SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
XP in Quarantine
Isolate and Protect Your Mission Critical Systems

Isolate XP with Unisys Stealth
Support for Windows XP ends April 8, 2014. Some
organizations cannot migrate. Mission critical systems
such as process control, point of sale, ATMs, Electronic
Health Records, and other critical environments are
vulnerable to security compromise.

any other network locations, particularly the Internet, or
can be allowed access to specific resources, such as the
enterprise’s core IT services.
Authenticated network users, if not authorized into the
appropriate COI, would not be able to detect or access the
set(s) of XP endpoints, regardless of network topology.

Unisys StealthTM is innovative software-based security that
makes endpoints virtually invisible on a network to users
or systems not explicitly authorized into the same secure
community group, called a Community of Interest (COI).

With Stealth, cyber attackers and malware cannot interact
with the XP workstations in any way. These XP workstations
can be cordoned off from the enterprise and external
network without requiring any physical network changes.

Stealth-protected endpoints running Windows XP are
designed to be undetectable, visible only to the specific
users that require access. The endpoints continue to
execute the same applications and control the same
instrumentation or other downstream devices with no
network reconfiguration and no creation of “air-gap” network
segments. The endpoints can be prevented from reaching

Value of Stealth Isolation and Protection
Isolating XP systems from the remainder of the network
greatly reduces the attack surface for the entire enterprise.
XP systems are predicted to be under heavy cyber scanning
when security patches terminate. Removing these systems
from hacker visibility will drive hackers to move to easier
You Can’t Hack What You Can’t See

targets. Additionally, if an XP endpoint is compromised, the
breach would be limited to only those systems in the same
COI, similar to quarantine. The remaining enterprise network
is not impacted.

Unisys Stealth is innovative software-based security
technology that is designed to:
•	 Segregate assets running unsupported Windows OS’s
from the rest of the network

A Few Use Cases
Unisys Stealth isolates mission critical systems to foster
secure, continuous operations.

•	 Mitigate risk associated with connectivity to the enterprise
network when no longer receiving security updates for
legacy OS’s

•	 Automation and Process Control Systems - Systems that
monitor and control industrial and critical infrastructure
processes including manufacturing, power generation
and transmission, chemical processing, and water
treatment are under strict regulation for security,
compliance and availability. For stability reasons and
because instrumentation devices downstream of the
control systems may not have upgrade capability, these
environments are not candidates for timely OS upgrades.

•	 Darken the segregated systems from would-be attackers
so they are not discoverable via typical network scanning
techniques	
•	 Allow access to core IT services if required, while 	
restricting access to the Internet

Contact

•	 Point of Sale or Payment Card Systems - Merchants
utilizing Point of Sale or other payment card systems
running Windows XP will be challenged to remain
compliant with the Payment Card Industry Data Security
Standard (PCI DSS) which states merchants must
ensure that all system components and software are
protected from known vulnerabilities by having the latest
vendor-supplied security patches installed. With Windows
vendor supplied patches terminating for XP, Unisys
Stealth can be used to cloak Point of Sale devices and
PCI processing systems to facilitate compliance.

stealth@unisys.com

•	 Automated Teller Machines - ATMs running unsupported
XP may become non-compliant with PCI requirements.
•	 Electronic Health Records - Electronic Health Record
and HIPAA regulations require specific protections to
ensure the security and confidentiality of electronic health
information and mandate that action be taken to properly
safeguard this data. Unisys Stealth proactively controls
access to servers and applications based on COI keys.

For more information visit www.unisys.com/stealthxp
© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, ClearPath and Unisys Stealth are registered trademarks or trademarks of Unisys Corporation.
All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.
Printed in the United States of America 	

01/14	

14-0013-B

Weitere ähnliche Inhalte

Was ist angesagt?

IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features rver21
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspectivenooralmousa
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practiceparves kamal
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-applSR NAIDU
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1MLG College of Learning, Inc
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data securityEffOne_Technologies
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001CUNIX INDIA
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101Jerod Brennen
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitalsMohammed Alabdali
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 

Was ist angesagt? (20)

What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-appl
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Renovo CE IT Overview
Renovo CE IT OverviewRenovo CE IT Overview
Renovo CE IT Overview
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
System security
System securitySystem security
System security
 

Andere mochten auch

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Corporation
 
Stealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicStealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicUnisys Corporation
 
Digital Generation CPG (German)
Digital Generation CPG (German)Digital Generation CPG (German)
Digital Generation CPG (German)Unisys Corporation
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services InfographicUnisys Corporation
 
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHICSURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHICUnisys Corporation
 

Andere mochten auch (8)

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Secure Your Mobile Enterprise
Secure Your Mobile EnterpriseSecure Your Mobile Enterprise
Secure Your Mobile Enterprise
 
Unisys Client 360
Unisys Client 360Unisys Client 360
Unisys Client 360
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries Infographic
 
Stealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicStealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey Infographic
 
Digital Generation CPG (German)
Digital Generation CPG (German)Digital Generation CPG (German)
Digital Generation CPG (German)
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services Infographic
 
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHICSURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
 

Ähnlich wie XP in Quarantine - Isolate and Protect Your Mission Critical Systems

ZERO DAY PLUS presentation
ZERO DAY PLUS presentationZERO DAY PLUS presentation
ZERO DAY PLUS presentationAlexander Rogan
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMAlienVault
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-WebGiovanni Maree
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper HelpSystems
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control SystemHemanth M
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesSymantec
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Introduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdfIntroduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdfArshak28
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesKrishna Chennareddy
 

Ähnlich wie XP in Quarantine - Isolate and Protect Your Mission Critical Systems (20)

OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
ZERO DAY PLUS presentation
ZERO DAY PLUS presentationZERO DAY PLUS presentation
ZERO DAY PLUS presentation
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Introduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdfIntroduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdf
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for Utilities
 

Mehr von Unisys Corporation

Unisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive BriefUnisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive BriefUnisys Corporation
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“Unisys Corporation
 
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...Unisys Corporation
 
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...Unisys Corporation
 
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN. DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.Unisys Corporation
 
Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Unisys Corporation
 
Digital Gen: Security Infographic
Digital Gen: Security InfographicDigital Gen: Security Infographic
Digital Gen: Security InfographicUnisys Corporation
 
Digital Gen: End User Services Infographic
Digital Gen: End User Services InfographicDigital Gen: End User Services Infographic
Digital Gen: End User Services InfographicUnisys Corporation
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure InfographicUnisys Corporation
 
Digital Generation Infographic
Digital Generation InfographicDigital Generation Infographic
Digital Generation InfographicUnisys Corporation
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security InfographicUnisys Corporation
 
Unisys Border Control / Protection Infographic
Unisys Border Control / Protection InfographicUnisys Border Control / Protection Infographic
Unisys Border Control / Protection InfographicUnisys Corporation
 
Unisys Security Insights Infographic: France
Unisys Security Insights Infographic: FranceUnisys Security Insights Infographic: France
Unisys Security Insights Infographic: FranceUnisys Corporation
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Corporation
 
Unisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: SpainUnisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: SpainUnisys Corporation
 
Unisys Security Insights Infographic: China
Unisys Security Insights Infographic: ChinaUnisys Security Insights Infographic: China
Unisys Security Insights Infographic: ChinaUnisys Corporation
 

Mehr von Unisys Corporation (20)

Elevate™ by Unisys
Elevate™ by UnisysElevate™ by Unisys
Elevate™ by Unisys
 
Unisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive BriefUnisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive Brief
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Digital Generation CPG UK
Digital Generation CPG UKDigital Generation CPG UK
Digital Generation CPG UK
 
DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“
 
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
 
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
 
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN. DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 
Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic
 
Digital Gen Infographic
Digital Gen InfographicDigital Gen Infographic
Digital Gen Infographic
 
Digital Gen: Security Infographic
Digital Gen: Security InfographicDigital Gen: Security Infographic
Digital Gen: Security Infographic
 
Digital Gen: End User Services Infographic
Digital Gen: End User Services InfographicDigital Gen: End User Services Infographic
Digital Gen: End User Services Infographic
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic
 
Digital Generation Infographic
Digital Generation InfographicDigital Generation Infographic
Digital Generation Infographic
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
Unisys Border Control / Protection Infographic
Unisys Border Control / Protection InfographicUnisys Border Control / Protection Infographic
Unisys Border Control / Protection Infographic
 
Unisys Security Insights Infographic: France
Unisys Security Insights Infographic: FranceUnisys Security Insights Infographic: France
Unisys Security Insights Infographic: France
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: Netherlands
 
Unisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: SpainUnisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: Spain
 
Unisys Security Insights Infographic: China
Unisys Security Insights Infographic: ChinaUnisys Security Insights Infographic: China
Unisys Security Insights Infographic: China
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

XP in Quarantine - Isolate and Protect Your Mission Critical Systems

  • 1. XP in Quarantine Isolate and Protect Your Mission Critical Systems Isolate XP with Unisys Stealth Support for Windows XP ends April 8, 2014. Some organizations cannot migrate. Mission critical systems such as process control, point of sale, ATMs, Electronic Health Records, and other critical environments are vulnerable to security compromise. any other network locations, particularly the Internet, or can be allowed access to specific resources, such as the enterprise’s core IT services. Authenticated network users, if not authorized into the appropriate COI, would not be able to detect or access the set(s) of XP endpoints, regardless of network topology. Unisys StealthTM is innovative software-based security that makes endpoints virtually invisible on a network to users or systems not explicitly authorized into the same secure community group, called a Community of Interest (COI). With Stealth, cyber attackers and malware cannot interact with the XP workstations in any way. These XP workstations can be cordoned off from the enterprise and external network without requiring any physical network changes. Stealth-protected endpoints running Windows XP are designed to be undetectable, visible only to the specific users that require access. The endpoints continue to execute the same applications and control the same instrumentation or other downstream devices with no network reconfiguration and no creation of “air-gap” network segments. The endpoints can be prevented from reaching Value of Stealth Isolation and Protection Isolating XP systems from the remainder of the network greatly reduces the attack surface for the entire enterprise. XP systems are predicted to be under heavy cyber scanning when security patches terminate. Removing these systems from hacker visibility will drive hackers to move to easier
  • 2. You Can’t Hack What You Can’t See targets. Additionally, if an XP endpoint is compromised, the breach would be limited to only those systems in the same COI, similar to quarantine. The remaining enterprise network is not impacted. Unisys Stealth is innovative software-based security technology that is designed to: • Segregate assets running unsupported Windows OS’s from the rest of the network A Few Use Cases Unisys Stealth isolates mission critical systems to foster secure, continuous operations. • Mitigate risk associated with connectivity to the enterprise network when no longer receiving security updates for legacy OS’s • Automation and Process Control Systems - Systems that monitor and control industrial and critical infrastructure processes including manufacturing, power generation and transmission, chemical processing, and water treatment are under strict regulation for security, compliance and availability. For stability reasons and because instrumentation devices downstream of the control systems may not have upgrade capability, these environments are not candidates for timely OS upgrades. • Darken the segregated systems from would-be attackers so they are not discoverable via typical network scanning techniques • Allow access to core IT services if required, while restricting access to the Internet Contact • Point of Sale or Payment Card Systems - Merchants utilizing Point of Sale or other payment card systems running Windows XP will be challenged to remain compliant with the Payment Card Industry Data Security Standard (PCI DSS) which states merchants must ensure that all system components and software are protected from known vulnerabilities by having the latest vendor-supplied security patches installed. With Windows vendor supplied patches terminating for XP, Unisys Stealth can be used to cloak Point of Sale devices and PCI processing systems to facilitate compliance. stealth@unisys.com • Automated Teller Machines - ATMs running unsupported XP may become non-compliant with PCI requirements. • Electronic Health Records - Electronic Health Record and HIPAA regulations require specific protections to ensure the security and confidentiality of electronic health information and mandate that action be taken to properly safeguard this data. Unisys Stealth proactively controls access to servers and applications based on COI keys. For more information visit www.unisys.com/stealthxp © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, ClearPath and Unisys Stealth are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Printed in the United States of America 01/14 14-0013-B