Professional Documents
Culture Documents
Stealth Intro
Stealth Intro
for Network
networks
• Complex DC 2
WAN 3
DC 1
DC 2
DC 3
Stealth
Network Appliance
Data
• Confidentiality
• Integrity
• Availability
Page 3
What is the Unisys Stealth Solution?
But more than that, the Stealth Solution allows multiple communities
of interest to share the same network without fear of another group
accessing their data or even their workstations and servers.
1 3
2 2 1 1 2 1 3 3 3
1 3
2 2 1 1 2 1 3 3 3
Community of Interest 1
Community of Interest 2
Community of Interest 3
1 3
2 2 1 1 2 1 3 3 3
Community of Interest 1
Community of Interest 2
Community of Interest 3
•
Stealth Delivers Defense-Level Encryption
… 100 … … 00 … … 111 …
NIC
Destination device
NIC
Parsed Intranet
Page 12
Reliability / Integrity
Encryption
Open Session Request Split Key
Key
AES-256 Encryption using Workgroup Key
Parsed using
Workgroup Key
Application
OS
7. Application Network Stack
6. Presentation
5. Session
4. Transport
3. Network
2. Link
Stealth
1. Physical
NIC
Internet
Stealth conserves
•
• Space
• Weight
• Power
• Heat Generation
•
Stealth
Network Appliance
Data
• Confidentiality
• Integrity
• Availability
Page 21
Commercial Network
Stealth in the DoD Network l or
y s ica
h
t ip le p
u l
t h m
w i
u e s s in
i s s o r k a w s
e t w , l
Sam cal n e a r e a t io n s
i l
log ealth C l LAN / WAN /Wireless
r e g u
• H nanci n a w it h
i io n c e
• F ucat plia
Stealth
d com tices
Network Appliance
• E c
t o p r a Data
due b e s t • Confidentiality
a n d • Integrity
• Availability
Page 22
Server Outsourcing Today
Customer A Unisys Outsourcing Facility
Customer A
Tier 1 Virtual Server
Customer A
Tier 2 Virtual Server
Virtual Servers
Customer B Customer B
Virtual Server
Customer B
Virtual Server
Customer A Customer B
Customer A
Tier 1 Virtual Server
Customer B
Virtual Server
Virtual Servers
Customer B Customer B
Virtual Server
Customer A
Tier 2 Virtual Server
Stealth Ensures:
•Customer A can only communicate with Customer A Tier 1 VS
•Customer A Tier 2 VS can only communicate with Customer A Tier 1 VS
•Customer B can only communicate with Customer B Virtual Servers
Customer A Customer B
Stealth Ensures:
•Customer A can only communicate with Customer A Tier 1 VS
•Customer A Tier 2 VS can only communicate with Customer A Tier 1 VS
•Customer B can only communicate with Customer B Virtual Servers
Customer A Customer B
Need to
•
• Promote sharing
• Extend the enterprise
• Strengthen agility
• Ensure trust
•
Questions?
UnisysStealthSolution.com
Stealth@Unisys.com