Phoenix Datacom to make networks and datacentres invisible to hackers, with Unisys Stealth
Aylesbury, Buckinghamshire, UK (PRWEB UK) 24 July 2013 -- Phoenix Datacom Ltd, the UK’s most technically competent provider of solutions and professional services to enhance the performance and security of networks and applications has announced it can make customer networks and datacentres ‘disappear’ – in effect, making them invisible to hackers.
Government-grade NSA EAL4+ certified technology
Now available to Enterprise network owners, this new solution, codenamed Stealth, was developed specifically for the US Department of Defence (DoD) by Phoenix Datacom’s partner Unisys - to dramatically reduce the attack surface of the DoD’s network and critical assets.
Integrated to existing infrastructures without the need for application changes or network re-engineering, Unisys Stealth creates a logical tunnel between data communication end-points to only those who are pre-identified as part of the defined access zone. Members of these zones seem as though they are alone on the network and are invisible to anyone or any devices not in the same zone.
Stealth technology includes a set of algorithms which scramble data at the bit level into multiple packets as the data moves through the network. The packets, secured using certified encryption, are then reassembled for delivery to the authorised users. Even if the packets were intercepted and their encryption decoded, the contents would prove meaningless without being reassembled with the related packets.
John Carson, Managing Director of Phoenix Datacom said, “Unisys Stealth represents a technological breakthrough in the way we can protect the network and crown jewels from the threat of cyber-crime. Stealth is so much more than just another security layer because it allows you to cloak the network, so as far as those who should not require access are concerned, anything that has been ‘cloaked’ by Unisys Stealth simply does not exist.”
Using a pre-configured USB device, Stealth can also provide secure remote access through an un-hackable and un-traceable tunnel between a public PC and the ‘Stealthed’ areas of the network and datacentre.
Carson went on to say, “With highly-publicised attacks and breaches on the increase, Unisys Stealth could not come at a better time. We believe that companies and organisations using Stealth to make the network and crown jewels completely invisible to hackers and potential internal threats are ruling themselves out from being the next target to suffer a highly-publicised and damaging event.”
-Ends-
More information about the Stealth Solution can be found on the Phoenix Datacom web site here: http://www.phoenixdatacom.com/stealth
About Phoenix Datacom
Founded in 1984 and located in Aylesbury, Buckinghamshire, Phoenix Datacom is the UK’s most technically competent provider of solutions and professional services to enhance the performance & security of cloud, physical and virtual networks.
We are trusted by major UK organisations, including Enterprise Network Owners in Private and Public Sectors and Defence, Network Equipment Manufacturers and most of the Fixed and Mobile Carriers and Broadcast providers to help them test, monitor, secure and optimise their networks & critical applications.
Richard Clothier, Phoenix Datacom, http://www.phoenixdatacom.com, +44(0)1296 397711, [email protected]
Share this article