• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Write for Us
  • Contact
  • Advertise
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Do Not Sell My Personal Information
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Unisys’ Stealth network traffic hider is better than encryption

Updated on May 7, 2014 by Guest Authors

The recent slew of cyber attacks that did not even spare encryption technologies from their wrath brings to mind Unisys’ network traffic protection tool that could have prevented them: Stealth. As the name suggests, the appliance works to hide private, two-way communications from hackers and eavesdroppers.

Stealth was developed in 2005 by Unisys to support the U.S. Defense Department’s efforts to boost network security. What’s unique about this tool is that even man-in-the-middle attacks and keylogger exploits have never been known to have successfully breached and compromised its security. It is really a wonder then why it did not gain much traction in a technology landscape constantly besieged by cyber threats and malicious attacks.

stealth-network

The commercial sector has gained access to Stealth a few years ago when Unisys opened the appliance to the public, which has long been in dire need for a advanced security systems to protect their network from snoopers. Stealth shields network infrastructure in four layers, which comprise an AES256 encryption for each packet and three different security protocols for certain users to run.

These groups of users communicate with each other through computers that exchange information in a highly secure environment to prevent traffic interception by third-party groups. For example, you want to communicate with two business customers, but the two of them will never be able to view each other’s network traffic. That is so because Stealth runs a packet driver that hides the communication line from eavesdroppers over the Web.

At the very basic level Stealth works as an added layer to your existing network security. Even the walking dead Windows XP can still be secured by shielding its applications with Stealth and select the users who can have access to the network, practically excluding the unauthorized from participating. That is especially helpful in cases where attackers attempt to penetrate private exchange of communications.

After implementing the Stealth appliance in your network servers, you may observe that two computers previously seen exchanging communications have ceased the interaction. It is an indication that the communication channel is now being hidden from outsiders. The only real problem with this is when power is shut down during outages, in which case a backup supply is necessary.

Then there is the issue of escalated privilege, or increased administrative rights for users, which must be monitored because anyone who has access to the tool might decide to alter the security settings of the feature, thus exposing your network to attackers.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Keychron K4 Wireless Mechanical Keyboard Review – The Biggest & The Best?

Keychron K6 Wireless Mechanical Keyboard Review – Nice Balance Between Design and Function

AuthenTrend AT.Wallet Fingerprint Cryptocurrency Wallet Review – The Coolest One You Can Buy

Yeedi K650 Robot Vacuum Review – A Good Basic Vacuum

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Samsung Galaxy S21 Ultra Model Number SM-G998* Differences
  • Samsung Galaxy S21+ 5G Model Number SM-G996* Differences
  • Samsung Galaxy S21 5G Model Number SM-G991* Differences
  • How to Read and Write to NTFS Drives on Apple M1 Mac?

Copyright © 2021 · All Rights Reserved