SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
XP in Quarantine
Isolate and Protect Your Mission Critical Systems

Isolate XP with Unisys Stealth
Support for Windows XP ends April 8, 2014. Some
organizations cannot migrate. Mission critical systems
such as process control, point of sale, ATMs, Electronic
Health Records, and other critical environments are
vulnerable to security compromise.

any other network locations, particularly the Internet, or
can be allowed access to specific resources, such as the
enterprise’s core IT services.
Authenticated network users, if not authorized into the
appropriate COI, would not be able to detect or access the
set(s) of XP endpoints, regardless of network topology.

Unisys StealthTM is innovative software-based security that
makes endpoints virtually invisible on a network to users
or systems not explicitly authorized into the same secure
community group, called a Community of Interest (COI).

With Stealth, cyber attackers and malware cannot interact
with the XP workstations in any way. These XP workstations
can be cordoned off from the enterprise and external
network without requiring any physical network changes.

Stealth-protected endpoints running Windows XP are
designed to be undetectable, visible only to the specific
users that require access. The endpoints continue to
execute the same applications and control the same
instrumentation or other downstream devices with no
network reconfiguration and no creation of “air-gap” network
segments. The endpoints can be prevented from reaching

Value of Stealth Isolation and Protection
Isolating XP systems from the remainder of the network
greatly reduces the attack surface for the entire enterprise.
XP systems are predicted to be under heavy cyber scanning
when security patches terminate. Removing these systems
from hacker visibility will drive hackers to move to easier
You Can’t Hack What You Can’t See

targets. Additionally, if an XP endpoint is compromised, the
breach would be limited to only those systems in the same
COI, similar to quarantine. The remaining enterprise network
is not impacted.

Unisys Stealth is innovative software-based security
technology that is designed to:
•	 Segregate assets running unsupported Windows OS’s
from the rest of the network

A Few Use Cases
Unisys Stealth isolates mission critical systems to foster
secure, continuous operations.

•	 Mitigate risk associated with connectivity to the enterprise
network when no longer receiving security updates for
legacy OS’s

•	 Automation and Process Control Systems - Systems that
monitor and control industrial and critical infrastructure
processes including manufacturing, power generation
and transmission, chemical processing, and water
treatment are under strict regulation for security,
compliance and availability. For stability reasons and
because instrumentation devices downstream of the
control systems may not have upgrade capability, these
environments are not candidates for timely OS upgrades.

•	 Darken the segregated systems from would-be attackers
so they are not discoverable via typical network scanning
techniques	
•	 Allow access to core IT services if required, while 	
restricting access to the Internet

Contact

•	 Point of Sale or Payment Card Systems - Merchants
utilizing Point of Sale or other payment card systems
running Windows XP will be challenged to remain
compliant with the Payment Card Industry Data Security
Standard (PCI DSS) which states merchants must
ensure that all system components and software are
protected from known vulnerabilities by having the latest
vendor-supplied security patches installed. With Windows
vendor supplied patches terminating for XP, Unisys
Stealth can be used to cloak Point of Sale devices and
PCI processing systems to facilitate compliance.

stealth@unisys.com

•	 Automated Teller Machines - ATMs running unsupported
XP may become non-compliant with PCI requirements.
•	 Electronic Health Records - Electronic Health Record
and HIPAA regulations require specific protections to
ensure the security and confidentiality of electronic health
information and mandate that action be taken to properly
safeguard this data. Unisys Stealth proactively controls
access to servers and applications based on COI keys.

For more information visit www.unisys.com/stealthxp
© 2014 Unisys Corporation. All rights reserved.
Unisys, the Unisys logo, ClearPath and Unisys Stealth are registered trademarks or trademarks of Unisys Corporation.
All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders.
Printed in the United States of America 	

01/14	

14-0013-B

Contenu connexe

Tendances

Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
nooralmousa
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
Ian Sommerville
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-appl
SR NAIDU
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
Jerod Brennen
 

Tendances (20)

What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-appl
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Renovo CE IT Overview
Renovo CE IT OverviewRenovo CE IT Overview
Renovo CE IT Overview
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
System security
System securitySystem security
System security
 

En vedette

En vedette (8)

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Secure Your Mobile Enterprise
Secure Your Mobile EnterpriseSecure Your Mobile Enterprise
Secure Your Mobile Enterprise
 
Unisys Client 360
Unisys Client 360Unisys Client 360
Unisys Client 360
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries Infographic
 
Stealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey InfographicStealth Secures Along Every Step of Your Journey Infographic
Stealth Secures Along Every Step of Your Journey Infographic
 
Digital Generation CPG (German)
Digital Generation CPG (German)Digital Generation CPG (German)
Digital Generation CPG (German)
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services Infographic
 
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHICSURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
SURVEY RESULTS: ACCELERATING INNOVATION AND THE DIGITAL JOURNEY - INFOGRAPHIC
 

Similaire à XP in Quarantine - Isolate and Protect Your Mission Critical Systems

ZERO DAY PLUS presentation
ZERO DAY PLUS presentationZERO DAY PLUS presentation
ZERO DAY PLUS presentation
Alexander Rogan
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
Giovanni Maree
 

Similaire à XP in Quarantine - Isolate and Protect Your Mission Critical Systems (20)

OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
ZERO DAY PLUS presentation
ZERO DAY PLUS presentationZERO DAY PLUS presentation
ZERO DAY PLUS presentation
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Introduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdfIntroduction to Embedded System Architecture and Design.docx.pdf
Introduction to Embedded System Architecture and Design.docx.pdf
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for Utilities
 

Plus de Unisys Corporation

Plus de Unisys Corporation (20)

Elevate™ by Unisys
Elevate™ by UnisysElevate™ by Unisys
Elevate™ by Unisys
 
Unisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive BriefUnisys Integrated Medical Device Management - Executive Brief
Unisys Integrated Medical Device Management - Executive Brief
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Digital Generation CPG UK
Digital Generation CPG UKDigital Generation CPG UK
Digital Generation CPG UK
 
DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“
 
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
 
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
 
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN. DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 
Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic
 
Digital Gen Infographic
Digital Gen InfographicDigital Gen Infographic
Digital Gen Infographic
 
Digital Gen: Security Infographic
Digital Gen: Security InfographicDigital Gen: Security Infographic
Digital Gen: Security Infographic
 
Digital Gen: End User Services Infographic
Digital Gen: End User Services InfographicDigital Gen: End User Services Infographic
Digital Gen: End User Services Infographic
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic
 
Digital Generation Infographic
Digital Generation InfographicDigital Generation Infographic
Digital Generation Infographic
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
Unisys Border Control / Protection Infographic
Unisys Border Control / Protection InfographicUnisys Border Control / Protection Infographic
Unisys Border Control / Protection Infographic
 
Unisys Security Insights Infographic: France
Unisys Security Insights Infographic: FranceUnisys Security Insights Infographic: France
Unisys Security Insights Infographic: France
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: Netherlands
 
Unisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: SpainUnisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: Spain
 
Unisys Security Insights Infographic: China
Unisys Security Insights Infographic: ChinaUnisys Security Insights Infographic: China
Unisys Security Insights Infographic: China
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

XP in Quarantine - Isolate and Protect Your Mission Critical Systems

  • 1. XP in Quarantine Isolate and Protect Your Mission Critical Systems Isolate XP with Unisys Stealth Support for Windows XP ends April 8, 2014. Some organizations cannot migrate. Mission critical systems such as process control, point of sale, ATMs, Electronic Health Records, and other critical environments are vulnerable to security compromise. any other network locations, particularly the Internet, or can be allowed access to specific resources, such as the enterprise’s core IT services. Authenticated network users, if not authorized into the appropriate COI, would not be able to detect or access the set(s) of XP endpoints, regardless of network topology. Unisys StealthTM is innovative software-based security that makes endpoints virtually invisible on a network to users or systems not explicitly authorized into the same secure community group, called a Community of Interest (COI). With Stealth, cyber attackers and malware cannot interact with the XP workstations in any way. These XP workstations can be cordoned off from the enterprise and external network without requiring any physical network changes. Stealth-protected endpoints running Windows XP are designed to be undetectable, visible only to the specific users that require access. The endpoints continue to execute the same applications and control the same instrumentation or other downstream devices with no network reconfiguration and no creation of “air-gap” network segments. The endpoints can be prevented from reaching Value of Stealth Isolation and Protection Isolating XP systems from the remainder of the network greatly reduces the attack surface for the entire enterprise. XP systems are predicted to be under heavy cyber scanning when security patches terminate. Removing these systems from hacker visibility will drive hackers to move to easier
  • 2. You Can’t Hack What You Can’t See targets. Additionally, if an XP endpoint is compromised, the breach would be limited to only those systems in the same COI, similar to quarantine. The remaining enterprise network is not impacted. Unisys Stealth is innovative software-based security technology that is designed to: • Segregate assets running unsupported Windows OS’s from the rest of the network A Few Use Cases Unisys Stealth isolates mission critical systems to foster secure, continuous operations. • Mitigate risk associated with connectivity to the enterprise network when no longer receiving security updates for legacy OS’s • Automation and Process Control Systems - Systems that monitor and control industrial and critical infrastructure processes including manufacturing, power generation and transmission, chemical processing, and water treatment are under strict regulation for security, compliance and availability. For stability reasons and because instrumentation devices downstream of the control systems may not have upgrade capability, these environments are not candidates for timely OS upgrades. • Darken the segregated systems from would-be attackers so they are not discoverable via typical network scanning techniques • Allow access to core IT services if required, while restricting access to the Internet Contact • Point of Sale or Payment Card Systems - Merchants utilizing Point of Sale or other payment card systems running Windows XP will be challenged to remain compliant with the Payment Card Industry Data Security Standard (PCI DSS) which states merchants must ensure that all system components and software are protected from known vulnerabilities by having the latest vendor-supplied security patches installed. With Windows vendor supplied patches terminating for XP, Unisys Stealth can be used to cloak Point of Sale devices and PCI processing systems to facilitate compliance. stealth@unisys.com • Automated Teller Machines - ATMs running unsupported XP may become non-compliant with PCI requirements. • Electronic Health Records - Electronic Health Record and HIPAA regulations require specific protections to ensure the security and confidentiality of electronic health information and mandate that action be taken to properly safeguard this data. Unisys Stealth proactively controls access to servers and applications based on COI keys. For more information visit www.unisys.com/stealthxp © 2014 Unisys Corporation. All rights reserved. Unisys, the Unisys logo, ClearPath and Unisys Stealth are registered trademarks or trademarks of Unisys Corporation. All other brands and products referenced herein are acknowledged to be trademarks or registered trademarks of their respective holders. Printed in the United States of America 01/14 14-0013-B