Security

You can’t hack what you can’t see.

Fusion’s UTM solution was developed by Unisys for the Department of Defense, and protects data in motion across the network as well as at rest.  Uniquely, the solution renders end points invisible on a network.

Security

Fusion’s UTM is identity based, not location or physical topology. Deployment requires no changes to the user environment and the service can operate over existing customer equipment, providing the same level of data segmentation and security across all network types.

Main benefits include:

  • Unprecedented security and value
  • Highest security performance: Designed for the Department of Defense; NSA-certified
  • Facilitates HIPAA compliance rules for data encryption
  • Protects PHI and other sensitive data across the hospital campus
  • Identity-based management; creates Communities of Interest, based on user credentials and not device location or physical topology
  • Secures off-site data access
  • Avoids the cost of data breaches
  • Easy, quick deployment
  • Incremental implementation
  • No application changes
  • Efficiencies in network infrastructure saves capital and operating expenses

Comprehensive Security Solutions

  • Managed security services
  • Managed firewalls
  • IPS services
  • Application firewalls
  • Content scanning
  • Email and web scanning

Identity and Access Management

  • Facilitated access management
  • Automated authentication
  • IDs managed across multiple systems
  • SSL Certificates
  • Credential issuance service
  • Enterprise Identity Services
  • Web access management

Response and Analytics

  • IDS services
  • Rapid response service
  • Security operations
  • Threat and vulnerability assessments
  • Log aggregation
  • Digital forensics

Risk and Compliance

  • Integrated risk and compliance solutions
  • Security management
  • PCI compliance
  • Vulnerability Management
  • Application vulnerability scanning

Secure Mobile Device Management

Fusion has responded to the burgeoning growth in mobile device type and usage with a best-in-class solution that manages mobile devices across multiple platforms, including iOS, Blackberry and Windows mobile platforms.  Offering a real time view of all mobile devices deployed across an enterprise, the solution manages the complete lifecycle of mobile assets, streamlining device deployments, enrollments and configurations by centrally tracking, monitoring and modifying mobile assets. Fusion’s solutions have been customized and developed with a focus on securing the data moving across the devices, integrating the solutions with our Stealth Cybersecurity solution, while at the same time managing access across locations, roles and functions.