pGet in touch with us:  +44 (0) 1252 757181

User/Device Segmenation

As employees (including Administrators) use more devices from different locations to perform their job functions, the desire to restrict and limit what systems and data can be accessed, depending on where the person is or from what type of device is greater than ever. (Corporate owned fixed PC, mobile device or User owned BYOD etc.)

Following the fundamental security design principle of “Need to Know”, Unisys Stealth™ ensure this objective is met, not only dependant on who you are, but also if on a trusted (Stealth enabled) device.

With the recent announcement of Stealth for Mobile this level of security in protecting corporate systems and data will soon be extended to mobile device types.

In the above example a Stealth Appliance acts as a Gateway -

  • The HR User’s mobile device does not have Stealth installed / enabled, so therefore cannot see or use the HR apps in this case.
  • The Finance User does have Stealth running on the mobile device so as the User is in the Finance COI, has the same access to the application(s).

Get in Contact






RealServe IT’s expertise and experience within the virtual desktop space allowed us to make informed design decisions, which in turn meant we were able to define our project requirements more efficiently.

Kevin Page - Systems Development & Integration.

Capgemini

We are delighted to have been working with RealServe IT since 2008 and have no reservations in highly recommending them as a consulting partner; to provide expert services for our Atlantis ILIO product portfolio.

Rajiv Pimplaskar - Vice President of Sales.

Atlantis (Vendor)

The knowledge and flexibility of RealServe IT allowed them to work with us and not for us. They recognised our own skills and worked with us to architect a superior solution at a fraction of the time and cost.

Antony Pugh - IT Service Delivery Manager.

Berendsen UK Limited

Our Partners