+
+

Related Products

  • Keeper Security
    1,751 Ratings
    Visit Website
  • Sumsub
    202 Ratings
    Visit Website
  • HERE Enterprise Browser
    2 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,505 Ratings
    Visit Website
  • Thinfinity Workspace
    14 Ratings
    Visit Website
  • OfficeSpace Software
    173 Ratings
    Visit Website
  • Auth0
    1,003 Ratings
    Visit Website
  • FusionAuth
    174 Ratings
    Visit Website
  • Synerion
    98 Ratings
    Visit Website
  • Iru
    1,487 Ratings
    Visit Website

About

A connected workforce is transformed with safe, secure, and simple applications. Transform access across the enterprise with biometrics, Zero Trust, and nonrepudiation made easy on one secure workplace wearable. Sign off on critical processes with stronger data integrity and identity assurance. Our standards-based approach and vast partner network means we connect to your existing infrastructure. Nymi’s workplace wearable, the Nymi Band, provides organizations with a platform to achieve zero-trust security principles and biometric authorization with the additional ability to solve a variety of challenges that impact productivity, compliance, health/safety, and culture. As part of its diverse, global enterprise customer base, Nymi serves the world’s largest enterprises with deployments across 15 countries to deliver data integrity and security, allowing highly regulated industries to achieve compliance securely and efficiently.

About

Traditional security controls are insufficient to protect from cyberattacks in the digital age, compelling organizations to adopt a Zero Trust Network. The principles are simple – trust no user or device, inside or outside the private network and grant as little access as possible upon reliable identification. Implementing these principles can be complex – solutions that require expensive, time-consuming upgrades to existing network infrastructure make the move to Zero Trust prohibitive. Unisys Stealth is a flexible cybersecurity software built on identity-based encrypted microsegmentation that transforms your existing network – both on-premises and in the cloud – into a Zero Trust Network. Unisys Stealth products and services offer cybersecurity solutions that maximize your security posture, maintain regulatory compliance and protect your organization.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies interested in a biometrics solution to protect employees with smart health & safety applications

Audience

Cybersecurity teams searching for an advanced IT Security solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Nymi
Founded: 2011
Canada
www.nymi.com

Company Information

Unisys
Founded: 1986
United States
www.unisys.com/offerings/security-solutions/unisys-stealth-products-and-services

Alternatives

Aruba ClearPass

Aruba ClearPass

Aruba Networks

Alternatives

RidgeShield

RidgeShield

Ridge Security
PortalGuard

PortalGuard

BIO-key International
WEB-key

WEB-key

BIO-key
Enclave

Enclave

SideChannel
Zero Networks Segment

Zero Networks Segment

Zero Networks

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Integrations

Eviden MDR Service
Graphical Documentation (GDOC)
HID IdenTrust
Microsoft 365
OneLogin
Ping Identity

Integrations

Eviden MDR Service
Graphical Documentation (GDOC)
HID IdenTrust
Microsoft 365
OneLogin
Ping Identity
Claim Nymi and update features and information
Claim Nymi and update features and information
Claim Unisys Stealth and update features and information
Claim Unisys Stealth and update features and information