ZTX Platform

ZTX Platform

SecureTrust Cyber
+
+

Related Products

  • Keeper Security
    1,751 Ratings
    Visit Website
  • Cloudflare
    1,918 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • Auth0
    1,003 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ManageEngine Endpoint Central
    2,505 Ratings
    Visit Website
  • Auvik
    675 Ratings
    Visit Website
  • ManageEngine OpManager
    1,631 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website

About

Traditional security controls are insufficient to protect from cyberattacks in the digital age, compelling organizations to adopt a Zero Trust Network. The principles are simple – trust no user or device, inside or outside the private network and grant as little access as possible upon reliable identification. Implementing these principles can be complex – solutions that require expensive, time-consuming upgrades to existing network infrastructure make the move to Zero Trust prohibitive. Unisys Stealth is a flexible cybersecurity software built on identity-based encrypted microsegmentation that transforms your existing network – both on-premises and in the cloud – into a Zero Trust Network. Unisys Stealth products and services offer cybersecurity solutions that maximize your security posture, maintain regulatory compliance and protect your organization.

About

The ZTX Platform is a fully managed, engineer-led cybersecurity solution that delivers Zero Trust security in a streamlined, scalable package. It unifies SASE, XDR, SIEM, RMM, and micro-segmentation into a single platform installed and operational within one business day. ZTX is licensed per seat, making it cost-effective and flexible for growing organizations. The platform offers centralized monitoring, real-time threat detection, automated response, and strict policy enforcement. Each user session is isolated via encrypted tunnels, preventing lateral movement and ensuring compliance. Ideal for companies seeking simplified, high-performance cybersecurity without managing multiple tools.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Cybersecurity teams searching for an advanced IT Security solution

Audience

Small to mid-sized enterprises (SMEs) Managed Security Service Providers (MSSPs) Compliance-focused organizations (HIPAA, CMMC, ISO 27001, etc.) IT/security teams looking for fully managed cybersecurity Regulated industries: healthcare, finance, legal, manufacturing

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$30/month per device
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Unisys
Founded: 1986
United States
www.unisys.com/offerings/security-solutions/unisys-stealth-products-and-services

Company Information

SecureTrust Cyber
Founded: 2018
United States
securetrust.io

Alternatives

Alternatives

RidgeShield

RidgeShield

Ridge Security
Enclave

Enclave

SideChannel
Zero Networks Segment

Zero Networks Segment

Zero Networks
Perimeter 81

Perimeter 81

Check Point Software Technologies

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

RMM Features

Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

AWS AI Services
OpenAI
SentinelOne Purple AI
Splunk Enterprise

Integrations

AWS AI Services
OpenAI
SentinelOne Purple AI
Splunk Enterprise
Claim Unisys Stealth and update features and information
Claim Unisys Stealth and update features and information
Claim ZTX Platform and update features and information
Claim ZTX Platform and update features and information