Sign in
Your Saved List Partners Sell in AWS Marketplace Amazon Web Services Home Help

Unisys Stealth(cloud) on Red Hat Enterprise Linux 6

Unisys Stealth(cloud) on Red Hat Enterprise Linux 6

By: Unisys Corporation Latest Version:

This version has been removed and is no longer available to new customers.

Product Overview

Unisys Stealth(cloud)® delivers award-winning technology that provides an additional layer of security for your AWS EC2 instances. As a leading micro-segmentation solution, Stealth(cloud) defends against east-west attacks within your AWS Virtual Private Cloud (VPC) and isolates your EC2 instances from other users in the cloud. Stealth(cloud) also protects against internal and external threats by cloaking EC2 instances and encrypting communication between EC2 instances in your VPC. Its role-base security approach provides you with the freedom to successfully expand your enterprise with confidence. Stealth(cloud) reduces complexity by flattening networks to facilitate simple management of security for the data center within the cloud. In addition to enhanced encryption, Stealth extends the level of security provided by AWS to help you effectively address regulatory and compliance standards such as PCI DSS, HIPAA, and SOX. IMPORTANT: STEALTH(CLOUD) ENTERPRISE MANAGER ( MUST BE DEPLOYED FIRST within a VPC, prior to deploying Stealth(cloud) EC2 instances. After Stealth(cloud) Enterprise Manager is deployed, you can launch multiple EC2 instances with Stealth(cloud) within the same VPC and gain the full benefits of Stealth security beginning at launch time. Test drive Stealth(cloud) right now at, or start your free 30 day trial today. Visit to learn more!


Operating System

Linux/Unix, Red Hat Enterprise Linux 6.7

Delivery Methods

  • CloudFormation Template

Pricing Information

Usage Information

Support Information

Customer Reviews