Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Unisys Intelligent Workplace Services significantly shorten resolution times while enhancing employee satisfaction by offering a contemporary, persona-driven service desk that features remote, self-healing, and proactive problem-solving as its primary service layer. The company provides seamless services through cutting-edge collaboration tools and merged reality applications, alongside quick-access asset lockers and vending machines for everyday IT supplies. Unisys Intelligent Workplace Services guarantee prompt and effective repairs or replacements for your devices. In addition to these services, you will benefit from on-site desk-side support and dispatch assistance, all while enjoying comprehensive lifecycle management of your assets throughout the organization, which includes installation, modifications, recycling, IT supply chain management, and depot requirements. Furthermore, the advanced InteliServe Platform by Unisys offers a variety of support channels, leverages sophisticated analytics, and integrates Artificial Intelligence (AI) with robotic process automation features. This holistic approach not only streamlines operations but also fosters a more efficient and responsive workplace environment.

Description

In the modern digital landscape, conventional security measures fall short in defending against cyber threats, which necessitates that organizations embrace a Zero Trust Network approach. This model operates on straightforward principles: no user or device is trusted, whether they are within the internal network or external to it, and access is minimized based on verified identity. While these principles are easy to understand, the process of implementation can pose significant challenges, particularly when it involves costly and lengthy upgrades to current network systems that may deter organizations from transitioning to Zero Trust. However, Unisys Stealth offers a versatile cybersecurity solution that leverages identity-based encrypted microsegmentation to seamlessly convert your existing infrastructure—whether on-premises or cloud-based—into a Zero Trust Network. With Unisys Stealth, businesses gain access to a suite of products and services designed to enhance their security posture, ensure regulatory adherence, and safeguard their operations. This innovative approach empowers organizations to proactively address vulnerabilities while fostering a more resilient security framework.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

TheEye

Integrations

TheEye

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Unisys

Country

United States

Website

www.unisys.com/siteassets/collateral/solution-brief/ex_210218_unisysintelligentworkplaceservices.pdf

Vendor Details

Company Name

Unisys

Founded

1986

Country

United States

Website

www.unisys.com/offerings/security-solutions/unisys-stealth-products-and-services

Product Features

Digital Workplace

Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Alternatives

Alternatives

RidgeShield Reviews

RidgeShield

Ridge Security
Enclave Reviews

Enclave

SideChannel
Riverbed Aternity Reviews

Riverbed Aternity

Riverbed Technology
Gzip Reviews

Gzip

GNU Operating System