Understanding Stealth Security

Stealth protects the communication between different components in your environment through the use of Communities of Interest (COIs). Communities of Interest enable you to configure which groups of physical servers, virtual machines, and ClearPath Forward partitions can communicate with one another, with other components in your environment, and with components outside of the secured environment. The network traffic for each COI is cryptographically separated using defense-grade cryptographic algorithms.

In this way, Stealth enables multiple user communities to securely share the same IT infrastructure. Stealth isolates applications so that only the authorized users can see and access the data unique to that application. The Stealth Authorization Service provides centralized authorization to protect the communication between Stealth endpoints (workstations, servers, and partition images in your environment).

In addition to adding Stealth security to the corporate LAN, use of Communities of Interest can be extended through any ClearPath Forward secure fabric (including the IP-LAN secure fabric) to provide additional security. The result is that even if data packets are delivered to the wrong place (either maliciously or accidentally because of a configuration error), they are unreadable. Additionally, the connection between a system administrator and the Fabric Manager user interface can be protected using Stealth security.

Stealth requires no application or infrastructure changes. It also supports many application scenarios, such as multicast traffic and video.