|By Cloud News Desk||
|July 1, 2009 06:45 AM EDT||
Unisys Corporation (NYSE: UIS) yesterday moved to overcome CIOs’ concerns about security of data in the cloud, cited by organizations and industry analysts as the top impediment to adopting cloud computing for business needs.
Unisys unveiled an innovative cloud computing strategy and solutions portfolio for organizations to move enterprise application workloads securely to tailored cloud environments with greater confidence in maintaining the integrity of critical information.
"I believe that cloud computing will revolutionize the way enterprises obtain business and IT services and change the kind of payback they get from their IT investments," said Rich Marcello, president, Unisys Systems and Technology (pictured below), adding:
"Our clients tell us that they see great value in moving enterprise applications and data to the cloud. However, they have lacked the comprehensive security to make them confident in doing so. Security is in Unisys DNA, data center transformation and application modernization are our heritage, and outsourcing services tailored to the client's specific business needs are our forté. Our cloud computing strategy draws on all those core capabilities to help clients break through the barriers to adoption and gain a full range of options for cloud services while safeguarding their operations and lowering IT costs."
Underpinning this strategy is Unisys Stealth security solution, an innovative, patent-pending data protection technology initially designed for government applications and now available to commercial clients. The Unisys Stealth technology cloaks data through multiple levels of authentication and encryption, bit-splitting data into multiple packets so it moves invisibly across networks and protects data in the Unisys secure cloud.
Richard Marcello, President, Unisys Systems and Technology
The Unisys cloud computing strategy enables clients to choose the type of data center computing services that best meet their business objectives, from self-managed, automated IT infrastructures to Unisys-managed cloud services. Using Unisys services and technologies, organizations can create a private cloud within their data centers, a public cloud through secure Unisys-managed cloud solutions, or a hybrid cloud solution combining the best of both private and Unisys-managed cloud services.
Download Unisys White Paper: "The Perfect Storm for Enterprise-Class Clouds"
Supporting its cloud computing strategy, Unisys today announced two new offerings:
- Unisys Secure Cloud Solution, a managed cloud service providing comprehensive data security for multi-tenant environments, in which clients share a common IT infrastructure. Because the solution uses Stealth technology, enterprise clients can move existing business applications - including those with secure or sensitive data, such as human resources, financial, and healthcare information - into a managed, shared cloud service. There is no need to rewrite or alter applications. This allows clients to reap the economic benefits of cloud services more quickly.
- Cloud Transformation Services, a portfolio of advisory and implementation services that help clients assess potential cloud computing options and determine which option best suits their needs or financial objectives.
Unisys Secure Cloud Solution: Extreme Security for Cloud Computing
The Unisys Secure Cloud Solution, with availability planned for July 31, is designed to provide the highest level of data security possible within a cloud environment today, while reducing clients' upfront investments and ongoing operational costs for cloud computing.
The Unisys Secure Cloud Solution integrates Unisys Stealth technology to allow different clients in a multi-tenant environment to share the same IT infrastructure without fear of exposing one client's data to another.
Integrated with the new Unisys Secure Cloud Solution, the Unisys Stealth technology enables encrypted "data in motion" to remain invisible as it traverses the infrastructure until it is reassembled upon delivery to authorized users. Unisys also is planning a Stealth solution for data security on storage area networks (SAN) by providing the same cloaking capability for "data at rest" in a virtualized storage environment.
Based on the Information Technology Infrastructure Library (ITIL) standard for service management, the Unisys Secure Cloud Solution uses the automation and virtualization capabilities of Unisys real-time infrastructure solutions, which enable the IT infrastructure to respond automatically to changes in the business environment. It also provides a self-service portal that enables organizations to scale IT resources in real time.
As client needs or data security requirements dictate, the Unisys Secure Cloud Solution can balance workloads across a global network of Unisys data centers, which are certified to key international standards such as ISO/IEC 27001:2005 for security, ISO/IEC 20000 for service management and the SAS 70 Type II auditing standard.
Through these centers, clients can both benefit from Unisys global and local service delivery expertise and comply with laws requiring storage of sensitive business data in-country. They can leverage Unisys layered security infrastructure, which includes intrusion detection and prevention service, security monitoring, advanced correlation and analytics, firewall management and logging.
New Secure "as a Service" Solutions Delivered through Unisys Secure Cloud
Unisys Secure Cloud Solution provides a global platform for delivering a full range of highly secure, managed IT infrastructure and application services available "as a service" through the cloud.
These services, also with availability planned for July 31, allow users to modernize their IT and application environments and enhance productivity while lowering costs and safeguarding their operations.
The new services include Secure Infrastructure as a Service (IaaS), for provisioning physical and virtual servers that both scale out and scale up; Secure Platform as a Service (PaaS), which provides a Java software stack - with .NET support planned - to make it easier for clients to move their applications to the cloud without making changes; My Secure Application as a Service (AaaS), for automatic provisioning of IT resources to support applications with multi-tier architectures; and Secure Software as a Service (SaaS), which provides access to hosted applications.
The Secure SaaS offering includes three solutions:
- Secure Hosted Communication and Collaboration Services, for Microsoft Outlook, SharePoint and Office Communication Services;
- Secure Virtual Office as a Service, for access to standard software suites that an organization's employees use; and
- Unisys Secure Document Delivery Service, which enables secure electronic delivery of high-volume documents, such as statements and bills, and allows two-way secure interaction with end customers - for example, making a payment or submitting a personal identification change such as credit card or address change.
New Cloud Transformation Services Build on Unisys Data Center Expertise
Unisys Cloud Transformation Services, available immediately, allow clients to plan and migrate to the type of cloud environment that best meets their business goals. These services help clients assess what application workloads can be moved to the cloud, how that can be done, and the technology, financial and security implications of their choices.
The Unisys Cloud Transformation Services comprise three suites of services:
- Cloud Advisory Services, which guide clients on the strategic implications that cloud computing may have for the business. They help clients determine if cloud computing - whether a private cloud, a Unisys-managed secure cloud or a hybrid cloud - is an effective choice;
- Cloud Assessment Services, which help clients determine which applications and services are best suited for cloud computing. In addition, these services assess the financial impact on the client's business of moving applications to the Unisys-managed secure cloud; and
- Cloud Migration Services, which help clients deploy applications to either a Unisys-managed secure cloud or a client-managed internal cloud, or both. For migration to a managed secure cloud, the services help clients move the application workload and the data to the cloud without interruption. For internal cloud implementations, clients can determine process optimization and cost improvements that they can realize from automating the IT infrastructure; plan and deploy the infrastructure; establish processes for IT service management; and determine critical ongoing requirements, such as storage modernization and disaster recovery.
Planning New Generations of Cloud Computing Solutions
Over the next several months, Unisys intends to launch additional solutions that give clients enhanced options in implementing cloud services.
Unisys plans a "cloud-in-a-box" solution as a comprehensive IT infrastructure package, enabling quick and cost-effective implementation of a private cloud. This solution will include virtualization capabilities, automation of ITIL best practices for service management, and Unisys Converged Remote Infrastructure Management capabilities, with Unisys Stealth solution as an option for extreme security.
Unisys also plans to deliver hybrid cloud technologies that provide the best of managed and dedicated services by combining public and private cloud capabilities.
Unisys is a worldwide information technology company. We provide a portfolio of IT services, software, and technology that solves critical problems for clients. We specialize in helping clients secure their operations, increase the efficiency and utilization of their data centers, enhance support to their end users and constituents, and modernize their enterprise applications. To provide these services and solutions, we bring together offerings and capabilities in outsourcing services, systems integration and consulting services, infrastructure services, maintenance services, and high-end server technology. With more than 27,000 employees, Unisys serves commercial organizations and government agencies throughout the world. For more information, visit www.unisys.com.
Any statements contained in this release that are not historical facts are forward-looking statements as defined in the Private Securities Litigation Reform Act of 1995. All forward-looking statements rely on assumptions and are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Risks and uncertainties that could affect the introduction of products, solutions and services identified in this release include the ability of the company to timely and effectively implement its planned activities; the level of demand for and uncertainty of customer acceptance of these new Unisys products, services and solutions; potential delays or reductions in funding available for research and development of new Unisys products, services and solutions; the performance and capabilities of third parties with whom the company has commercial relationships for cloud computing or data security products, services or solutions; competitive pressures in the information services and technology marketplace, including pricing and introduction of new products and services by third parties; delays or reductions in information technology spending by our clients and potential clients; adverse changes in the economic and business environment; and volatility and rapid technological change in the company's industry. Additional discussion of factors that could affect Unisys future results is contained in periodic filings with the Securities and Exchange Commission.
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Feb. 20, 2017 03:30 AM EST Reads: 6,106
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Feb. 20, 2017 03:15 AM EST Reads: 1,302
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
Feb. 20, 2017 02:00 AM EST Reads: 4,131
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Feb. 20, 2017 01:00 AM EST Reads: 5,194
China Unicom exhibit at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE FDD, TD-LTE), fixed-line broadband, ICT, data communica...
Feb. 20, 2017 01:00 AM EST Reads: 814
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
Feb. 20, 2017 12:15 AM EST Reads: 948
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, will present an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He will expound on the industry issues he frequently came up against as an analyst, and...
Feb. 20, 2017 12:00 AM EST Reads: 1,386
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
Feb. 19, 2017 10:30 PM EST Reads: 6,138
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Feb. 19, 2017 09:30 PM EST Reads: 826
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often un...
Feb. 19, 2017 08:00 PM EST Reads: 2,827
SYS-CON Events announced today that Technologic Systems Inc., an embedded systems solutions company, will exhibit at SYS-CON's @ThingsExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Technologic Systems is an embedded systems company with headquarters in Fountain Hills, Arizona. They have been in business for 32 years, helping more than 8,000 OEM customers and building over a hundred COTS products that have never been discontinued. Technologic Systems’ pr...
Feb. 19, 2017 06:45 PM EST Reads: 3,142
SYS-CON Events announced today that IoT Now has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
Feb. 19, 2017 06:15 PM EST Reads: 1,080
SYS-CON Events announced today that WineSOFT will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Based in Seoul and Irvine, WineSOFT is an innovative software house focusing on internet infrastructure solutions. The venture started as a bootstrap start-up in 2010 by focusing on making the internet faster and more powerful. WineSOFT’s knowledge is based on the expertise of TCP/IP, VPN, SSL, peer-to-peer, mob...
Feb. 19, 2017 06:00 PM EST Reads: 1,396
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
Feb. 19, 2017 05:45 PM EST Reads: 5,369
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Feb. 19, 2017 05:45 PM EST Reads: 947
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Feb. 19, 2017 05:00 PM EST Reads: 8,157
With billions of sensors deployed worldwide, the amount of machine-generated data will soon exceed what our networks can handle. But consumers and businesses will expect seamless experiences and real-time responsiveness. What does this mean for IoT devices and the infrastructure that supports them? More of the data will need to be handled at - or closer to - the devices themselves.
Feb. 19, 2017 05:00 PM EST Reads: 1,607
SYS-CON Events announced today that Dataloop.IO, an innovator in cloud IT-monitoring whose products help organizations save time and money, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Dataloop.IO is an emerging software company on the cutting edge of major IT-infrastructure trends including cloud computing and microservices. The company, founded in the UK but now based in San Fran...
Feb. 19, 2017 04:15 PM EST Reads: 2,075
Building a cross-cloud operational model can be a daunting task. Per-cloud silos are not the answer, but neither is a fully generic abstraction plane that strips out capabilities unique to a particular provider. In his session at 20th Cloud Expo, Chris Wolf, VP & Chief Technology Officer, Global Field & Industry at VMware, will discuss how successful organizations approach cloud operations and management, with insights into where operations should be centralized and when it’s best to decentraliz...
Feb. 19, 2017 03:45 PM EST Reads: 1,414
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, will discuss how to use Kubernetes to setup a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace....
Feb. 19, 2017 02:30 PM EST Reads: 2,255