The Unisys Secure Cloud Solution is a core component of Unisys cloud computing strategy, which enables clients to choose the type of data center computing services that best meet their business objectives, from self-managed private clouds to Unisys-managed cloud services as well as hybrid solutions.
"With its advanced data protection and network security features, the Unisys Secure Cloud Solution takes a crucial extra step to give clients greater confidence in moving more of their applications with sensitive business data to the cloud," said Sam Gross, vice president, Global IT Outsourcing Solutions, Unisys. "By doing so, they could realize cost savings and operational efficiencies by leveraging the significant investment Unisys has made in global service delivery and infrastructure."
The Secure Cloud Solution integrates Unisys patent-pending Stealth data protection technology, which cloaks data from detection as it moves through the network. As a result, clients in a multi-tenant environment can share the same IT infrastructure without fear of compromising the security of their data. (Unisys also plans to release a Stealth solution for storage area networks to provide the same cloaking capability for "data at rest.")
Assessing Unisys cloud computing strategy and Secure Cloud Solution, and the value that the Stealth technology brings, The 451 Group analyst William Fellows wrote, "Establishing a strict chain of custody for data will be a key requirement for running more sensitive workloads in the cloud."
Fellows stated further, "Unisys has arrived at the right place and the right time with its Secure Cloud offerings to tap the current industry mood around the suitability of cloud computing in the enterprise. . . . End users who are assessing workloads and considering deployment options – and then deciding where to use clouds in the mix as a result – should take a look." (1)
As a managed public cloud service, Unisys Secure Cloud Solution enables global delivery of multiple new services: Secure Infrastructure as a Service (IaaS), Secure Platform as a Service (PaaS), My Secure Application as a Service (AaaS), and three Secure Software as a Service (SaaS) offerings: Secure Unified Communication as a Service, Secure Virtual Office as a Service and Secure Document Delivery Service.
Collaboration with Partners Key to Powerful, End-to-End Solution
The Unisys Secure Cloud Solution, which is based on the Information Technology Infrastructure Library (ITIL) standard for service management, uses the automation and virtualization capabilities of Unisys real-time infrastructure solutions. Drawing on technologies from key partners as well as Unisys, these solutions enable an organization's IT infrastructure to respond automatically to changes in the business environment.
Unisys worked closely with Intel to develop the computing architecture that powers the Secure Cloud Solution and collaborated with EMC, drawing on that partner's storage technology to create the information infrastructure that enables fast storage and delivery of information securely in the cloud. Software from partners Scalent Systems and Enigmatec Corporation enables repurposing and orchestration of IT resources to meet the service levels required for clients' business.
Unisys Converged Remote Infrastructure Management solution provides end-to-end operations capabilities for the Unisys Secure Cloud Solution. Based on software from BMC Software, the Converged Remote Infrastructure Management capability gives clients a single view of their infrastructure, managing the cloud from the cloud and enabling them to seamlessly integrate request, change, configuration, incident and availability management into their existing service management infrastructure.
A self-service portal enables clients of Unisys Secure Cloud Solution to scale IT resources in real time to meet fluctuating business requirements.
As client needs or data security requirements dictate, the Unisys Secure Cloud Solution can balance workloads across a global network of Unisys data centers certified to key international standards for security and service management. Through these centers, clients can both benefit from Unisys global and local service delivery expertise and comply with laws requiring storage of sensitive business data in-country while leveraging Unisys layered security infrastructure.
A portfolio of Unisys Cloud Transformation Services, also available now, complements the Secure Cloud Solution. These advisory and implementation services assist clients in assessing potential cloud computing options and determining which best suits their needs or financial objectives; modernizing their IT and application environments; and, through the cloud, enhancing productivity while lowering costs and safeguarding their data.
Delivered by a force of more than 800 Unisys consultants worldwide, these Cloud Transformation Services are designed to accelerate clients' realization of value from cloud solutions.