Unisys Survey Reveals 86 Percent of Critical Infrastructure Providers in Australia and New Zealand Have Been Breached in the Past Year
SYDNEY, 29 July, 2014 – New global research from Unisys finds alarming gaps in the security of the critical infrastructure organisations.
Unisys Wins Contract Worth up to $28 Million to Provide Data Center Support Services to U.S. Department of Defense
|BLUE BELL, Pa., July 29, 2014 – Unisys (NYSE: UIS) recently was awarded a contract from the U.S. Defense Information Systems Agency (DISA) to provide a range of data center support services.|
|http://www.unisys.com.au/offerings/security-solutions/Unisys in the News/Cybersecurity-scourge-causes-firms-to-lose-confidential-data-id-1403|
|Unisys in the News|
Cybersecurity scourge causes 70% of critical infrastructure firms to lose confidential data
IT Pro Portal covers the findings of the Unisys-Ponemon cybersecurity research.
|Secure Your Operations;Improve Operational Efficiency;Ensure Critical Business Performance|
|Security Solutions;Secure Your Operations|
|Unisys Survey Reveals Nearly 70 Percent of Critical Infrastructure Providers Have Been Breached in the Past Year|
|BLUE BELL, Pa., July 10, 2014 – New research from Unisys Corporation (NYSE: UIS) finds alarming gaps in the security of the world’s critical infrastructure.|
Australian Organisations Less Mature in Using Mobility
Australian Organisations Less Mature in Using Mobility to Drive Tangible Business Returns - Unisys Survey Finds
|Mobile Application Services;Mobility;Mobility for Transportation|
|Unisys Cited as a Leader in Independent Research Firm’s Report on ITSM Implementation Services Providers|
|BLUE BELL, Pa., July 9, 2014 – Unisys Corporation (NYSE: UIS) today announced that it has been named a “Leader” in IT service management (ITSM) in Forrester Research, Inc.’s June 2014 report “The Forrester Wave™: North American ITSM Implementation Services Providers, Q2 2014.”|
|http://www.unisys.com.au/offerings/security-solutions/Unisys in the News/Virtualizations-Dirty-Little-Secret-The-Other-30-Percent-id-1341|
|Unisys in the News|
Virtualization’s Dirty Little Secret
In TMCNet, Unisys’ Jim Thompson examines a conundrum: virtualization has helped reduce server sprawl in the data center, yet it’s still deemed unacceptable for many mission-critical applications. Resource-sharing is the crux of the problem. “Containerization” via secure partitioning is an alternative, dedicating resources to each mission-critical application for fast, secure execution.
|Improve Operational Efficiency;Secure Your Operations|
|Secure Your Operations|
|Unisys Introduces More Powerful Models of Forward! Platform Using Intel Xeon Processor E7 Family|
|Second generation of Forward! system combines high-availability and reliability features with scale-up and scale-out options for cloud, ERP, big data and analytics applications|
|High-End Servers;Forward by Unisys;Data Center Consolidation;SAP Migration;UNIX to Linux Migration|
This whitepaper will help you understand fundamental Choreographer concepts that can be used to form a mental model of how the cloud is architected and managed. Also learn about key choreographer capabilities and use cases.
|Globalize Your Operations;Increase Enterprise Agility;Minimize CAPEX and O＆M;Transform Business Processes;Business Drivers|
|Unisys Boosts Power and Flexibility for ClearPath Clients with New Models Using Advanced Fabric Architecture|
|12 new Intel-based systems use software-defined architecture to outperform proprietary predecessors|
|High-End Servers;ClearPath Systems;ClearPath Dorado Systems;ClearPath Libra Systems;ClearPath MCP Software;ClearPath OS 2200 Software;ClearPath Dorado 4350 and 4370 Systems;ClearPath Dorado 4380 and 4390 Systems;ClearPath Dorado 6380 and 6390 Systems;ClearPath Libra 4380 and 4390 Systems;ClearPath Libra 6380 and 6390 Systems;ClearPath Libra 8380 and 8390 Systems|
|Unisys Stealth Wins TechAmerica 2014 American Technology Award for Cybersecurity|
|Award recognizes Stealth cybersecurity innovation to help enterprises address cyber threats, reduce costs and improve agility|
|Security Solutions;Unisys Stealth;Stealth for Amazon Web Services;Stealth for Mobile;Stealth for Network|
Applied Innovation Webinar Series
Please join Unisys for 30-minute live webinars to learn how we’re applying innovation to solve our clients’ toughest business challenges, and ask questions of our Subject Matter Experts. If the timing is not convenient for you, we encourage you to watch recent webinar recordings on demand. More webinars are being added so please come back often!
|Ensure Critical Business Performance;Secure Your Operations|
|Application Services;Social Business|