Sign In Study/Leading-Edge-Technology-for-City-of-Oss-to-Enable-a-New-Way-of-Working-id-640
​City of Oss Implements New Way of Working
The City of Oss enables anywhere, anytime access to its enterprise content management system Study/VyStar-Credit-Union-Automates-and-Amplifies-Disaster-Recovery-id-461
​VyStar Automates Disaster Recovery
​Highly available services help reduce risk and bolster customer service Study/Unisys-Helps-NSW-Police-Force-Use-Digital-Imagery-id-454
​NSW Police Force Uses Digital Imagery
Enables the NSW Police Force to securely store and share images to support police investigations Study/GSA-Modernizes-Fleet-Management-and-Property-Applications-id-1109
​GSA Modernizes Fleet Management Apps
ClearPath ePortal enterprise solution extends application value
Public Sector

A race to support the public

Public Sector organizations today are faced with multiple challenges, simultaneously, and from all directions. There is an expectation that they must be innovative in their approach to services. They are being asked to meet the growing demand for services, and deliver them in a manner most convenient to the citizen. At the same time, mandated cost savings translates into shrinking IT budgets. There is constant pressure on governments to do more with less, faster, and more securely.

Unisys sits at the center of many mission critical needs of public sector organizations around the world. We develop and support the complex solutions that provide critical services to governments, their agencies, and their citizens, including:

  • Immigration and Border Control. Every day millions of people pass through country borders all over the globe safely and efficiently thanks to Unisys. Unisys is a global leader in People Identity, integrating cutting-edge biometric technologies that enable the rapid identification of threats and allow the efficient passage of citizens through major national ID programs.
  • Security. Citizens rely on their government to feel safe and secure at home. Unisys provides highest levels of security and identity assurance in the most convenient manner to citizens, travelers, and employees. When it comes to attacks on government networks and systems, attackers are becoming more sophisticated and more targeted, and Unisys is on the front lines of defense.
  • Health & Human Services. Unisys delivers innovative approaches to child welfare and benefit eligibility through the series of agencies that we call our clients. Unisys innovates best practices, process, and technologies to public sector organizations to improve services, reduce costs, and empower citizens through technology.
  • Public Safety & Justice. Unisys has implemented large, complex multi-agency multi-jurisdictional public safety and justice solutions that require innovative thinking and a high level of accuracy and integration.

When the system is mission critical, and when the citizen is important, public sector organizations turn to Unisys and our proven track record and daily leadership.



 Secure Family Net -id-950
Unisys Secure Family Net

Unisys Secure Family Net
U-LEAF Apps for Business and Government
Google Apps for Business and Government

Google Apps for Business and Government Enforcement Message Switch and Justice Exchange
LEMS Weather
Unisys Weather
Unisys Weather Content Management for Public Sector
Enterprise Content Management for Public Sector
Enterprise Content Management for Public Sector Safety and Justice
Public Safety and Justice
Public Safety and Justice and Human Services (HHS)
Health and Human Services
Health and Human Services (HHS) and Citizen Engagement for Local Governments

​End User Services

Unisys Offerings
End User Services

Managed Services and Outsourcing Family/V3-PublicSector-UnisysManagedServices-id-1168
Managed Services & Outsourcing

Unisys Managed Services for Public Sector


Unisys Managed Services enables government agencies across the globe to keep pace with technology change and end-user demands. We take a people computing approach to analyzing and evaluating business processes. We are experts at devising specific solutions for categories of end users that proactively avoid issues and efficiently resolve open issues. The results include reduced downtime for end users, improved business processes, and increased results for the agency and the citizen. Unisys works with leading public sector agencies around the globe to measure and monitor and improve end user productivity, and provide the right integrated solutions to maximize efficiency agency and the public.

Unisys Solution Family
Managed Services and Outsourcing
Service Desk

There is a science to end user support at the service desk, and the science is focused on making things easy for the user. Unisys People Computing has taken this science to a new level. By identifying the personas – or sets of users with similar needs and attitudes – that exist in the business, we are able to focus on a finite set of solutions. Then, using powerful data analytics to monitor users experience and spot trends, we are able to understand intimately how they engage with the systems, applications, and other functions. From this deep understanding, we are able to build a smart services catalogue where users access specific tools and applications needed for their particular persona, and support them in the manner they prefer.

Unisys provides a seamless and uninterrupted customer and employee experience using persona-based support across multiple channels and devices. Key to this consistent experience is Unisys VantagePoint™, an advanced user interface and multi-service integration platform. VantagePoint provides users an enterprise service portal that enables self-services to fix a problem or order the right tools or apps, and then reports service status in real time on any device. Your users enjoy an optimized experience, and your organization gains flexibility, speed, and economy, all without compromising control, compliance or security.

Unisys Offerings
Service Desk

Managed Services and Outsourcing -id-942

Unisys Offerings

Mobility Family/V3-Industry-Forward!byUnisysforPublicSector-id-1167
Forward! by Unisys

Forward!  by Unisys for Public Sector


The Forward! by Unisys™ fabric can extend across multiple platforms connected locally or over a wide-area network. Workloads can be distributed, moved or replicated easily across the fabric. Nodes and applications can be added or upgraded easily without the need to rip and replace, enabling agencies to respond quickly as mission requirements or technology changes.

Government agencies can now benefit from mission-critical security and performance while they take advantage of the flexibility and cost-efficiency of the x86 platform.

Unisys Solution Family
Forward by Unisys
Stealth for Mobile

Unisys StealthTM for Mobile enables authenticated and secure access to application processing environments in the data center from mobile applications. With Unisys Stealth for Mobile, security starts in the data center and extends to mobile devices. It leverages application wrapping software that encrypts data-in-motion from the mobile app across the Internet – securing it from hackers and eavesdroppers. Benefits include:

  • Helps secure the most critical assets in the data center from threats introduced by mobile devices.
  • End-users are quickly authenticated into Stealth Communities of Interest with no adverse impact on the user experience. 
  • Enables even more fine-grained security to be applied to your application users.
  • Fosters quicker implementation of mobile initiatives - application developers don’t need to become security experts or keep up with ever-changing security protocols.
  • Supports BYOD environments - it does not require an entire device to be secured; personal data or applications on the mobile device are undisturbed.

Unisys Stealth for Mobile secures the entire data path by protecting critical servers and virtual machines with Data Center Segmentation, connecting authenticated mobile users into secure Communities of Interest, and wrapping applications on the mobile device.

Unisys Offerings
Stealth for Mobile

Unisys Stealth;Mobility Family/V3-PublicSector-MobilityforPublicSector-id-1166
Mobility by Unisys

Mobility for Public Sector 


Unisys Mobility Solutions are helping to transform agency operations and enhance the value of citizen engagement. Our solution begins with mobile assessments and consulting where we develop a mobile strategy and help to gain control of the mobile environment. Then we help to establish an optimal mobile infrastructure and environment management to ensure current and future demands can be met. Unisys has developed advanced mobile applications that bring mobile technology to the field. And finally, we constantly consider the best mobile security approach to make sure the business is always safe. Powered by our Insights to Value approach, Unisys has partnered with agencies around the world to deliver operational efficiencies, provide mobile access to information, and make agencies more agile in their efforts to provide services to the public.

Unisys Solution Family

​Data Center Planning, Design, and Implementation Services

Unisys Offerings
Data Center Planning Design and Implementation Services

Cloud Solutions Family/V3-PublicSector-UnisysStealth-id-1164
Unisys Stealth

Unisys Stealth for Public Sector


The Unisys Stealth™ Solution Suite quickly establishes Communities of Interest (COI) between devices or for a particular transaction where only members are even aware of the existence of the community. By concealing the communication endpoints, Unisys Stealth carves out the complexity of IT infrastructure and delivers greater cost efficiencies while strengthening data security and controlling endpoint access. Unisys Stealth ensures the security of any device, laptop or computer by making the network or transaction invisible to any who do not know about it. Since you can’t hack what you can’t see, Unisys Stealth is the answer for public sector organizations that have to be constantly concerned about the security of information and data.

Unisys Solution Family
Unisys Stealth Family/V3-PublicSector-MeetingtheMissionwithCloud-id-1165
Unisys Cloud Solutions

Unisys Cloud Solutions for Public Sector


Today’s public CIOs confront expanding missions on many fronts. An ever-increasing range of citizen services are being proposed. Compliance requirements are constantly growing. Security concerns are heightened. Even sourcing has become a priority for the public CIO. Forward-thinking public sector CIOs have turned to the cloud for the cost savings and agility they seek. What many have found is that to pursue the best-practice cloud pathways requires laying new highway and specialized tread for their IT infrastructure. Unisys Cloud Solutions strategy provides the roadmap, advisory services and tools to help Public Sector CIO’s gain more visibility into their infrastructure, gain greater efficiencies, and achieve all of this with the highest confidence of a secure IT environment.

Unisys Solution Family
Cloud Solutions
CloudBuild Services

While the pressure to adopt cloud is intense, adopting cloud haphazardly could be detrimental. There are persistent concerns around security, compliance, regulations, and cost. There are also unprecedented implementation challenges including:

  • the “cloud-in-a-corner” syndrome;
  • higher levels of risk in migrating to cloud; and
  • project failures and budget overruns.

The cloud is not a place to figure it out as you go.

Unisys CloudBuild Services enables organizations to successfully build cloud that is integrated into the overall business process, transforming their existing infrastructure into an agile IT-as-a-service model. Unisys “8-Tracks” model, a 360-degree cloud view approach, covers eight critical data center domains. Together with ConOps, which includes industry best practices, Unisys ensures that your cloud infrastructure meets the security, regulatory and compliance requirements enabling us to deliver the most secure and reliable cloud in the market place.

Unisys Offerings
CloudBuild Services

Cloud Solutions
Stealth for Network Security

Unisys StealthTM secures data-in-motion and controls the information sharing within or across networks by employing an innovative data cloaking technique – all while vastly simplifying the infrastructure. Stealth assures security by transforming information using FIPS140-2 certified AES-256 encryption integrated with a new cryptographic data-dispersal algorithm that spreads data across the fabric of the network.

Stealth for Network Security has been through the National Security Agency's Common Criteria process and received EAL-4+ certification as a multi-domain network software solution for protection of data-in-motion across any network - private or public - qualifying Stealth to protect up to secret defense-level or sensitive industry information to support your mission critical requirements.

Here’s what Stealth for Network Security can do:

  • Render communication endpoints undetectable and secure across any private or public network 
  • Secure virtualization of communities of interest (COI) based on security privileges allowing multiple COIs to coexist on a single physical infrastructure
  • Deliver superior cyber defense resulting from Stealth’s ability to cloak networks from outsiders 
  • Reduce infrastructure and cost by reducing the need for multiple, separate physical networks for each COI 
  • Work with the existing security, identity management and IT infrastructure without a costly redesign

Stealth for Data Center Segmentation

Enterprise data centers have evolved over the last decade following innovations in server virtualization and consumerization of IT. Today's security reality presents a critical need to restrict access to certain assets, specifically the servers executing strategic applications and housing the most sensitive data.

The traditional tiered network architecture accomplishes critical server and database security by physical network separation from other data center assets. Flat networks are more flexible and easier to administer, but any system on the network can access any other system.

Unisys StealthTM provides a superior solution to either configuration. Separation of critical servers and databases is achieved by using software to virtualize the network and create secure groups we call Communities of Interest (COI). Far less network equipment is required and on already flat networks, Stealth compartmentalizes the servers with COI; systems in different COI cannot communicate with each other. The result is cost efficiencies with much greater protection.

Regional Isolation

Companies looking to multiple geographies for new business opportunities are exposed to new security challenges. Confidentiality requirements may necessitate that systems at geographically dispersed centers be kept separate from the corporate data center. However, some regional access to the enterprise data center is required.

Unisys StealthTM is designed to provide a solution to the regional challenge. Using Communities of Interest, Unisys Stealth helps secure sensitive data, servers and applications within a regional data center as well as corporate assets in the enterprise data center to:

  • Isolate regional assets from local threats
  • Segregate regional assets from each other
  • Allow selective and secure regional access to the enterprise network

Using Unisys Stealth to connect the regional data center back to the corporate data center provides access to corporate servers, data, and applications to only those with explicit permission.

Secure Remote Access

Unisys StealthTM for Secure Remote Access provides teleworkers, clients, and other trusted parties outside the enterprise with access to sensitive data in the data center. Individuals can be authorized into secure Communities of Interest (COI) which provides limited, granular access to information they need. In addition to establishing virtual COI, Unisys Stealth makes communication endpoints – servers, laptops, and other devices – dark on the network, making them virtually invisible to anyone not authorized into the COI.

  • Need-to-know access to enterprise data from outside the enterprise
  • Flexibility to securely connect from practically anywhere, anytime
  • Ease of use and enhanced user experience

Secure Virtual Terminal

Unisys Stealth for Secure Virtual Terminal (SVT) delivers the Unisys Stealth for Network Security on a secure USB-based device. SSVT is designed to protect high value transactions, transmit sensitive data, facilitate emergency preparedness, and is ideal for travelling, home-based, or guest users. It can be booted from virtually any PC or laptop and preconfigured to establish a virtual secure Stealth tunnel through any network - private or public - to another predetermined Stealth endpoint such as a URL, web portal, Stealth gateway, etc. Our solution guarantees a clean boot from the USB device that mitigates any malware that may have infected the PC itself.

  • SSVT has all of the attributes of Stealth for Network Security
  • Flexibility to securely connect from anywhere, anytime
  • Ease of use and enhanced user experience 
  • Small and portable


Unisys Offerings
Stealth for Network Security

Unisys Stealth
​​​SAP Simplification and HANA

Unisys Offerings
SAP Simplification and HANA

Forward by Unisys

​Data Center Consolidation

Out of Control

Today’s data center is under extreme pressure to become more agile while reducing cost. Organizations are exploring new ways to consolidate, reduce server complexity, optimize system management resources, and leverage new technologies like virtualization.

Ideal Data Center

An ideal data center deployment needs IT agility and fast response to rapidly changing business dynamics. This means that applications need to perform at all times and new business requirements need to be implemented promptly. Applications deployed in virtualized environments need to be easy and secure - all without losing the predictability of performance.

Take Control!

The Forward! by UnisysTM fabric delivers a secure and predictive environment to consolidate mission critical and other applications. It enables the flexibility of virtualization combined with the security of physical infrastructure. Forward! fabric provides secure isolated partitions for virtualized performance without the worries of cloud performance. Forward! fabric also helps reduce infrastructure costs through consolidation.

Rethink the Way Mission Critical Applications Are Deployed

Technologies such as virtualization have reduced server sprawl by increasing the utilization of physical servers. However, the various applications are not completely isolated, which may lead to data vulnerability and performance problems. Consolidating into a Forward! environment brings many advantages:

  • Mission critical security
  • Predictable performance
  • Isolated partitioning with dedicated hardware resources
  • Increased application and network performance
  • Effective system management
  • Scalability
  • Fast Interconnect

Predicted Cost Savings Through:

  • Reduced number of servers and maintenance contracts 
  • Reduced software licensing, software maintenance, and hardware maintenance requirements
  • Simplified system management
  • Effective disaster recovery and backup implementations

People, Processes, and Technology

The Unisys Data Center Consolidation Services combine the people, processes, and technology with the project management necessary to transform a client’s existing data centers into ones that provide business agility at a lower cost.

Unisys has a complete range of services that create a cohesive, end-to-end optimization, and migration of data centers. And, Unisys offers a wide range of services for discovery, analysis, optimization, virtualization, consolidation, and migration of data centers, and support any gaps in client skills and capacities.

Unisys Offerings
Data Center Consolidation

Forward by Unisys



Point of View Paper
Unisys Point of View Paper - Automate to Minimize Support Costs While Boosting User Productivity of View Paper/Automate-to-Minimize-Support-Costs-While-Boosting-User-Productivity-id-537
​​​​Boosting User Productivity

Case Study
Unisys Case Study - Texas Workforce Commission Streamlines Support and Service Delivery for Its End Users Study/Texas-Workforce-Commission-Streamlines-Support-and-Service-Delivery-id-460
​Texas Workforce Streamlines Operations

Unisys eBook - Unisys Mobility Solutions eBook
​Unisys Mobility Solutions eBook

Thought Leader
Unisys Thought Leader - Weston Morris Leader/Weston-Morris-id-878
Strategic Planning - Desktop Virtualization & Mobility Initiatives

Case Study
Unisys Case Study - Multisourcing services integration helps australian national audit office control costs and improve IT service quality Study/Multisourcing-Services-Integration-Helps-Australian-National-Audit-id-1775

​Integration Helps Australian National Audit

News Release
Unisys to Provide Full Range of IT Support Services to Army Personnel Under Army Enterprise Service Desk Contract Worth Up to $93 Million Release/Unisys-to-Provide-Full-Range-of-IT-Support-Services-to-Army-Personnel

​Unisys to Provide Full Range of IT Support Services to Army Personnel Under Army Enterprise Service Desk Contract Worth Up to $93 Million

Case Study
Unisys Case Study - Enabling Continuous Innovation Through IT Managed Services for the City of Chicago Study/Enabling-Continuous-Innovation-Through-IT-Managed-Services-id-1771

​Chicago Drives Innovation through IT

Case Study
Unisys Case Study - Outsourcing Partnership Key to Expanded Citizen Services for the City of Minneapolis Study/Outsourcing-Citizen-Services-for-the-City-of-Minneapolis-id-463
​Minneapolis Outsources Citizen Services

Case Study
Unisys Case Study - Employing Leading Edge Technology to Support City of Minneapolis Mobility Initiative Study/City-of-Minneapolis-Mobility-Initiative-id-462
​City of Minneapolis' Mobility Initiative

Unisys White Paper - Public Sector Cloud: Meeting the Mission
​​Public Sector Cloud: Meeting the Mission