|Managed Services & Outsourcing|
Unisys Managed Services for Public Sector
Unisys Managed Services enables government agencies across the globe to keep pace with technology change and end-user demands. We take a people computing approach to analyzing and evaluating business processes. We are experts at devising specific solutions for categories of end users that proactively avoid issues and efficiently resolve open issues. The results include reduced downtime for end users, improved business processes, and increased results for the agency and the citizen. Unisys works with leading public sector agencies around the globe to measure and monitor and improve end user productivity, and provide the right integrated solutions to maximize efficiency agency and the public.
|Unisys Solution Family|
|Managed Services and Outsourcing|
|Mobility by Unisys|
Mobility for Public Sector
Unisys Mobility Solutions are helping to transform agency operations and enhance the value of citizen engagement. Our solution begins with mobile assessments and consulting where we develop a mobile strategy and help to gain control of the mobile environment. Then we help to establish an optimal mobile infrastructure and environment management to ensure current and future demands can be met. Unisys has developed advanced mobile applications that bring mobile technology to the field. And finally, we constantly consider the best mobile security approach to make sure the business is always safe. Powered by our Insights to Value approach, Unisys has partnered with agencies around the world to deliver operational efficiencies, provide mobile access to information, and make agencies more agile in their efforts to provide services to the public.
|Unisys Solution Family|
Unisys Stealth for Public Sector
The Unisys Stealth™ Solution Suite quickly establishes Communities of Interest (COI) between devices or for a particular transaction where only members are even aware of the existence of the community. By concealing the communication endpoints, Unisys Stealth carves out the complexity of IT infrastructure and delivers greater cost efficiencies while strengthening data security and controlling endpoint access. Unisys Stealth ensures the security of any device, laptop or computer by making the network or transaction invisible to any who do not know about it. Since you can’t hack what you can’t see, Unisys Stealth is the answer for public sector organizations that have to be constantly concerned about the security of information and data.
|Unisys Solution Family|
|Forward! by Unisys|
Forward! by Unisys for Public Sector
The Forward! by Unisys™ fabric can extend across multiple platforms connected locally or over a wide-area network. Workloads can be distributed, moved or replicated easily across the fabric. Nodes and applications can be added or upgraded easily without the need to rip and replace, enabling agencies to respond quickly as mission requirements or technology changes.
Government agencies can now benefit from mission-critical security and performance while they take advantage of the flexibility and cost-efficiency of the x86 platform.
|Unisys Solution Family|
|Forward by Unisys|
|Unisys Cloud Solutions|
Unisys Cloud Solutions for Public Sector
Today’s public CIOs confront expanding missions on many fronts. An ever-increasing range of citizen services are being proposed. Compliance requirements are constantly growing. Security concerns are heightened. Even sourcing has become a priority for the public CIO. Forward-thinking public sector CIOs have turned to the cloud for the cost savings and agility they seek. What many have found is that to pursue the best-practice cloud pathways requires laying new highway and specialized tread for their IT infrastructure. Unisys Cloud Solutions strategy provides the roadmap, advisory services and tools to help Public Sector CIO’s gain more visibility into their infrastructure, gain greater efficiencies, and achieve all of this with the highest confidence of a secure IT environment.
|Unisys Solution Family|
Data Center Consolidation
Out of Control
Today’s data center is under extreme pressure to become more agile while reducing cost. Organizations are exploring new ways to consolidate, reduce server complexity, optimize system management resources, and leverage new technologies like virtualization.
Ideal Data center
An ideal data center deployment needs IT agility and fast response to rapidly changing business dynamics. This means that applications need to perform at all times and new business requirements need to be implemented promptly. Applications deployed in virtualized environments need to be easy and secure -- all without losing the predictability of performance.
Forward! by UnisysTM fabric delivers a secure and predictive environment to consolidate mission critical and other applications. It enables the flexibility of virtualization combined with the security of physical infrastructure.
Forward! fabric provides secure isolated partitions for virtualized performance without the worries of cloud performance.
Forward! fabric also helps reduce infrastructure costs through consolidation.
"It is my experience that the Unisys ClearPath platform is reliable, secure and offers the requisite performance to manage a significant increase in our capacity needs arising due to the economic downturn."
— Mostafa Zommo, HRSDC Director General, Enterprise Services
Rethink the Way Mission Critical Applications Are Deployed
Technologies such as virtualization have reduced server sprawl by increasing the utilization of physical servers. However, the various applications are not completely isolated, which may lead to data vulnerability and performance problems. Consolidating into a
Forward! environment brings many advantages:
- Mission critical security
- Predictable performance
- Isolated partitioning with dedicated hardware resources
- Increased application and network performance
- Effective system management
- Fast Interconnect
Predicted cost savings through:
- Reduced number of servers and maintenance contracts
- Reduced software licensing, software maintenance, and hardware maintenance requirements
- Simplified system management
- Effective disaster recovery and backup implementations
People, Processes, and Technology
The Unisys Data Center Consolidation Services combine the people, processes, and technology with the project management necessary to transform a client’s existing data centers into ones that provide business agility at a lower cost.
Unisys has a complete range of services that create a cohesive, end-to-end optimization, and migration of data centers. And, Unisys offers a wide range of services for discovery, analysis, optimization, virtualization, consolidation, and migration of data centers, and support any gaps in client skills and capacities.
|Data Center Consolidation|
|Forward by Unisys|
Evolution Forward SAP environments manage many of the most complex organizations and place even greater demands on the infrastructure. Processing and delivering the right information daily is critical to support an organization’s operations. And for many organizations, if SAP goes down, their business goes down. The SAP infrastructure has to be rock solid. According to Aberdeen Group, “up to 70% of SAP productions are running on physical servers” to maintain the level of performance.
The SAP future demands are only getting more demanding. How do you deliver the results today while balancing the future requirements from SAP?
Predictive Virtualized Performance
The Forward! by Unisys™ fabric is aimed at these demanding environments. In its fabric based architecture Unisys Intel X86 platforms are interlinked by high speed network technology such as InfiniBand and G-Bit Ethernet. Forward! fabric provides the right kind of infrastructure especially for predictable performance within secure partitions, coupled with security for critical applications. Compared with the alternative high-end RISC platforms, the Linux, and X86 technologies are cost effective solutions.
The Forward! fabric delivers the mission critical attributes of a UNIX and mainframe environment on Intel Xeon technology.
Performance of SAP ERP workloads is enhanced via high speed interconnects across multi nodes and secure partitions (s-Par) that enable dedicated physical resources of processing, memory, and I/O for predictive performance. s-Par simulates the traditional SAP physical configuration in:
- a secure and predictive virtualized environment;
- allows for fast deployment; and
- agility needed by changing business requirements.
SAP is often one of the most important applications in an organization’s data center. The SAP applications are typically supporting the core business processes and business decision making. In the past, many of these systems were implemented on UNIX as they needed the scalability and reliability provided by these platforms.
Today, Intel platforms are delivering equivalent levels of performance and scalability at lower costs. Unisys has developed a set of services to enable the smooth transition from legacy UNIX platforms to mission critical Intel platforms with minimal risk. As part of this service, Unisys will:
- assess the current architecture and the needs of the various SAP landscapes;
- architect and design a new Intel-based approach that will enable additional capacity, improved service levels; and
- formulate a strategy that matches the emerging SAP technologies.
View the Forward! SAP Certification.
|Forward by Unisys|
Business environments are changing dramatically with the increasing proliferation of consumerized mobile devices like smartphones and tablets. Employees and partners expect organizations to provide options of working from anywhere on a device of their choice with access to information they need when they need it. They are also increasingly commingling personal and business tasks on the same device. Customers today want instant access to products and services, and they want nothing less than the ‘complete’ digital experience in anything they do. Many organizations struggle to handle these expectations. They are hindered by standardized IT environments built for cost efficiencies and lack the agility to respond quickly to changing business needs.
Organizations are faced with balancing business demands for mobile flexibility while being able to manage the mobile environment within their existing standardized IT environment. If mobility is implemented without careful planning, organizations risk incomplete security deployments, missed revenue opportunities from introducing new products and services, and erroneous and costly decisions using inefficient business processes.
Unisys Mobility Solutions simplifies enterprise mobility with an integrated end-to-end mobile solution. We focus not only on the technology, but also on the users. Our People Computing approach, designed to maximize the utility of any mobile solution, sets Unisys apart. Our entire Mobility solution set is designed to make business, employees, and customers more effective by enabling businesses to:
Gain Insights & Control
Business and operational insights help you securely manage mobile resources while identifying areas of inefficiencies and opportunities.
Improve productivity and efficiency through enabling mobile access to existing enterprise or new applications designed to improve employee productivity or increase customer engagement.
Be Enterprise Agile
Meet the demands of the mobile enterprise with reliable, secure, and agile processes and resources that support the growth and demands of the mobile business environment.
Unisys’ Mobility solutions enable clients to achieve organizational value by:
- Delivering industry-standard centralized outsourcing services for mobile environments.
- Focusing on enabling legacy, primary system interfaces on latest device technology.
- Securing the user, applications and data, not just the device, with user authentication and biometric solutions, mobile application management technology and data isolation.
- Re-engineering standardized IT infrastructure from a less secure to a tiered, agile environment.
The user is at the heart of our solution. We work with you to ensure that the right people access the right information, at right time, and at the right location.
Unisys offers a comprehensive suite of mobility solutions that address mobility needs from the perspective of business processes, infrastructure, applications and the end-users.
Our integrated mobile solutions include:
Mobile Environment Management is our terminology for a more holistic management approach, including both devices (MDM) and applications (MAM). Our key capabilities include:
- Mobile Device Management for all OSs including iOS, Android, Win8, BB
- Mobile Application Management
- Mobile Lifecycle Management
- Mobile End User Support, Monitoring and Enablement
- Mobile Content Management
- Mobile Telecom Expense Management
Unisys is also an authorized service provider including Apple, enabling us to provide our customers with:
- Full warranty services
- Desk-side support option for Device and Configuration issues
- Install, move, add and de-install (IMACD) on-site support services when needed
Mobile Application Development represents cost-effective and high-quality mobile application development and integration services we provide to our customers. These services take advantage of advanced technologies and security built-in approaches designed to ensure continuity, high performance, and ease of maintenance. Our key capabilities include:
- Native iOS, Android, Win8
- HTML5 & Cross Platform
- Mobile AppStore Setup and Management
- Mobile Application Life-Cycle Management
- Unisys ePortal – HTML5 mobile app creation infrastructures running on our ClearPath systems
Mobile Infrastructure represents services we provide to enable our customer's mobile environment through cloud or on-premise infrastructures. Our goal is to ensure our customer's infrastructure is able to adjust and adapts to change in demands, to provide the secure sharing of files and documents across environments, and to provide access to modern apps designed for the evolving workplace. Our key capabilities include:
- Cloud Setup and Management
- On-Premise / Data Center Setup and Management
- SaaS Integration including Office 365 and Google Apps
- Secure Cloud Storage
Mobile Security represents our approach to provide our customer's mobile environment with greater security, lower risk using a more holistic security approach for the enterprise. We help our customers move away from risk-laden BYOT, to better governance and risk management by focusing on four key dimensions of security: user, device, apps and data. Our key capabilities include:
- Multi-Factor Authentication (including Biometric Authentication)
- VPN Setup
- App Wrapping
- User, Device, App and Data Security services
Mobile Assessments and Consulting represents services designed to provide our customers with a better mobile strategy to succeed in a mobile environment that has become very fragmented and comprised of disparate systems by putting them back into the driver’s seat. Our key capabilities include:
- Innovation Workshops
- Assessment and Strategy Consulting
- Process Transformation
- Governance and policies
- Mobile User Role Definition
End User Services
End User Services begins with your people; what makes them successful, how and where they prefer to work, what they experience. The aim is to optimize the experience for each individual, deliver the service and support to meet their unique needs, and maximize their contributions to the business.
Unisys End User Services helps organizations create flexible, efficient, and highly responsive end-user support environments that allow enterprises to take full advantage of new consumer devices, applications, mobility, work styles and schedules. The experience and infrastructure delivered by Unisys enables this to be up-and-running quickly, and without compromising security, compliance or control.
"We have often looked to Unisys to consult and help guide us in our network technology decisions. Their expertise is essential to maintaining our complex and evolving infrastructure environment."
— Walter J. Fahey, Maimonides Vice President of Management Information Systems and CIO
By definition, help desks are reactive. Unisys End User Services are different, they feature advanced analytics to actually predict and eliminate issues before they occur. Our advanced End-User Experience Monitoring technology optimizes performance in the most meaningful way possible by capturing what each end-user actually experiences, in real time.
The result is what every organization strives for: fewer incidents, faster resolution, improved productivity, higher satisfaction, lower cost.
|End User Services|
|Managed Services and Outsourcing|
Data Center Planning, Design, and Implementation Services
Unisys offers a complete range of services that delivers a cohesive, end-to-end optimization of data centers. We combine world class people, processes, and technology with the program and project management expertise necessary to transform a client’s existing data centers into a business engine that provides agility at a lower cost. Unisys offers a wide range of services for discovery, analysis, optimization, virtualization, consolidation, and migration of data centers that can complement client efforts and fill gaps in skills and capacities.
Any and all aspects of the data center are addressed including:
- Facilities: layout, power/cooling, physical security
- System infrastructure: servers, networking, storage, and security
- Applications, infrastructure mapping & dependencies
- Service management and operations considerations
Infrastructure Transformation Services
Unisys Infrastructure Transformation Services is a consultative offering designed to help you achieve lasting value from infrastructure projects. This service identifies areas for optimization and process improvement, and outlines tangible ways to reduce costs and improve performance.
Data Center Move and Consolidation Services
The Unisys Data Center Move and Consolidation Services combine the people, processes, technology, and expert project management required to design, build, and transform your data center environments. We can design and construct a complete facility or selected portions, and provide strategic support for consolidation and virtualization as part of the migration activities.
|Data Center Planning Design and Implementation Services|
While the pressure to adopt cloud is intense, adopting cloud haphazardly could be detrimental. There are persistent concerns around security, compliance, regulations, and cost. There are also unprecedented implementation challenges including:
- the “cloud-in-a-corner” syndrome;
- higher levels of risk in migrating to cloud; and
- project failures and budget overruns.
The cloud is not a place to figure it out as you go.
Unisys CloudBuild Services enables organizations to successfully build cloud that is integrated into the overall business process, transforming their existing infrastructure into an agile IT-as-a-service model. Unisys “8-Tracks” model, a 360-degree cloud view approach, covers eight critical data center domains. Together with ConOps, which includes industry best practices, Unisys ensures that your cloud infrastructure meets the security, regulatory and compliance requirements enabling us to deliver the most secure and reliable cloud in the market place.
|Stealth for Network Security|
Unisys StealthTM secures data-in-motion and controls the information sharing within or across networks by employing an innovative data cloaking technique – all while vastly simplifying the infrastructure. Stealth assures security by transforming information using FIPS140-2 certified AES-256 encryption integrated with a new cryptographic data-dispersal algorithm that spreads data across the fabric of the network.
Stealth for Network Security has been through the National Security Agency's Common Criteria process and received EAL-4+ certification as a multi-domain network software solution for protection of data-in-motion across any network - private or public - qualifying Stealth to protect up to secret defense-level or sensitive industry information to support your mission critical requirements.
Here’s what Stealth for Network Security can do:
- Render communication endpoints undetectable and secure across any private or public network
- Secure virtualization of communities of interest (COI) based on security privileges allowing multiple COIs to coexist on a single physical infrastructure
- Deliver superior cyber defense resulting from Stealth’s ability to cloak networks from outsiders
- Reduce infrastructure and cost by reducing the need for multiple, separate physical networks for each COI
- Work with the existing security, identity management and IT infrastructure without a costly redesign
Stealth for Data Center Segmentation
Enterprise data centers have evolved over the last decade following innovations in server virtualization and consumerization of IT. Today's security reality presents a critical need to restrict access to certain assets, specifically the servers executing strategic applications and housing the most sensitive data.
The traditional tiered network architecture accomplishes critical server and database security by physical network separation from other data center assets. Flat networks are more flexible and easier to administer, but any system on the network can access any other system.
Unisys StealthTM provides a superior solution to either configuration. Separation of critical servers and databases is achieved by using software to virtualize the network and create secure groups we call Communities of Interest (COI). Far less network equipment is required and on already flat networks, Stealth compartmentalizes the servers with COI; systems in different COI cannot communicate with each other. The result is cost efficiencies with much greater protection.
Companies looking to multiple geographies for new business opportunities are exposed to new security challenges. Confidentiality requirements may necessitate that systems at geographically dispersed centers be kept separate from the corporate data center. However, some regional access to the enterprise data center is required.
Unisys StealthTM is designed to provide a solution to the regional challenge. Using Communities of Interest, Unisys Stealth helps secure sensitive data, servers and applications within a regional data center as well as corporate assets in the enterprise data center to:
- Isolate regional assets from local threats
- Segregate regional assets from each other
- Allow selective and secure regional access to the enterprise network
Using Unisys Stealth to connect the regional data center back to the corporate data center provides access to corporate servers, data, and applications to only those with explicit permission.
Secure Remote Access
Unisys StealthTM for Secure Remote Access provides teleworkers, clients, and other trusted parties outside the enterprise with access to sensitive data in the data center. Individuals can be authorized into secure Communities of Interest (COI) which provides limited, granular access to information they need. In addition to establishing virtual COI, Unisys Stealth makes communication endpoints – servers, laptops, and other devices – dark on the network, making them virtually invisible to anyone not authorized into the COI.
- Need-to-know access to enterprise data from outside the enterprise
- Flexibility to securely connect from practically anywhere, anytime
- Ease of use and enhanced user experience
Secure Virtual Terminal
Unisys Stealth for Secure Virtual Terminal (SVT) delivers the Unisys Stealth for Network Security on a secure USB-based device. SSVT is designed to protect high value transactions, transmit sensitive data, facilitate emergency preparedness, and is ideal for travelling, home-based, or guest users. It can be booted from virtually any PC or laptop and preconfigured to establish a virtual secure Stealth tunnel through any network - private or public - to another predetermined Stealth endpoint such as a URL, web portal, Stealth gateway, etc. Our solution guarantees a clean boot from the USB device that mitigates any malware that may have infected the PC itself.
- SSVT has all of the attributes of Stealth for Network Security
- Flexibility to securely connect from anywhere, anytime
- Ease of use and enhanced user experience
- Small and portable
|Stealth for Network|
|Stealth for Mobile|
Unisys StealthTM for Mobile enables authenticated and secure access to application processing environments in the data center from mobile applications. With Unisys Stealth for Mobile, security starts in the data center and extends to mobile devices. It leverages application wrapping software that encrypts data-in-motion from the mobile app across the Internet – securing it from hackers and eavesdroppers. Benefits include:
- Helps secure the most critical assets in the data center from threats introduced by mobile devices.
- End-users are quickly authenticated into Stealth Communities of Interest with no adverse impact on the user experience.
- Enables even more fine-grained security to be applied to your application users.
- Fosters quicker implementation of mobile initiatives - application developers don’t need to become security experts or keep up with ever-changing security protocols.
- Supports BYOD environments - it does not require an entire device to be secured; personal data or applications on the mobile device are undisturbed.
Unisys Stealth for Mobile secures the entire data path by protecting critical servers and virtual machines with Data Center Segmentation, connecting authenticated mobile users into secure Communities of Interest, and wrapping applications on the mobile device.
|Stealth for Mobile|
There is a science to end user support at the service desk, and the science is focused on making things easy for the user. Unisys People Computing has taken this science to a new level. By identifying the personas – or sets of users with similar needs and attitudes – that exist in the business, we are able to focus on a finite set of solutions. Then, using powerful data analytics to monitor users experience and spot trends, we are able to understand intimately how they engage with the systems, applications, and other functions. From this deep understanding, we are able to build a smart services catalogue where users access specific tools and applications needed for their particular persona, and support them in the manner they prefer.
Unisys provides a seamless and uninterrupted customer and employee experience using persona-based support across multiple channels and devices. Key to this consistent experience is Unisys VantagePoint™, an advanced user interface and multi-service integration platform. VantagePoint provides users an enterprise service portal that enables self-services to fix a problem or order the right tools or apps, and then reports service status in real time on any device. Your users enjoy an optimized experience, and your organization gains flexibility, speed, and economy, all without compromising control, compliance or security.
|Managed Services and Outsourcing|
The Unisys Law Enforcement Message Switch/Justice Exchange (LEMS/JX) is a message switch designed specifically to support the exchange of law enforcement and criminal justice information. The solution enables users to easily access disparate information from various federal and state criminal justice information systems.
The LEMS/JX meets government agencies’ needs for a proven, reliable, and open systems message switch that complies with the unique requirements of the criminal justice information exchange. LEMS/JX is an open architecture solution that provides the following key capabilities:
- Allows users to access and manage information in federal and state criminal justice information systems
- Connects disparate criminal justice information systems using asynchronous messaging in the format and protocols native to each information system
- Supports a wide variety of message formats and protocols that use powerful, configurable, and flexible message processing and interface capabilities
- Provides guaranteed message delivery with high availability and high performance using message store and forward capabilities
- Acts as the control terminal message switch for systems such as NCIC 2000 and Nlets that require connection to a single system in a state
- Supports the latest information sharing technologies and standards
- Integration with legacy technologies
LEMS/JX provides access to information in the following systems:
- FBI National Crime Information Center (NCIC)
- Nlets (The International Justice and Public Safety Network)
- National Weather Service (NWS)
- Division of Motor Vehicles (DMV)
- Computerized Criminal History (CCH) system
- State Hot Files
- Other criminal justice information held by the state
- Integrated Justice Information Sharing Systems