Sign In

 

 


http://www.unisys.com/industries/transportation/Case Study/NZTA-Avoids-Up-To-NZ80-Million-Expenditure-by-Modernising-id-466
​​The Business Critical Modernisation Roadmap
NZTA avoids up to NZ$80 million expenditure by modernising rather than replacing systems
http://assets.unisys.com/Documents/Global/CaseStudies/CS_130139_NZTAAvoidsUpToNZ80MillionExpenditurebyModernisingRatherthanReplacingSystemsAndRunsBusinessasUsual.pdf

http://www.unisys.com/offerings/industry-solutions/transportation-industry-solutions/airport-passengers-facilitation-suite/Case Study/Pioneering-Self-Service-at-Billund-Airport-id-407

​Increase the Level of Self-Service


​First airport to launch a home-print bag tag solution


http://assets.unisys.com/Documents/Global/CaseStudies/CS_130083_PioneeringSelfServiceatBillundAirport.pdf

 

 

http://www.unisys.com/industries/transportation/Story/Transportation-id-708
Transportation

Transportation players are navigating the opportunities of a challenging market

Transportation players – airlines, airports, and air cargo players – are constantly poised to take off. They are also constantly facing turbulence. These industries are flying into the headwinds of the most complex mix of challenges since the first commercial airlines ran 100 years ago. Customer demand is in constant flux, fuel costs pose a persistent threat to the business, and technology innovation is forcing business leaders to regularly rethink their entire business models.

There may have been a day when slow and steady won the race in the Transportation industry, but those days are long gone. Quarterly planning has been replaced by real-time visibility, big data, and predictive analytics. Hardware upgrades and depreciated IT assets have been supplanted by SaaS solutions, virtualization, and cloud computing. And ticket counters, 800 numbers and websites are giving way to mobile. The good news is that these complex mixes of challenges are being met by an ever-expanding array of technology solutions.

Transportation executives are now called to lead the company through this IT-led innovation while maintaining on-ground efficiency, business stability, and marketplace competitiveness. Unisys works with these executives – on the tarmac and in the boardroom – to ensure that their technology and operations meet the grueling demands of today's business climate.

Airlines operate in an environment with many variables. Some variables are controllable such as flight schedules, airfare, and crew and staff size. Other variables are not controllable, such as the weather, fuel prices, and economic instability. With so many variables to manage, airlines must establish highly reliable and intelligent airline systems. Unisys supports 15 of the today's top 25 global airlines. We have engineered the worldwide systems for over 200 airlines, and each day our systems check-in over 25% of the world's passengers. We are in the business of helping airlines contain variability, increase differentiation, optimize operational excellence, and improve passenger centricity.

Airports today are so much more than an arrival and departure location for planes. They are mini-cities, and home to massive retail attractions, large parking operations, and big business. And yes, airports also serve as the hub of the world's transportation system, carrying over 2 million passengers each day just in the U.S. Unisys Serves over 100 airports around the world helping them to boost revenue, reduce cost of operations, and improve decision-making through a unified view of operations and intelligent tools.

Air Cargo is an important contributor to the profitability of an Airline’s business. Cargo players are looking to tech-driven efficiencies to solidify their stability and growth, and the challenges can be daunting. We should know – Unisys Air Cargo solutions are used by carriers to move over 25% of the world's air freight. We combine our industry experience and know-how with practical product solutions to help air cargo organizations achieve high performance.


 

 

 

 

http://www.unisys.com/industries/transportation/Story/Transportation-id-708
Transportation-id-708


 

 

http://assets.unisys.com/PublishingImages/Global/Offerings/Offerings_Airline_Passenger_Services_AirCore.jpgAirCore/Airline Passenger Services
http://www.unisys.com/offerings/industry-solutions/transportation-industry-solutions/aircore-airline-passenger-services/Offerings/AirCore-Airline-Passenger-Services-id-1176
AirCore Airline Passenger Services
AirCore/Airline Passenger Services






http://assets.unisys.com/PublishingImages/Global/Offerings/Offerings_Logistics_Management_Solutions.jpgLogistics Solutions
http://www.unisys.com/offerings/industry-solutions/transportation-industry-solutions/logistics-solutions/Offerings/Logistics-Solutions-id-1170
Logistics Solutions
Logistics Solutions






http://assets.unisys.com/PublishingImages/Global/Offerings/Offerings_Airport_Operations.jpgAirport Operations Suite
http://www.unisys.com/offerings/industry-solutions/transportation-industry-solutions/airport-operations-suite/Offerings/Airport-Operations-Suite-id-1174
Airport Operations Suite
Airport Operations Suite






http://assets.unisys.com/PublishingImages/Global/Offerings/Offerings_Airport_Passengers_Suite.jpgAirport Passenger Facilitation Suite
http://www.unisys.com/offerings/industry-solutions/transportation-industry-solutions/airport-passengers-facilitation-suite/Offerings/Airport-Passenger-Facilitation-Suite-id-1172
Airport Passengers Facilitation Suite
Airport Passenger Facilitation Suite






 

 

http://www.unisys.com/offerings/mobility/Offerings/Mobility -id-942
Mobility

Business environments are changing dramatically with the increasing proliferation of consumerized mobile devices like smartphones and tablets. Employees and partners expect organizations to provide options of working from anywhere on a device of their choice with access to information they need when they need it. They are also increasingly commingling personal and business tasks on the same device. Customers today want instant access to products and services, and they want nothing less than the ‘complete’ digital experience in anything they do. Many organizations struggle to handle these expectations. They are hindered by standardized IT environments built for cost efficiencies and lack the agility to respond quickly to changing business needs.

Organizations are faced with balancing business demands for mobile flexibility while being able to manage the mobile environment within their existing standardized IT environment. If mobility is implemented without careful planning, organizations risk incomplete security deployments, missed revenue opportunities from introducing new products and services, and erroneous and costly decisions using inefficient business processes.

Unisys Mobility Solutions simplifies enterprise mobility with an integrated end-to-end mobile solution. We focus not only on the technology, but also on the users. Our People Computing approach, designed to maximize the utility of any mobile solution, sets Unisys apart. Our entire Mobility solution set is designed to make business, employees, and customers more effective by enabling businesses to:

Gain Insights & Control

Business and operational insights help you securely manage mobile resources while identifying areas of inefficiencies and opportunities.

Mobilize Information

Improve productivity and efficiency through enabling mobile access to existing enterprise or new applications designed to improve employee productivity or increase customer engagement.

Be Enterprise Agile

Meet the demands of the mobile enterprise with reliable, secure, and agile processes and resources that support the growth and demands of the mobile business environment.

Unisys’ Mobility solutions enable clients to achieve organizational value by:

  • Delivering industry-standard centralized outsourcing services for mobile environments.
  • Focusing on enabling legacy, primary system interfaces on latest device technology.
  • Securing the user, applications and data, not just the device, with user authentication and biometric solutions, mobile application management technology and data isolation.
  • Re-engineering standardized IT infrastructure from a less secure to a tiered, agile environment.

The user is at the heart of our solution. We work with you to ensure that the right people access the right information, at right time, and at the right location.

Unisys offers a comprehensive suite of mobility solutions that address mobility needs from the perspective of business processes, infrastructure, applications and the end-users.

Our integrated mobile solutions include:

Mobile Environment Management is our terminology for a more holistic management approach, including both devices (MDM) and applications (MAM). Our key capabilities include:

  • Mobile Device Management for all OSs including iOS, Android, Win8, BB
  • Mobile Application Management
  • Mobile Lifecycle Management
  • Mobile End User Support, Monitoring and Enablement
  • Mobile Content Management
  • Mobile Telecom Expense Management

Unisys is also an authorized service provider including Apple, enabling us to provide our customers with:

  • Full warranty services
  • Desk-side support option for Device and Configuration issues
  • Install, move, add and de-install (IMACD) on-site support services when needed

Mobile Application Development represents cost-effective and high-quality mobile application development and integration services we provide to our customers. These services take advantage of advanced technologies and security built-in approaches designed to ensure continuity, high performance, and ease of maintenance. Our key capabilities include:

  • Native iOS, Android, Win8
  • HTML5 & Cross Platform
  • Mobile AppStore Setup and Management
  • Mobile Application Life-Cycle Management
  • Unisys ePortal – HTML5 mobile app creation infrastructures running on our ClearPath systems

Mobile Infrastructure represents services we provide to enable our customer's mobile environment through cloud or on-premise infrastructures. Our goal is to ensure our customer's infrastructure is able to adjust and adapts to change in demands, to provide the secure sharing of files and documents across environments, and to provide access to modern apps designed for the evolving workplace. Our key capabilities include:

  • Cloud Setup and Management 
  • On-Premise / Data Center Setup and Management
  • SaaS Integration including Office 365 and Google Apps
  • Secure Cloud Storage

Mobile Security represents our approach to provide our customer's mobile environment with greater security, lower risk using a more holistic security approach for the enterprise. We help our customers move away from risk-laden BYOT, to better governance and risk management by focusing on four key dimensions of security: user, device, apps and data. Our key capabilities include:

  • Multi-Factor Authentication (including Biometric Authentication) 
  • VPN Setup 
  • App Wrapping 
  • User, Device, App and Data Security services

Mobile Assessments and Consulting represents services designed to provide our customers with a better mobile strategy to succeed in a mobile environment that has become very fragmented and comprised of disparate systems by putting them back into the driver’s seat. Our key capabilities include:

  • Innovation Workshops
  • Assessment and Strategy Consulting 
  • Process Transformation 
  • Governance and policies
  • Mobile User Role Definition

Unisys Offerings
Mobility


Mobility
http://www.unisys.com/offerings/security-solutions/unisys-stealth/stealth-for-mobile/Offerings/Stealth-for-Mobile-id-1035
Stealth for Mobile

Unisys StealthTM for Mobile enables authenticated and secure access to application processing environments in the data center from mobile applications. With Unisys Stealth for Mobile, security starts in the data center and extends to mobile devices. It leverages application wrapping software that encrypts data-in-motion from the mobile app across the Internet – securing it from hackers and eavesdroppers. Benefits include:

  • Helps secure the most critical assets in the data center from threats introduced by mobile devices.
  • End-users are quickly authenticated into Stealth Communities of Interest with no adverse impact on the user experience. 
  • Enables even more fine-grained security to be applied to your application users.
  • Fosters quicker implementation of mobile initiatives - application developers don’t need to become security experts or keep up with ever-changing security protocols.
  • Supports BYOD environments - it does not require an entire device to be secured; personal data or applications on the mobile device are undisturbed.

Unisys Stealth for Mobile secures the entire data path by protecting critical servers and virtual machines with Data Center Segmentation, connecting authenticated mobile users into secure Communities of Interest, and wrapping applications on the mobile device.


Unisys Offerings
Stealth for Mobile


Unisys Stealth;Mobility
http://www.unisys.com/offerings/mobility/Solution Family/V3-Industry-UnisysMobilityforTransportation-id-1160
Mobility by Unisys

Mobility for Transportation

 

Mobile technology is at the forefront of redefining the future travel experience. Along with passport and driver’s license, the mobile phone is the standard accessory for passenger travel. With 70% of passengers carrying a smartphone, it’s the ideal medium to engage and process passengers to provide them with information at the right time and location to reduce the stress of travel, and to increase ancillary and non-aeronautical - food, beverage and retail - revenues. Unisys Mobility Solutions simplify mobility across the entire transportation value chain. Our integrated solution is engineered to make transportation staff more effective, enhance the passenger experience, and ensure the security of mobile applications.

 


Unisys Solution Family
Mobility



http://www.unisys.com/offerings/security-solutions/unisys-stealth/Solution Family/V3-Industry-UnisysStealthforTransportation-id-1159
Unisys Stealth

Unisys Stealth for Transportation

 

Highly sensitive airline industry information requires extreme security. Airline executives and airport directors know this – and so do their customers and partners. Unisys Stealth™ is a leading-edge software security innovation that makes data communication endpoints undetectable on a network, thereby helping to eliminate them as targets for hackers. Stealth’s identity-based solution makes communication endpoints “dark” by allowing communications only to authorized members with a defined community of interest such as an airport shared infrastructure or among partners of an airline alliance. Learn how leading airline industry executives are leveraging Stealth to cost-effectively protect their information.


Unisys Solution Family
Unisys Stealth



http://www.unisys.com/offerings/cloud-solutions/Solution Family/V3-Industry-CloudforTransportation-id-1161
Unisys Cloud Solutions

Unisys Cloud Solutions for Transportation

 

Airlines and airports have thousands of applications accessed by hundreds of customers every day. These applications vary from booking a flight and managing airport gates to reconciling baggage. With the millions of transactions per day, airline CEOs and airport directors are challenged to manage capacity and still maintain excellent service efficiency. The cloud sets a new flight plan for how passengers and employees access applications, data, and services. Unisys Cloud Solutions strategy provides the roadmap, advisory services, and tools to help airline CEO’s and airport directors gain more visibility into their infrastructure, gain greater efficiencies, and achieve all of this with the highest confidence of a secure IT environment.


Unisys Solution Family
Cloud Solutions



http://www.unisys.com/offerings/security-solutions/unisys-stealth/stealth-for-network-security/Offerings/Stealth-for-Network-Security-id-1029
Stealth for Network Security

Unisys StealthTM secures data-in-motion and controls the information sharing within or across networks by employing an innovative data cloaking technique – all while vastly simplifying the infrastructure. Stealth assures security by transforming information using FIPS140-2 certified AES-256 encryption integrated with a new cryptographic data-dispersal algorithm that spreads data across the fabric of the network.

Stealth for Network Security has been through the National Security Agency's Common Criteria process and received EAL-4+ certification as a multi-domain network software solution for protection of data-in-motion across any network - private or public - qualifying Stealth to protect up to secret defense-level or sensitive industry information to support your mission critical requirements.

Here’s what Stealth for Network Security can do:

  • Render communication endpoints undetectable and secure across any private or public network 
  • Secure virtualization of communities of interest (COI) based on security privileges allowing multiple COIs to coexist on a single physical infrastructure
  • Deliver superior cyber defense resulting from Stealth’s ability to cloak networks from outsiders 
  • Reduce infrastructure and cost by reducing the need for multiple, separate physical networks for each COI 
  • Work with the existing security, identity management and IT infrastructure without a costly redesign

Stealth for Data Center Segmentation

Enterprise data centers have evolved over the last decade following innovations in server virtualization and consumerization of IT. Today's security reality presents a critical need to restrict access to certain assets, specifically the servers executing strategic applications and housing the most sensitive data.

The traditional tiered network architecture accomplishes critical server and database security by physical network separation from other data center assets. Flat networks are more flexible and easier to administer, but any system on the network can access any other system.

Unisys StealthTM provides a superior solution to either configuration. Separation of critical servers and databases is achieved by using software to virtualize the network and create secure groups we call Communities of Interest (COI). Far less network equipment is required and on already flat networks, Stealth compartmentalizes the servers with COI; systems in different COI cannot communicate with each other. The result is cost efficiencies with much greater protection.

Regional Isolation

Companies looking to multiple geographies for new business opportunities are exposed to new security challenges. Confidentiality requirements may necessitate that systems at geographically dispersed centers be kept separate from the corporate data center. However, some regional access to the enterprise data center is required.

Unisys StealthTM is designed to provide a solution to the regional challenge. Using Communities of Interest, Unisys Stealth helps secure sensitive data, servers and applications within a regional data center as well as corporate assets in the enterprise data center to:

  • Isolate regional assets from local threats
  • Segregate regional assets from each other
  • Allow selective and secure regional access to the enterprise network

Using Unisys Stealth to connect the regional data center back to the corporate data center provides access to corporate servers, data, and applications to only those with explicit permission.

Secure Remote Access

Unisys StealthTM for Secure Remote Access provides teleworkers, clients, and other trusted parties outside the enterprise with access to sensitive data in the data center. Individuals can be authorized into secure Communities of Interest (COI) which provides limited, granular access to information they need. In addition to establishing virtual COI, Unisys Stealth makes communication endpoints – servers, laptops, and other devices – dark on the network, making them virtually invisible to anyone not authorized into the COI.

  • Need-to-know access to enterprise data from outside the enterprise
  • Flexibility to securely connect from practically anywhere, anytime
  • Ease of use and enhanced user experience

Secure Virtual Terminal

Unisys Stealth for Secure Virtual Terminal (SVT) delivers the Unisys Stealth for Network Security on a secure USB-based device. SSVT is designed to protect high value transactions, transmit sensitive data, facilitate emergency preparedness, and is ideal for travelling, home-based, or guest users. It can be booted from virtually any PC or laptop and preconfigured to establish a virtual secure Stealth tunnel through any network - private or public - to another predetermined Stealth endpoint such as a URL, web portal, Stealth gateway, etc. Our solution guarantees a clean boot from the USB device that mitigates any malware that may have infected the PC itself.

  • SSVT has all of the attributes of Stealth for Network Security
  • Flexibility to securely connect from anywhere, anytime
  • Ease of use and enhanced user experience 
  • Small and portable

 


Unisys Offerings
Stealth for Network Security


Unisys Stealth
http://www.unisys.com/offerings/cloud-solutions/cloudbuild-services/Offerings/CloudBuild-Services-id-975
CloudBuild Services

While the pressure to adopt cloud is intense, adopting cloud haphazardly could be detrimental. There are persistent concerns around security, compliance, regulations, and cost. There are also unprecedented implementation challenges including:

  • the “cloud-in-a-corner” syndrome;
  • higher levels of risk in migrating to cloud; and
  • project failures and budget overruns.

The cloud is not a place to figure it out as you go.

Unisys CloudBuild Services enables organizations to successfully build cloud that is integrated into the overall business process, transforming their existing infrastructure into an agile IT-as-a-service model. Unisys “8-Tracks” model, a 360-degree cloud view approach, covers eight critical data center domains. Together with ConOps, which includes industry best practices, Unisys ensures that your cloud infrastructure meets the security, regulatory and compliance requirements enabling us to deliver the most secure and reliable cloud in the market place.


Unisys Offerings
CloudBuild Services


Cloud Solutions
http://www.unisys.com/offerings/cloud-solutions/cloud-advisory-services/Offerings/Cloud-Advisory-Services-id-963
Cloud Advisory Services

Cloud Advisory Services provide strategic and financial guidance on aligning IT to business objectives. This starts with a roadmap that outlines the vision of a hybrid enterprise based on a combination of existing data center, internal cloud, and external cloud resources to provide agility, flexibility, and control.


​"Based on the study Unisys conducted and the advice they provided, we were able to confidently select a cost-effective email solution using cloud technology. Unisys provided valuable expertise in addressing executive team concerns and building confidence for the subsequent migration."

— Allan Steele, VP/CIO DART

 


Unisys provides the following types of advisory services:

 

  • IT Strategy Service to help clients develop their IT infrastructure and operations strategy based on their business objectives and provide a roadmap to get to hybrid enterprise vision.
  • Data Center Strategy Service to help clients develop their data center strategy based on their business requirements, technology trends, total cost of ownership, and realization models (e.g. own, lease, or outsource).
  • Feasibility Analysis Service to help choose the right approach (e.g. transformation of their existing data centers, or deploying internal cloud, or moving business workloads to public cloud).
  • Value Assessment Services to develop a business case that can stand the scrutiny of CFO.

Unisys Offerings
Cloud Advisory Services


Cloud Solutions

 

 

eBooks
Unisys Mobility Solutions eBook
http://www.unisys.com/offerings/mobility/eBooks/Unisys-Mobility-Solutions-eBook-id-1039
Unisys Mobility Solutions eBook

Brochure
Mobility Solutions for Air Transportation
http://www.unisys.com/industries/transportation/Brochure/Mobility-Solutions-for-Air-Transportation-id-528
Mobility Solutions for Air Transportation

Video
Unisys Transportation Solutions
http://www.unisys.com/industries/transportation/Video/Unisys-Transportation-Solutions-id-482
Unisys Transportation Solutions
http://www.youtube.com/embed/oo942J8ZU5o
Video
Unisys Applied Innovation in the Transportation Industry
http://www.unisys.com/industries/transportation/Video/Unisys-Applied-Innovation-in-the-Transportation-Industry-id-1126
Unisys Applied Innovation in the Transportation Industry
http://www.youtube.com/embed/Z3rZBy8pcP0?rel=0
Video
Biometrics at Unisys
http://www.unisys.com/offerings/security-solutions/Video/Biometrics-at-Unisys-id-497
​Biometrics at Unisys
http://www.youtube.com/embed/80EfchyQ6xc
Brochure
Unisys AirCore For Airlines
http://www.unisys.com/industries/transportation/Brochure/Unisys-AirCore-For-Airlines-id-648

​Unisys AirCore For Airlines



Unisys in the News
Unisys unveils invisibility cloak for network traffic
http://www.unisys.com/offerings/security-solutions/unisys-stealth/Unisys in the News/Unisys-unveils-invisibility-cloak-for-network-traffic-id-1211

​​​Unisys unveils invisibility cloak for network traffic



Thought Leader
John Kendall
http://www.unisys.com/offerings/security-solutions/Thought Leader/John-Kendall-id-832
Insights into the Latest Global Security Trends

Video
Airport Solutions
http://www.unisys.com/industries/transportation/airport-solutions/Video/Airport-Solutions-id-1266
Airport Solutions
http://www.youtube.com/embed/LODqoCA0yac
Case Study
NZTA Avoids Up To NZ$80 Million Expenditure by Modernising Rather than Replacing Systems And Runs Business as Usual Operations During IT System Modernisation Project
http://www.unisys.com/industries/transportation/Case Study/NZTA-Avoids-Up-To-NZ80-Million-Expenditure-by-Modernising-id-466
​​The Business Critical Modernisation Roadmap