Sign In Study/Pioneering-Self-Service-at-Billund-Airport-id-407

​​​​​​Pioneering Self Service at Billund Airport

​First airport to launch a home-print bag tag solution Study/NZTA-Avoids-Up-To-NZ80-Million-Expenditure-by-Modernising-id-466
​​​​NZTA Avoids NZ80 Million Expenditure
New Zealand Transport Agency modernises its infrastructure rather than replace its systems

Transportation players are navigating the opportunities of a challenging market

Transportation players – airlines, airports, and air cargo players – are constantly poised to take off. They are also constantly facing turbulence. These industries are flying into the headwinds of the most complex mix of challenges since the first commercial airlines ran 100 years ago. Customer demand is in constant flux, fuel costs pose a persistent threat to the business, and technology innovation is forcing business leaders to regularly rethink their entire business models.

There may have been a day when slow and steady won the race in the Transportation industry, but those days are long gone. From forecasting to ‘now-casting’, long-term planning has been replaced by real-time visibility, big data and predictive analytics. Hardware upgrades and depreciated IT assets have been supplanted by SaaS solutions, virtualization and cloud computing. Ticket counters, call centers, and websites are giving way to mobile, social, and agile computing. The good news is that these complex mixes of challenges are being met by an ever-expanding array of technology solutions. Transportation executives are now called to lead the company through this IT-led innovation while maintaining on-ground efficiency, business stability, and marketplace competitiveness. Unisys works with executives—on the tarmac and in the boardroom—to ensure that their technology and operations meet the grueling demands of today’s business climate.

Airlines operate in an environment with many moving parts. Some are controllable such as flight schedules, capacity, airfare, and crew and staff size. Other variables are not controllable, such as the weather, fuel prices, and economic instability. To navigate this complexity, airlines must establish highly reliable and intelligent airline systems. Unisys supports 15 of the today’s top 25 global airlines with modern mission critical business solutions. We have engineered the worldwide systems for over 200 airlines, and each day our systems check-in over 25% of the world’s passengers. We are in the business of helping airlines contain variability, increase differentiation, optimize operational excellence and improve passenger centricity.

Airports today are so much more than an arrival and departure location for planes. They are mini-cities, and home to massive retail attractions, large parking operations, and big business. And yes, airports also serve as the hub of the world’s transportation system, carrying over 2 million passengers daily just in the U.S. Unisys serves over 100 airports around the world helping them to boost revenue, reduce cost of operations and improve decision making through a unified view of operations and intelligent tools.

Air Cargo is essential for global trade, and an important contributor to the profitability of the airlines business. Cargo players are looking to tech-driven efficiencies to solidify their stability and growth, and the challenges can be daunting. We should know - about 25% of the world’s air cargo shipments are processed by Unisys solutions. From booking to handling, from warehouse management to tracking and tracing, and from revenue management to revenue accounting, Unisys combines our industry experience and know-how with integrated business solutions to help air cargo organizations achieve high performance.



Logistics Solutions
Logistics Solutions Passenger Services
AirCore Airline Passenger Services
AirCore/Airline Passenger Services Operations Suite
Airport Operations Suite
Airport Operations Suite Passenger Facilitation Suite
Airport Passengers Facilitation Suite
Airport Passenger Facilitation Suite


Unisys Offerings

Mobility Family/V3-Industry-UnisysMobilityforTransportation-id-1160
Mobility by Unisys

Mobility for Transportation


Mobile technology is at the forefront of redefining the future travel experience. Along with passport and driver’s license, the mobile phone is the standard accessory for passenger travel. With 70% of passengers carrying a smartphone, it’s the ideal medium to engage and process passengers to provide them with information at the right time and location to reduce the stress of travel, and to increase ancillary and non-aeronautical - food, beverage and retail - revenues. Unisys Mobility Solutions simplify mobility across the entire transportation value chain. Our integrated solution is engineered to make transportation staff more effective, enhance the passenger experience, and ensure the security of mobile applications.


Unisys Solution Family
Stealth for Mobile

Unisys StealthTM for Mobile enables authenticated and secure access to application processing environments in the data center from mobile applications. With Unisys Stealth for Mobile, security starts in the data center and extends to mobile devices. It leverages application wrapping software that encrypts data-in-motion from the mobile app across the Internet – securing it from hackers and eavesdroppers. Benefits include:

  • Helps secure the most critical assets in the data center from threats introduced by mobile devices.
  • End-users are quickly authenticated into Stealth Communities of Interest with no adverse impact on the user experience. 
  • Enables even more fine-grained security to be applied to your application users.
  • Fosters quicker implementation of mobile initiatives - application developers don’t need to become security experts or keep up with ever-changing security protocols.
  • Supports BYOD environments - it does not require an entire device to be secured; personal data or applications on the mobile device are undisturbed.

Unisys Stealth for Mobile secures the entire data path by protecting critical servers and virtual machines with Data Center Segmentation, connecting authenticated mobile users into secure Communities of Interest, and wrapping applications on the mobile device.

Unisys Offerings
Stealth for Mobile

Unisys Stealth;Mobility Family/V3-Industry-UnisysStealthforTransportation-id-1159
Unisys Stealth

Unisys Stealth for Transportation


Highly sensitive airline industry information requires extreme security. Airline executives and airport directors know this – and so do their customers and partners. Unisys Stealth™ is a leading-edge software security innovation that makes data communication endpoints undetectable on a network, thereby helping to eliminate them as targets for hackers. Stealth’s identity-based solution makes communication endpoints “dark” by allowing communications only to authorized members with a defined community of interest such as an airport shared infrastructure or among partners of an airline alliance. Learn how leading airline industry executives are leveraging Stealth to cost-effectively protect their information.

Unisys Solution Family
Unisys Stealth Family/V3-Industry-CloudforTransportation-id-1161
Unisys Cloud Solutions

Unisys Cloud Solutions for Transportation


Airlines and airports have thousands of applications accessed by hundreds of customers every day. These applications vary from booking a flight and managing airport gates to reconciling baggage. With the millions of transactions per day, airline CEOs and airport directors are challenged to manage capacity and still maintain excellent service efficiency. The cloud sets a new flight plan for how passengers and employees access applications, data, and services. Unisys Cloud Solutions strategy provides the roadmap, advisory services, and tools to help airline CEO’s and airport directors gain more visibility into their infrastructure, gain greater efficiencies, and achieve all of this with the highest confidence of a secure IT environment.

Unisys Solution Family
Cloud Solutions
CloudBuild Services

While the pressure to adopt cloud is intense, adopting cloud haphazardly could be detrimental. There are persistent concerns around security, compliance, regulations, and cost. There are also unprecedented implementation challenges including:

  • the “cloud-in-a-corner” syndrome;
  • higher levels of risk in migrating to cloud; and
  • project failures and budget overruns.

The cloud is not a place to figure it out as you go.

Unisys CloudBuild Services enables organizations to successfully build cloud that is integrated into the overall business process, transforming their existing infrastructure into an agile IT-as-a-service model. Unisys “8-Tracks” model, a 360-degree cloud view approach, covers eight critical data center domains. Together with ConOps, which includes industry best practices, Unisys ensures that your cloud infrastructure meets the security, regulatory and compliance requirements enabling us to deliver the most secure and reliable cloud in the market place.

Unisys Offerings
CloudBuild Services

Cloud Solutions
​Cloud Advisory Services

Cloud Advisory Services provide strategic and financial guidance on aligning IT to business objectives. This starts with a roadmap that outlines the vision of a hybrid enterprise based on a combination of existing data center, internal cloud, and external cloud resources to provide agility, flexibility, and control.

​"Based on the study Unisys conducted and the advice they provided, we were able to confidently select a cost-effective email solution using cloud technology. Unisys provided valuable expertise in addressing executive team concerns and building confidence for the subsequent migration."

— Allan Steele, VP/CIO DART


Unisys provides the following types of advisory services:


  • IT Strategy Service to help clients develop their IT infrastructure and operations strategy based on their business objectives and provide a roadmap to get to hybrid enterprise vision.
  • Data Center Strategy Service to help clients develop their data center strategy based on their business requirements, technology trends, total cost of ownership, and realization models (e.g. own, lease, or outsource).
  • Value Assessment Services to develop a business case that can stand the scrutiny of CFO.

Unisys Offerings
Cloud Advisory Services

Cloud Solutions
Stealth for Network Security

Unisys StealthTM secures data-in-motion and controls the information sharing within or across networks by employing an innovative data cloaking technique – all while vastly simplifying the infrastructure. Stealth assures security by transforming information using FIPS140-2 certified AES-256 encryption integrated with a new cryptographic data-dispersal algorithm that spreads data across the fabric of the network.

Stealth for Network Security has been through the National Security Agency's Common Criteria process and received EAL-4+ certification as a multi-domain network software solution for protection of data-in-motion across any network - private or public - qualifying Stealth to protect up to secret defense-level or sensitive industry information to support your mission critical requirements.

Here’s what Stealth for Network Security can do:

  • Render communication endpoints undetectable and secure across any private or public network 
  • Secure virtualization of communities of interest (COI) based on security privileges allowing multiple COIs to coexist on a single physical infrastructure
  • Deliver superior cyber defense resulting from Stealth’s ability to cloak networks from outsiders 
  • Reduce infrastructure and cost by reducing the need for multiple, separate physical networks for each COI 
  • Work with the existing security, identity management and IT infrastructure without a costly redesign

Stealth for Data Center Segmentation

Enterprise data centers have evolved over the last decade following innovations in server virtualization and consumerization of IT. Today's security reality presents a critical need to restrict access to certain assets, specifically the servers executing strategic applications and housing the most sensitive data.

The traditional tiered network architecture accomplishes critical server and database security by physical network separation from other data center assets. Flat networks are more flexible and easier to administer, but any system on the network can access any other system.

Unisys StealthTM provides a superior solution to either configuration. Separation of critical servers and databases is achieved by using software to virtualize the network and create secure groups we call Communities of Interest (COI). Far less network equipment is required and on already flat networks, Stealth compartmentalizes the servers with COI; systems in different COI cannot communicate with each other. The result is cost efficiencies with much greater protection.

Regional Isolation

Companies looking to multiple geographies for new business opportunities are exposed to new security challenges. Confidentiality requirements may necessitate that systems at geographically dispersed centers be kept separate from the corporate data center. However, some regional access to the enterprise data center is required.

Unisys StealthTM is designed to provide a solution to the regional challenge. Using Communities of Interest, Unisys Stealth helps secure sensitive data, servers and applications within a regional data center as well as corporate assets in the enterprise data center to:

  • Isolate regional assets from local threats
  • Segregate regional assets from each other
  • Allow selective and secure regional access to the enterprise network

Using Unisys Stealth to connect the regional data center back to the corporate data center provides access to corporate servers, data, and applications to only those with explicit permission.

Secure Remote Access

Unisys StealthTM for Secure Remote Access provides teleworkers, clients, and other trusted parties outside the enterprise with access to sensitive data in the data center. Individuals can be authorized into secure Communities of Interest (COI) which provides limited, granular access to information they need. In addition to establishing virtual COI, Unisys Stealth makes communication endpoints – servers, laptops, and other devices – dark on the network, making them virtually invisible to anyone not authorized into the COI.

  • Need-to-know access to enterprise data from outside the enterprise
  • Flexibility to securely connect from practically anywhere, anytime
  • Ease of use and enhanced user experience

Secure Virtual Terminal

Unisys Stealth for Secure Virtual Terminal (SVT) delivers the Unisys Stealth for Network Security on a secure USB-based device. SSVT is designed to protect high value transactions, transmit sensitive data, facilitate emergency preparedness, and is ideal for travelling, home-based, or guest users. It can be booted from virtually any PC or laptop and preconfigured to establish a virtual secure Stealth tunnel through any network - private or public - to another predetermined Stealth endpoint such as a URL, web portal, Stealth gateway, etc. Our solution guarantees a clean boot from the USB device that mitigates any malware that may have infected the PC itself.

  • SSVT has all of the attributes of Stealth for Network Security
  • Flexibility to securely connect from anywhere, anytime
  • Ease of use and enhanced user experience 
  • Small and portable


Unisys Offerings
Stealth for Network Security

Unisys Stealth



Unisys eBook - Unisys Mobility Solutions eBook
​Unisys Mobility Solutions eBook

Unisys Event - 95th Annual American Meteorological Society (AMS) Meetings
95th Annual American Meteorological Society (AMS) Meetings

Unisys Video - Unisys Transportation Solutions
​Unisys Transportation Solutions
Unisys Video - Unisys Applied Innovation in the Transportation Industry
​Unisys Applied Innovation in the Transportation Industry
Unisys Video - Biometrics at Unisys
​​Biometrics at Unisys
News Release
Airlines Can Track and Monitor Temperature-Sensitive Freight Using Unisys Air Cargo Logistics Management System Release/Airlines-Can-Track-and-Monitor-Temperature-Sensitive-Freight-Using-Unisys-Air-Cargo-Logistics-Management-System

​​​Airlines Can Track and Monitor Temperature-Sensitive Freight Using Unisys Air Cargo Logistics Management System

Unisys in the News
Unisys in the News - The New Dynamic in the News/The-New-Dynamic-id-2012
​​​The New Dynamic

Case Study
Unisys Case Study - NZTA Avoids Up To NZ$80 Million Expenditure by Modernising Rather than Replacing Systems And Runs Business as Usual Operations During IT System Modernisation Project Study/NZTA-Avoids-Up-To-NZ80-Million-Expenditure-by-Modernising-id-466
​​​​NZTA Avoids NZ80 Million Expenditure

News Release
Virgin Atlantic Cargo Customers Can Now Book Shipments Through Unisys Cargo Portal Services Release/Virgin-Atlantic-Cargo-Customers-Can-Now-Book-Shipments-Through-Unisys-Cargo-Portal-Services

​Virgin Atlantic Cargo Customers Can Now Book Shipments Through Unisys Cargo Portal Services

Unisys Brochure - Unisys AirCore For Airlines

​​​Unisys AirCore For Airlines