Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Unisys Delivers Secure Cloud Solution

BLUE BELL, Pa.--(BUSINESS WIRE)--Unisys Corporation (NYSE:UIS) today announced that the Unisys Secure Cloud Solution became available to clients on July 31. This innovative solution enables enterprise clients to securely move conventional business applications - including those with secure or sensitive data, such as human resources, financial, customer and healthcare information - into a managed, shared cloud service without costly, time-consuming rewrites or other alterations.

The Unisys Secure Cloud Solution is a core component of Unisys cloud computing strategy, which enables clients to choose the type of data center computing services that best meet their business objectives, from self-managed private clouds to Unisys-managed cloud services as well as hybrid solutions.

"With its advanced data protection and network security features, the Unisys Secure Cloud Solution takes a crucial extra step to give clients greater confidence in moving more of their applications with sensitive business data to the cloud," said Sam Gross, vice president, Global IT Outsourcing Solutions, Unisys. "By doing so, they could realize cost savings and operational efficiencies by leveraging the significant investment Unisys has made in global service delivery and infrastructure."

The Secure Cloud Solution integrates Unisys patent-pending Stealth data protection technology, which cloaks data from detection as it moves through the network. As a result, clients in a multi-tenant environment can share the same IT infrastructure without fear of compromising the security of their data. (Unisys also plans to release a Stealth solution for storage area networks to provide the same cloaking capability for "data at rest.")

Assessing Unisys cloud computing strategy and Secure Cloud Solution, and the value that the Stealth technology brings, The 451 Group analyst William Fellows wrote, "Establishing a strict chain of custody for data will be a key requirement for running more sensitive workloads in the cloud."

  • 1