Unisys.com
A Giant Step Forward!
The Forward! by Unisys ™ fabric delivers the scalability, performance and security to support applications.
Financial Industry Insights
Unisys suite of solutions creates a successful model for Financial Services organizations of the future.
ClearPath & Innovation
Unisys ClearPath mainframes deliver scalable, reliable, and secure real-time infrastructure.
Getting to Trust
Security, privacy, risk -- words designed to attain real trust. This blog covers the cyber world.
Disruptive IT Trends
Six disruptive trends are creating new opportunities for IT to deliver value to the business.
On Point
Unisys develops advanced IT solutions that define the future of government while driving down costs.
European Voices
Unisys designs, builds, and manages mission-critical environments for businesses and governments.
Views from the Edge
News and views on issues affecting Service Management and IT operations.
Executive Conversations
Sharing key topics and IT trends with Unisys executives and other industry leading company peers.

ThinkstockPhotos-466425231200x200

Thinking Security: The Pete Test

People in the security area and security scanner programs are constantly adapting to the new vulnerabilities that are found and attacks that happen. We can use these external assessments to become more secure, and help our security mindset.


Posted by: on 06/2/15


ThinkstockPhotos-460210083200x200

Detect, Identify and Take Timely Action against Threats and Intruders

Today, there needs to be a focus on proactively identifying intruders. Whether threats are external or internal, this can be achieved through the use of advanced forensics and analytics that raise the alarm early and send alerts to those responsible for IT, data or network assets.


Posted by: on 06/1/15


ThinkstockPhotos-493958387200x200

Service Management Showtime

Preview of the upcoming service management industry events where Unisys will have a strong presence and the speakers we have at each venue.


Posted by: on 05/29/15


ThinkstockPhotos-452033657200x200

Knowledge Transfer That Actually Works: Rethinking Knowledge Transfer from a Social Perspective

Despite a looming retirement crisis and an increased understanding of the value of knowledge within the enterprise, most companies still have not implemented successful critical knowledge transfer initiatives.


Posted by: on 05/27/15


Dreamteam200x200

The Mobile App Dev Dream Team: Diverse Personalities Are Key

To be successful with this two-speed methodology in the area of mobile application development requires a diverse set of people with complementary strengths.


Posted by: on 05/21/15


US-0031-OS2200-E-web-size200x200

Achieving the Impossible

Many believed it simply could not be done, but Unisys never wavered from the commitment to meet or exceed CMOS class performance "on all products" by 2015. We had a vision and we are now delivering it.


Posted by: on 05/20/15


ThinkstockPhotos-466942014200x200

Continuous Compliance…Moving Beyond a Checklist Mentality

Often, people incorrectly view governance and compliance as a static checklist set of activities, that when completed, signify that an organization has successfully guaranteed its present and future security.


Posted by: on 05/14/15


ThinkstockPhotos-510465925200x200

Using ITSM Kaizen to Improve Service Delivery

ITSM Kaizen, which leverages a philosophy of continuous improvement, offers a five-step approach that lets you move forward with confidence as you enhance your service-management capability. This includes:


Posted by: on 05/14/15


ShadowITBank200x200

Shadow IT Goes Mainstream

For years, CIOs have been warning over the inherent risks associated with shadow IT; however, by bringing shadow IT into the open, there can also be a value-add for businesses.


Posted by: on 05/6/15


PremV

Public Cloud Security: Completing the Jigsaw

Find out how enterprises can now leverage platforms such as AWS to host even their mission-critical business applications, and achieve significant savings on capital expenditure, without fear of introducing a new vector for threats and breaches.


Posted by: on 05/6/15


Back To Top