Unisys.com
A Giant Step Forward!
The Forward! by Unisys ™ fabric delivers the scalability, performance and security to support critical applications using Linux and Windows.
Executive Conversations
Sharing key topics and IT trends with Unisys executives and other industry leading company peers.
ClearPath & Innovation
Unisys ClearPath mainframes deliver scalable, reliable, and secure real-time infrastructure.
Financial Industry Insights
Unisys holistic suite of solutions creates a successful model for Financial Services organizations of the future.
Disruptive IT Trends
Six disruptive trends are creating new opportunities for IT to deliver value to the business.
On Point
Unisys develops advanced information technology solutions that define the future of government while driving down costs.
European Voices
Unisys designs, builds, and manages mission-critical environments for businesses and governments.
Views from the Edge
Join us as we discuss issues that are affecting Service Management and IT operations. We will share news and views of interest to IT leaders and service management practioners.

security-compliance_200x200

Verifying Security Policy Compliance

Security best practices call for monitoring compliance with security policies, then taking the appropriate actions if the system is out of compliance. ClearPath Dorado administrators will find this task has now become easier.


Posted by: Dr. Glen E. Newton on 07/31/14


BPM_200x200

Hybrid Application Management – The Role of Orchestration

Cloud, as a technology, is mainly focused on the automation of IT resource management. Orchestration is more akin to the automation of business process than the typical automation of individual resources and their configurations.


Posted by: Michael Salsburg on 07/31/14


biometrics_200x200

Tighten Security with Multifactor Authentication

Highlights the need and move from password authentication to biometric usage to secure and safeguard information.


Posted by: Linda Welch on 07/31/14


mobile_462058729

The Mobile Trendsetters Guide to Developing a Mobile Strategy

Find out the three key elements to develop a winning mobile strategy to keep up with the Mobile Trendsetters.


Posted by: Darren McGrath on 07/30/14


law-enforcement-technology_200x200

Law Enforcement and Justice, Part Two: The Impact of Technology on 21st Century Policing

Responding to the challenges of 21st century policing requires law enforcement officers to have a clear sense of direction, resilience, and the ability to inspire and motivate teams through change; and this change can be facilitated by technological innovation.


Posted by: John Wright on 07/30/14


mobile-cloud_200x200

The Transformation of Service Management

IT departments are challenged by the plethora of consumer-grade technologies that are being brought into the workplace. This podcast addresses the impact of cataclysmic trends on ITSM and how you can survive them.


Posted by: ITSM Editor on 07/25/14


compliance_200x200

Enterprise Governance, Risk, and Compliance (eGRC) – Managing Risk in the Enterprise Effectively and Efficiently

Understand the challenges facing organizations today, the advantages of a sound Governance, Risk, and Compliance program and ways to leverage eGRC tools to gain operational effectiveness and efficiency throughout the enterprise.


Posted by: Charles Ugalde on 07/24/14


Encryption_200x200

Need for Speed: Banking on Faster Payments!

What is one major industry initiative that will impact mobile payments, easy-to-use banking applications, and money transfer that is set to reshape the future of the mobile banking industry? The answer is faster payments.


Posted by: Robert Olson on 07/23/14


cyberwar_200x200

Cyberwar of the Worlds

A bustling newsroom, shouted directives are barely audible over the commotion. The room quiets as the local news anchor takes his seat behind the rich mahogany newsdesk and the countdown to live begins ...


Posted by: Adam Gallagher on 07/23/14


people_200x200

Managing Your Most Important Asset; People Computing by Unisys

People are shaping the transformation of the computer evolution. They require a next-generation IT environment to empower productivity and innovation. But aligning technology to end-users to help them perform at their maximum potential takes a unique approach.


Posted by: ITSM Editor on 07/17/14


Back To Top