2:15
Unisys Video.
One of the best marketing videos from Unisys. Does somebody know the song name?. It's beau...
published: 21 Feb 2012
author: 63Poker
Unisys Video.
Unisys Video.
One of the best marketing videos from Unisys. Does somebody know the song name?. It's beautifull!.- published: 21 Feb 2012
- views: 729
- author: 63Poker
3:07
Unisys Stealth Solution for Amazon Web Services
Amazon Web Services (AWS) is a collection of remote computing services (also called web se...
published: 19 Aug 2013
Unisys Stealth Solution for Amazon Web Services
Unisys Stealth Solution for Amazon Web Services
Amazon Web Services (AWS) is a collection of remote computing services (also called web services) that together comprise a cloud computing platform offered by Amazon over the Internet. Amazon Virtual Private Cloud (VPC) is one of the services available in the AWS Cloud. Unisys Stealth for Amazon Web Services brings the enhanced security of Stealth -- encrypted communication between endpoints, segregation of data by Community of Interest (COI), and endpoints that are cloaked from hackers -- to the AWS Cloud. This positions organizations to achieve the cost savings offered by public clouds while addressing the security concerns so often associated with them.- published: 19 Aug 2013
- views: 97
3:15
Unisys ClearPath Dorado: The Best Protection
Are ClearPath Dorado systems safe from hacker attacks? Symantec thinks so. In this short v...
published: 07 May 2012
author: Unisys Corporation
Unisys ClearPath Dorado: The Best Protection
Unisys ClearPath Dorado: The Best Protection
Are ClearPath Dorado systems safe from hacker attacks? Symantec thinks so. In this short video, Symantec lead penetration tester Erik Kamerling talks about h...- published: 07 May 2012
- views: 606
- author: Unisys Corporation
3:20
Larry Dunn, Unisys
A conversation with Larry Dunn, vice president, Global IT Solutions, Unisys. Larry talks a...
published: 12 Dec 2011
author: aternityinc
Larry Dunn, Unisys
Larry Dunn, Unisys
A conversation with Larry Dunn, vice president, Global IT Solutions, Unisys. Larry talks about Unisys' focus on End User Experience Management, why they have...- published: 12 Dec 2011
- views: 424
- author: aternityinc
45:43
Unisys CEO brings IT firm back to profitability
J. Edward Coleman arrived at the helm of Unisys in 2008 with a deep appreciation of how qu...
published: 11 May 2011
author: TepperCMU
Unisys CEO brings IT firm back to profitability
Unisys CEO brings IT firm back to profitability
J. Edward Coleman arrived at the helm of Unisys in 2008 with a deep appreciation of how quickly the market changes in the technology industry. After all, he ...- published: 11 May 2011
- views: 4584
- author: TepperCMU
3:24
Unisys Stealth Solution Suite Overview
Stealth allows multiple user communities to share the same IT infrastructure, securely. St...
published: 06 Dec 2013
Unisys Stealth Solution Suite Overview
Unisys Stealth Solution Suite Overview
Stealth allows multiple user communities to share the same IT infrastructure, securely. Stealth isolates applications so that only the authorized users can see and access the data unique to that application. In effect, you can't hack what you can't see. And, it works without application or infrastructure changes.- published: 06 Dec 2013
- views: 23
2:07
Unisys Airport Solutions
This video demonstrates how our industry expertise in air transportation - combined with o...
published: 30 May 2012
author: Unisys Corporation
Unisys Airport Solutions
Unisys Airport Solutions
This video demonstrates how our industry expertise in air transportation - combined with our strong modernization and security capabilities - add up to a win...- published: 30 May 2012
- views: 470
- author: Unisys Corporation
3:44
Unisys: At the Heart of UK Banking
In an industry where there is no room for error, Unisys works with clients to design, buil...
published: 15 Nov 2011
author: Unisys Corporation
Unisys: At the Heart of UK Banking
Unisys: At the Heart of UK Banking
In an industry where there is no room for error, Unisys works with clients to design, build, and manage mission-critical systems, delivering high-volume, tra...- published: 15 Nov 2011
- views: 902
- author: Unisys Corporation
3:34
Unisys Stealth for Mobile
Unisys Stealth for Mobile enables authenticated and secure access to application processin...
published: 08 Oct 2013
Unisys Stealth for Mobile
Unisys Stealth for Mobile
Unisys Stealth for Mobile enables authenticated and secure access to application processing environments in the data center from mobile applications. With Unisys Stealth for Mobile, security starts in the data center and extends to mobile devices. It leverages application wrapping software that encrypts data-in-motion from the mobile app across the Internet -- securing it from hackers and evesdroppers. Unisys Stealth for Mobile secures the entire data path by protecting critical servers and virtual machines with Data Center Segmentation, connecting authenticated mobile users into secure Communities of Interest, and wrapping applications on the mobile device.- published: 08 Oct 2013
- views: 334
4:13
Unisys Application Management
Unisys Application Management helps stakeholders be better informed about Commercial Off-t...
published: 08 Apr 2013
author: Unisys Corporation
Unisys Application Management
Unisys Application Management
Unisys Application Management helps stakeholders be better informed about Commercial Off-the-Shelf (COTS) and ERP applications that are foundational to runni...- published: 08 Apr 2013
- views: 157
- author: Unisys Corporation
2:36
2012 11 23 UNISYS YOLANDA DOBLE ANIVERSARIO
Yolanda Auza, presidente de Unisys, nos cuenta sobre los 60 años de labores de Unisys en C...
published: 23 Nov 2012
author: Computerworldcol
2012 11 23 UNISYS YOLANDA DOBLE ANIVERSARIO
2012 11 23 UNISYS YOLANDA DOBLE ANIVERSARIO
Yolanda Auza, presidente de Unisys, nos cuenta sobre los 60 años de labores de Unisys en Colombia y de sus 25 años de trabajo en esta empresa, con un interes...- published: 23 Nov 2012
- views: 152
- author: Computerworldcol
Youtube results:
3:11
Unisys Stealth Datacenter Segmentation
Cloak your Strategic Applications
Unisys Stealth is designed to protect business data and...
published: 06 Dec 2013
Unisys Stealth Datacenter Segmentation
Unisys Stealth Datacenter Segmentation
Cloak your Strategic Applications Unisys Stealth is designed to protect business data and systems by creating a communications tunnel that is cloaked to any users or devices except those who are pre-identified as part of the "secure community" referred to as a Community of Interest (COI). This is unlike traditional solutions, which use physical topology to cordon off and protect high value servers, virtual workloads and applications. In contrast, Stealth enables security by using COIs, allowing the network to be simplified while protecting visibility and access to different servers and applications.- published: 06 Dec 2013
- views: 82
3:17
Unisys Stealth Regional Isolation
An Information Embassy
As companies look to multiple geographies for new business opportu...
published: 06 Dec 2013
Unisys Stealth Regional Isolation
Unisys Stealth Regional Isolation
An Information Embassy As companies look to multiple geographies for new business opportunities, IT challenges can quickly become a nightmare. Confidentiality requirements or geopolitical challenges that may compromise IP and data integrity necessitate that systems at geographically dispersed centers be kept separate from the corporate data center. Unisys Stealth is designed to help enterprises shield data assets within a designated region while controlling access to corporate assets from users in that region. Creating an information embassy with Unisys Stealth enables an organization to establish a secure regional site in various geographic locations.- published: 06 Dec 2013
- views: 8
2:38
Unisys Stealth Secure Remote Access
Much More than your Traditional VPN
Organizations typically use VPNs to access the enterp...
published: 06 Dec 2013
Unisys Stealth Secure Remote Access
Unisys Stealth Secure Remote Access
Much More than your Traditional VPN Organizations typically use VPNs to access the enterprise network from remote sites. Unisys Stealth can be used in lieu of, or in conjunction with, deployed VPNs, to provide a higher level of security for both the information being transmitted and the endpoint sending the data. Stealth creates a communications tunnel hidden to everyone except those who are pre-identified as part of the "secure community" referred to as a Community of Interest (COI). An undetectable cryptographically secure tunnel into the network means avoiding the radar of hackers and ensures the connection remains protected from intrusion. You can't hack what you can't see!- published: 06 Dec 2013
- views: 24
19:40
Unisys Stealth Solution for Secure Virtual Terminal - Segment 1: Why SSVT
Segment 1: Why SSVT: Security to Defend Your Reputation: Protecting High Value Client Data...
published: 02 Dec 2011
author: Unisys Corporation
Unisys Stealth Solution for Secure Virtual Terminal - Segment 1: Why SSVT
Unisys Stealth Solution for Secure Virtual Terminal - Segment 1: Why SSVT
Segment 1: Why SSVT: Security to Defend Your Reputation: Protecting High Value Client Data Protecting your client's high value data is critical to your botto...- published: 02 Dec 2011
- views: 652
- author: Unisys Corporation