Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl...

36
Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012

Transcript of Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl...

Page 1: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

Unisys Disruptive IT TrendsFinancial Services Priorities & Unisys Strategic Direction

Sidney PearlMay 8th 2012

Page 2: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 2

Unisys Disruptive IT Trends for 2012

Consumerization of IT / Mobility

The Consumerization of IT and mobile computing are underpinning the next

significant increase in end-user productivity, and are driving the need for a new generation

of IT support models

IT Appliances

Appliances are a packaged combination of hardware and software, offering a faster and

easier deployment compared to buying, installing and configuring the components

separately

CyberSecurity

CyberSecurity involves the security of IT systems within the enterprise and the broader

digital networks upon which they rely – including cyber space itself and critical

infrastructures

Social Computing

Social computing is creating a web of people who interact with applications, data

and each other real time, changing the nature of how we think about and build

enterprise applications in the future

Big Data / Smart Computing

Big Data and Smart Computing relate to the use of huge volumes of data flooding into the enterprise and opportunity to identity patterns

and derive real-time business insights for competitive advantage

Cloud Computing

Cloud computing is an on-demand, pay-per-use, flexible and scalable model for service delivery over the Internet covering the entire IT stack from platforms to infrastructure to

applications

Drive New

Business

Opportunities

& Control IT

Costs

Key disruptive trends are creating new opportunities for IT to deliver business value and a step-change in productivity via new styles of interaction, automation & service delivery

Page 3: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 3

Disruptive Trend Organizational Impact

• Private Cloud Implementations are driving greater agility, while addressing security & data concerns

• Software as a Service applications are growing rapidly in reaction to high maintenance/deployment costs

• How to manage the diverse influx of consumer-purchased devices

• How to gain control using mobile device management and security

• Application mobile enablement is where real value can be unlocked

• Use of social computing to drive enterprise-wide collaboration

• Social enablement of enterprise applications & processes to drive customer & constituent collaboration

The Impact of these Disruptive Trends is Wide Ranging

Disruptive Trend Organizational Impact

• Mobile, social, and cloud computing are creating new security complications

• Consolidation of security systems such as access control & surveillance for simplicity and cost control

• Increased Criminalization of cyberspace heightening need for robust CyberSecurity

• Growing data volumes are driving up storage costs creating the need for storage rationalization

• In-Process analytics enable real time leverage of high volume data streams.

• Organizations are embracing an onslaught of new customer and process data

• Appliances attractive for “plug and play” simplicity, but mature and less disruptive

• Growth in highly-specialized information appliances for high-performance analytics

The Disruptive Trends continue to be top-of-mind with CIOs and decision makers – and continue to see high growth-rates and innovation within the IT marketplace

Page 4: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 4

Consumerization of IT / Mobile ComputingEnterprise Significance & 2012 Predictions

Mobile Computing

The “Consumerization of IT” is continuing to accelerate within corporate IT environments, as new generations of powerful mobile devices proliferate…

Enterprise Significance

2012 Predictions

The opportunity? Exploiting the full potential of mobile devices and applications for anywhere, anytime worker productivity, customer value, and process improvement

IT organizations will develop new applications and reengineer business processes as they look to connect with clients and improve employee productivity.

Organizations will make greater use of mobile device and application management tools to better manage, secure, maintain, and deploy mobile devices and applications.

Page 5: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 5

Mobility as the New DesktopThe Emerging Computing Platform for Growth

The key business drivers are:

Employee Productivity: Mobile computing boosts worker productivity through anytime/anywhere access to corporate resources, information and business processes

Driving Customer Value: Organizations are discovering new ways of generating customer value and competitive advantage with mobile services as the delivery channel or even as an integral part of the product or service

Business Process Improvement: Mobile devices are significantly improving and streamlining existing business processes and helping to innovate entirely new ones

The primary business drivers for Mobile Computing relate to improving employee productivity, driving customer value by enhancing the customer experience and delivering

new products and services, and streamlining business processes

Mobility is fast becoming the new technology platform for growth and innovation - changing the way we access and consume information, communicate, and conduct business transactions

Why Now?

Consumerization of IT is driving additional opportunities for the business as consumers and employees adopt mobile computing as their preferred method of information access and bring their own high-end devices to work

Page 6: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 6

Mobile is the New DesktopAn explosion of new devices is rapidly engulfing the market

• Smart-phones, Tablets, and imminent “Flexible” computing platforms are increasing the pace of change at the end-point.

• The environment is diverse, and will become more diverse in the coming years..

• Newer devices more often serve as dual purpose “personal” and “workplace” devices than traditional laptops and PCs.

• Diversity in operating environments and form factors will continue, putting pressure on the burgeoning mobile applications market.

• Integrated Mobile Device Management is complicated by a lack of standards.

IDC Black Book Q2 2011 Key Observations

As mobile becomes “the new desktop”, the challenges include how to enhance mission-critical applications and how to secure and manage an ever-growing array of devices and applications

Page 7: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 7

Mobile Technology TrendsMobile technologies are expanding user interface innovation

Top 10 Mobile Technologies to watch

in 2012

Location Based Services

Context-Aware Services

Mobile Social Networking

Object Recognition

Mobile Search

Mobile Instant messaging

Mobile Commerce

Mobile email

Mobile Payment

Mobile Video

Source: Gartner

Mobility continues to be a key platform for business growth and innovation… Location Based Services allows field operations to be enhanced

with geographical data,

Uniquely mobile functions, such as the ability to "check in" to a store for alerts, or add items to a shopping cart simply by taking a photo or scanning a barcode enhances retail experience,

Near Field Communication (NFC) streamlines payment processing for financial applications,

Context-aware applications provide personalized and targeted end-user experience across the board,

New sensors and processing capability recognize the user's surroundings, allowing innovative business applications

Emerging mobile technologies such as context-awareness and mobile payments continue to introduce rich and innovative new services delivering a competitive edge for early adopters

Key Observations

Page 8: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 8

Unisys Consumerization of IT ResearchKey 2011 Findings and Implications for 2012

IT executives recognize the CoIT trend is real and inevitable 40% of devices used to access applications are personally owned (up

10% from last year)

iWorkers are using smart mobile devices at twice the rate IT executives believe is the case

Yet IT departments are not taking proactive steps to ready their organizations to serve needs of mobile customers:

Only 6% of IT decision-makers have modernized customer-facing apps to work with mobile devices

IT respondents doing less than they did in 2010 to secure mobile devices

Constrained resources a barrier: 80% of IT respondents say department workload is increasing due to consumerization

Our second annual global survey in conjunction with IDC found that enterprises are falling further behind employee usage of Consumer Technologies in the Workplace

Usage of consumer technologies increasing among employees; IT executives see value, but are hampered by security concerns, support issues, and a growing workload…

Page 9: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 9

Recent findings from Unisys BriefingsTen Key Observations stand out in Client Conversations

Key Client Observations

After briefing over 40 organizations across a number of industries on the findings of the 2011 Consumerization of IT Research, Unisys has arrived at a set of ten key observations

Our global clients are keenly interested in services that can help

them …

Client Initiatives

Determine mobile application opportunity areas and implement via

mobile development& modernization services

(#4, 8, 9 & 10)

Implement a consistent approach to device

management & securityacross the enterprise

(#1, 2, 3, 5, 6 & 7)

1. Moved past last years “lock it out” response

2. More open to BYOT approaches

3. Ongoing business procurement outside of IT

4. Developing mobile app business case is key

5. Security remains primary concern

6. Interest in cloud solutions to regain app control

7. IT policies need to be strengthened

8. Few have moved past basic mobile apps

9. Cost and skills a barrier to app modernization

10.Customer apps prioritized over employee apps

Page 10: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 10

2012 Focus Areas Key ConsiderationsChallenge/

Opportunity

Business Process Redesign

Rethinking Processes in a Mobile Context – Going beyond mobile-enabling existing business processes and designing new ones to innovate service delivery.

$7.6B IT spending on reinventing business processes and systems by 2015 1

How and where to mobile-enable business applications - and re-design processes

Application Mobile Enablement

Mobile-Enabling Enterprise Applications – Organizations will need to implement a strategic approach for application mobile enablement.$5.6B IT spending on mobile application development by 2015 2

How to choose the optimal approach for mobile-enablement

Comprehensive Device & Application Management

Managing Mobile Application Portfolios - App Stores will be adopted to manage corporate-approved, custom-built mobile applications.20% of enterprise employees will use tablets instead of laptops within 2 years 3

How to maintain and update increasing numbers of mobile apps

Secure Multi-Device Access to Applications

Securing Mobile Access - Organizations will need to provide secure mobile access to complex enterprise applications across multiple devices.83% cited security concerns about mobile devices 4

How to securely access applications on multiple devices – leveraging existing investments

Once organizations implement their secure mobility infrastructure, they will start mobile-enabling their internal and customer-facing business applications and close the “Consumerization Gap”

1 & 2. Forrester, 3.Gartner, 4. Unisys/IDC

Market Trends & Business ImplicationsMobile Computing Trends Coming to the Forefront in 2012

Page 11: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 11

Key focus areas should include secure application management as well as device management and mobile-enablement of internal and customer-facing business applications and processes

As part of internal and customer-facing mobile-enablement initiatives, review business processes to uncover process re-design opportunities in a new, mobile context

Consider application mobile enablement to unlock the potential of your enterprise applications – extending functionality and preserving investments

Evaluate mobile application management solutions to maintain an exploding number of mobile applications - and enterprise app stores to deploy your mobile applications

In concert with mobile device management, ensure mobile users, applications and data are appropriately secured with techniques such as multi-factor authentication

Unisys Perspective & RecommendationsStrategic Recommendations for Mobile Computing

Effectively securing and managing mobile devices early on paves the way for organizations to gain competitive advantage by innovating new mobile-enabled services ahead of their competition

BusinessProcess Redesign

BusinessProcess Redesign

Application Mobile

Enablement

Application Mobile

Enablement

Mobile Device & Application Management

Mobile Device & Application Management

Mobile Security

Mobile Security

Page 12: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 12

Unisys Mobile Computing Solutions PortfolioThe four core areas you need to address

Innovation Workshops, strategy, and assessments targeting mobility opportunities across the business

Mobile device and application management to support and manage diverse end points & applications

Mobile application development and mobile enablement – including modernization of legacy applications

Mobility Assessment Services

Mobile Device Management

Mobility Application Services

Mobility User AuthenticationMobile device biometrics and identity lifecycle management

Customers Get: An integrated set of services from advisory to application mobile-enablement, device security, support and management …

…Providing enterprise-grade secure mobility solutions to modernize mission-critical applications

Unisys SolutionsCore Areas

BusinessProcess Redesign

BusinessProcess Redesign

Application Mobile

Enablement

Application Mobile

Enablement

Mobile Device & Application Management

Mobile Device & Application Management

Mobile Security

Mobile Security

Page 13: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 13

CyberSecurity

CyberSecurity is the protection of information systems and their dependency on digital networks from exploitation of vulnerabilities in cyber space

Enterprise Significance

2012 Predictions

Securing against all threats and vulnerability – including cybercrime, cloud, mobile and social computing - is vital for future growth, innovation and competitive advantage

CyberSecurityEnterprise Significance & 2012 Predictions

Organizations will implement predictive security operations, consisting of dedicated analysts and advanced data analytics software, to identify threats.

Greater integration of security technologies such as intrusion detection, malware detection, and data loss prevention will improve security operational models.

Page 14: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 14

Business Drivers & ChallengesAddressing CyberSecurity in Today’s Network-Centric Society

The key business drivers are:

• Increasing sophistication, frequency and scale of Cybercrime: Both public and private sectors need to scale up there levels of protection across their operations

• Cloud computing: CyberSecurity must now be addressed across this full, integrated environment where applications and data may be highly virtualized

• Rise of mobile devices and applications: The Consumerization of IT effect means that there are a broader array of end user or consumer devices in use

• Leakage of sensitive data: Protecting sensitive data no matter where it resides

• Increasing regulatory environment: Dealing with the expected impact of new security legislation applicable to the protection of critical infrastructure and resources

Increasing levels of cyber-crime and regulatory and compliance requirements, and an explosion in use of “edge” devices and applications as a result of the Consumerization

of IT have created an unparalleled need for robust security solutions …

While these are not the only drivers, they are of a magnitude that is requiring serious attention to compete in the CyberSecurity “arms-race” by managing risk and protecting assets

Page 15: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 15

• Identity Theft

• Personal Safety

• Computer Viruses

• Shopping/Banking Online

• Credit Card Fraud

• Financial Obligations

• War or Terrorism

• A Serious Health Epidemic

Organizations are Waking Up to a New Reality Perceived threat negatively impacts consumer behavior

What issues drive security as a concern for consumers?

Financial InternetNational Personal

67% are extremely or very concerned about national security

70% seriously concerned about identity theft

66% seriously concerned about credit / debit card fraud

49% seriously concerned about meeting financial obligations

51% are seriously concerned about online transaction security

U N I S Y S S E C U R I T Y I N D E X - O V E R A L L S U M M A R Y F R O M 1 H 2 0 1 1

NotConcerned

ExtremelyConcerned

0 300

150

75 225

164

Page 16: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 16

2012 Focus Areas Key Considerations Challenge/Opportunity

Increasing Levels of Cybercrime

A more menacing threat landscape emerging - Organizations struggling to keep pace with the changing nature of attacks Cybercrime now costs companies average of $6M per year in terms of remediating successful data breeches 1

How to raise protection levels against cyber-crime while reducing or maintaining costs

Mobile, Social & Cloud Security

Widening “Consumerization Gap” - Enterprises doing less than last year to secure mobile devices Published social media guidelines (46% vs. 60%), Single Sign-On (52% vs. 73%), 83% cite security concerns 2

How to secure the “borderless” enterprise across the Disruptive Trends

Increasing Data Sharing Requirements

Corporate “sharing” of threat & risk information - Regulated data sharing on cyber-security breeches with government agencies Last year saw activity from agencies including the FTC, Department of Education, Office of Inspector General and the Security Exchange Commission 3

How to ensure regulatory compliance and employ best practices for data sharing

Security Systems Consolidation

Strong interest in consolidation of security systems - Such as access control and video surveillance for cost savings and standardization

How to maximize cost savings through consolidation and virtualization

Recent CyberSecurity trends include increasing threat vectors related to social, mobile and cloud computing, together with an increasing regulatory environment around Cyber “rules of the road”

1. Ponemon Institute , 2. Unisys/IDC Consumerization Study, 3 – DataPrivacyMonitor.com

Market Trends & Business ImplicationsCyberSecurity Trends Coming to the Forefront in 2012

Page 17: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 17

The strategy for prevention, detection and reaction to risk should be a holistic approach and be built upon the concept of a common operating picture and situational awareness across all fronts

• Establish a logical holistic framework for CyberSecurity: Take a comprehensive approach as the challenge is far broader than simply addressing one issue

• Manage User Identities and entitlements in a comprehensive, integrated approach: Adopt a centralized approach that integrates user access with device security

• Take a coordinated approach to Sensitive Data Protection: Consider secure document access, data encryption / masking, digital rights management, as well as cloud and social networks where sensitive data can be particularly at-risk

• Incorporate CyberSecurity enhancements as an integral part of Application Modernization: As mission-critical applications are modernized in areas such as cloud- and mobile-enablement, review and upgrade security levels

• Take advantage of built-in capabilities of today’s devices to provide advanced authentication: Biometric techniques via voice, signature and facial recognition can be used for strong authentication as opposed to add-on hardware

Unisys Perspective & RecommendationsStrategic Recommendations for CyberSecurity

For organizations getting the CyberSecurity posture right across all its elements will be vital for future growth, innovation and competitive advantage

Identity & Access

Management

Sensitive Data Protection

Application Security

Modernization

Secure Infrastructure Engineering

Page 18: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 18

Unisys CyberSecurity Approach

Our framework addresses key CyberSecurity issues related to disruptive trends (such as cloud, mobile, and social computing), sensitive data protection, and regulatory requirements

We approach CyberSecurity in 8 domains covering users, data, applications, infrastructure and assets together with governance, situational awareness, and security operations…

The challenge is broader than one issue such as securing mobile devices or the cloud…

Logical framework supports Cyber strategies and specific plans tailored to each domain

Holistic approach helps move from point solutions to enterprise security intelligence

Predictive security operations with advanced analytics identifies threats

Unisys logical framework for CyberSecurity

Page 19: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 19

Unisys CyberSecurity Solutions Portfolio

Security Advisory Services

Identity & Access

Management

Cyber Situational Awareness

CyberSecurity Operations

Center

Risk Advisory

Compliance

Application Advisory

Security Monitoring,

Awareness & Reporting

Integration Services

Readiness

Respond

Recover

Central Management of

Digital User Identities

Infrastructure Architecture

Data Protection

Secure Cloud

Stealth Solution

Security Infrastructure Engineering

Our solutions assist our clients to protect data, networks, assets, and personnel from cyber threats, comply with regulations, ensure business continuity and maximize enterprise resilience

Comprehensive set of solutions addressing all components of the CyberSecurity framework …

Page 20: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 20

Cloud Computing

Organizations are ready to exploit the benefits of the cloud in the context of their data center operations for mission-critical workloads

Enterprise Significance

2012 Predictions

The benefit? Tangible IT agility gains to support the business with a more flexible and efficient cost model

Cloud ComputingEnterprise Significance & 2012 Predictions

Private cloud implementations will accelerate as enterprises seek improved agility and cost savings while maintaining security of an on-premise infrastructure

Use of software-as-a-service for email and collaboration will accelerate to reduce costs and simplify operations

Organizations will assess their applications portfolio to take greater advantage of cloud computing opportunities

Page 21: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 21

Key Issues Driving Cloud AdoptionData Centers are pressured to Reduce Costs & Increase Service

Data Center Challenges

Reducing Costs

Managing rising costs within data centers

Driving infrastructure and/or data center consolidation

Reducing upfront capital costs and maintenance of older infrastructure

Improving Service

Speeding time-to-market for new services

Aligning IT services and costs with business demand and usage

Improving service quality and customer satisfaction via automation

Business Benefits of the Cloud Model

Companies can expand network capacity and run applications directly on a vendor's network

Lower budgetary requirements allow smaller companies or agencies to innovate new IT-enabled services

Burden of developing and maintaining expertise is transferred to the service provider

Pay-per-use basis helps transform the way IT departments create and deploy customized applications

Cloud Computing models provide the opportunity to increase service levels while simultaneously reducing overall cost and/or upfront capital expense

Page 22: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 22

The Data Center will Grow Increasingly DiversePublic and Private clouds will each have their place

• Continued adoption of Cloud technologies will result in a more diversified “Hybrid” infrastructure environment

• Traditional dedicated and outsourced infrastructure will remain a part of the overall IT landscape.

• A common management view will be required to keep these models efficiently managed and optimized.

• Accelerating the transition will require us to build clouds that match or exceed existing application SLAs for performance, security, and reliability.

IDC Cloud Computing Survey Key Observations

Page 23: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 23

But Barriers to Adoption still Exist…So correctly engineering your cloud is critical to success

• Cloud benefits are clearly recognized, but….

• Cloud infrastructures need to demonstrate proven RAS characteristics

• In today’s world, most applications expect to operate with Mission Critical SLAs

• Costs in the Public Cloud environment remain a concern.

• And most importantly, accountability for applications (Performance, RAS) in the cloud remains an IT responsibility.

IDC Cloud Computing Survey Success Criteria

Page 24: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 24

Market Trends & Business ImplicationsCloud Computing Trends Coming to the Forefront in 2012

Rapidly increasing adoption of cloud services and technologies are changing the nature of Data Center infrastructure, governance and economics – reducing costs and increasing flexibility

2012 Focus Areas Key Considerations Challenge/Opportunity

Use of SaaS beyond “Cloud Basics”

Exploring more strategic SaaS solutions –Organizations are more broadly adopting SaaS in vertical industry functions and IT management

SaaS will account for 26% of the total packaged software market in 2016 1

How and where to adopt SaaS beyond e-mail and collaboration basics.

Private Clouds raising importance of Virtualization

Virtualization as foundation for Private Cloud - Private cloud success relies on upfront virtualization & storage rationalization

80% of enterprises reported that consolidation and broad use of server virtualization were high or critical priorities 2

How to prepare for hybrid cloud through virtualization and private cloud initiatives.

Preparing for management of Hybrid Cloud Environments

Planning for Hybrid deployment models – In the Data Center of the Future, boundaries will blur between cloud & existing systems

61% of organizations report that hybrid cloud will be part of their strategy 3

How to manage assets in an integrated way - regardless of deployment model.

1. Forrester , 2. Forrester , 3. FutureCloudComputing.net

Page 25: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 25

The Unisys Hybrid Enterprise StrategyA holistic approach to leveraging Cloud Computing technologies across the enterprise

• A robust Cloud model must take into account that “Virtual Datacenters” will be a mix of traditional IT models and cloud models

• Extracting maximum value from cloud technology requires us to look at not just data center impacts, but also applications & IT management considerations

ApplicationsApplications

Data CentersData Centers

ManagementManagementSingle Management View

Traditional

OutsourcedData

Centers

Cloud

HostedPrivate Clouds

InternalPrivate Clouds

PublicClouds

Traditional

InternalData

Centers

Achieving efficiency across applications requires a variety of infrastructure approaches and a consistent management model

A holistic approach requires us to examine all three tiers of the IT estate

Page 26: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 26

The Unisys Hybrid Enterprise Vision

Policy & GovernanceFinancial Management Service Management

Workload

NETWORK

Internal Data

Centers

Applications• Workloads are balanced automatically and

run on the most suitable infrastructure

• Workload attributes are tracked to maintain optimal performance through applications and infrastructure changes

Data Centers• Cloud architectures reduce the need for

excess data center capacity

• Automation and self provisioning improve services and reduce labor costs

• Policy Management ensures controls, performance and cost are balanced

Management• One integrated IT management environment

provides a comprehensive view across all infrastructure

• Self-service interfaces and proactive security mechanisms allow for rapid change to both onsite and cloud resources to optimize cost, compliance, security and performance.

Key Attributes

Security & Risk Monitoring & Event Management

Integrated Enterprise Management Environment

Static & Dynamic Workload Allocation to Optimal Infrastructure

Reduced, Optimized Data Center Footprint

“Single Pane of Glass” Management for both Cloud & Non-Cloud

OutsourcedData

Centers

Workload

NETWORK

InternalPrivate Clouds

Workload

NETWORK

HostedPrivate Clouds

PublicClouds

Borderless, Virtual, Automated, Visible and Secure

Page 27: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 27

Our Cloud Portfolio is ComprehensiveWe differentiate based on our Mission Critical capabilities

Cloud Professional Services Cloud Management SoftwareCloud Managed Services

CloudBuild methodology

Management Financial Architecture Security

Storage Network ITIL/ITSMSupportServices

• CloudBuild is differentiated by its comprehensive approach.

• Fully-featured cloud operations approach addressing all eight aspects required to integrate cloud inside a data center.

Cloud

HostedPrivate Clouds

VirtualDesktop

IaaS

PaaS

• Our Unisys Cloud is a semipublic cloud offering delivering IaaS and PaaS for our ITO customer base.

• Virtual Desktop Infrastructure offers innovative solutions to ITO customers to lower their cost of operations.

• Pre-integrated, private cloud solution transforms operations into an agile, efficient and automated infrastructure.

• Modular design allows clients to integrate automated, self-service capabilities.

Keeping pace in the evolving cloud market requires ongoing innovation to drive differentiation. Our focus is to ensure our cloud offerings support our client’s mission-critical IT requirements.

Page 28: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 28

Social Computing

Beyond digital marketing, social computing is an important strategic platform for increasing workplace collaboration and knowledge management

Enterprise Significance

2012 Predictions

Social computing is a strategic platform for modernizing enterprise applications to connect collaboration with business processes.

The benefit? Tangible productivity gains and customer value

Social ComputingEnterprise Significance & 2012 Predictions

Organizations will socially enable client-facing channels and contact points to gain greater connection to consumers, improve service and client loyalty

Social technologies will be integrated into the fabric of applications in customer relationship management, case management, and exception handling

Page 29: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 29

The New Socially-Connected EnterpriseThe Emerging Enterprise Social Layer

The key business drivers are:

• Consumerization of IT: Consumers and citizens are identifying with the Social Computing paradigm as their preferred method of communication

• Knowledge & Collaboration: Organizations are seeking to establish new and highly effective human connections across their geographically dispersed and mobile workforce

• Customer Engagement: Customers are demanding more personalized, interactive and transparent engagement, overt participation, and better service and support

• Enabling Enterprise Applications: Organizations are optimizing business processes and transactions and modernizing their applications to meet new workforce demands

Moving beyond hierarchical and formal connections, companies are re-wiring their organizations not only to create an empowered, dynamic, and networked

workforce, but also to more deeply engage with their customers …

Pervasive Social Computing is creating a new “Enterprise Social Layer”: Redefining how we collaborate with colleagues, prospective and existing customers, and business partners

Page 30: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 30

• Socially driven processes are disrupting traditional approaches to business

• Social techniques and tools allow people to connect and interact with unprecedented speed and ease as business gets social

• Within IT, social computing is becoming a key part of the application development agenda

• Enterprise applications are tapping into social computing techniques to deliver a new paradigm for collaboration

Gartner Application Development Agenda Key Observations

Social Computing TrendsAn emerging facet of modern application design and delivery

As social computing is changing the realm of possibilities for business interactions, it is also changing the nature of how developers design and deliver enterprise software

Future applications and services will be built upon innovative combinations of cloud, mobile and social technologies, and will become ever more difficult to maintain as platforms continue to shift

Page 31: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 31

2012 Focus Areas Key Considerations Challenge/Opportunity

Social enablement of enterprise applications & processes

Embedding into Enterprise Applications & Processes – Social platforms increasingly integrated with enterprise applications.Today 59% of organizations are planning or implementing enterprise social platforms 1

How to social-enable applications to improve processes and streamline efficiencies

Use of social computing to drive

enterprise-wideCollaboration

Worker Productivity & Knowledge Management – Rapidly becoming a new paradigm for collaboration due to increasingly mobile workforceIn North America, remote and mobile work is becoming the norm as two-thirds of the workforce works remotely 2

How to deploy enterprise-wide for enhanced productivity and innovation

Enriched customer

engagement through social

channels

Collaborative Customer Engagement and Participation – Use of social computing to enable overt customer participation and ownership Social CRM is the hottest trend in CRM which is growing at over 50% annually. 3

How to engage customers across sales and service channels

Advances in social computing technology are changing the fabric of communication and information sharing with employees, customers and partners – creating a new wave of corporate productivity

Organizations are making social networks part of their application fabric by integrating them with their internal business processes, transactional systems and information repositories

Market Trends & Business ImplicationsSocial Computing Trends Coming to the Forefront in 2012

1 – Forrester, 2 – Gartner, 3 - Gartner

Page 32: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 32

Unisys Perspective & RecommendationsStrategic Recommendations for Social Computing

Go beyond digital marketing and think of social computing as a new paradigm for enterprise collaboration and as a “next generation” enabler for application modernization

Target “horizontal” functions such as strategic knowledge management, innovation, and customer relationship management to deliver relevant and contextual information to end users

Target “vertical” functions such as client-facing transactional applications to add collaborative functionality to cut cycle-time for ad-hoc processes such as exception handling

Start exploring modernization and integration opportunities between business applications and enterprise social computing platforms to automate ad-hoc, workflow processes

Target “horizontals” such as KM and innovation and “verticals” such as transactional business applications - with social computing as an application modernization enabler

Our set of strategic recommendations help clients progress along the continuum of social computing scenarios in a measured approach with increasing levels of business impact

StrategyDevelopment

StrategyDevelopment

Social-Enabling Mission Critical

Applications

Social-Enabling Mission Critical

Applications

Page 33: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 33

Implementing the Enterprise “Social Layer”…A phased approach for social computing maturity

1

Develop a comprehensive Social Computing Strategy• Identify opportunity areas for social

enablement

• Develop a comprehensive roadmap

• Start with an enterprise platform

• Explore integration opportunities with business applications

Implement an Enterprise Social Platform for Customer Engagement and Employee Collaboration• Enhance strategic communities on top of

Knowledge Management initiatives• Leverage Social Computing for open

innovation to source ideas• Enhance client-interactions beyond marketing

to improve customer engagement• Extract business insights via Social Analytics

2

Social-Enable Transactional Business Applications (Vertical Applications)• Identify applications that may benefit from

social-enablement• Candidate apps typically require manual

processes or frequent collaboration• Key areas include case management,

exception handling and customer service

3

Social computing is increasingly becoming embedded into the overall enterprise application fabric – offering productivity gains across line of business applications and changing the way we collaborate

Social-Enabling Mission Critical

Applications

Social-Enabling Mission Critical

Applications

Unisys Social Computing Advisory Services

Unisys Social Computing Implementation Services

Unisys Social Computing Modernization Services

Page 34: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 34

Our Social Computing Strategy is to help our customers leverage social technology for enterprise application modernization and for collaborative suites for internal and customer-facing scenarios

Unisys Strategy & SolutionsOur Strategy and Focus

Enterprise Application Modernization and OutsourcingEnterprise Application Modernization and Outsourcing

Enterprise SecurityEnterprise Security

Enterprise Collaboration ExpertiseEnterprise Collaboration Expertise

Core Focus Areas

Core Competencies and Differentiation

Social Computing

Innovation WorkshopIdentification and Prioritization of Opportunities

Social Computing

Advisory ServicesIdentification and Prioritization of Opportunities

Social Computing

Implementation ServicesWorkplace Collaboration, Knowledge Management, and Customer Engagement

Social Computing

Modernization ServicesIntegration with Enterprise Applications and Processes

Service Offerings

CustomerEngagement

CustomerEngagement

Next Generation Knowledge Mgmt

& Collaboration

Next Generation Knowledge Mgmt

& Collaboration

Social-Enabling Mission Critical

Applications

Social-Enabling Mission Critical

Applications

Unisys Social Computing Services provide enterprise-grade social collaboration solutions to modernize mission-critical applications and processes

Page 35: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 35

Unisys Disruptive IT TrendsInformational Resource for CIOs and Business Leaders

• Significance of the Trends for CIOs & Business Leaders

• Strategic Point of View Whitepapers

• Business Implications, Challenges & Opportunities

• Market & Analyst Facts

• In-depth Trend Research

• Unisys & Third-Party Perspectives

• Blogs & Multi-Media

• Unisys Solutions & Case Studies

The Disruptive IT Trends web site provides in-depth information and insights related to the six Disruptive Trends with Unisys and third-party perspectives, research and recommendations

http://www.DisruptiveITTrends.com

Page 36: Unisys Disruptive IT Trends Financial Services Priorities & Unisys Strategic Direction Sidney Pearl May 8 th 2012.

© 2012 Unisys Corporation. All rights reserved. 36

Thank You