Your SlideShare is downloading. ×
Accelerated Saa S Exec Briefing V2
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Accelerated Saa S Exec Briefing V2

962
views

Published on

Unisys offering to ISVs to take advantage of Cloud Computing

Unisys offering to ISVs to take advantage of Cloud Computing


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
962
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Secured SaaS AcceleratorExecutive Briefing
    name,
    title,
    Date
  • 2. Page 2
    Cloud computingis an approach that enables organizations to leverage scalable, elastic and secure resources as services with the expected results of simplified operations, significant savings in cost and nearly instant provisioning.
    The key attributes “usually” associated with Cloud Computing
    Multi-tenant – the ability to process the needs of multiple users with shared resources in a dynamic and transparent fashion
    Elastic and Scalable – resources can expand and contract as needed
    Metered/Rented – some manner of “pay for only what you use”
    Self-Provisioned – “self check-in” at least to some degree
    Internet based – accessible using internet technology, usually over the public Internet
    X as a Service – the details/concerns of implementation are abstracted for the customer
    The seventh attribute sets Secure cloud computing apart
    Secure– an overall decrease in risk due to greater security protocols and tools from the cloud provider for data in motion, data at rest and data in process.
    Our Definition of Cloud Computing?
  • 3. Page 3
    The Financial Benefits of Cloud Computing for your Customers
    Source: Forrester Research, “Talking To Your CFO About Cloud Computing”, October 29, 2008
  • 4. Page 4
    How Cloud is Typically Used Today
    Cloud
    Traditional
    HIGH
    DocumentManagement
    Conventional business applications with:
    • Patient Data
    • 5. Employee Information
    • 6. Financial Information
    • 7. Customer Information
    • 8. Government
    Mail and Collaboration
    Financials and Planning
    Mission Critical/OLTP
    Analytics and Reporting
    DR
    SecurityRequirements
    Web
    SoftwareDevelopment/Test
    LOW
    Routine Applications
    Critical Applications
    Business Applications
    This is relative, not definitive positioning
  • 9. Page 5
    © 2009 Unisys Corporation. All rights reserved.
    What’s Driving The Growth of SaaS?
    Market Forces
    • New Competitors w/o License Revenue
    • 10. Broadband Access
    • 11. Excess Capacity
    • 12. Simplification
    • 13. Windows OS
    • 14. Adoption of Web
    Client Forces
    • Improved Cash Flow
    • 15. Focus IT on Core Business
    • 16. Desire to reduce costs
    • 17. Reduce capital expenditures on IT
    • 18. Simplification
    ISV Concerns of moving to SaaS Business Model
    • Disruption in revenue model (recognition, cash flow, increased risk)
    • 19. Capital outlay to create a services infrastructure & timing of market adoption
    • 20. Costs to modify applications and maintain two different software business models
    • 21. Security of doing business on the Web – for ISV and their customers’
  • Page 6
    SaaS Revenue Distribution 2009* 22% growth over 2008
    31% Content, Communication & Collaboration (CC&C)
    27% Customer Relationship Management (CRM)
    17% Enterprise Resource Planning (ERP)
    25% All Other Categories
    All Other
    CC &C
    ERP
    CRM
    SaaS revenue is forecasted to double by 2013 reaching $16 billion
    *Source: Market Trends: Software as a Service, Worldwide, 2009-2013, Gartner, May 7, 2009, cited at www.mysaasblog.com/saas-growth.htm
  • 22. Page 7
    Securing your data outside your firewall?
    Unauthorized visibility to your data when in a shared computing environment?
    Unintentional cloud administration errors?
    Providing unauthorized access/rights to others
    Causing your data to go to other organizations, customers, or competitors
    Potential breach of the virtualization hypervisor (i.e. virus)?
    Data Protectionand Privacy
    • The cloud provider’s auditing procedures?
    • 23. The cloud provider’s ability to help you meet your regulatory and compliance requirements?
    Compliance
    Why Security is the Top ConcernDo you worry about…
    What if these concerns were eliminated and your cloud was really secure?
  • 24. Page 8
    Unisys Extreme Security Enables You to Confidently Operate in the Cloud
    Patent-pending Stealth technology that instantiates private communities of interest based on FIPS 140-2, 256-bit AES* encryption and cloaks the data with proprietary “bit splitting”.
    The Unisys Difference
    Layered multi-vendor approach to security with Intrusion Detection and Prevention Services (IDPS), firewall management, 24x7 security monitoring, advanced correlation and analytics, auditable logs…
    Security Best Practices
    Secure Cloud services team operates ISO 20000-certified delivery processes that are ITIL V3-compliant.
    Operational Maturity
    Independently Certified Security Program
    Secure Cloud services are provided from ISO 27001-certified delivery centers.
    Independently Audited and Certified Services Centers
    SAS-70 Type II-certified data centers.
    *Advanced Encryption Standard
  • 25. Our Security Tools Gives You The Confidence to Operate SaaS
    Cloud
    Cloud
    Traditional
    Secure Cloud
    Traditional
    HIGH
    HIGH
    DocumentManagement
    DocumentManagement
    Conventional business applications with:
    • Patient Data
    • 26. Employee Information
    • 27. Financial Information
    • 28. Customer Information
    • 29. Government
    Conventional business applications with:
    • Patient Data
    • 30. Employee Information
    • 31. Financial Information
    • 32. Customer Information
    • 33. Government
    Financials and Planning
    Mail and Collaboration
    Mail and Collaboration
    Financials and Planning
    Mission Critical/OLTP
    Mission Critical/OLTP
    Analytics and Reporting
    Analytics and Reporting
    DR
    DR
    SecurityRequirements
    SecurityRequirements
    Web
    Web
    SoftwareDevelopment/Test
    SoftwareDevelopment/Test
    LOW
    LOW
    Routine Applications
    Critical Applications
    Routine Applications
    Critical Applications
    Business Applications
    Business Applications
    This is relative, not definitive positioning
  • 34. Page 10
    Unisys Secure Cloud
    Virtualization
    Automation
    Internal Cloud
    Cloud Transformation Services
    Secure Private Cloud
    All the advantages of Cloud Computing – internally
    1
    2
    Data Center Transformation
    Unisys Secure Cloud Solution
    Delivering profound business results through Data Center transformation
    Extremely Secure Cloud Computing
    External Cloud
    Internal Cloud
    4
    Cloud security powered by Unisys Stealth
    3
    Optimized on + off premises
    Hybrid Cloud
    Combining the best of Internal and
    External Cloud for maximum agility, elasticity and security, at minimum cost
    2010
  • 38. Unisys Secure SaaS Accelerator Portfolio of Services
    My Secure Application as a Service
    Provisioning and de-provisioning of your existing multi-tiered application on our infrastructure (IaaS & PaaS) 24/7 managed services
    Advisory Services
    • SaaS Value Assessment
    • 39. Security Advisory (Application & Infrastructure)
    • 40. Virtualization Assessment
    • 41. Application Advisory for SaaS Deployment
    Secure Infrastructure as a Service
    • Virtual & Physical Servers
    • 42. 24/7 availability
    • 43. Simple setup utilizing templates
    • 44. Flexible capacity – pay for what you use
    • 45. Customer Portal
    • 46. Secured by Stealth
    Development Services
    • Application Architecture
    • 47. Application Optimization
    • 48. Application Development & Testing
    • 49. Workload Design
    • 50. Workload Migration
    SecurePlatform as a Service (PaaS)
    • IaaS features plus
    • 51. Remote Management
    • 52. Image &Patch Management
    • 53. Backup & Restore
    • 54. C-Rim Monitoring
    • 55. Application Availability
    • 56. Event Notification
  • Benefits of Unisys Secured SaaS Accelerator Services
    Page 12
    Knowledge on Demand
    Global Operations
    Proven Performance
    Expand on Demand
    Low Risk
    No CapEx
    Speed
    SaaS Tools
    Operate Today
    Secure, trusted environment for experimentation
    Pay as you go service – you control cash outflow
    Quickly stand up proof of concepts
    Use our tools to operate SaaS revenue models
    Our neutral platform requires no re-writes
    Use our experts to stand up your SaaS business
    Leverage our scale, reach, and 24/7 availability
    Long Heritage of operating mission critical apps.
    As your business grows we scale to support you
  • 57. Where we go from here?
    Page 13