Secured SaaS AcceleratorExecutive Briefing name, title, Date
Page 2 Cloud computingis an approach that enables organizations to leverage scalable, elastic and secure resources as services with the expected results of simplified operations, significant savings in cost and nearly instant provisioning. The key attributes “usually” associated with Cloud Computing Multi-tenant – the ability to process the needs of multiple users with shared resources in a dynamic and transparent fashion Elastic and Scalable – resources can expand and contract as needed Metered/Rented – some manner of “pay for only what you use” Self-Provisioned – “self check-in” at least to some degree Internet based – accessible using internet technology, usually over the public Internet X as a Service – the details/concerns of implementation are abstracted for the customer The seventh attribute sets Secure cloud computing apart Secure– an overall decrease in risk due to greater security protocols and tools from the cloud provider for data in motion, data at rest and data in process. Our Definition of Cloud Computing?
Page 3 The Financial Benefits of Cloud Computing for your Customers Source: Forrester Research, “Talking To Your CFO About Cloud Computing”, October 29, 2008
Page 4 How Cloud is Typically Used Today Cloud Traditional HIGH DocumentManagement Conventional business applications with:
Mail and Collaboration Financials and Planning Mission Critical/OLTP Analytics and Reporting DR SecurityRequirements Web SoftwareDevelopment/Test LOW Routine Applications Critical Applications Business Applications This is relative, not definitive positioning
Disruption in revenue model (recognition, cash flow, increased risk)
Capital outlay to create a services infrastructure & timing of market adoption
Costs to modify applications and maintain two different software business models
Security of doing business on the Web – for ISV and their customers’
Page 6 SaaS Revenue Distribution 2009* 22% growth over 2008 31% Content, Communication & Collaboration (CC&C) 27% Customer Relationship Management (CRM) 17% Enterprise Resource Planning (ERP) 25% All Other Categories All Other CC &C ERP CRM SaaS revenue is forecasted to double by 2013 reaching $16 billion *Source: Market Trends: Software as a Service, Worldwide, 2009-2013, Gartner, May 7, 2009, cited at www.mysaasblog.com/saas-growth.htm
Page 7 Securing your data outside your firewall? Unauthorized visibility to your data when in a shared computing environment? Unintentional cloud administration errors? Providing unauthorized access/rights to others Causing your data to go to other organizations, customers, or competitors Potential breach of the virtualization hypervisor (i.e. virus)? Data Protectionand Privacy
The cloud provider’s auditing procedures?
The cloud provider’s ability to help you meet your regulatory and compliance requirements?
Compliance Why Security is the Top ConcernDo you worry about… What if these concerns were eliminated and your cloud was really secure?
Page 8 Unisys Extreme Security Enables You to Confidently Operate in the Cloud Patent-pending Stealth technology that instantiates private communities of interest based on FIPS 140-2, 256-bit AES* encryption and cloaks the data with proprietary “bit splitting”. The Unisys Difference Layered multi-vendor approach to security with Intrusion Detection and Prevention Services (IDPS), firewall management, 24x7 security monitoring, advanced correlation and analytics, auditable logs… Security Best Practices Secure Cloud services team operates ISO 20000-certified delivery processes that are ITIL V3-compliant. Operational Maturity Independently Certified Security Program Secure Cloud services are provided from ISO 27001-certified delivery centers. Independently Audited and Certified Services Centers SAS-70 Type II-certified data centers. *Advanced Encryption Standard
Our Security Tools Gives You The Confidence to Operate SaaS Cloud Cloud Traditional Secure Cloud Traditional HIGH HIGH DocumentManagement DocumentManagement Conventional business applications with:
Financials and Planning Mail and Collaboration Mail and Collaboration Financials and Planning Mission Critical/OLTP Mission Critical/OLTP Analytics and Reporting Analytics and Reporting DR DR SecurityRequirements SecurityRequirements Web Web SoftwareDevelopment/Test SoftwareDevelopment/Test LOW LOW Routine Applications Critical Applications Routine Applications Critical Applications Business Applications Business Applications This is relative, not definitive positioning
Page 10 Unisys Secure Cloud Virtualization Automation Internal Cloud Cloud Transformation Services Secure Private Cloud All the advantages of Cloud Computing – internally 1 2 Data Center Transformation Unisys Secure Cloud Solution Delivering profound business results through Data Center transformation Extremely Secure Cloud Computing
External Cloud Internal Cloud 4 Cloud security powered by Unisys Stealth 3 Optimized on + off premises Hybrid Cloud Combining the best of Internal and External Cloud for maximum agility, elasticity and security, at minimum cost 2010
Unisys Secure SaaS Accelerator Portfolio of Services My Secure Application as a Service Provisioning and de-provisioning of your existing multi-tiered application on our infrastructure (IaaS & PaaS) 24/7 managed services Advisory Services
Benefits of Unisys Secured SaaS Accelerator Services Page 12 Knowledge on Demand Global Operations Proven Performance Expand on Demand Low Risk No CapEx Speed SaaS Tools Operate Today Secure, trusted environment for experimentation Pay as you go service – you control cash outflow Quickly stand up proof of concepts Use our tools to operate SaaS revenue models Our neutral platform requires no re-writes Use our experts to stand up your SaaS business Leverage our scale, reach, and 24/7 availability Long Heritage of operating mission critical apps. As your business grows we scale to support you