Welcome!

Security Authors: Pat Romanski, Michael Bushong, Elizabeth White, Ashley Stephenson, Brad Anderson

Related Topics: SYS-CON MEDIA, SOA & WOA, Virtualization, Cloud Expo

SYS-CON MEDIA: Article

Enterprise-Class Clouds: It's A Perfect Storm

Before you dive into the Cloud, have you asked yourself the right questions?

Anyone familiar with the history of Unisys will not be at all surprised to learn that the company is the latest giant to enter the arena of enterprise cloud computing.

Indeed, with its deep experience and rich technological innovation and capabilities in the enterprise server marketplace, as well as its involvement in transaction-intensive, mission-critical environments, it's a natural evolution for the company. As a pioneer in large-scale computing, Unisys is in a unique position to provide cloud computing that is secure enough and scalable enough for enterprise-class computing.

In an informative and well-written white paper published today at SYS-CON.com, Dr Michael A. Salsburg, a Distinguished Engineer at Unisys who has published and presented over 60 papers internationally in the fields of infrastructure and business service modeling, management and optimization, describes how the company's ability to deliver RTEs and RTIs whether in-sourced or outsourced helps Unisys provide the perfect platform for the emerging cloud computing environment.

Titled "The Perfect Storm for Enterprise-Class Clouds," the white paper focuses on the key attributes required for enterprise computing and explains how the Unisys Secure Cloud can deliver these through enterprise-class cloud computing.

The Three Key Characteristics of Cloud Computing
Salsburg also describes three key characteristics of cloud computing: elasticity (provisioning and deprovisioning resources in real time to meet workload demands), utility (providing resources on a 'pay-as-you-go' basis), and ubiquity (providing services available from the worldwide web).

Protecting Data-in-Motion
Unisys has been recognized as a leader in secure computing, receiving the ISO 27001 2005 certification for best practices in Information Security Management for all of its data centers and managed service centers. The multitenant approach of Cloud Computing brings up a warning flag for IT professionals who understand the security risk of this approach, and Unisys has a unique approach to protecting the integrity of data-in-motion (data that is transmitted through the cloud network).

Don't Just Jump Blindly Into the Cloud
To learn more about what you need to consider before "jumping into the cloud," read Dr Salsburg's white paper today:

Download the Unisys White Paper "The Perfect Storm for Enterprise-Class Clouds"

More Stories By Cloud News Desk

Cloud Computing News Desk brings the latest industry news related to the Cloud paradigm of massively scalable IT resources and capabilities delivered as a service using Internet technologies. For up to date news on the International Cloud Computing Conference & Expo series, the easiest way is to follow it on Twitter.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.