Smashing g the Barriers to Adoption of Enterprise Cloud Computing Jason P. Noel Vice President Gl b l Customer Global C Ad i Advisory February 2009 What’s What s Driving IT to a New Approach? Market Forces Business Forces • The Economy • Defer and avoid costs • Anytime, anywhere IT • Fix the IT bottleneck • IT as strategic enabler • Tectonic shift in technology CLOUD COMPUTING • Map supply and demand more effectively • De-capitalize IT • The Environment (Green) • Automate A t t Operations O ti Perceived barriers to a new approach Public Cloud Private Cloud • Security • Existing investments • Compliance • Labor intensive, steep learning curve • Application Rewrites • Skeptical about results © 2009 Unisys Corporation. All rights reserved. Page 2 What is Cloud Computing? Cloud computing is an approach that enables organizations to leverage scalable, l bl elastic l ti and d secure resources as services i with ith the th expected t d results of simplified operations, significant savings in cost and nearly instant provisioning. The key attributes “usually” associated with Cloud Computing 1. Multi-tenant – the ability to process the needs of multiple users with shared resources in a dynamic and transparent fashion 2. Elastic and Scalable – resources can expand and contract as needed 3. Metered/Rented – some manner of “pay for only what you use” 4. Self-Provisioned – “self check-in” at least to some degree 5. Internet based – accessible using internet technology, usually over the public Internet 6. X as a Service – the details/concerns of implementation are abstracted for the customer The seventh attribute sets Secure cloud computing apart 7. Secure – an overall decrease in risk due to greater security protocols and tools from the cloud provider for data in motion, data at rest and data in process. © 2009 Unisys Corporation. All rights reserved Page 3 Why the Sudden Interest? Gartner’s 10 Strategic Technologies for 2009 1. 2. 3. 4. 5. 6. 7 7. 8. 9. 10. Virtualization (Ranked No. 5 last year) Cloud computing (New to the list) Computing fabrics (No. 8 last year) Web-oriented architecture (New but similar to “the Web platform” No. 7 last year) Enterprise mashups (No. 6 last year) Specialized systems (New to the list) Social software and social networking (No. (N 10 llastt year)) Unified communications Business intelligence (New) Green IT ((No. 1 last yyear)) Cloud Computing is generating significant interest due to the confluence of emerging Cloudware technology and the drive to minimize additional capital expenditures on data centers and infrastructure Gartner Identifies the Top 10 Strategic Technologies for 2009: http://www.gartner.com/it/page.jsp?id=777212 Gartner Identifies the Top 10 Strategic Technologies for 2008: http://www.gartner.com/it/page.jsp?id=530109 © 2009 Unisys Corporation. All rights reserved Page 4 The Key Business Driver for Cloud Agility Extreme Automation Self-service capability © 2009 Unisys Corporation. All rights reserved Ready-to-go Page 5 The Financial Benefits of Cloud Go Beyond Capital Expenditure Financial Perspective Traditional Data Center Cloud Computing Expenditure type Capital expenditure (capex) Operating expense (opex) Operating expense (opex) Cash flow Servers and software are purchased upfront Payments are made as the service is provided. Financial risk Entire financial risk is taken upfront, f t with ith uncertain t i return. Financial risk is taken monthly thl and d iis matched t h d tto return. Income statement Maintenance and depreciated capital expense Balance sheet Software and hardware are carried as a long-term capital asset. asset Maintenance expense only Nothing appears on the balance sheet. Source: Forrester Research, “Talking To Your CFO About Cloud Computing”, October 29, 2008 © 2009 Unisys Corporation. All rights reserved Page 6 How Cloud is Typically Used Today This is relative, not definitive positioning Cl d Cloud T diti Traditional l HIGH Mail and Collaboration Conventional C ti l business b i applications with: Document Management Financials a cas and Planning • Patient Data Analytics and Reporting S Security it Requirements • Employee Information • Financial Information • Customer Information Web DR Mission Critical/ OLTP • Government S ft Software Development/ Test LOW Routine Applications Business Applications © 2009 Unisys Corporation. All rights reserved Critical Applications Page 7 Survey #1: What is Your Greatest Concern About Moving Workloads to the Cloud? 72% cited SECURITY concerns 34% selected Integration issues 14% cited TCO 8% none of the above TCO NONE INTEGRATION SECURITY Results from 90 respondents, Unisys online survey taken 25 June 2009 2009, Webinar - Cloud Computing Security: Protecting your Data in the Cloud More than one choice selected thus total exceeds 100% © 2009 Unisys Corporation. All rights reserved Page 8 Survey #2: What Do You See as Your Greatest Barrier to Moving to Cloud? 51% cited SECURITY/Data Privacy concerns 21% selected Integration of cloud cloud-based based applications with existing systems 18% cited Bring systems back in-house 10% selected Regulatory/Compliance issues REGULATORY/COMPLIANCE BACK IN-HOUSE INTEGRATION SECURITY/DATA PRIVACY Results from 312 respondents, Unisys press release release, “Unisys Unisys Poll Shows Security Concerns as Leading Cause of User Hesitancy in Adopting Cloud Computing”, September 15, 2009 © 2009 Unisys Corporation. All rights reserved Page 9 Survey #3: What Concerns Do You Have About Moving to the Cloud for IT Service? 83% cited SECURITY 9% selected What to put in the cloud 6% selected How to transform to the cloud 2% cited Internal or External cloud WHAT INTERNAL/EXTERNAL HOW SECURITY Results from 272 respondents, Unisys survey on sys-con sys con.com; com; results as of October 13 13, 2009 © 2009 Unisys Corporation. All rights reserved Page 10 Security y is © 2009 Unisys Corporation. All rights reserved Page 11 Why Security is a Top Concern Do you worry about about… • Securing your data outside your firewall? Data Protection and Privacy • Unauthorized visibility to your data when in a shared computing environment? • Unintentional cloud administration errors? – Providing unauthorized access/rights to others – Causing your data to go to other organizations, customers, t or competitors tit • Potential breech of the virtualization hypervisor (i.e. virus)? Compliance • The cloud provider’s auditing procedures? • The cloud provider’s ability to help you meet your regulatory and compliance requirements? What if these concerns were eliminated and your cloud was really secure? © 2009 Unisys Corporation. All rights reserved Page 12 Secure + Private Clouds = More Options This is relative, not definitive positioning Secure Cloud Traditional Private Cloud Cloud HIGH Mail and Collaboration Conventional business applications with: Document Management Financials and Planning • Patient Data Analytics and Reporting S Security it Requirements • Employee Information • Financial Information • Customer Information Web DR Mission Critical/ OLTP • Government S ft Software Development/ Test LOW Routine Applications Business Applications © 2009 Unisys Corporation. All rights reserved Critical Applications Page 13 Considerations to Weigh This is relative, not definitive positioning Secure Cloud Traditional Private Cloud Cloud HIGH Mail and Collaboration Conventional business applications with: Risk Tolerance Document Management Financials and Planning • Patient Data Analytics and Reporting S Security it Requirements Web S ft Software Development/ Test • Employee Information • Financial Information Cyclical Workloads • Customer Information DR Mission Critical/ OLTP • Government Payment Options LOW Routine Applications Business Applications © 2009 Unisys Corporation. All rights reserved Critical Applications Page 14 Assessing the Transformation 1 Business Drivers Modernize? Existing Application? 2 Key Client Considerations Security & Compliance? Cyclical Workloads? Network Latency? Relative Costs? New Application? Will My Applications Run? Business Continuity? 3 Client Deployment Options Traditional IT Private Cloud © 2009 Unisys Corporation. All rights reserved Public Cloud Page 15 How is Unisys Tackling E t Enterprise i Cloud??? Cl d??? © 2009 Unisys Corporation. All rights reserved Page 16 Unisys Areas of Strength Play to a New Approach to IT Data Center Transformation and Outsourcing End User Outsourcing and Support Services Security Application Modernization and Outsourcing We help you transform your data centers and make the right IT sourcing decisions. We do this by leveraging our transformational services and outsourcing capabilities to help you achieve maximum return, and make your operations more agile, secure and efficient while lowering your overall costs. Anywhere, anytime secure support for your hardware and software needs with Anywhere measurable cost reductions, improved satisfaction and faster incident resolution. With 31 ITO Operations Centers with multi-language capabilities and global ITIL-based Resolution Optimization Model, ISO-certified global logistics network and remote infrastructure management with last mile delivery capabilities in over 100 countries. Unisys has tackled some of the toughest security challenges in the world for both public and private sector clients. We bring an holistic approach to security that spans digital and physical environments, securing your people, places, assets and data. Unisys Application Services helps you minimize the risk of change by anticipating roadblocks while enabling better alignment to business needs – and creating an efficient e ace be between ee you your bus business ess a and d IT. interface © 2009 Unisys Corporation. All rights reserved Page 17 Unisys Plan for Delivering Secure IT Services in the Cloud 1 2 D Data C Center T Transformation f i U i Unisys S Secure Cl Cloud dS Solution l i Delivering profound business results through Data Center transformation Extremely Secure Cloud Computing Available now Available now Virtualization Automation Internal Cloud Cloud Transformation Services Internal Cloud External Cloud 4 3 Unisys Secure Private Cloud Solution All the advantages of Cloud Computing – internally Available December 2009 Optimized on + off premises Hybrid Cloud • Secure IaaS • Secure PaaS • Secure SaaS • My Secure AaaS • Secure DRaaS Cloud security powered by Unisys Stealth Combining the best of Internal and External Cloud for maximum agility, elasticity and security, at minimum cost Available Q1 2010 © 2009 Unisys Corporation. All rights reserved Page 18 Unisys Secure Cloud Solution: Managed End End-to-End to End, Anytime Anytime, Anywhere Secure Infrastructure as a Service (IaaS) • cc-RIM RIM Service Desk & Server Management • Provisioning virtual and physical servers, scale-up or scale-out Secure Platform as a Service (PaaS) • One click selection of platform, web, application, and database servers • Automated middleware application management with c-RIM Enterprise Management Service • Sun Java™ stack Secure Software as a Service (SaaS) Secure Document Delivery Service • Secured documents for electronic delivery directly into clients’ e-mail inbox Secure Unified Communication as a Service • Cloud-based e-mail, SharePoint and Office Communication Services Secure Virtual Office as a Service My y Secure Application pp as a Service • Provisioning and de-provisioning of your multitiered application on our PaaS platform • Hosted desktop via Secure Cloud with centralized control and management Subscription based Pricing Subscription-based © 2009 Unisys Corporation. All rights reserved Page 19 Unisys Secure Cloud Solution: What’s What s New – November 2009 Secure Infrastructure as a Service (IaaS) • cc-RIM RIM Service Desk & Server Management • Provisioning virtual and physical servers, scale-up or scale-out Secure Platform as a Service (PaaS) • One click selection of platform, web, application, and database servers • Automated middleware application management with c-RIM Enterprise Management Service • Sun Java™ stack Secure Software as a Service (SaaS) Secure Document Delivery Service • Secured documents for electronic delivery directly into clients’ e-mail inbox Secure Unified Communication as a Service • Cloud-based e-mail, SharePoint and Office Communication Services • Microsoft stack: IIS web server server, .Net Net application server, SQL Server • Custom stacks (IBM WebSphere, Oracle, etc.) Secure Virtual Office as a Service My y Secure Application pp as a Service • Provisioning and de-provisioning of your multitiered application on our PaaS platform • Hosted desktop via Secure Cloud with centralized control and management • Qualified client-supplied devices now supported Secure Disaster Recovery as a Service • Database replication: configure the secure cloud environment as a Disaster Recovery Backup © 2009 Unisys Corporation. All rights reserved Page 20 Addressing Your Global Compliance Requirements Alingsas, SE St Just, Milton Keynes, UK Eagan, MN Budapest, HU Schipol, NL Roseville, MN Shanghai, China Rochester, NY Blue Bell, PA Reston, VA Salt Lake City, UT Hong Kong Austin, TX Mexico City Bogota Bogota, Columbia Bangalore, India Singapore Milton, Queensland Australia IT Outsourcing Centers Rio de Janeiro, Brazil Auckland, New Zealand Perth Australia Perth, Global Cloud Center Regional Cloud Centers C-RIM Centers Sao Paulo, Brazil Sandton, South Africa Santiago, g , Chile © 2009 Unisys Corporation. All rights reserved Rhodes, Australia Wellington, New Zealand Page 21 Comprehensive Security Enables You to Confidently Make the Move The Unisys Difference Security S it Best B t Practices Operational Maturity Independently Certified Security Program Independently Audited and Certified Services Centers Patent-pending Stealth technology that allows private communities of interest based on FIPS 140-2 140-2, 256-bit AES AES* encryption and cloaks the data with proprietary “bit splitting”. Layered multi-vendor approach to security with Intrusion Detection and Prevention Services (IDPS) (IDPS), firewall management management, 24x7 security monitoring, advanced correlation and analytics, auditable logs… Secure Cloud services team operates ISO 20000-certified delivery processes that are ITIL V3-compliant. Secure Cloud services are provided from ISO 27001-certified 27001 certified delivery centers. SAS-70 SAS 70 Type II-certified II certified data centers. *Advanced Encryption Standard © 2009 Unisys Corporation. All rights reserved Page 22 Securing Your Cloud: Unisys Stealth Security Unisys Stealth Solution for Network secures data-in-motion for LAN, WAN and wireless networks – available now • Stealth technology: • “cloaks” data and devices from unauthorized access, e.g. sniffers • secures data within client-defined community of interest Stealth solution for storage secures SAN data-at-rest data at rest – planned Q1 2010 • Stealth technology: • goes beyond encryption, dispersing storage across virtual disk, local or remote • secures data within client-defined community of interest Benefits: f • • • • Protects the confidentiality and integrity of data-in-motion and data-at-rest Eliminates the need to modify applications, or to web-enable them for the cloud y deployed, p y dramatically y simplifies p IT infrastructure, resulting g in lower costs Easily Establishes verifiable chain of custody for your data © 2009 Unisys Corporation. All rights reserved Page 23 Today’s Challenges with Securing a Cloud Service Typical Cloud Facility Client A Cli t A Client Virtual Web Server VPN/SSL Network Client B Virtual Web Server Client A Virtual App Server Client B VPN/SSL Network Client B Virtual App Server Client A Virtual DB Server Must web-enable applications Client B Virtual DB Server Bottom Line SAN • More expensive: For client and Cloud provider • In-elastic: Unique solution for each application / client Client A Storage encryption Client B Storage encryption • Impractical: Takes significant time and cost to set up and maintain © 2009 Unisys Corporation. All rights reserved Page 24 In Contrast: Stealth Secures and Simplifies Typical Facility UnisysCloud Data Center Stealth Protected Stealth Network Appliance Client A Stealth Network Appliance Client B All data in blue is safe Cli t A Client AVirtual VirtualWeb WebServer Server VPN/SSL Network Client B Server B Virtual Web Virtual Web Server Client A A Virtual App Server Virtual App Server Internet VPN/SSL Network Client B Server B Virtual App Virtual App Server Client A Virtual DBDB Server A Virtual Server Must web-enable applications No need to change the application Client B B Virtual Server Virtual DBDB Server Bottom Line More expensive: for less clientexpensive, and Cloud provider • More secure and multi-tenant •• In-elastic: Unique solution and for each application / client Simpler standardized, Simpler, standardized much more elastic • Impractical: Takes significant time and cost to set up and maintain SAN Stealth Storage Appliance SAN Client A Storage encryption Client B Storage encryption Stealth Endpoint © 2009 Unisys Corporation. All rights reserved Page 25 Unisys Stealth Security Overview ©© 2009 Allrights rights reserved 2009Unisys Unisys Corporation. Corporation. All reserved. Page 26 Unisys Stealth Bit-Splitting Overview ©© 2009 Allrights rights reserved 2009Unisys Unisys Corporation. Corporation. All reserved. Page 27 Foundation for Building a Cost-effective Cost effective Secure Cloud Provide self-service access to software and server provisioning i i i and d ITSM supportt Secure Cloudware Stack Security Service Management g Provisioning Virtualization Implement Stealth DIM DIM* and DAR DAR* security to provide effective isolation Implement robust ITIL-based service management through g automation Fully automate provisioning (virtual, physical), configuration and compliance management of virtual software and “personas” Fully F ll virtualize i t li th the server and d storage t resources tto provide id flexibility and scalability A server/storage farm populated with both scale-up and scale-out servers. *Data in Motion (DIM); Data at Rest (DAR) © 2009 Unisys Corporation. All rights reserved Page 28 A Secure Stack for Multi-Tiered Applications: Dynamic Scalability, Scalability Rapid Repurposing Repurposing, and Process Automation Provide self-service access to software and server provisioning i i i and d ITSM supportt Secure Cloudware Stack Security Service Management g Provisioning Virtualization Unisys Stealth Solution for Network Unisys Stealth solution for storage Unisys Converged Remote Infrastructure Management (C-RIM); Unisys uChargeback™software; Unisys uGovern™ software* Unisys uOrchestrate™ software; predefined Runbooks. Unisys uProvision™ software VMware®, Windows® Unisys uAdapt™ software Unisys Enterprise Servers using Intel® Xeon® 7400 series processors, EMC® storage, etc. *Available Q1 2010 © 2009 Unisys Corporation. All rights reserved Page 29 What is Private Cloud Computing? Cloud computing is an approach that enables organizations to leverage scalable, elastic and secure resources as services with the expected results of simplified operations, significant savings in cost and nearly instant provisioning. The key attributes “usually” associated with Cloud Computing 1 1. 2. 3. 4. 5. 6. Multi tenant – the ability to process the needs of multiple users with shared resources in a dynamic and transparent fashion Multi-tenant Elastic and Scalable – resources can expand and contract as needed Metered/Rented – some manner of “pay for only what you use” Self-Provisioned – “self check-in” at least to some degree Internet based – accessible using internet technology, usually over the public Internet X as a Service – the details/concerns of implementation are abstracted for the customer A seventh th attribute tt ib t sets t Secure S cloud l d computing ti apartt 7. Secure – an overall decrease in risk due to greater security protocols and tools from the cloud provider for data in motion, data at rest and data in process. Private cloud computing delivers self-provisioned and automated IT capabilities as services to internal users on an immediate and as-needed basis. © 2009 Unisys Corporation. All rights reserved Page 30 Unisys Secure Cloud Solution Now Available for the Private Cloud Self-service p portal speeds p provisioning p g Secure Cloudware Stack Security Optional Stealth security solution provides effective effective, multi-tenant isolation Service Management g Greatest number of management options – in-house or by Unisys – enabling visibility to your Cloud resources Provisioning Virtualization Fully automated provisioning frees up IT resources Fully F ll virtualizes i t li th the server and d storage t resources to t provide id flexibility and scalability A server/storage farm populated with both scale-up and scale-out servers: clients or Unisys. © 2009 Unisys Corporation. All rights reserved Page 31 Unisys Secure Private Cloud Solution Innovation for Your Internal Data Centers Self-Service Portal Secure Cloudware Stack Benefits • Automated Provisioning Security • Metering & Usage Service Management Unisys U sysg Secu Secure e c-RIM or BMC Remedy Option • Service Management and a d Operations Ope at o s Private Cloud Provisioning Appliance Virtualization Service Desk Your Cloud Infrastructure Your qualified Y lifi d assets t or U Unisys i h hardware d (I S & PaaS) (IaaS P S) Virtualized & Non-Virtualized / Scale Up & Scale Out © 2009 Unisys Corporation. All rights reserved Page 32 Unisys “Walks Walks the Walk Walk” Request Type Server & Desktop Virtualization # per Year ~700/ `200 Before Provisioning Time 10+ Days After Provisioning Time Before Resources After Resources 5 minutes 3 with projection of doubling every year 95% of requests require 0 people resources, other 5% is 2 Offshore 2 Offshore 5 with flat future head count Standard Physical Configurations ~250 15+ Days 20 minutes 9 with projection of doubling next year Custom Physical Configurations ~200 20+ Days 2-3 days Same resources as above © 2009 Unisys Corporation. All rights reserved Page 33 Taking Your First Step into the Cloud Advisory and Assessment Services Planning and Design Services Implementation Services Advisory y and Assessment Migration Services • Understand implications that cloud might have • Create awareness • Create design for •strategic Deploy and • Migrate and the transformed configure cloud consolidate for your business. • Analyze feasibility infrastructure technologies applications on cloud • Create business case Explore alternatives such as internal or private, external • including infrastructure • Integrate I t t existing i ti and value model St t i technologies, Strategic or public, or hybrid clouds and might gain infrastructure withhow a client • Transform existing • Create alignment with value from internally optimizing their processes and operations, and cloud infrastructure into current technology, security infrastructure based on the Unisys vision for a infrastructure Real-Time cloud • Integrate operations operations, and Infrastructure with (RTI). • Develop cloud security transformation plans ( (e.g. c-RIM) RIM) • Fast track the for infrastructure adoption deployment •and Examines the characteristics of business services that • Identify candidate application migration have sub-components with the potential to be moved to the transformation areas Cloud Feasibility cloud, and what positive impacts would be realized. based on application & Workload workload Assessment • Assesses the readiness of the client’s infrastructure to support the consumption of a cloud IT delivery model. © 2009 Unisys Corporation. All rights reserved Page 34 Balance Efficiency and Effectiveness The Performance Zone IT Waste And Overspending p g Point Solution Delivery Silo Delivery Missed Business Expectations © 2009 Unisys Corporation. All rights reserved Page 35 Standardized Infrastructure Footprints The Current Environment • Many Current Datacenters are built b ilt around d th the conceptt of standardizing 3 levels of infrastructure footprints – This leads to missed SLAs Wasted andInternal Wasted CloudResources. Resources Missed SLAs Current Datacenter Small, Medium, and Large Standardized Unisys Infrastructure Architecture A hit t Footprints Unisys Patterns Workload Patterns Application Workloads • Since all of the resources are co-located in the datacenter the connections are also standardized standardized. External Cloud © 2009 Unisys Corporation. All rights reserved Page 36 Fit-for-Purpose℠ Design Understanding Workloads Service Levels and Work Infrastructure Services Workload Types Missed Expectations & Resource Waste Service Executed / Waste Minimized • Workloads fit in to a number of architectural patterns. Each pattern has optimized hardware and software ft solutions l ti th thatt support it. • Running solutions on optimized hardware allows for optimal costs, increased consumer experience, i and d minimal i i l resource waste. © 2009 Unisys Corporation. All rights reserved Page 37 Transforming the Delivery Model Identifying Workloads • Identification of workloads needs to come from an understanding of the business. Business Value Chain – Break the Business in to its Value Chain Functions and Sub-Functions. – Understand the workloads that each Sub-Function utilizes to be effective. Business Intelligence ETL Processing Campaign Management – Model these workloads and the requirements placed on them. © 2009 Unisys Corporation. All rights reserved Page 38 Legacy Approach IT Waste & Overspending Result © 2009 Unisys Corporation. All rights reserved Page 39 Demand Driven Approach Fit for Purpose℠ Tailored Infrastructure Services Fit-for-Purpose℠ Result © 2009 Unisys Corporation. All rights reserved Page 40 Using Patterns for Cloud Computing Understand U de sta d tthe e Workload o oad • There are three ways to optimize th cloud the l d architecture. hit t – Internal Deployment – An application with an internal deployment has all of its component workloads in the datacenter. – External Deployment Current Datacenter – An application pp with an external deployment has all of its component workloads in an external cloud. – Hybrid Deployment – An Unisys Architecture application with some workloads in Unisys Patterns the datacenter andWorkload some in the external cloud. Patterns Internal Cloud External Cloud © 2009 Unisys Corporation. All rights reserved Page 41 Critical Steps to achieve “elastic datacenters in the cloud” Educate & Energize the Enterprise Determine how the Cloud can be used Enterprise Cloud Awareness unWorkshop Enterprise Cloud Feasibility Analysis Modernization Benchmark Business Workload Decomposition Service Enterprise Cloud Technology Alignment Analysis Enterprise Cloud Operational Alignment Analysis Build a Strategy & Design Enterprise Adoption Service Enterprise Cloud Business Case and Value Engineering Service Performance Z Zone Value V l Total Cost of Ownership Modeling Exercise Cloud Adoption Services Cloud Readiness & Strategic Roadmap Service. Cloud Transition Services © 2009 Unisys Corporation. All rights reserved Enterprise Cloud PoC Services Page 42 • Unisys and the Unisys logo are registered trademarks of Unisys Corporation. products referenced herein are • Anyy other brands and p acknowledged to be trademarks or registered trademarks of their respective holders. © 2009 Unisys Corporation. All rights reserved Page 43 Additi Additional l Material M t i l © 2009 Unisys Corporation. All rights reserved Page 44 Unisys Announces Cloud Strategy and Offerings © 2009 Unisys Corporation. All rights reserved Page 45 Unisys Can Help You With Your Journey From Data Center Transformation to Cloud Service Offerings High Business Impact Secure “IT as a Service” Ability of IT function to help create business process advantage Manage Service Levels Improve Delivery Reduce Costs Process and P d Cultural Changes Low Time Standardize, Consolidate, Virtualize Automate technology to improve delivery and meet service levels Business B i ““performancef enabled” applications Location-independent L ti i d d t secure operations S Supported d with i h Standardized, S d di d Integrated I d Global Gl b l Delivery D li © 2009 Unisys Corporation. All rights reserved Page 46 Cloud Computing Options Public Cloud • Rented services • Multi-tenancy • Self-service Private Cloud Optimized Workloads • Automation • Virtualization T diti l • Traditional data center Hybrid Cloud © 2009 Unisys Corporation. All rights reserved Page 47 Typical Cloud Services Delivered Accessing the cloud is about renting X as a Service (XaaS) SaaS Software as a Service Renting execution of software solutions over the Internet (e.g., salesforce com) salesforce.com) PaaS Platform as a Service Renting g use of an application pp environment over the Internet ((e.g., g, Google App Engine) IaaS Infrastructure as a Service Renting use of computing power or storage over the Internet (e (e.g., g Amazon’s EC2 & S3) Each successive service delivers a greater portion of the overall solution as part of the “rented” bundle. © 2009 Unisys Corporation. All rights reserved Page 48 Data Center Transformation and Outsourcing Experience and Innovation • Decades of experience and expertise Experience Innovation • Large-scale, high availability, high transaction volume – our heritage • Thousands of Outsourcing clients in 100+ countries • Industry-recognized leader in IT Outsourcing • Unisys Real-time Infrastructure technology: powers the cloud • Scalable, integrated, repeatable, global delivery model • Time to value, unique visibility • Robust portfolio and roadmap tracks to the client’s IT maturity • tools to assess, plan, model, and select the best transformation projects • long-term view and quick, high value, l low risk i k projects j t with ith d defined fi d cost/risk t/ i k • Optimized support model with end-toend view ¾ ITIL b ITIL-based d processes linking li ki all ll support levels: self-help and levels 1, 2, 3 Unisys y Stealth – transformational security y © 2009 Unisys Corporation. All rights reserved Page 49 Element Virtualization plus Real-Time Real Time Infrastructure Automated Policy Enforcement Build & Manage Orchestration/Workflow Resource Utilization Re-purposing Client Virtualization Server Virtualization Servers Element Virtualization Network Virtualization Network Storage © 2009 Unisys Corporation. All rights reserved Application Virtualization Storage Virtualization Apps Page 50 Real-Time Infrastructure plus Secure Cloud IT Frramewo ork (e.g. ITIL) X as a Service Build & Manage Unisys uProvision Web Platform Application Platform Automated Policy Enforcement Unisys uGovern Orchestration/Workflow Unisys uOrchestrate Database Platform Resource Utilization Unisys uChargeback Re-purposing Unisys uAdapt Client Virtualization Server Virtualization Servers Element Virtualization Network Virtualization Network Storage © 2009 Unisys Corporation. All rights reserved Application Virtualization Storage Virtualization Apps Unisys Cloud Transformation Services Advisory and Assessment Services • Create awareness • Analyze feasibility • Create business case and value model • Create alignment with current technology, operations, and security • Fast track the adoption • Identify candidate transformation areas based on application workload Planning and Design Services • Create design for the transformed infrastructure including technologies, operations, and security • Develop transformation plans for infrastructure deployment and application migration Implementation Services • Deploy and configure cloud technologies • Integrate I t t existing i ti infrastructure with cloud • Integrate operations with cloud ( (e.g. c-RIM) RIM) © 2009 Unisys Corporation. All rights reserved Migration Services • Migrate and consolidate applications on cloud infrastructure • Transform existing infrastructure into cloud infrastructure Page 52