Unisys going on offense in server and security markets

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

Forget firewalls. Set your endpoints to go dark. For our CEO Interview Series, Unisys CEO Ed Coleman discusses a new software-focused data center strategy

Unisys is going on offense.

That's the very clear message from CEO Ed Coleman, who says a new software-focused data center strategy and powerful new security technology will enable the usually quiet Blue Bell, PA-company to take up the attack in vital market segments and shake up customer views about Unisys. In this installment of the IDG Enterprise CEO Interview Series, Coleman spoke with Chief Content Officer John Gallant and Computerworld reporter Pat Thibodeau about the company's strategic partnership with Intel to bring Unisys's mission-critical server software to RISC, Windows and Linux servers. He also provided insights into Unisys Stealth - a security technology that, well, sounds too good to be true - and explained how the company's services strategy is shifting to capture high-growth opportunities.

[ For a quick, smart take on the news you'll be talking about, check out InfoWorld TechBrief -- subscribe today. ]

Compare and contrast Unisys to IBM, HP or Dell. Where are you similar and where are you different?

We participate in some of the same segments of the marketplace, but we think of ourselves fundamentally as a provider of mission-critical services and solutions to our clients. We really focus on that "mission-critical" because what we do tends to be vitally important to the organizations we support, either in terms of the hardware or software that we provide or the services we provide. We're not trying to be all things to all people. We drill down to the areas of security, data center, end-user outsourcing and support, and application modernization and support. There are a lot of things over the last four or five years we've exited from a business standpoint, in order to build our solutions around those four areas.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
Mobile Security Insider: iOS vs. Android vs. BlackBerry vs. Windows Phone
Recommended
Join the discussion
Be the first to comment on this article. Our Commenting Policies