Hi [[ session.user.profile.firstName ]]

Unisys CloudForte® for Microsoft Azure

Accelerate Your Secure Cloud Adoption

As part of digital transformation, both large and small enterprise and government organizations are facing a variety of cloud adoption challenges.

Join us as we explore the reality of secure cloud adoption – and learn the details about Unisys CloudForte® for Microsoft Azure – with Jason Carter, Lead Solutions Architect, CloudForte, Unisys, and Julia Nathan, Senior Cloud Solution Architect at Microsoft.
Recorded Apr 13 2020 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Carter, Lead Solutions Architect, CloudForte; Julia Nathan, Senior Cloud Solution Architect, Microsoft
Presentation preview: Unisys CloudForte® for Microsoft Azure

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Unisys Live Panel Discussion: Delivering Zero Trust with Dynamic Isolation Oct 6 2020 10:30 am UTC 45 mins
    Sally Eaves & JP Cavanna
    Today, enterprise organizations exist in a very challenging cyber security landscape. Threats are everywhere. Trust is a liability. And enterprise IT environments are very complex. Bad actors continue to become more sophisticated in their attacks. Many of them now use powerful exploitation tools that were previously available only to nation-states. And, in some cases, the bad guys work together to share/exchange tools, information and stolen data.

    The immediate impact of the pandemic on the global economy was also felt far and wide - with remote working, alterations in workforce levels, and changes to infrastructure becoming a common occurrence. As efforts now shift to the long-term strategic view of the ‘new normal’, organizations are questioning how they will ensure business resiliency in 2021 and act more quickly against new and evolving cyber threats. This exclusive industry discussion panel on ‘Delivering Zero Trust with Dynamic Isolation’ with Sally Eaves & JP Cavanna will provide answers to these and other critical questions:

    • How Dynamic Isolation works to enable enterprises to act against threats at malware speeds?
    • How prepared are organizations to the possibility of internal threats?
    • Is Zero Trust the best way to navigate current cyber landscape?
    • What does the architecture of Dynamic Isolation look like and how can it make a difference?
  • Killing the VPN: A Deeper Dive into Unisys Stealth™ Sep 30 2020 4:00 pm UTC 60 mins
    Lance Vaughn
    Unisys has a new approach to protecting the State of Texas’ critical data and a faster way to respond and dynamically isolate the attacks that occur.

    Unisys Stealth™ is driving this new approach. This 1-hour webinar will cover real world examples and the key approaches to how Stealth can help you reduce the cost curve of Security, avoid the constant proliferation of VPN’s and dynamically isolate threats.
  • Unisys Live Panel Discussion: Hybrid Cloud Cost Optimization Recorded: Sep 22 2020 35 mins
    Anupriya Ramraj & Sally Eaves
    From business continuity and resiliency, through to cost optimization, it's critical that business is able to overcome new and evolving challenges. Cloud migration and optimization enable companies to fuse resourcing, budgeting, and security all in one place.

    However, two-thirds of companies that have adopted cloud do not believe they are realizing the full potential of its capabilities or cost-saving ability. So, where can business leaders start when shaping their processes for the future of cloud adoption?
    Join Dr. Sally Eaves and Anupriya Ramraj as they discuss industry best-practice approaches to cloud deployment and cost optimization. In this discussion, they will explore:
    • The agility which cloud applications can bring to any infrastructure and their potential for growth
    • The means through which organizations can pursue better cost management through idle resource review and reduction
    • The evolving capabilities that third-party vendors can offer, and how Unisys CloudForte can offer a facility for multi and hybrid cloud environments.
    Join us on Tuesday, September 22nd, 12:30 pm CEST.
  • Protect your critical assets from Ransomware Recorded: Jul 24 2020 4 mins
    Unisys & Dell Technologies
    Ransomware is a fact of life. It’s getting worse and that’s not good for your business. Once the bad guys are in, what do you do? At this point it’s not about stopping attacks -- it’s about recovery……and getting your critical operations up and running as fast as possible… with data that is clean from ransomware. Watch this video from Unisys and Dell Technologies we have the solution - Unisys Stealth® and Dell EMC PowerProtect Cyber Recovery
  • Cloud Security for a New World of Work Recorded: Jul 21 2020 43 mins
    Sudhir Mehta Global VP Product Management Strategy, Unisys & Mark McIntyre, Chief Security Advisor (Federal), Microsoft
    Cloud Security is top of mind for many organizations in our current world situation. This joint webinar with Unisys and Microsoft is a discussion on “Cloud Security for a New World of Work.”
  • A Recipe for Success: Taking Charge of Your Cloud Security Compliance Recorded: Jun 24 2020 43 mins
    Anupriya Ramraj, VP Global Cloud Services, Unisys; JP Cavanna, Industry Dir. & Lead Cybersecurity Strategist (EMEA), Unisys
    Now more than ever we continue to hear about cloud security lapses and high-profile breaches in the news. However, if you dig deeper into the details behind each of these breaches, you'd find that many vulnerabilities could have been avoided if the cloud environment was configured according to cloud security best practices.

    With many cloud customers lacking the essential tools, knowledge and processes to implement compliance, this webinar will reflect on key industry challenges and set out clear goals that will enable you to start building an effective Cloud Security Posture Management (CSPM) program. We will cover the following steps as a 'recipe for success':

    •Understand the reasons behind unsecure cloud deployments from blind spots to multi-cloud use,
    •Review security compliance throughout cloud lifecycles and learn how to build a Cloud Security Posture Management (CSPM) program,
    •Identify security posture goals across all phases of cloud adoption, including new cloud designs, migrations and operations.
    •Embrace a Zero Trust strategy for cloud with adaptive security that protects your critical assets.

    No security management system can fully guarantee 100% cloud security; however, security compliance using Cloud Security Posture Management (CSPM) can dramatically reduce the risks associated with cloud misconfiguration, ensure better adherence to cloud security best practices, and alert security professionals of potential vulnerabilities.
  • Business Resilience: Defining a New Approach to Security Recorded: May 27 2020 46 mins
    JP Cavanna, Industry Director & Lead Cyber Security Strategist and Evangelist (UK/EMEA), Unisys
    Traditional perimeter defenses are dead and organizations are under greater pressure to embrace new approaches to cyber security that reduce costs, increase ROI and provide business resilience in light of the current climate with Covid-19.

    With 2020 being a year for safe bets only, this webinar will reflect on clear trends within the modern security landscape and enable you to define a new approach for security. This will focus on achieving business resilience with:

    •Zero-trust environments through software-defined perimeters that empower network visibility and control
    •Reduced Attack Surfaces (with micro-segmentation, cloaking and e2ee)
    •Real-time response to threats
    •Remote worker capabilities that are secured at scale.
  • Cyber Recovery in the Age of Ransomware Recorded: Apr 14 2020 39 mins
    Andrew Peters, Stealth Industry Director, Unisys; George Pradel, Senior Systems Engineer, Dell Technologies
    Many companies have already been hit by a ransomware attack- or will be. Technically astute hackers continue their ability to infiltrate ransomware so much, that Ransomware as a Service is now available on the darknet. In today's hyper connected world, it could be only a matter of time until 'something' happens. How are you modernizing your cyber resilience strategy? Have you made provisions with technology that adapts to the ever-changing approaches of modern attacks? What is your plan to recover when your catalogs, directories, AD, etc. are locked-down with ransomware?

    Whether it is phishing, ransomware or insider attacks, the sophistication and intensity of modern cyber threats can make it difficult to keep up. In fact, attacks are routinely targeting back-up systems -- even "secure" back-ups.

    In this webinar, you will learn how to:

    Evolve your security strategy (It is all about data management)
    Take the economic incentive away from cyberhackers
    Reduce your attack surface
  • Unisys CloudForte® for Microsoft Azure Recorded: Apr 13 2020 34 mins
    Jason Carter, Lead Solutions Architect, CloudForte; Julia Nathan, Senior Cloud Solution Architect, Microsoft
    Accelerate Your Secure Cloud Adoption

    As part of digital transformation, both large and small enterprise and government organizations are facing a variety of cloud adoption challenges.

    Join us as we explore the reality of secure cloud adoption – and learn the details about Unisys CloudForte® for Microsoft Azure – with Jason Carter, Lead Solutions Architect, CloudForte, Unisys, and Julia Nathan, Senior Cloud Solution Architect at Microsoft.
  • Disaster Recovery Recorded: Oct 1 2019 61 mins
    Jeff Gilmer
    If a disaster were to strike, would you be able to successfully recover your network?

    Disaster recovery focuses on the ability of an organization to recover from a technology outage. This can be loss of a single technology or a catastrophic event. Many companies have a need to quickly gain a better understanding of their Disaster Recovery capabilities, future options, and strategies.

    Join us as we explore the differences between Emergency Management, Business Continuance, and Disaster Recovery Planning.

    You will learn how to prioritize the recovery of your organization's services by understanding all the steps in a successful recovery plan. We will also cover what is required to recover those services including facilities, IT, financial, and resources.

    Don't wait until it's too late. Know what to expect in the event of a disaster.

    Jeff is effective in both restoring and building organizations through improved long-term process improvement and implementation of solid scalable methodologies. Jeff also specializes in communications and regularly presents at seminars/webinars, industry events, and partner-sponsored events. In addition, Jeff has presented Excipio’s results to a variety of private and public sector audiences, including: senior executive teams, state legislatures, city councils, and federal agencies, boards of directors, and small community forums.”
  • Cloud Done Right! 9 Critical Elements for Success Recorded: Aug 7 2019 63 mins
    Unisys - Raj Raman, Lakshmi Ashok, Allen McMichael, Lori Pierson, Lisa McLaine, Brenda Celeste
    Enterprises need to modernize their operations to grow and stay competitive. But changes to IT infrastructure can quickly get out of hand. This involves moving workloads from on-premises data centers to public-cloud, private-cloud and hybrid-cloud solutions. The process is challenging and time consuming, leaving many organizations struggling to meet their business initiatives. In this webinar we’ll describe the nine key attributes that enterprises must master to be successful.

    Please join us on July 24th to learn how Unisys CloudForte™ helps our clients accelerate their migration to the cloud, while mitigating their risk and managing their costs.

    •Lisa McLaine - Global Director - Cloud and Infrastructure Services
    •Raj R. Ramen - Chief Technology Officer - Cloud
    •Lori Pierson - Portfolio Head - Global Cloud, Infrastructure and Application Services
    •Lakshmi Ashok - Chief Technology Officer - Homeland Security and Critical Infrastructure
    •Allen McMichael - Head - Global Cloud Managed Service Operations
    •Brenda Celeste - Director - Analyst Relations, North America
  • Elevate - An Omnichannel Banking Solution for Anytime, Anywhere Recorded: Jul 31 2019 3 mins
    Elevate is a fully integrated omnichannel banking ecosystem that enables frictionless customer journeys regardless of touchpoint, anytime, anywhere.
  • Build the Bank Platform of the Future: Omnichannel & the Role of Open Banking Recorded: Jul 17 2019 55 mins
    Maria Allen, VP & Global Head Financial Services, Unisys and Stephen Greer, Senior Analyst, Celent
    New business models are emerging in banking, and these are underpinned by new principles of openness, flexibility and agility. For many, omnichannel is an aspiration, most banks are still in the early days of deployment. What are the keys to success? And what should you prioritize in your digital transformation? Get insights on global industry best practices and learn about the rise of platform banking including:

    -New customer acquisition
    -New products
    -New distributions channels
    -and more….

    Join industry experts Unisys’ Maria Allen, and Celent’s Stephen Greer’s webinar at 11am EST on 17 July 2019.

    Our Presenters

    Maria Allen, Unisys
    Maria L. Allen is Vice President and Global Head of Financial Services. In this role, Maria is responsible for building new products and services across all regions, platforms and channels ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives. With more than 30 years' experience in business operations, technology and sales, she has worked both in and with large number of financial institutions across diverse geographies. Maria is an award winning, visionary experienced in the development of high performance products, mission critical and technology-enabled business services for complex and compliance driven industries.

    Stephen Greer, Celent
    Stephen is an expert on retail banking trends, with an emphasis on fintech startups, emerging technology, and digital transformation. He has worked with some of the largest banks in the US and globe to influence digital strategies and identify opportunities in the space. Stephen has been a frequent speaker at large conferences such as CARTES Paris, American Banker’s Retail Banking Conference, and Cumbre Financiera Panama, as well as at industry roundtables and vendor events. He has been quoted in publications such as Forbes, The San Francisco Chronicle, American Banker, Banking Exchange, and others.
  • From Telephone to Telepathy – The Evolution of Digital Support Recorded: Jun 26 2019 61 mins
    Weston Morris, Global Leader for Unisys Digital Workplace Services
    Today’s enterprises need capabilities that go beyond the “Service Desk” and “Desktop Support.” Enterprises need capabilities that:

    •Start with how users devices are provisioned and configured so they are ready to ‘phone home’ when a problem is detected.
    •Include Artificial Intelligence and machine learning as inherent components of the digital workplace ecosystem.
    •Go beyond the visualization of device data to proactive resolution response.
    •Use intelligent analytics to infer how the end-users feel about their service without the hassle of a formal survey.

    Please join us as we profile seven clients’ use of our Digital Support innovations to accelerate digital transformation.
  • Addressing Consumer Safety Concerns with Zero Trust Security Recorded: Jun 24 2019 27 mins
    Christopher Kloes, VP of Security, Unisys
    In this webinar, you’ll learn:

    •The leading security concerns for consumers worldwide
    •The benefits of a Zero Trust security model to protect critical customer information
    •Five steps for implementing Zero Trust
  • How SOC Superheroes Win Recorded: Jun 5 2019 59 mins
    Salvatore Sinno, Global Chief Security Architect, Unisys; Ismael Cervantes, Sales Engineer, LogRhythm
    Today's reality is that a security breach is not a matter of IF, but a matter of WHEN. According to research from Ponemon Institute, the mean time to detect (MTTD) a breach is 197 days, and the mean time to respond (MTTR) is 69 days. When a threat is detected, organizations have a difficult time responding quickly. The security operations center (SOC) contacts the network team, or the endpoint team, or both to figure out where the anomalous endpoint or user is, and then they determine how to contain it - an inefficient process that can consume days or weeks before remediation.

    Rapidly responding to threats require leveraging state of the art innovation that combines advanced security analytics, machine intelligence, Dynamic Isolation, and automation. In this webcast, you will gain insights on how smart CISOs are making incidents non-newsworthy by controlling and neutralizing security events. Learn how to

    Bring multiple essential capabilities together to quickly identify threats and neutralize them before they cause harm not in days or weeks but minutes.
    Employ advanced security analytics and machine intelligence to continuously monitor endpoints, networks and user behaviors for cohesive end-to-end threat visibility.
    Deploy Dynamic Isolation to restrict or block malicious users and devices from communicating over the network.
    See a live demo that will entail a real-life scenario of insider attack with simulated attack, detection, and response in Seconds not hours, days or months.
  • Building a Zero Trust Model in the Cloud with Microsegmentation Recorded: Apr 2 2019 55 mins
    Salvatore Sinno, Chief Security Architect, Unisys; John Kindervag, Chief Technology Officer, Palo Alto Networks
    The historical approach to business security has focused on defending a fixed perimeter. The objective was to keep threats on the outside of the perimeter of a wall around a castle. However, today the reality is that these same boundaries are harder to define and very porous. The assumption that systems and traffic within a data centre can be trusted is flawed because once a single host is compromised, moving within a trusted zone is often easy. While it is often hard to directly attack high-value assets from outside the network, using an indirect attack using systems inside the network is much simpler, although more time-consuming. These same principles are equally applicable to public cloud deployments.

    The Zero Trust architecture is the foundation of the future of public cloud security. The ability to authenticate and secure communication without relying on the location of the endpoints or the security of the network means that organizations can adopt the cloud paradigm and embrace its benefits of cost and flexibility while maintaining control of their data and compliance in virtual environments.

    In this webcast, John Kindervag, the creator of the Zero Trust Model, and Unisys experts will introduce concepts associated with the Zero Trust model in the cloud and show how Unisys Stealth® and Palo Alto Networks provide a unified platform to enhance system survivability and reduce the impact of potential threats.

    By the end of this session, attendees will

    1. Understand how Palo Alto Networks and Stealth enable the Zero Trust model within the cloud.

    2. Understand Palo Alto Networks and Stealth Zero Trust segmentation platform.

    3. Understand how this solution can accelerate cloud adoption.

    4. Understand methods and metrics by which the next generation of CISO's can define and deliver success in the public cloud.
  • Playing Moneyball in Cybersecurity Recorded: Mar 25 2019 40 mins
    Matt Soderlund, Cybersecurity Leader, Unisys
    When giants like Equifax, Facebook, and Google are getting breached on a larger scale than ever before, setting security priorities based on headlines and gut instinct doesnt cut it. Finally, your board of directors understands the need to pay close attention to cybersecurity. Youre now being asked to demonstrate the business impact of your security investments, and you need objective, data-validated priorities to obtain budget approval. Find out how Unisys TrustCheck lets you play cybersecurity Moneyball.
  • Imagine an End to Identity Fraud Recorded: Mar 4 2019 4 mins
    Identification that relies on what an individual knows or has―such as passwords, PINs and documents―won’t stop identity fraud. Even biometric markers can be spoofed. As fraudsters become more sophisticated, stronger security with multi-modal biometric identification is required. See how Stealth(identity) can help put an end to identity fraud.

    Learn more about Stealth(identity)™: unisys.com/sid
Securing Your Tomorrow
Unisys is a global information technology company that specializes in providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets. Unisys offerings include security solutions, advanced data analytics, cloud and infrastructure services, application services and application and server software.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Unisys CloudForte® for Microsoft Azure
  • Live at: Apr 13 2020 7:00 pm
  • Presented by: Jason Carter, Lead Solutions Architect, CloudForte; Julia Nathan, Senior Cloud Solution Architect, Microsoft
  • From:
Your email has been sent.
or close