Unisys IT Disruptive Trends Overview

Download Report

Transcript Unisys IT Disruptive Trends Overview

Unisys Disruptive IT Trends
Financial Services Priorities & Unisys Strategic Direction
Sidney Pearl
May 8th 2012
Unisys Disruptive IT Trends for 2012
Key disruptive trends are creating new opportunities for IT to deliver business value and
a step-change in productivity via new styles of interaction, automation & service delivery
Cloud Computing
Consumerization of IT / Mobility
Cloud computing is an on-demand, pay-peruse, flexible and scalable model for service
delivery over the Internet covering the entire
IT stack from platforms to infrastructure to
applications
CyberSecurity
CyberSecurity involves the security of IT
systems within the enterprise and the broader
digital networks upon which they rely –
including cyber space itself and critical
infrastructures
The Consumerization of IT and mobile
computing are underpinning the next
significant increase in end-user productivity,
and are driving the need for a new generation
of IT support models
Drive New
Business
Opportunities
& Control IT
Costs
Social Computing
Social computing is creating a web of
people who interact with applications, data
and each other real time, changing the
nature of how we think about and build
enterprise applications in the future
IT Appliances
Big Data / Smart Computing
Appliances are a packaged combination of
hardware and software, offering a faster and
easier deployment compared to buying,
installing and configuring the components
separately
Big Data and Smart Computing relate to the
use of huge volumes of data flooding into the
enterprise and opportunity to identity patterns
and derive real-time business insights for
competitive advantage
© 2012 Unisys Corporation. All rights reserved.
2
The Impact of these Disruptive Trends is Wide Ranging
Disruptive Trend
Organizational Impact
• Private Cloud Implementations
are driving greater agility, while
addressing security & data concerns
• Software as a Service applications
are growing rapidly in reaction to
high maintenance/deployment costs
• How to manage the diverse influx of
consumer-purchased devices
• How to gain control using mobile
device management and security
• Application mobile enablement is
where real value can be unlocked
• Use of social computing to drive
enterprise-wide collaboration
• Social enablement of enterprise
applications & processes to drive
customer & constituent collaboration
Disruptive Trend
Organizational Impact
• Mobile, social, and cloud computing are
creating new security complications
• Consolidation of security systems such
as access control & surveillance for
simplicity and cost control
• Increased Criminalization of cyberspace
heightening need for robust CyberSecurity
• Growing data volumes are driving up
storage costs creating the need for
storage rationalization
• In-Process analytics enable real time
leverage of high volume data streams.
• Organizations are embracing an onslaught
of new customer and process data
• Appliances attractive for “plug and play”
simplicity, but mature and less disruptive
• Growth in highly-specialized information
appliances for high-performance analytics
The Disruptive Trends continue to be top-of-mind with CIOs and decision makers –
and continue to see high growth-rates and innovation within the IT marketplace
© 2012 Unisys Corporation. All rights reserved.
3
Consumerization of IT / Mobile Computing
Enterprise Significance & 2012 Predictions
The “Consumerization of IT” is continuing to accelerate within corporate IT environments, as
new generations of powerful mobile devices proliferate…
Enterprise Significance
Mobile Computing
The opportunity? Exploiting the full potential of mobile
devices and applications for anywhere, anytime worker
productivity, customer value, and process improvement
2012 Predictions
IT organizations will develop new applications and
reengineer business processes as they look to connect
with clients and improve employee productivity.
Organizations will make greater use of mobile device and
application management tools to better manage, secure,
maintain, and deploy mobile devices and applications.
© 2012 Unisys Corporation. All rights reserved.
4
Mobility as the New Desktop
The Emerging Computing Platform for Growth
The primary business drivers for Mobile Computing relate to improving employee
productivity, driving customer value by enhancing the customer experience and delivering
new products and services, and streamlining business processes
The key business drivers are:
Why Now?
 Employee Productivity: Mobile computing boosts worker
productivity through anytime/anywhere access to corporate
resources, information and business processes
 Driving Customer Value: Organizations are discovering
new ways of generating customer value and competitive
advantage with mobile services as the delivery channel or
even as an integral part of the product or service
 Business Process Improvement: Mobile devices are
significantly improving and streamlining existing business
processes and helping to innovate entirely new ones
Consumerization of IT
is driving additional
opportunities for the
business as consumers
and employees adopt
mobile computing as their
preferred method of
information access and
bring their own high-end
devices to work
Mobility is fast becoming the new technology platform for growth and innovation - changing the way
we access and consume information, communicate, and conduct business transactions
© 2012 Unisys Corporation. All rights reserved.
5
Mobile is the New Desktop
An explosion of new devices is rapidly engulfing the market
As mobile becomes “the new desktop”, the challenges include how to enhance mission-critical
applications and how to secure and manage an ever-growing array of devices and applications
IDC Black Book Q2 2011
Key Observations
• Smart-phones, Tablets, and imminent
“Flexible” computing platforms are increasing
the pace of change at the end-point.
• The environment is diverse, and will become
more diverse in the coming years..
• Newer devices more often serve as dual
purpose “personal” and “workplace” devices
than traditional laptops and PCs.
• Diversity in operating environments and form
factors will continue, putting pressure on the
burgeoning mobile applications market.
• Integrated Mobile Device Management is
complicated by a lack of standards.
© 2012 Unisys Corporation. All rights reserved.
6
Mobile Technology Trends
Mobile technologies are expanding user interface innovation
Emerging mobile technologies such as context-awareness and mobile payments continue to
introduce rich and innovative new services delivering a competitive edge for early adopters
Top 10 Mobile
Technologies to watch
in 2012
Location
Based
Services
Key Observations
Mobility continues to be a key platform for business
growth and innovation…
ContextAware
Services
 Location Based Services allows field operations to be enhanced
with geographical data,
Mobile
Social
Networking
Object
Recognition
 Uniquely mobile functions, such as the ability to "check in" to a
store for alerts, or add items to a shopping cart simply by taking
a photo or scanning a barcode enhances retail experience,
Mobile
Search
Mobile
Instant
messaging
Mobile
Commerce
Mobile email
Mobile
Payment
Mobile Video
 Near Field Communication (NFC) streamlines payment
processing for financial applications,
 Context-aware applications provide personalized and targeted
end-user experience across the board,
 New sensors and processing capability recognize the user's
surroundings, allowing innovative business applications
Source: Gartner
© 2012 Unisys Corporation. All rights reserved.
7
Unisys Consumerization of IT Research
Key 2011 Findings and Implications for 2012
Our second annual global survey in conjunction with IDC found that enterprises are falling further
behind employee usage of Consumer Technologies in the Workplace
Usage of consumer technologies increasing among employees; IT
executives see value, but are hampered by security concerns, support
issues, and a growing workload…
 IT executives recognize the CoIT trend is real and inevitable
 40% of devices used to access applications are personally owned (up
10% from last year)
 iWorkers are using smart mobile devices at twice the rate IT
executives believe is the case
 Yet IT departments are not taking proactive steps to ready their
organizations to serve needs of mobile customers:
 Only 6% of IT decision-makers have modernized customer-facing
apps to work with mobile devices
 IT respondents doing less than they did in 2010 to secure mobile
devices
 Constrained resources a barrier: 80% of IT respondents say
department workload is increasing due to consumerization
© 2012 Unisys Corporation. All rights reserved.
8
Recent findings from Unisys Briefings
Ten Key Observations stand out in Client Conversations
After briefing over 40 organizations across a number of industries on the findings of the 2011
Consumerization of IT Research, Unisys has arrived at a set of ten key observations
Key Client Observations
1. Moved past last years “lock it out” response
2. More open to BYOT approaches
3. Ongoing business procurement outside of IT
4. Developing mobile app business case is key
5. Security remains primary concern
6. Interest in cloud solutions to regain app control
7. IT policies need to be strengthened
8. Few have moved past basic mobile apps
9. Cost and skills a barrier to app modernization
10.Customer apps prioritized over employee apps
Client Initiatives
Our global clients are keenly
interested in services that can help
them …
Determine mobile
application opportunity
areas and implement via
mobile development
& modernization services
(#4, 8, 9 & 10)
Implement a consistent
approach to device
management & security
across the enterprise
(#1, 2, 3, 5, 6 & 7)
© 2012 Unisys Corporation. All rights reserved.
9
Market Trends & Business Implications
Mobile Computing Trends Coming to the Forefront in 2012
Once organizations implement their secure mobility infrastructure, they will start mobile-enabling
their internal and customer-facing business applications and close the “Consumerization Gap”
2012 Focus Areas
Business
Process
Redesign
Application
Mobile
Enablement
Challenge/
Opportunity
Key Considerations
Rethinking Processes in a Mobile Context – Going
beyond mobile-enabling existing business processes
and designing new ones to innovate service delivery.
$7.6B IT spending on reinventing business processes and
systems by 2015 1
Mobile-Enabling Enterprise Applications –
Organizations will need to implement a strategic
approach for application mobile enablement.
How to choose the
optimal approach for
mobile-enablement
$5.6B IT spending on mobile application development by
2015 2
Comprehensive
Device &
Application
Management
Managing Mobile Application Portfolios - App
Stores will be adopted to manage corporateapproved, custom-built mobile applications.
Secure MultiDevice Access
to Applications
Securing Mobile Access - Organizations will need to
provide secure mobile access to complex enterprise
applications across multiple devices.
How to maintain and
update increasing
numbers of mobile apps
20% of enterprise employees will use tablets instead of
laptops within 2 years 3
83% cited security concerns about mobile devices 4
How and where to
mobile-enable business
applications - and redesign processes
How to securely access
applications on multiple
devices – leveraging
existing investments
1 & 2. Forrester, 3.Gartner, 4. Unisys/IDC
© 2012 Unisys Corporation. All rights reserved.
10
Unisys Perspective & Recommendations
Strategic Recommendations for Mobile Computing
Key focus areas should include secure application management as well as device management
and mobile-enablement of internal and customer-facing business applications and processes
Business
Process
Redesign
As part of internal and customer-facing mobile-enablement
initiatives, review business processes to uncover process redesign opportunities in a new, mobile context
Application
Mobile
Enablement
Consider application mobile enablement to unlock the potential of
your enterprise applications – extending functionality and preserving
investments
Mobile Device
& Application
Management
Evaluate mobile application management solutions to maintain an
exploding number of mobile applications - and enterprise app
stores to deploy your mobile applications
Mobile
Security
In concert with mobile device management, ensure mobile users,
applications and data are appropriately secured with techniques
such as multi-factor authentication
Effectively securing and managing mobile devices early on paves the way for organizations to gain
competitive advantage by innovating new mobile-enabled services ahead of their competition
© 2012 Unisys Corporation. All rights reserved.
11
Unisys Mobile Computing Solutions Portfolio
The four core areas you need to address
Core Areas
Business
Process
Redesign
Application
Mobile
Enablement
Mobile Device
& Application
Management
Mobile
Security
Unisys Solutions
Mobility Assessment Services
Innovation Workshops, strategy, and
assessments targeting mobility
opportunities across the business
Mobility Application Services
Mobile application development and
mobile enablement – including
modernization of legacy applications
Mobile Device Management
Mobile device and application
management to support and manage
diverse end points & applications
Mobility User Authentication
Mobile device biometrics and identity
lifecycle management
Customers Get:
An integrated set of services from advisory to
application mobile-enablement, device security,
support and management …
…Providing enterprise-grade secure
mobility solutions to modernize
mission-critical applications
© 2012 Unisys Corporation. All rights reserved.
12
CyberSecurity
Enterprise Significance & 2012 Predictions
CyberSecurity is the protection of information systems and their dependency on digital
networks from exploitation of vulnerabilities in cyber space
Enterprise Significance
CyberSecurity
Securing against all threats and vulnerability – including
cybercrime, cloud, mobile and social computing - is vital
for future growth, innovation and competitive advantage
2012 Predictions
Organizations will implement predictive security
operations, consisting of dedicated analysts and
advanced data analytics software, to identify threats.
Greater integration of security technologies such as
intrusion detection, malware detection, and data loss
prevention will improve security operational models.
© 2012 Unisys Corporation. All rights reserved.
13
Business Drivers & Challenges
Addressing CyberSecurity in Today’s Network-Centric Society
Increasing levels of cyber-crime and regulatory and compliance requirements, and an
explosion in use of “edge” devices and applications as a result of the Consumerization
of IT have created an unparalleled need for robust security solutions …
The key business drivers are:
• Increasing sophistication, frequency and scale of Cybercrime: Both public and
private sectors need to scale up there levels of protection across their operations
• Cloud computing: CyberSecurity must now be addressed across this full, integrated
environment where applications and data may be highly virtualized
• Rise of mobile devices and applications: The Consumerization of IT effect means that
there are a broader array of end user or consumer devices in use
• Leakage of sensitive data: Protecting sensitive data no matter where it resides
• Increasing regulatory environment: Dealing with the expected impact of new security
legislation applicable to the protection of critical infrastructure and resources
While these are not the only drivers, they are of a magnitude that is requiring serious attention to
compete in the CyberSecurity “arms-race” by managing risk and protecting assets
© 2012 Unisys Corporation. All rights reserved.
14
Organizations are Waking Up to a New Reality
Perceived threat negatively impacts consumer behavior
What issues drive security as a concern for consumers?
• War or Terrorism
• Credit Card Fraud
• Computer Viruses
• Identity Theft
• A Serious Health Epidemic
• Financial Obligations
• Shopping/Banking Online
• Personal Safety
National
Financial
Personal
Internet
UNISYS SECURITY INDEX - OVERALL SUMMARY FROM 1H 2011
 67% are extremely or very concerned about national
security
150
 70% seriously concerned about identity theft
75
164
225
 66% seriously concerned about credit / debit card
fraud
 49% seriously concerned about meeting financial
obligations
0
Not
Concerned
Extremely
Concerned
300
 51% are seriously concerned about online transaction
security
© 2012 Unisys Corporation. All rights reserved.
15
Market Trends & Business Implications
CyberSecurity Trends Coming to the Forefront in 2012
Recent CyberSecurity trends include increasing threat vectors related to social, mobile and cloud
computing, together with an increasing regulatory environment around Cyber “rules of the road”
2012 Focus Areas
Increasing
Levels of
Cybercrime
Mobile, Social
& Cloud
Security
Increasing
Data Sharing
Requirements
Security
Systems
Consolidation
Key Considerations
Challenge/Opportunity
A more menacing threat landscape emerging Organizations struggling to keep pace with the
changing nature of attacks
Cybercrime now costs companies average of $6M per year in
terms of remediating successful data breeches 1
Widening “Consumerization Gap” - Enterprises
doing less than last year to secure mobile devices
Published social media guidelines (46% vs. 60%), Single
Sign-On (52% vs. 73%), 83% cite security concerns 2
Corporate “sharing” of threat & risk information Regulated data sharing on cyber-security breeches
with government agencies
Last year saw activity from agencies including the FTC,
Department of Education, Office of Inspector General and
the Security Exchange Commission 3
Strong interest in consolidation of security
systems - Such as access control and video
surveillance for cost savings and standardization
How to raise protection levels
against cyber-crime while
reducing or maintaining costs
How to secure the
“borderless” enterprise
across the Disruptive Trends
How to ensure regulatory
compliance and employ best
practices for data sharing
How to maximize cost
savings through consolidation
and virtualization
1. Ponemon Institute , 2. Unisys/IDC Consumerization Study, 3 – DataPrivacyMonitor.com
© 2012 Unisys Corporation. All rights reserved.
16
Unisys Perspective & Recommendations
Strategic Recommendations for CyberSecurity
The strategy for prevention, detection and reaction to risk should be a holistic approach and be built
upon the concept of a common operating picture and situational awareness across all fronts
• Establish a logical holistic framework for CyberSecurity: Take a comprehensive
approach as the challenge is far broader than simply addressing one issue
Identity &
Access
Management
Sensitive Data
Protection
Application
Security
Modernization
Secure
Infrastructure
Engineering
• Manage User Identities and entitlements in a comprehensive, integrated approach:
Adopt a centralized approach that integrates user access with device security
• Take a coordinated approach to Sensitive Data Protection: Consider secure document
access, data encryption / masking, digital rights management, as well as cloud and social
networks where sensitive data can be particularly at-risk
• Incorporate CyberSecurity enhancements as an integral part of Application
Modernization: As mission-critical applications are modernized in areas such as cloudand mobile-enablement, review and upgrade security levels
• Take advantage of built-in capabilities of today’s devices to provide advanced
authentication: Biometric techniques via voice, signature and facial recognition can be
used for strong authentication as opposed to add-on hardware
For organizations getting the CyberSecurity posture right across all its elements will be vital for
future growth, innovation and competitive advantage
© 2012 Unisys Corporation. All rights reserved.
17
Unisys CyberSecurity Approach
We approach CyberSecurity in 8 domains covering users, data, applications, infrastructure
and assets together with governance, situational awareness, and security operations…
The challenge is broader than
one issue such as securing
mobile devices or the cloud…
Unisys logical framework for CyberSecurity
Logical framework supports
Cyber strategies and specific
plans tailored to each domain
Holistic approach helps move
from point solutions to enterprise
security intelligence
Predictive security operations
with advanced analytics
identifies threats
Our framework addresses key CyberSecurity issues related to disruptive trends (such as cloud,
mobile, and social computing), sensitive data protection, and regulatory requirements
© 2012 Unisys Corporation. All rights reserved.
18
Unisys CyberSecurity Solutions Portfolio
Comprehensive set of solutions
addressing all components of the
CyberSecurity framework …
Security
Advisory
Services
Risk Advisory
Compliance
Application
Advisory
CyberSecurity
Operations
Center
Security
Monitoring,
Awareness
& Reporting
Integration
Services
Cyber
Situational
Awareness
Security
Infrastructure
Engineering
Readiness
Infrastructure
Architecture
Respond
Data Protection
Recover
Secure Cloud
Identity &
Access
Management
Central
Management of
Digital User
Identities
Stealth Solution
Our solutions assist our clients to protect data, networks, assets, and personnel from cyber threats,
comply with regulations, ensure business continuity and maximize enterprise resilience
© 2012 Unisys Corporation. All rights reserved.
19
Cloud Computing
Enterprise Significance & 2012 Predictions
Organizations are ready to exploit the benefits of the cloud in the context of their
data center operations for mission-critical workloads
Enterprise Significance
Cloud Computing
The benefit? Tangible IT agility gains to support the
business with a more flexible and efficient cost model
2012 Predictions
Private cloud implementations will accelerate as
enterprises seek improved agility and cost savings while
maintaining security of an on-premise infrastructure
Use of software-as-a-service for email and collaboration
will accelerate to reduce costs and simplify operations
Organizations will assess their applications portfolio to
take greater advantage of cloud computing opportunities
© 2012 Unisys Corporation. All rights reserved.
20
Key Issues Driving Cloud Adoption
Data Centers are pressured to Reduce Costs & Increase Service
Data Center Challenges
Reducing Costs
 Managing rising costs within data centers
 Driving infrastructure and/or data center
consolidation
 Reducing upfront capital costs and
maintenance of older infrastructure
Improving Service
 Speeding time-to-market for new services
 Aligning IT services and costs with
business demand and usage
 Improving service quality and customer
satisfaction via automation
Business Benefits of the Cloud Model
 Companies can expand network
capacity and run applications directly
on a vendor's network
 Lower budgetary requirements
allow smaller companies or agencies
to innovate new IT-enabled services
 Burden of developing and maintaining
expertise is transferred to the
service provider
 Pay-per-use basis helps transform
the way IT departments create and
deploy customized applications
Cloud Computing models provide the opportunity to increase service levels while
simultaneously reducing overall cost and/or upfront capital expense
© 2012 Unisys Corporation. All rights reserved.
21
The Data Center will Grow Increasingly Diverse
Public and Private clouds will each have their place
IDC Cloud Computing Survey
Key Observations
• Continued adoption of Cloud
technologies will result in a more
diversified “Hybrid” infrastructure
environment
• Traditional dedicated and outsourced
infrastructure will remain a part of the
overall IT landscape.
• A common management view will be
required to keep these models
efficiently managed and optimized.
• Accelerating the transition will require
us to build clouds that match or exceed
existing application SLAs for
performance, security, and reliability.
© 2012 Unisys Corporation. All rights reserved.
22
But Barriers to Adoption still Exist…
So correctly engineering your cloud is critical to success
IDC Cloud Computing Survey
Success Criteria
• Cloud benefits are clearly
recognized, but….
• Cloud infrastructures need to
demonstrate proven RAS
characteristics
• In today’s world, most
applications expect to operate
with Mission Critical SLAs
• Costs in the Public Cloud
environment remain a concern.
• And most importantly,
accountability for applications
(Performance, RAS) in the cloud
remains an IT responsibility.
© 2012 Unisys Corporation. All rights reserved.
23
Market Trends & Business Implications
Cloud Computing Trends Coming to the Forefront in 2012
Rapidly increasing adoption of cloud services and technologies are changing the nature of Data
Center infrastructure, governance and economics – reducing costs and increasing flexibility
2012 Focus Areas
Use of SaaS
beyond “Cloud
Basics”
Private Clouds
raising importance
of Virtualization
Preparing for
management of
Hybrid Cloud
Environments
Key Considerations
Challenge/Opportunity
Exploring more strategic SaaS solutions –
Organizations are more broadly adopting SaaS in
vertical industry functions and IT management
How and where to adopt
SaaS beyond e-mail and
collaboration basics.
SaaS will account for 26% of the total packaged software
market in 2016 1
Virtualization as foundation for Private Cloud Private cloud success relies on upfront virtualization
& storage rationalization
How to prepare for hybrid
cloud through virtualization
and private cloud
initiatives.
80% of enterprises reported that consolidation and broad
use of server virtualization were high or critical priorities 2
Planning for Hybrid deployment models – In the
Data Center of the Future, boundaries will blur
between cloud & existing systems
How to manage assets in
an integrated way regardless of deployment
model.
61% of organizations report that hybrid cloud will be part
of their strategy 3
1. Forrester , 2. Forrester , 3. FutureCloudComputing.net
© 2012 Unisys Corporation. All rights reserved.
24
The Unisys Hybrid Enterprise Strategy
A holistic approach to leveraging Cloud Computing
technologies across the enterprise
Applications
Internal
Data
Centers
Internal
Private
Clouds
Traditional
Hosted
Private
Clouds
Cloud
Public
Clouds
Outsourced
Data
Centers
Data Centers
Traditional
Single Management View
Achieving efficiency across applications requires
a variety of infrastructure approaches and a
consistent management model
Management
A holistic approach requires us to
examine all three tiers of the IT estate
• A robust Cloud model must take into account that “Virtual Datacenters” will be a mix of
traditional IT models and cloud models
• Extracting maximum value from cloud technology requires us to look at not just data center
impacts, but also applications & IT management considerations
© 2012 Unisys Corporation. All rights reserved.
25
The Unisys Hybrid Enterprise Vision
Borderless, Virtual, Automated, Visible and Secure
Financial Management
Internal
Data
Centers
Service Management
Policy & Governance
NETWORK
NETWORK
NETWORK
Workload
Workload
Workload
Internal
Private
Clouds
Hosted
Private
Clouds
Public
Clouds
Static & Dynamic
Workload Allocation to
Optimal Infrastructure
Outsourced
Data
Centers
“Single Pane of Glass”
Management for both
Cloud & Non-Cloud
Integrated Enterprise Management Environment
Security & Risk
Reduced, Optimized
Data Center Footprint
Monitoring & Event Management
Key Attributes
Applications
• Workloads are balanced automatically and
run on the most suitable infrastructure
Data Centers
• Cloud architectures reduce the need for
excess data center capacity
• Automation and self provisioning improve
• Workload attributes are tracked to maintain
services and reduce labor costs
optimal performance through applications and
•
Policy Management ensures controls,
infrastructure changes
performance and cost are balanced
Management
• One integrated IT management environment
provides a comprehensive view across all
infrastructure
• Self-service interfaces and proactive security
mechanisms allow for rapid change to both onsite
and cloud resources to optimize cost, compliance,
security and performance.
© 2012 Unisys Corporation. All rights reserved.
26
Our Cloud Portfolio is Comprehensive
We differentiate based on our Mission Critical capabilities
Cloud Managed Services
Virtual
Desktop
Hosted
Private
Clouds
IaaS
Cloud Professional Services
Cloud Management Software
CloudBuild methodology
PaaS
Cloud
• Our Unisys Cloud is a
semipublic cloud offering
delivering IaaS and PaaS for
our ITO customer base.
• Virtual Desktop Infrastructure
offers innovative solutions to
ITO customers to lower their
cost of operations.
Management
Financial
Architecture
Security
Storage
Network
ITIL/ITSM
Support
Services
• CloudBuild is differentiated by its
comprehensive approach.
• Fully-featured cloud operations
approach addressing all eight
aspects required to integrate
cloud inside a data center.
• Pre-integrated, private cloud
solution transforms operations
into an agile, efficient and
automated infrastructure.
• Modular design allows clients
to integrate automated, selfservice capabilities.
Keeping pace in the evolving cloud market requires ongoing innovation to drive differentiation.
Our focus is to ensure our cloud offerings support our client’s mission-critical IT requirements.
© 2012 Unisys Corporation. All rights reserved.
27
Social Computing
Enterprise Significance & 2012 Predictions
Beyond digital marketing, social computing is an important strategic platform for
increasing workplace collaboration and knowledge management
Enterprise Significance
Social Computing
Social computing is a strategic platform for modernizing
enterprise applications to connect collaboration with
business processes.
The benefit? Tangible productivity gains and customer
value
2012 Predictions
Organizations will socially enable client-facing channels
and contact points to gain greater connection to
consumers, improve service and client loyalty
Social technologies will be integrated into the fabric of
applications in customer relationship management, case
management, and exception handling
© 2012 Unisys Corporation. All rights reserved.
28
The New Socially-Connected Enterprise
The Emerging Enterprise Social Layer
Moving beyond hierarchical and formal connections, companies are re-wiring their
organizations not only to create an empowered, dynamic, and networked
workforce, but also to more deeply engage with their customers …
The key business drivers are:
• Consumerization of IT: Consumers and citizens are identifying with the Social
Computing paradigm as their preferred method of communication
• Knowledge & Collaboration: Organizations are seeking to establish new and highly
effective human connections across their geographically dispersed and mobile workforce
• Customer Engagement: Customers are demanding more personalized, interactive and
transparent engagement, overt participation, and better service and support
• Enabling Enterprise Applications: Organizations are optimizing business processes
and transactions and modernizing their applications to meet new workforce demands
Pervasive Social Computing is creating a new “Enterprise Social Layer”: Redefining how we
collaborate with colleagues, prospective and existing customers, and business partners
© 2012 Unisys Corporation. All rights reserved.
29
Social Computing Trends
An emerging facet of modern application design and delivery
As social computing is changing the realm of possibilities for business interactions, it is also
changing the nature of how developers design and deliver enterprise software
Gartner Application Development Agenda
Key Observations
• Socially driven processes are disrupting
traditional approaches to business
• Social techniques and tools allow people
to connect and interact with
unprecedented speed and ease as
business gets social
• Within IT, social computing is becoming a
key part of the application development
agenda
• Enterprise applications are tapping into
social computing techniques to deliver a
new paradigm for collaboration
Future applications and services will be built upon innovative combinations of cloud, mobile and
social technologies, and will become ever more difficult to maintain as platforms continue to shift
© 2012 Unisys Corporation. All rights reserved.
30
Market Trends & Business Implications
Social Computing Trends Coming to the Forefront in 2012
Advances in social computing technology are changing the fabric of communication and information
sharing with employees, customers and partners – creating a new wave of corporate productivity
2012 Focus Areas
Social enablement
of enterprise
applications
& processes
Use of social
computing to drive
enterprise-wide
Collaboration
Enriched
customer
engagement
through social
channels
Key Considerations
Embedding into Enterprise Applications &
Processes – Social platforms increasingly
integrated with enterprise applications.
Today 59% of organizations are planning or implementing
enterprise social platforms 1
Worker Productivity & Knowledge Management
– Rapidly becoming a new paradigm for
collaboration due to increasingly mobile workforce
In North America, remote and mobile work is becoming
the norm as two-thirds of the workforce works remotely 2
Collaborative Customer Engagement and
Participation – Use of social computing to enable
overt customer participation and ownership
Social CRM is the hottest trend in CRM which is growing
at over 50% annually. 3
Challenge/Opportunity
How to social-enable
applications to improve
processes and
streamline efficiencies
How to deploy
enterprise-wide for
enhanced productivity
and innovation
How to engage
customers across sales
and service channels
1 – Forrester, 2 – Gartner, 3 - Gartner
Organizations are making social networks part of their application fabric by integrating them with
their internal business processes, transactional systems and information repositories
© 2012 Unisys Corporation. All rights reserved.
31
Unisys Perspective & Recommendations
Strategic Recommendations for Social Computing
Our set of strategic recommendations help clients progress along the continuum of social
computing scenarios in a measured approach with increasing levels of business impact
Strategy
Development
Go beyond digital marketing and think of social computing as a new
paradigm for enterprise collaboration and as a “next generation”
enabler for application modernization
Target “horizontal” functions such as strategic knowledge
management, innovation, and customer relationship management
to deliver relevant and contextual information to end users
Target “vertical” functions such as client-facing transactional
applications to add collaborative functionality to cut cycle-time for adhoc processes such as exception handling
Social-Enabling
Mission Critical
Applications
Start exploring modernization and integration opportunities between
business applications and enterprise social computing platforms to
automate ad-hoc, workflow processes
Target “horizontals” such as KM and innovation and “verticals” such as transactional
business applications - with social computing as an application modernization enabler
© 2012 Unisys Corporation. All rights reserved.
32
Implementing the Enterprise “Social Layer”…
A phased approach for social computing maturity
Social computing is increasingly becoming embedded into the overall enterprise application fabric –
offering productivity gains across line of business applications and changing the way we collaborate
1
Develop a comprehensive Social
Computing Strategy
• Identify opportunity areas for social
enablement
• Develop a comprehensive roadmap
• Start with an enterprise platform
• Explore integration opportunities with
business applications
2
3
Implement an Enterprise Social
Platform for Customer Engagement
and Employee Collaboration
• Enhance strategic communities on top of
Knowledge Management initiatives
• Leverage Social Computing for open
innovation to source ideas
• Enhance client-interactions beyond marketing
to improve customer engagement
• Extract business insights via Social Analytics
Social-Enable Transactional Business
Applications (Vertical Applications)
• Identify applications that may benefit from
social-enablement
• Candidate apps typically require manual
processes or frequent collaboration
• Key areas include case management,
exception handling and customer service
Social-Enabling
Mission Critical
Applications
Unisys Social Computing
Advisory Services
Unisys Social Computing
Implementation Services
Unisys Social Computing
Modernization Services
© 2012 Unisys Corporation. All rights reserved.
33
Unisys Strategy & Solutions
Our Strategy and Focus
Our Social Computing Strategy is to help our customers leverage social technology for enterprise
application modernization and for collaborative suites for internal and customer-facing scenarios
Core Focus Areas
Next Generation
Knowledge Mgmt
& Collaboration
Customer
Engagement
Social-Enabling
Mission Critical
Applications
Identification and
Prioritization of
Opportunities
Implementation
Services
Workplace Collaboration,
Knowledge Management,
and Customer Engagement
Social
Computing
Identification and
Prioritization of
Opportunities
Advisory
Services
Social
Computing
Innovation
Workshop
Social
Computing
Social
Computing
Service Offerings
Modernization
Services
Integration with
Enterprise Applications
and Processes
Core Competencies and Differentiation
Enterprise Collaboration Expertise
Enterprise Application Modernization and Outsourcing
Enterprise Security
Unisys Social Computing Services provide enterprise-grade social collaboration solutions to
modernize mission-critical applications and processes
© 2012 Unisys Corporation. All rights reserved.
34
Unisys Disruptive IT Trends
Informational Resource for CIOs and Business Leaders
The Disruptive IT Trends web site provides in-depth information and insights related to the six
Disruptive Trends with Unisys and third-party perspectives, research and recommendations
• Significance of the Trends
for CIOs & Business
Leaders
• Strategic Point of View
Whitepapers
• Business Implications,
Challenges & Opportunities
• Market & Analyst Facts
• In-depth Trend Research
• Unisys & Third-Party
Perspectives
• Blogs & Multi-Media
http://www.DisruptiveITTrends.com
• Unisys Solutions & Case
Studies
© 2012 Unisys Corporation. All rights reserved.
35
Thank You
© 2012 Unisys Corporation. All rights reserved.
36