DEBUG: PAGE=domain, TITLE=View all Vendors,ID=1466,TEMPLATE=vendors
toggle expanded view
VENDORID = -1
VENDOR =
VENDORparam =
Title = View all Vendors
Description =

Search across all vendors:

Unisys - Managed Security Services

Vendor Analysis

by Mike Smart

published on May 10, 2018

Access to this report is restricted to logged in clients with access. Login to get full access

Report Overview:

This NelsonHall vendor assessment analyzes Unisys' offerings and capabilities in Managed Security Services.

Who is this Report for:

NelsonHall’s Managed Security Services profile on Unisys is a comprehensive assessment of Unisys’ offerings and capabilities designed for:

  • Sourcing managers monitoring the capabilities of existing suppliers of managed security services and identifying vendor suitability for security services RFPs
  • Vendor marketing, sales, and business managers looking to benchmark themselves against their peers
  • Financial analysts and investors specializing in the IT services sector.

Scope of this Report:

security services offerings and capabilities, and market and financial strengths, including:

  • Identification of the company’s strategy, emphasis, and new developments
  • Analysis of the company’s strengths, weaknesses, and outlook
  • Revenue estimates
  • Analysis of the profile of the company’s customer base including the company’s targeting strategy and examples of current contracts
  • Analysis of the company’s offerings and key service components
  • Analysis of the company’s delivery organization including the location of delivery locations.

Key Findings & Highlights:

This NelsonHall vendor assessment analyzes Unisys’ offerings and capabilities in managed security services.

Unisys has a long history in both cybersecurity and physical security services, particularly around identity management services (for establishments such as airports and ports, and defense and intelligence agencies). Across its security offerings, Unisys is aiming to help clients in operationalizing security.

Login to get full access:

close