The UNITE 2024 Conference will be held February 27th through March 7th 2024, with sessions on Tuesday through Thursday of each week. This virtual conference opens Tuesday, February 27th at 10:30 a.m. (U.S. Eastern Standard Time) with the Welcome and Conference Overview, to introduce our virtual conference. The focus of the conference is Secure and Efficient Cloud Solutions with Unisys ClearPath.

We will explore the substantial improvements and capabilities available from Unisys and its partners to assist in meeting the challenges we are all facing with new technologies, new business requirements, and changes resulting from the recent pandemic. 

Additional details on the conference agenda, schedule, and description for each session will be available through the on-line UNITE Agenda System, which replaces the paper documents (Agenda, Conference at a Glance, and Session Evaluation form) used at previous in-person conferences.

UNITE has scheduled a number of sessions from both Unisys and outside speakers on current and trending topics that should be of interest to a majority of attendees. We refer to these as General Interest Sessions.

Please note that the sessions listed on this page are not all of the sessions to be presented at the conference. These are representative of the topics that will be featured at the conference and that UNITE believes will be of interest to most attendees. If there is a topic that you would like to see at a future conference, please send an email to conf.plan@unite.org and ask about it. It may already be planned.


Opening General Session

The opening general session will be held on Tuesday, February 27th at 11:00a.m. Eastern Standard Time. This presentation is shown on the Agenda as session 6518, ClearPath Product Roadmap and Strategy.

Chuck Lefebvre, Vice President, Solution Management, Enterprise Computing, Unisys Corporation will cover the overall ClearPath product roadmap and strategy, for OS 2200 / Dorado, MCP / Libra, and our cross-platform software products such as AB Suite, Data Exchange and ePortal.

Chuck Lefebvre, Vice President, Solution Management, Enterprise Computing

Chuck is a long term Unisys associate, with varying roles from product support, product development and now in product / solution management for ClearPath products. For the past 7 years he has lead the ClearPath Solution Management team, responsible for setting the direction and investment priorities for the ClearPath program..

His team maintains and publishes the product strategy and roadmap for the ClearPath portfolio. Products in their portfolio include: MCP / Libra Systems and Software, OS 2200 / Dorado Systems and Software, AB Suite, BIS, ePortal, Data Exchange, storage integration for these systems, and all enabling software for this ClearPath Forward portfolio. They are also responsible for relationships with partners providing products and services for the portfolio. Chuck is based in Eagan, MN, USA.

Management (MTP) and General Interest Sessions

These sessions should be of interest and value to all attendees:

6497 - Optimization After MCP Virtualization

Post-virtualization has come with numerous benefits to reflect on and take pride in as we continue to strive towards achieving the highest levels of system performance. Since going virtual in 2021, we are excited to share the path, progress, and improvements we have made to optimize our environment.

As we now approach our third full year since moving the MCP into a virtualized environment, we continue to explore new ways and features to improve performance and utilize the potential we have at our disposal. This includes the implementation of real-time disaster recovery and backup software, as well as our continuous efforts to keep the entire system current and optimized with the latest updates and firmware.

As we continue to grow and maximize the capabilities of our environment to offer the highest standard of service, reliability, and security to our membership, we look forward to the challenges and successes we can share for years to come.

6454 - Planning for Post Quantum Encryption

Practical quantum computers are on the horizon and the industry is buzzing about how their arrival will revolutionize everything from logistics to the development of pharmaceuticals. However, their availability also introduces new threats and risks.

Malicious actors will be seeking to use quantum computers for unscrupulous purposes. In their hands, quantum computers pose a serious threat to data security, and they are already acting in anticipation.

In this session you'll learn about the Quantum Threat and how to begin preparing your organization to defend against it.

6534 - How and Why Hackers Hack and How To Best Defend

Attend this presentation given by 35-year cybersecurity veteran, Roger A. Grimes, author of 14 books and over 1,300 articles on computer security, to learn why hackers hack and how they hack. Roger will discuss their motivations and discuss how today's real-world mix of malware and human-directed sophisticated attacks, like ransomware, happen.

The presentation will include a previously recorded video demonstration by world-renowned hacker Kevin Mitnick, getting around multifactor authentication like it wasn't even there. It's an attack that would work against over 90% of today's multifactor solutions.

Most importantly, learn the four best computer security practices, that if you do well, will significantly lower your risk of being a cyber victim. This is an entertaining, informative, and practical talk that will help make you a better cybersecurity defender.

6438 - Machine Learning Systems for Cybersecurity: a primer to design, develop, and deploy

The impact of Artificial Intelligence (AI) and Machine Learning (ML) on cybersecurity is significant and growing. However, the sheer pace of innovation and progress in these fields can easily frustrate even experienced developers and product managers who wish to evaluate the applicability of new techniques to their problems. In this talk, we first sort through the buzzwords and noise from a problem-solving perspective. We then aim to offer some practical advice for designing, developing, and deploying ML systems, based on our experience with various cybersecurity solutions at Fortra. We supplement our analysis with concrete examples for Email security and Managed Detection and Response (MDR) applications. As you could surely anticipate, we conclude by making some predictions with reference to generative AI.

6577 How to Avoid Cyber Attacks

The speaker will discuss prevalent and current cyber incidents including:
• Ransomware
• Phishing
• Email compromise
• Day zero software bugs
• plus other exploits.


He will identify and discuss:
• The types of security breaches;
• Targeting techniques used on companies/organizations and on individuals;
• Social engineering approaches; and
• Available FBI Cyber tools and services.

He will also review legal mitigation procedures and the best practices to avoid becoming a target and victim either individually or as an organization.

6489 - Unisys ClearPath Managed Services: Navigate the Future with Seamless Operations

In this session, we will explore how the synergy between ClearPath solutions, and our comprehensive Managed Services, creates an unparalleled roadmap for organizations seeking seamless, secure, and efficient operations in the digital era.

Tailored for Your Business:

Every business is unique, and our presentation will showcase how ClearPath Managed Services can be tailored to meet the specific needs of your organization. From scalability to customization, our capabilities can empower you to align your IT strategy with your business goals.

Efficiency Redefined:

We will also illustrate the unmatched efficiency delivered by ClearPath Managed Services in a cloud environment. Explore how our comprehensive management approach streamlines knowledge transition, enhances infrastructure reliability, and optimizes resource utilization.

Navigating the Cloud:

The cloud can be intricate, but with ClearPath Managed Services, we simplify the journey. Gain insights into how our services provide expert navigation through the cloud landscape, ensuring a smooth migration, optimal deployment, and ongoing support for your ClearPath environment.

6526 - CISA - Your official source of Cybersecurity Alerts and Vulnerability Management

The Cybersecurity and Infrastructure Security Agency (CISA) is America's Cyber Defense Agency. This session will explore the many types and frequency of Alerts and Advisories, various Training options, process and procedure guidance Documentation, recommended security Frameworks, information on Ransomware and defenses, activities of State Actors, and the capability to request and receive help.

CISA is the department of US Homeland Security that is responsible for tracking and distributing information on Cyber Threats to America's networks, infrastructure, governments, businesses, schools, and all other organizations. CISA works with various security departments of public and private organizations within the USA including the FBI and NSA. CISA also works with and publishes joint alerts and advisories with certain allied foreign Cybersecurity Agencies.

We will review certain email alerts and advisories, published ransomware threats, mitigation processes and techniques, some of the training available, and discuss paths to report Cyber Issues and get help.

6761 - Enhance Your Business Services with Effective Monitoring, Analytics, and Security

Enterprise business services are delivered and supported by complex layers of enterprise servers like ClearPath MCP and OS 2200s, application servers and network servers of various types, and virtualized environments including on-premise and cloud deployed elements. All of these are bound together with networks and their various supporting components.

Securing and protecting these enterprise business-process assets requires integrated, comprehensive, real-time data collection and monitoring, as well as advanced predictive analytics with anomaly detection and alerting that are supported by machine learning to recognize irregular patterns and feed root cause analysis.  These capabilities must also be supported by robust protection of all data, all processing results, and analytical results with encryption and a zero trust architecture.

This session will explore the techniques and value of monitoring and analysis provided through:

  • Establishing baseline behaviors in capacity consumption, internal platform traffic and network interface traffic
  • Extending real time data collection and analysis to IOT and OT devices in the enterprise
  • Detecting unusual behavior in processing, in capacity used, and network traffic
  • Applying predictive analytics and root-cause analysis of observed anomalies
  • Monitoring primary storage processor traffic and air-gaped backup storage processor traffic
  • Alerting of unusual behaviors through integrated analytical tools and to any enterprise services management facility
  • Delivering status and alerts through a single dashboard with drill-down functionality.

OS 2200 Sessions

These sessions should be of interest to attendees oriented towards OS 2200 systems. You should also consider the General and MTP sessions identified above. In particular consider sessions:

6438 - "Machine Learning Systems for Cybersecurity: a primer to design, develop, and deploy",

6454 - "Planning for Post Quantum Encryption" are of value for any ClearPath environment and

6761 - "Enhance Your Business Services with Effective Monitoring, Analytics, and Security".

NOTE that sessions not showing a session number are awaiting final abstracts to complete scheduling.

6470 – OS 2200 Release 20 New Features Detail / OS 2200 Hardware and Software Update including CSS

Join this informative session for detailed information on the latest releases for OS 2200 and Dorado systems.

  • OS 2200 Software Release 20.0
  • OS 2200 Software Series Release 3.0
  • Dorado Hardware Update

6569 Cyber Recovery for Unisys Environments

We are excited to introduce you to the Unisys Cyber Resiliency solutions. These solutions provide an automated cyber resiliency capability that will allow you to recover your environment in the event of a cyber-attack.

This session is for both our 2200 and MCP clients.

Your organization should attend this session to learn how to customize your environment so you can recover from a cyber-attack quickly. The topics include:

  • How do you ensure your data is validated to be free from malware?
  • What data and files do you need to conduct a recovery operation?
  • How do you ensure your data survives a cyber-attack, allowing you the ability to recover?
  • How do you train your team to perform the recovery?

6462 – OS 2200 Clinic

Take advantage of this exceptional opportunity to ask questions of the Unisys ClearPath OS 2200 Engineering team as well as share your OS 2200 experience. The clinic is an open forum so come prepared to engage in learning more about your OS 2200 system.

OS 2200 ClearPath Software Series - User Experiences

This session will provide discussion of User Experiences with OS 2200 ClearPath Software Series.


MCP Sessions

These sessions should be of interest to attendees oriented towards MCP systems. You should also consider the General and MTP sessions detailed above. In particular consider sessions:

6438 - "Machine Learning Systems for Cybersecurity: a primer to design, develop, and deploy",

6454 - "Planning for Post Quantum Encryption" are of value for any ClearPath environment and

6761 - "Enhance Your Business Services with Effective Monitoring, Analytics, and Security".

NOTE that sessions not showing a session number are awaiting final abstracts to complete scheduling.

6745 ClearPath Forward® Libra Systems and Software Series for MCP Update

This session will include an update on the newest generation of the integrated Intel® x64 based Libra systems: the ClearPath Forward® Libra 4600, 6600, and 8600 series of integrated platforms, and will also cover the latest enhancements for ClearPath Forward Software Series for MCP.

6569 Cyber Recovery for Unisys Environments

We are excited to introduce you to the Unisys Cyber Resiliency solutions. These solutions provide an automated cyber resiliency capability that will allow you to recover your environment in the event of a cyber-attack.

This session is for both our 2200 and MCP clients.

Your organization should attend this session to learn how to customize your environment so you can recover from a cyber-attack quickly. The topics include:

  • How do you ensure your data is validated to be free from malware?
  • What data and files do you need to conduct a recovery operation?
  • How do you ensure your data survives a cyber-attack, allowing you the ability to recover?
  • How do you train your team to perform the recovery?

6446 – ClearPath MCP Security Update and Overview

This talk will present an overview of ClearPath MCP security - concentrating on security features of the MCP 21.0 release as well as include general topics and best practices about platforms (Libra and CSS). This talk will conclude with a look ahead at the future, with industry drivers of MCP security features and influences (MFA, Supply Chain attestation, Artificial Intelligence, and others).

6753 Understanding Unisys MCP Computing Models - Fixed vs Metering vs Consumption

Unisys provides a variety of ways to license capacity for running your company's workloads. This presentation will compare and contrast the various implementations in the MCP environment by looking at the three main types:

  • Fixed: Fixed capacity systems and systems with limited adjustable levels of capacity-on-demand
  • Metering: RPM-Seconds (or MIPS-Months) tracking and monthly billing
  • Consumption: Cloud-Value-Unit (CVU) calculation and monthly billing

Measuring and monitoring the systems resources consumed by the various workloads processed by the MCP system is important in managing capacity consumption, predicting future capacity requirements, accounting for consumption costs, and validating potential billing depending on the consumption model in use.

6622 MCP Clinic

Take advantage of this exceptional opportunity to ask questions of the Unisys ClearPath MCP Engineering team as well as share your MCP experience. The clinic is an open forum so come prepared to engage in learning more about your MCP system.


AB Suite Sessions

These sessions should be of interest to attendees oriented towards AB Suite. NOTE that sessions not showing a session number are awaiting final abstracts to complete scheduling.

6585 AB Suite Product and Strategy Update

A staple for any UNITE conference is the AB Suite Product and Strategy update, and this year is no exception. The AB Suite Product Manager will tell you all about the status of the AB Suite program, an overview of all new features of the most recent release and plans for future releases.

6788 AB Suite and Azure DevOps – Source Control and Much More

Do you want to really take advantage of the “Agile” in your Agile Business Suite development? AB Suite has been paired with Azure DevOps to provide not only Source Management, but a full spectrum of DevOps capabilities. Whether your organization is comprised of only two part-time developers, or a large staff of end users, architects, programmers, testers, and operations personnel, you can benefit from the integration of AB Suite with Azure DevOps. It’s more than just theory.

This presentation will provide an overview of the DevOps capabilities that are baked in to the AB Suite environment, and give some real world examples of the benefits that can be achieved.

We look forward to seeing you at UNITE 2024!

Last updated: 8 March 2024 08:17 EST (GMT-0500)