SunGard Offers Cisco Powered IaaS Cloud

SunGard Offers Cisco Powered IaaS Cloud

SunGard Enterprise Cloud Services have met the highest level of achievement for partners delivering Cisco technologies as a managed solution.

The company has been certified as a Cisco Master Managed Services Channel Partner (MSCP) and also received the official designation of a Cisco Cloud Provider to offer Cisco Powered IaaS (Infrastructure-as-a-Service) Cloud.
Cisco now recognizes SunGard, a software and technology services company, as a provider that can deliver exceptional cloud services in a multitenant environment to end customers.

Cisco Master Managed Services Channel Partner program supports partners who sell and deliver managed and cloud services based on Cisco technology.  Following this certification, SunGard’s cloud offering is deployed using a Cisco validated infrastructure.

SunGard’s investment in Cisco Certification ranks it among an elite group of channel partners with the resources to deploy, manage and support services for multiple technologies,” said Edison Peres, senior vice president of worldwide channels at Cisco.

Being part of the global Cisco MSCP and the Cloud Partner program is a great achievement for SunGard and an additional validation of our managed services and cloud offerings,” said Rob Walters, vice president, managed services at SunGard Availability Services. “This official designation will only help to accelerate our already close partnership with Cisco.”

Built on best-in-class Vblock technology from VMware, Cisco and EMC (VCE), SunGard’s Enterprise Cloud Services can deliver managed compute, network, storage and security services that support customer production applications.

These services effectively provide fully managed, end-to-end infrastructure solutions that help customers run their IT operations run in a smooth manner.

SunGard notes that it achieved the coveted Cisco certification following an independent audit of SunGard facilities and SunGard’s managed service Information Technology Infrastructure Library (ITIL) processes, procedures and system approach.

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…