IBM Announces A 10-Year Strategic Partnership with UniCredit

IBM Announces A 10-Year Strategic Partnership with UniCredit

IBM Announces a 10-Year Strategic Partnership with UniCredit to Deliver New Services

The multi-billion dollar agreement will enable UniCredit to leverage innovative solutions and Cloud technology, gaining significant levels of efficiency and competitiveness

ARMONK, N.Y. – 18 Jul 2013: IBM (NYSE:IBM) announced today a multi-billion dollar, 10-year agreement to transform the IT infrastructure that supports all of UniCredit’s commercial and private banking activities in Europe. As a result of this transformation, UniCredit will gain dramatic efficiency and flexibility with the introduction of new service models and a cloud-based infrastructure for its data centers. As a result, Unicredit clients would be able to access new and innovative services that meet the growing demand for sophisticated financial services in Europe.

The agreement will include the creation of a joint venture between UniCredit Business Integrated Solutions – the global service company of UniCredit – and IBM, which will have employees in Italy, Germany, Austria, Slovakia, and Czech Republic of both companies. With the combination of leading edge skills applied to the banking industry, the new company is ideally positioned to contribute to reshaping the industry in Europe. As part of the agreement, the company will market and deliver IT infrastructure services not only to UniCredit, but also to other companies and institutions .

Innovation is at the foundation of the partnership between the two companies. IBM and UniCredit will establish a Value Creation Center that will aim to harness innovation to provide superior service and drive success for clients on a continuous basis. The Center will monitor trends in the banking and IT industries and identify emerging disruptive technologies to be rapidly introduced into UniCredit’s infrastructure.

Cloud analytics will make it possible for UniCredit to better predict and understand trading in financial markets, manage spending and provide the most innovative customer solutions.

UniCredit’s innovation-driven approach to sourcing reflects changing motivations in the strategic sourcing marketplace,” said Erich Clementi, senior vice president, IBM Global Technology Services. “When making sourcing decisions, forward thinking organizations like UniCredit are moving beyond basic needs like cost-cutting to higher-order business outcomes such as growth, competitive advantage and, of course, innovation.”

Major organizations which are leaders in the world markets choose to go into partnership with IBM to access superior innovative technologies to acquire necessary capabilities and expertise. According to the IBM Center for Applied Insights study, “Why partnering strategies matter,” involving more than 1,300 business and IT sourcing decision makers worldwide, organizations that have made that shift are outperforming on a host of financial measures, including revenue and gross profit growth.

About IBM Cloud Computing

IBM has helped thousands of clients adopt cloud models and manages millions of cloud based transactions every day. IBM assists clients in areas as diverse as banking, communications, healthcare and government to build their own clouds or securely tap into IBM cloud-based business and infrastructure services. IBM is unique in bringing together key cloud technologies, deep process knowledge, a broad portfolio of cloud solutions, and a network of global delivery centers. For more information about cloud offerings from IBM, visit http://www.ibm.com/smartcloud. Follow us on Twitter at http://www.twitter.com/ibmcloud and on our blog at http://www.thoughtsoncloud.com

IBM

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…