Unisys Sets Sites on Global Track and Trace

Rolls out solution aimed at bridging the gap between supply chain security and business effectiveness

  • Secure Supply Chain: Vulnerability assessment, strategic planning and implementation of new processes and technologies for in-transit shipment security, perimeter security, facility access and border crossings, port security, worker and visitor credentialization, identity management, and data integrity and sharing.

  • In-Transit Visibility: Supply chain optimization starts with tracking and tracing — the ability to know what's where at all times and where it has been — and virtual warehousing, which extends visibility beyond organizational walls and allows near real-time in-transit inventory allocation. This also includes data management and analytics for real-time exception handling, automated triggers and early-warning notifications.

  • Anti-Counterfeiting: Prevention (stopping counterfeiting before it happens), detection (finding counterfeits already introduced into the supply chain), and response (triggers and actions when threats are detected or suspected).

  • Asset Tracking: Effective management and utilization of assets requires visibility into asset location.

  • Compliance Management: Changing regulations and big buyer mandates for RFID adoption and vendor performance management have made compliance a top priority, along with international trade management and security.

  • Assessment and Planning: Value assessment and business case development, RFID strategy, pilot design, technical design, and risk and business continuity assessment.

  • Implementation: Design and deployment of track and trace, or RFID-based systems and networks. Implementation emphasizes business process change to help ensure and maximize benefits.

  • Infrastructure Outsourcing: Full management of computing and network technology for maximum operational efficiency, with tight IT security to provide data privacy and integrity.