Your Text here                         Your Text here



Shahar Geiger Maor
  VP & Senior Analyst
     shahar@stki.info

V...
Agenda
                                                                                                  Information
1   I...
Information Security
                                                                                                     ...
Information

Security/Privacy In the News                                                                                 ...
Information

                               Security Trends                                                               ...
Information

                            Security Trends                                                                  ...
Information
     Technologies Categorization 2009                                                                         ...
Information

                    STKI Madad 2008-2009
                                                                    ...
Information

Sophisticated Threat Environment                                                                             ...
Information

               Application Security                                                                          ...
Information

Web Applications - Vulnerabilities                                                                           ...
Information

   Web Applications -Vulnerabilities                                                                         ...
Information
                           Web Application Firewall                                                           ...
Information
                           Web Application Firewall                                                           ...
Application Security                                                                                                Inform...
Information

     Network Access Control                                                                                  ...
Information

                          NAC Insights                                                                       ...
Information

                           STKI Israeli Positioning
                                                         ...
NAC                                                                       Information
                                    ...
Information

Endpoint Security                                                                                            ...
Information

Endpoint Security -Threats                                                                                   ...
Information

          Endpoint Security -Protection                                                                      ...
Information

          Endpoint Security -Protection                                                                      ...
Information

          Endpoint Security -Protection                                                                      ...
Anti -X Suites                                                                                                      Inform...
Data Centric Security                                                                                                     ...
Data Centric
         Data Centric Approach                                                                               ...
Data Centric

Data Centric Security Arena                                                                                 ...
Data Centric

Data Leak/Loss Prevention                                                                                   ...
Data Centric

    Data Leak /Loss Prevention                                                                              ...
Data Centric

      DLP –Market Status & Players                                                                          ...
Data Centric

    DLP –Market Status                                                                                      ...
Data Centric
                DLP - Israeli Market Positioning 1Q09                                                        ...
Data Centric

  ERM
                                                                                                      ...
Applications and File Formats                                                                                   Data Centr...
Data Centric

ERM –How Does it Work?
                                                                                     ...
Data Centric

    ERM -Israeli Market Players                                                                             ...
Data Centric
                                                                                                             ...
Data Centric
                                                                                                             ...
Data Centric
                                                                                                             ...
Data Centric
                                                                                                             ...
SIEM/SOC                              SIEM/SOC




    Your Text here   Your Text here




                               ...
SIEM/SOC                                                                              SIEM/SOC




 What is SIEM?
   • Se...
Silos of Redundant Information                                                                                            ...
An Enterprise Platform for Compliance                                                                                     ...
SIEM/SOC                                                                        SIEM/SOC

                        - Israel...
Next Generation SIEM/SOC: MSS
                                                                                            ...
SIEM/SOC
               MSS Trends in Israel                                                                              ...
SIEM/SOC
                       MSS –World Leaders                                                                        ...
Identity & Access Management (IDM/IAM)
                                                                                   ...
IDM Global Mega Trends                                                                                                IDM/...
Trends in the Israeli Market                                                                                             I...
IAM/IDM                                                                                               IDM/IAM

           ...
IDM/IAM
 Key Success Factors for Future IDM Project


Consider IDM also as a business project, rather
 than a pure IT pro...
Information
          Security Consultants                                                                                ...
Information
          Security Integrators                                                                                ...
Information
          Security Distributors                                                                               ...
Agenda
                                                                                                  Information
1   I...
Networking                                                                                                                ...
Networking
        Networking Future Trends                                                                               ...
Technologies Categorization 2009                                                                                          ...
Networking
Year of savings and productivity                                                                               ...
Networking
                     STKI Madad 2008-9                                                                         ...
Local Area Network Trends
                                                                                                ...
LAN                                                                      Networking
                                      ...
Networking
The Nortel Crisis                                                                                              ...
The Nortel Crisis –What’s next?
                                                                                          ...
The Nortel Crisis                                                                                                         ...
Networking

                             WAN Optimization                                                                 ...
WAN Optimization                                                                                          Networking
     ...
Networking
                       Voice Over IP (VOIP)                                                                    ...
VOIP (Enterprise & Call Centers)                                                                                        Ne...
Networking
                                  Video Over IP                                                                ...
Networking
Video Over IP Map                                                                                              ...
Networking
   Unified Communications (UC)                                                                                 ...
Networking
                                UC Challenges                                                                  ...
Networking
                       UC Preferred Choice                                                                     ...
Networking Integrators                                                                                              Networ...
Agenda
                                                                                                  Information
1   I...
Green IT




Small, incremental changes
compounded many times can
mean big savings for
large-scale Text here
             ...
Green IT
So, How Can I Be More Green?                                                                                     ...
STKI Madad 2008-9                                                                                           Green IT
     ...
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Upcoming SlideShare
Loading in...5
×

Infrastructure Services Market 2009

1,619

Published on

Presentation by Shahar Maor about the Infrastructure Services Market in Israel 2009

Published in: Technology
0 Comments
7 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,619
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
7
Embeds 0
No embeds

No notes for slide

Transcript of "Infrastructure Services Market 2009"

  1. 1. Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info Visit My Blog: http://shaharmaor.blogspot.com/ 1
  2. 2. Agenda Information 1 Information Security Security Communication 2 Networking Networking Your Text here Your Text here Green IT 3 Green IT Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  3. 3. Information Security Information Security GRC and Security market size (Ms of $) 2008 2009 Your Text here 2010 Your Text here Governance & Risk Management 35.0 42% 50.0 50% 75.0 (also BCP) 95.0 -10.53% 85.0 11.76% 95.0 Security (projects) 90.0 -5.56% 85.0 -5.88% 80.0 Security (Software) 220 0% 220 14% 250 Total Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
  4. 4. Information Security/Privacy In the News Security -Trends Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
  5. 5. Information Security Trends Security -Trends Cloud Outsourcing cyber crime Virtualization computing Sensitive or Inability to properly confidential identify and Your Text here Your Text here information may authenticate users not be properly to multiple systems End-user’s protected organization is External threat of unable to control organized cyber the data criminal syndicates management Unauthorized environment Third parties might parties might be be able to access able to access private files without private files without authorization authorization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
  6. 6. Information Security Trends Security -Trends Data breaches Peer-to-peer file Web 2.0 and involving Mobility personal sharing mesh-ups information Unsupervised Use of P2P monitoring of Your Text here might result in Your Text here Sensitive or employees’ use confidential the loss of Inability to of Web 2.0 information that sensitive or properly applications can ends up in the confidential identify and result in the loss hands of cyber business authenticate of critical remote users criminals and information confidential including trade identity thieves business data secrets on the Internet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  7. 7. Information Technologies Categorization 2009 Security -Trends Business Value Investment to make money Remote Access Cut costs, Increase Manage Sec. IAM/IDM Services IT Project productivity Business SSO Cloud Project App. Anti Your Text here Your Text here Sec. DLP Commodity IT X Size of figure = Mobile EPS SIEM/SOC complexity/ Sec. Services cost of project Vir. DB Network NAC Sec. Sec. Security Investment for regulations GRC Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
  8. 8. Information STKI Madad 2008-2009 Security -Trends Network DLP Hardening Market Players 5% 4% 3% 5% Access GRC 18% 5% Miscellaneous EPS/Anti x 6% Your Text here Your Text here 14% DB Protection NAC WAF & Apps 7% 6% 11% Management Trends 8% 8% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  9. 9. Information Sophisticated Threat Environment Security -Trends First-Stage Second-Stage Writers Middle Men End Value Abusers Abusers Hacker or Fame Tool Writers Direct Attack Compromised Host and Theft Application Malware Machine Extortionist Writers Harvesting DDoS for Hire Botnet Creation Espionage Worms Your Text Information here Spammer Text here Your Harvesting Botnet Extortion Management Viruses Phisher Internal Theft Commercial Abuse of Sales Personal Privilege Pharmer/DNS Information Trojans Poisoning Fraudulent Sales Information Identity Theft Spyware Brokerage Click Fraud Electronic IP Leakage Financial Fraud Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9 Source: Cisco Israel
  10. 10. Information Application Security Security -App. Sec STKI observation: Secure development should be an integral part of any new project and therefore should be calculated within the project’s budget. STKI survey shows that spendings on secure development scale from 0% of total project budget (Main-Frame based projects) up to 10% ( core web applications projects) of total project budget. here Your Text Your Text here Average spending on secure development is 5% of total project budget (including: training, code review and penetration tests) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  11. 11. Information Web Applications - Vulnerabilities Security -App. Sec Probability to detect vulnerabilities of different risk degree (results of 32,717 sites and 69,476 vulnerabilities of different degrees of severity) Your Text here Your Text here % Sites (Scanned) % Sites (Black & Whitebox) % Sites (All) Source: http://www.webappsec.org/projects/statistics/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  12. 12. Information Web Applications -Vulnerabilities Security -App. Sec Vulnerability frequency by types: 1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to system design errors 2. Information Leakage and Predictable Resource Location are often connected with improper system administration (for example, weak access control) Your Text here Your Text here Source: http://www.webappsec.org/projects/statistics/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  13. 13. Information Web Application Firewall Security -App. Sec –Israeli Market Players Applicure - dotDefender (Apache and IIS) Cisco* - ACE XML Gateway Barracuda - Web Application Firewall IBM* –Data Power (fromerly NetContinuum) Your Text here Your Text here Breach Security - WebDefend Microsoft –IAG WAF Citrix - Application Firewall (Formerly Protegrity - Defiance Teros) *Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  14. 14. Information Web Application Firewall Security -App. Sec –Leading Players -1Q09 Solution What Should I Know? Representatives/ Integrators F5 - Application Security One of the best WAFs around. Features a good Trek-IT (Dis.), Manager (ASM) policy toolset for adaptive learning. Offer strong Artnet, integration to the TMOS family of products. Taldor, Spider, Superb load balancing capabilities. One of two Bezeq Int., One Your Text here leading solutions in Israel. Strong market Your Text here NewAge, Netcom presence Imperva – SecureSphere The first in the Israeli market. Imperva has an Comsec (Dis.), array of out-of-the-box policies and attack Netcom, Bynet, signatures as well as superior learning mode . A Taldor, NewAge, leading DB protection solution. Has a significant 012 Smile market share Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
  15. 15. Application Security Information Security -App. Sec –Israeli Players and Positioning -1Q09 Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  16. 16. Information Network Access Control Security -Network Sec Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  17. 17. Information NAC Insights Security -Network Sec NAC has not been “fully digested” by Israeli customers in 2008. There should be more activity in 2009 NAC can be deployed less expensively when it is an embedded feature of an existing vendor and customers take notice here it of Your Text Your Text here Israeli customers first priority: implementing a guest networking control Network Security or Endpoint Security? NAC is a Layer 2 vs. Layer 3 match Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  18. 18. Information STKI Israeli Positioning Security -Network Sec • Not a technological positioning, refers only to Israeli market • Focused on enterprise market (not SMB) Vendor A • Not an STKI recommendation Vendor B  Market Presence (X) Local Support  Market share - existing and new sales (more emphasis)  Mind share (how user organizations rate vendors) Worldwide  Local Support (Y) – is influenced by (X) Leader  Experience & technical knowledge, localization, support, number and kind of integrators  Worldwide leaders marked, based on global positioning  Vendors to watch: Are only just entering israeli market so can’t be positioned but should be watched Vendors to Watch: Vendor C Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
  19. 19. NAC Information Security -Network Sec - Israeli Market Positioning 1Q09 Vendors to Watch: HP Procurve Check Point Microsoft Local Support Cisco Player Symantec Worldwide XOR SWAT Juniper Leader Access Layers Enterasys Leap McAfee ForeScout Insightix Nortel This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  20. 20. Information Endpoint Security Security -EPS Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
  21. 21. Information Endpoint Security -Threats Security -EPS Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
  22. 22. Information Endpoint Security -Protection Security -EPS Organization Outside Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
  23. 23. Information Endpoint Security -Protection Security -EPS Organization Outside Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
  24. 24. Information Endpoint Security -Protection Security -EPS Anti X DLP Organization NAC Outside Your Text here Your Text here Manageability Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
  25. 25. Anti -X Suites Information Security - Israeli Market Positioning 1Q09 (Enterprise Leaders Only) -EPS Symantec Local Support McAfee Player Trend Micro Worldwide Leader Microsoft This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
  26. 26. Data Centric Security Data Centric Security Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
  27. 27. Data Centric Data Centric Approach Security Your Text here Your Text here Build a wall – “perimeter “Business of Security” – Security security” is built into the business process Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  28. 28. Data Centric Data Centric Security Arena Security DLP ERM Database Encryption Protection Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
  29. 29. Data Centric Data Leak/Loss Prevention Security -DLP Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
  30. 30. Data Centric Data Leak /Loss Prevention Security -DLP  DLP is an overall framework into which different elements fit  There are three types of data that may leak: • Data at rest • DataYourtransit in Text here Your Text here • Data on endpoints  No single DLP focus area is full proof, an optimal solution should cover all three areas  DLP is a growing area, and vendors react accordingly Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
  31. 31. Data Centric DLP –Market Status & Players Security -DLP World Leaders (consolidation in progress…): Symantec (Acquired Vontu, 2007, 350$ M) • Websense (Acquired PortAuthority 2007, 90$ M) • Reconnex (Acquired by McAfee, July 2008, 46$ M) • Tablus Text here Your (Acquired by RSA, 2007, 40$ M) • Your Text here Vericept ? Workshare? • Main drivers for DLP are: • Regulations such as Payment Card Industry (PCI), Accountability Act (HIPAA) • e-mail security, instant messaging (IM) and endpoint monitoring solutions Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
  32. 32. Data Centric DLP –Market Status Security -DLP DLP Deployments Status -Israel 1Q09 Solution Deployed 20% Your Text here PlanYour Text here to Deploy “Not Therequot; Yet Soon 60% 20% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
  33. 33. Data Centric DLP - Israeli Market Positioning 1Q09 Security -DLP Vendors to Watch: ProofPoint Workshare IBM (ISS) Local Support Player Worldwide Leader Websense Fast Movement McAfee Verdasys Symantec This analysis should be used with its supporting documents RSA Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
  34. 34. Data Centric ERM Security (Enterprise Rights Management) -ERM Enterprise Rights Management (ERM) technology—also known as Enterprise DRM or Information Rights Management (IRM) What is it? • ERMYour Text hereencrypting files that contain Your Text hereand only entails content allowing those users or devices that have proper credentials to decrypt the files and access the content Awareness of ERM has increased ERM has been growing steadily since it became a technology category unto itself about five years ago Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 34
  35. 35. Applications and File Formats Data Centric Security Used in ERM Implementations -ERM Your Text here Your Text here Source: Gilbane Group Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
  36. 36. Data Centric ERM –How Does it Work? Security -DLP SQL Server 1. New user is authorized to use RMS Active Directory 2. The User defines set of rules and content usage rights for the data he wants to share – He is the data owner 3. User distributes data to relevant recipients RMS Server Your Text here Your Text here 4. When recipient tries to open a file –a request is sent to the RMS Server in 4 1 order to authorize/deny access 5. RMS enforces rules made by the data owner 2 5 3 Data owner Recipient Source: Microsoft Israel Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
  37. 37. Data Centric ERM -Israeli Market Players Security -ERM Microsoft -Rights Management Services EMC- EMC Documentum IRM Product Suite Oracle - Oracle Information Rights Management Adobe –Adobe LifeCycle Rights Management SU: IsraeliYour Text here Your Text here Secure Islands -A provider of an advanced information protection and control (IPC) solution Covertix –Develops innovative software technology to track, monitor and control documents and files within and outside the organization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
  38. 38. Data Centric Security DB Protection –Market Status -DB Protections DB Protection Deployments Status -Israel 1Q09 Leading Israeli Players: “Not Therequot; Yet •Sentrigo 49% •Imperva Plan to •Oracle DB Vault Deploy Soon 30% •Guardium Text here Your Solution Your Text here Deployed 20% DB encryption: OtherDo Not Ged-i (Israeli SU): offers Know 1% high-level encryption to Storage Data Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
  39. 39. Data Centric Security Masking of Production Data -Data Masking Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
  40. 40. Data Centric Security Masking of Production Data -Data Masking  What is it? • The process of data masking is designed to “de-identify” data, such that the data remains based on real information, but no longer has any practical usage or application  What is the need? • The drive to outsource and offshore application development and Your Text here testing work means that organizations will have little control Your Text here over who gets to see their data • Test environments are not physically as secure as production systems  What can go wrong? • Sensitive data might be downloaded to laptops and stolen • Employees might misuse sensitive information and engage in fraudulent activity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
  41. 41. Data Centric Security Masking of Production Data -Data Masking Your Text here Your Text here Source: Securosis.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
  42. 42. SIEM/SOC SIEM/SOC Your Text here Your Text here 42
  43. 43. SIEM/SOC SIEM/SOC  What is SIEM? • Security Information & Event Management  What is SOC? • Security Operation Center  How does it work? • Collects and analyzes all log data and basic event management Your Text here Your Text here • monitors and manages all aspects of enterprise security in real time, from a single, centralized location • The NOC of security  Why do we need it? • Need for real-time awareness of internal/ external threats • Ensure business continuity and comply with regulations • A toolset for improving business logic (Security BI) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 43
  44. 44. Silos of Redundant Information SIEM/SOC Management Your Text here Your Text here Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 44
  45. 45. An Enterprise Platform for Compliance SIEM/SOC and Security Your Text here Your Text here SIEM Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
  46. 46. SIEM/SOC SIEM/SOC - Israeli Market Positioning 1Q09 Vendors to Watch: IBM -MSS TriGeo Local Support Player ArcSight Worldwide Leader EMC Fast Symantec Movement CA IBM Cisco This analysis should be used with its NetIQ supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
  47. 47. Next Generation SIEM/SOC: MSS SIEM/SOC -MSS What does MSS offer? -Comprehensive solution for security management: • Firewall/EP Management Service • Intrusion Detection & Prevention Management Service • Vulnerability Management Service Your Text here Your Text here Why should we go there? • Cost effective! • Use of best-of-breed security Why shouldn’t we? • Who owns my data? • No one else in Israel goes there…yet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
  48. 48. SIEM/SOC MSS Trends in Israel -MSS STKI observation: MSS is well accepted in SMB organizations, but Israeli CISOs in enterprises still strongly oppose this trend The current economic downturn should encourage Your Text here Your Text here some enterprises to reconsider MSS MSS providers addresses the management (CFOs and CEOs) in order to attract new clients Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
  49. 49. SIEM/SOC MSS –World Leaders -MSS Delivery Opportunities in Israel for: •Current world leaders (IBM, Symantec) • local ISPs •Network integrators •Traditional OS players Market Penetration (Source: Frost and Sullivan) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
  50. 50. Identity & Access Management (IDM/IAM) IDM/IAM Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
  51. 51. IDM Global Mega Trends IDM/IAM  Fraud and identity theft will increase strong authentication use  Strong authentication and SSO will strengthen their ties  Context-based authorization will put risk analysis here Your Text into Your Text here access control decisions  Physical and logical security will continue to converge  Federation will slowly grow Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
  52. 52. Trends in the Israeli Market IDM/IAM  Nov 2008: CA acquired Eurekify to enhance its role-based management suite  ERP based SOD solutions start to be seen, mainly for GRC reasons: • 2006: SAP acquired Virsa, enterprise risk management software Your Text here Your Text here provider, to bolster SAP’s software compliance skills • 2008: Oracle acquired Logical Apps, an automated GRC controls, for enterprise applications  Israeli new GRC enforcement Start-Ups: • Xpandion -Risk management and behavioral analyzing software solutions • SPATIQ –provides an automated tool for Entitlement Management Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
  53. 53. IAM/IDM IDM/IAM - Israeli Market Positioning 1Q09 Vendors to Watch: SPATIQ Local Support Player IBM Novell Sun (OS) Worldwide Leader CA Prominent WAM Player BMC Microsoft Oracle Velo (OS) This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
  54. 54. IDM/IAM Key Success Factors for Future IDM Project Consider IDM also as a business project, rather than a pure IT project Make sure the project bridges the gap between business and IT  StartYour Text here easier success (Single Signhere a small for On, Your Text vertical project)  Choose a step-by-step approach, rather than a mastodon implementation. Focus on basic functionalities not on the additional features Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
  55. 55. Information Security Consultants Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
  56. 56. Information Security Integrators Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
  57. 57. Information Security Distributors Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
  58. 58. Agenda Information 1 Information Security Security Communication 2 Networking Networking Your Text here Your Text here Green IT 3 Green IT Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
  59. 59. Networking Networking Networking market size (Ms of $) Your Text here Your Text here 2008 2009 2010 LAN 80.0 -25.00% 60.0 8.33% 65.0 equipment WAN 50.0 -20.00% 40.0 12.50% 45.0 equipment VoIP 40.0 -20.00% 32.0 25.00% 40.0 equipment Totals 170.0 -22.35% 132.0 13.64% 150.0 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
  60. 60. Networking Networking Future Trends Trends Datacenter Networking virtualization Next Generation Networking Internet Protocol (IP) Core and High Speed Broadband Green Networking IPv6 Your Text here Your Text here Network Operating systems Network intelligence and policy control Network Security Communication billing Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
  61. 61. Technologies Categorization 2009 Networking Trends Business Value Investment to make money SAAS/ Cut costs, Increase Cloud IT Project UC productivity Optimization Business Project Billing NGN Your Text here Your Text here VOIP IPv6 Commodity IT Size of figure = Networking Infra. complexity/ Vir. Services Network cost of project Security Investment for regulations Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
  62. 62. Networking Year of savings and productivity Trends What networking technologies are you investing-in to enhance employee productivity and collaboration in 2009? (Answer all that apply) 2009 2008 55% 52% 46% 36% 32% 31% 29% 23% Your Text here Your Text here 19% 13% 11% 9% 8% NA 1% NA Shahar Maor’s work Copyright 2009Source: Goldman Sachsor attribution from any graphic or portion of graphic @STKI Do not remove source Research 62
  63. 63. Networking STKI Madad 2008-9 Trends Optimization 2% Market Players 8% UC VOIP and IPTel 8% 20% Nortel 10% Network Infra Your Text here Your Text here 20% Trends Miscellaneous 10% Network Costs 12% Reduction 10% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
  64. 64. Local Area Network Trends Networking -LAN  Security embedded features in the LAN infra are imperative  Network Virtualization is already here  LAN vendors should support standard-based platforms Your Text here Your Text here  Israeli Trends: Corporate LAN to endpoints is stable: 100 MBIT Ethernet; • Backbone LAN: 2 X 1GBIT (10GBIT in some cases) Israeli enterprise tend to “count on” either Cisco or Nortel for their • backbone network. Other players appear on the network edges Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
  65. 65. LAN Networking -LAN - Israeli Market Positioning 1Q09 Vendors to Watch: Foundry Local Support Cisco Player Nortel Worldwide Leader Enterasys 3COM HP Juniper This analysis should be used with its Alcatel supporting documents Extreme Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
  66. 66. Networking The Nortel Crisis -Nortel From 90K to Feb 08: 30K Nortel says Nortel employees it will cut announces More and 2,100 jobs 1,300 more layoffs… layoffs Nortel says several Your Text here files Nortel Your Text here Nortel executives for bankruptcy Reports to leave in protection Financial 2009 Results for Q3 2008 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
  67. 67. The Nortel Crisis –What’s next? Networking -Nortel Nortel files for Chapter 11 to “deal decisively” with its historic debt burdens Nov 10’th 2008: A Nortel spokesman said the company had enough liquidity to sustain 12 to 18 months of operation under the current conditions Your Text here Your Text here Survival still possible for Nortel, but Companies that exit the bankruptcy process often emerge in smaller form and are frequently acquired in part or whole by larger suitors looking for a good deal 19.2.09: Radware has purchased Nortel’s Alteon… Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
  68. 68. The Nortel Crisis Networking –Israeli Market ”What if” Analysis -Nortel Acquiring parts of Nortel? HP Alliance with Avaya Cisco and Microsoft Acquire Nortel’s Juniper Telephony? Your Text here Your Text here •Enterasys (LAN and sec.) Gores •Siemens (Telephony) Goes deeper into the Alcatel Israeli market? Goes deeper into the 3COM Israeli market? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
  69. 69. Networking WAN Optimization -WAN WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN: VOIP Deployments Data Center Consolidation Your Text here Your Text here 2007 2008 Server Virtualization BCP/DRP 0% 10% 20% 30% 40% 50% 60% 70% 80% Source: Aberdeen Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
  70. 70. WAN Optimization Networking -WAN - Israeli Market Positioning 1Q09 Local Support Expand Player Riverbed F5 Worldwide Leader Cisco Blue Coat Citrix Radware Packeteer* Juniper This analysis should be used with its supporting documents *June 2008: A Blue Coat company Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
  71. 71. Networking Voice Over IP (VOIP) -VOIP STKI observation: Many enterprises are migrating, or planning to migrate, their telephony infrastructure from traditional circuit-switched technology to newer Internet Protocol (IP)-based systems Your Text here Your Text here  Motivations to actually migrate: End of life/end of support for current telephony infrastructure • Moving to a new office/office improvements •  Motivations to wait: “Phones are working” • Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 71
  72. 72. VOIP (Enterprise & Call Centers) Networking -VOIP - Israeli Market Positioning 1Q09 Vendors to Watch: Asterisk Cisco Local Support Player Nortel Worldwide Avaya* Leader Tadiran 3COM This analysis should be used with its Alcatel-Lucent supporting documents *Most CC in the market are Avaya Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 72
  73. 73. Networking Video Over IP –Video OIP  By 2011, 60% of Internet traffic is expected to be video traffic (Cisco)  Global organizations use it as a vital working tool – especially in order to cut travelling costs Your Text here Your Text here  Video technology is considered by many local organizations as mostly “nice to have”  Local organizations use this technology mainly for training/marketing purposes Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
  74. 74. Networking Video Over IP Map –Video OIP Your Text here Your Text here Source: http://www.video-over-ip.com/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
  75. 75. Networking Unified Communications (UC) –UC Why do we need this? Integration: Of any or all communications, collaborative, and business applications Presence: guides users to the most appropriate means of communications Your extends applications and integration here Your Text of Mobility: Text here applications every way you go Productivity: improves business processes Why now? Key drivers today are: Workforce virtualization, Cost reduction, Increasingly available tools, Business improvement opportunities Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
  76. 76. Networking UC Challenges –UC The problem: business justification for collaboration technologies comes down to “soft dollars”: • Productivity • Better Text here Your teamwork Your Text here • Better customer service How do you define “better”? What is its business value to the company? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
  77. 77. Networking UC Preferred Choice –UC 56% Cisco 41% Microsoft 22% Avaya 10% Nortel Alcatel-Lucent Text here 5% Your Your Text here 3% 3Com 2% Nokia-Siemens 4% Newer Vendors 4% Others 9% Unsure 0% 10% 20% 30% 40% 50% 60% Source: Goldman Sachs Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
  78. 78. Networking Integrators Networking - Israeli Market Positioning 1Q09 (Leaders) Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
  79. 79. Agenda Information 1 Information Security Security Communication 2 Networking Networking Your Text here Your Text here Green IT 3 Green IT Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
  80. 80. Green IT Small, incremental changes compounded many times can mean big savings for large-scale Text here organizations Your Your Text here 80
  81. 81. Green IT So, How Can I Be More Green? Trends Secure mobile Virtualized server access to networks, PC management and storage applications, and environments data State of the art Your Text here Your Text here Intelligent archiving Teleconferencing power and cooling (all around) Working Go digital! & environment (car Asset management Printing pool, working from consolidation home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
  82. 82. STKI Madad 2008-9 Green IT Trends (Not Including Printing) PC Energy Management Miscellaneous 9% Trends 12% 38% Market Players Your Text here Your Text here 15% DC Facilities 20% Asset Management 6% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 82

×