• Like
  • Save
Infrastructure Services  Market 2009
Upcoming SlideShare
Loading in...5
×
 

Infrastructure Services Market 2009

on

  • 3,550 views

Presentation by Shahar Maor about the Infrastructure Services Market in Israel 2009

Presentation by Shahar Maor about the Infrastructure Services Market in Israel 2009

Statistics

Views

Total Views
3,550
Views on SlideShare
3,539
Embed Views
11

Actions

Likes
7
Downloads
0
Comments
0

2 Embeds 11

http://www.slideshare.net 10
http://www.techgig.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Infrastructure Services  Market 2009 Infrastructure Services Market 2009 Presentation Transcript

    • Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info Visit My Blog: http://shaharmaor.blogspot.com/ 1
    • Agenda Information 1 Information Security Security Communication 2 Networking Networking Your Text here Your Text here Green IT 3 Green IT Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
    • Information Security Information Security GRC and Security market size (Ms of $) 2008 2009 Your Text here 2010 Your Text here Governance & Risk Management 35.0 42% 50.0 50% 75.0 (also BCP) 95.0 -10.53% 85.0 11.76% 95.0 Security (projects) 90.0 -5.56% 85.0 -5.88% 80.0 Security (Software) 220 0% 220 14% 250 Total Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
    • Information Security/Privacy In the News Security -Trends Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
    • Information Security Trends Security -Trends Cloud Outsourcing cyber crime Virtualization computing Sensitive or Inability to properly confidential identify and Your Text here Your Text here information may authenticate users not be properly to multiple systems End-user’s protected organization is External threat of unable to control organized cyber the data criminal syndicates management Unauthorized environment Third parties might parties might be be able to access able to access private files without private files without authorization authorization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
    • Information Security Trends Security -Trends Data breaches Peer-to-peer file Web 2.0 and involving Mobility personal sharing mesh-ups information Unsupervised Use of P2P monitoring of Your Text here might result in Your Text here Sensitive or employees’ use confidential the loss of Inability to of Web 2.0 information that sensitive or properly applications can ends up in the confidential identify and result in the loss hands of cyber business authenticate of critical remote users criminals and information confidential including trade identity thieves business data secrets on the Internet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
    • Information Technologies Categorization 2009 Security -Trends Business Value Investment to make money Remote Access Cut costs, Increase Manage Sec. IAM/IDM Services IT Project productivity Business SSO Cloud Project App. Anti Your Text here Your Text here Sec. DLP Commodity IT X Size of figure = Mobile EPS SIEM/SOC complexity/ Sec. Services cost of project Vir. DB Network NAC Sec. Sec. Security Investment for regulations GRC Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
    • Information STKI Madad 2008-2009 Security -Trends Network DLP Hardening Market Players 5% 4% 3% 5% Access GRC 18% 5% Miscellaneous EPS/Anti x 6% Your Text here Your Text here 14% DB Protection NAC WAF & Apps 7% 6% 11% Management Trends 8% 8% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
    • Information Sophisticated Threat Environment Security -Trends First-Stage Second-Stage Writers Middle Men End Value Abusers Abusers Hacker or Fame Tool Writers Direct Attack Compromised Host and Theft Application Malware Machine Extortionist Writers Harvesting DDoS for Hire Botnet Creation Espionage Worms Your Text Information here Spammer Text here Your Harvesting Botnet Extortion Management Viruses Phisher Internal Theft Commercial Abuse of Sales Personal Privilege Pharmer/DNS Information Trojans Poisoning Fraudulent Sales Information Identity Theft Spyware Brokerage Click Fraud Electronic IP Leakage Financial Fraud Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9 Source: Cisco Israel
    • Information Application Security Security -App. Sec STKI observation: Secure development should be an integral part of any new project and therefore should be calculated within the project’s budget. STKI survey shows that spendings on secure development scale from 0% of total project budget (Main-Frame based projects) up to 10% ( core web applications projects) of total project budget. here Your Text Your Text here Average spending on secure development is 5% of total project budget (including: training, code review and penetration tests) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
    • Information Web Applications - Vulnerabilities Security -App. Sec Probability to detect vulnerabilities of different risk degree (results of 32,717 sites and 69,476 vulnerabilities of different degrees of severity) Your Text here Your Text here % Sites (Scanned) % Sites (Black & Whitebox) % Sites (All) Source: http://www.webappsec.org/projects/statistics/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
    • Information Web Applications -Vulnerabilities Security -App. Sec Vulnerability frequency by types: 1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to system design errors 2. Information Leakage and Predictable Resource Location are often connected with improper system administration (for example, weak access control) Your Text here Your Text here Source: http://www.webappsec.org/projects/statistics/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
    • Information Web Application Firewall Security -App. Sec –Israeli Market Players Applicure - dotDefender (Apache and IIS) Cisco* - ACE XML Gateway Barracuda - Web Application Firewall IBM* –Data Power (fromerly NetContinuum) Your Text here Your Text here Breach Security - WebDefend Microsoft –IAG WAF Citrix - Application Firewall (Formerly Protegrity - Defiance Teros) *Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
    • Information Web Application Firewall Security -App. Sec –Leading Players -1Q09 Solution What Should I Know? Representatives/ Integrators F5 - Application Security One of the best WAFs around. Features a good Trek-IT (Dis.), Manager (ASM) policy toolset for adaptive learning. Offer strong Artnet, integration to the TMOS family of products. Taldor, Spider, Superb load balancing capabilities. One of two Bezeq Int., One Your Text here leading solutions in Israel. Strong market Your Text here NewAge, Netcom presence Imperva – SecureSphere The first in the Israeli market. Imperva has an Comsec (Dis.), array of out-of-the-box policies and attack Netcom, Bynet, signatures as well as superior learning mode . A Taldor, NewAge, leading DB protection solution. Has a significant 012 Smile market share Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
    • Application Security Information Security -App. Sec –Israeli Players and Positioning -1Q09 Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
    • Information Network Access Control Security -Network Sec Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
    • Information NAC Insights Security -Network Sec NAC has not been “fully digested” by Israeli customers in 2008. There should be more activity in 2009 NAC can be deployed less expensively when it is an embedded feature of an existing vendor and customers take notice here it of Your Text Your Text here Israeli customers first priority: implementing a guest networking control Network Security or Endpoint Security? NAC is a Layer 2 vs. Layer 3 match Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
    • Information STKI Israeli Positioning Security -Network Sec • Not a technological positioning, refers only to Israeli market • Focused on enterprise market (not SMB) Vendor A • Not an STKI recommendation Vendor B  Market Presence (X) Local Support  Market share - existing and new sales (more emphasis)  Mind share (how user organizations rate vendors) Worldwide  Local Support (Y) – is influenced by (X) Leader  Experience & technical knowledge, localization, support, number and kind of integrators  Worldwide leaders marked, based on global positioning  Vendors to watch: Are only just entering israeli market so can’t be positioned but should be watched Vendors to Watch: Vendor C Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
    • NAC Information Security -Network Sec - Israeli Market Positioning 1Q09 Vendors to Watch: HP Procurve Check Point Microsoft Local Support Cisco Player Symantec Worldwide XOR SWAT Juniper Leader Access Layers Enterasys Leap McAfee ForeScout Insightix Nortel This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
    • Information Endpoint Security Security -EPS Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
    • Information Endpoint Security -Threats Security -EPS Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
    • Information Endpoint Security -Protection Security -EPS Organization Outside Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
    • Information Endpoint Security -Protection Security -EPS Organization Outside Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
    • Information Endpoint Security -Protection Security -EPS Anti X DLP Organization NAC Outside Your Text here Your Text here Manageability Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
    • Anti -X Suites Information Security - Israeli Market Positioning 1Q09 (Enterprise Leaders Only) -EPS Symantec Local Support McAfee Player Trend Micro Worldwide Leader Microsoft This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
    • Data Centric Security Data Centric Security Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
    • Data Centric Data Centric Approach Security Your Text here Your Text here Build a wall – “perimeter “Business of Security” – Security security” is built into the business process Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
    • Data Centric Data Centric Security Arena Security DLP ERM Database Encryption Protection Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
    • Data Centric Data Leak/Loss Prevention Security -DLP Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
    • Data Centric Data Leak /Loss Prevention Security -DLP  DLP is an overall framework into which different elements fit  There are three types of data that may leak: • Data at rest • DataYourtransit in Text here Your Text here • Data on endpoints  No single DLP focus area is full proof, an optimal solution should cover all three areas  DLP is a growing area, and vendors react accordingly Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
    • Data Centric DLP –Market Status & Players Security -DLP World Leaders (consolidation in progress…): Symantec (Acquired Vontu, 2007, 350$ M) • Websense (Acquired PortAuthority 2007, 90$ M) • Reconnex (Acquired by McAfee, July 2008, 46$ M) • Tablus Text here Your (Acquired by RSA, 2007, 40$ M) • Your Text here Vericept ? Workshare? • Main drivers for DLP are: • Regulations such as Payment Card Industry (PCI), Accountability Act (HIPAA) • e-mail security, instant messaging (IM) and endpoint monitoring solutions Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
    • Data Centric DLP –Market Status Security -DLP DLP Deployments Status -Israel 1Q09 Solution Deployed 20% Your Text here PlanYour Text here to Deploy “Not Therequot; Yet Soon 60% 20% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
    • Data Centric DLP - Israeli Market Positioning 1Q09 Security -DLP Vendors to Watch: ProofPoint Workshare IBM (ISS) Local Support Player Worldwide Leader Websense Fast Movement McAfee Verdasys Symantec This analysis should be used with its supporting documents RSA Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
    • Data Centric ERM Security (Enterprise Rights Management) -ERM Enterprise Rights Management (ERM) technology—also known as Enterprise DRM or Information Rights Management (IRM) What is it? • ERMYour Text hereencrypting files that contain Your Text hereand only entails content allowing those users or devices that have proper credentials to decrypt the files and access the content Awareness of ERM has increased ERM has been growing steadily since it became a technology category unto itself about five years ago Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 34
    • Applications and File Formats Data Centric Security Used in ERM Implementations -ERM Your Text here Your Text here Source: Gilbane Group Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
    • Data Centric ERM –How Does it Work? Security -DLP SQL Server 1. New user is authorized to use RMS Active Directory 2. The User defines set of rules and content usage rights for the data he wants to share – He is the data owner 3. User distributes data to relevant recipients RMS Server Your Text here Your Text here 4. When recipient tries to open a file –a request is sent to the RMS Server in 4 1 order to authorize/deny access 5. RMS enforces rules made by the data owner 2 5 3 Data owner Recipient Source: Microsoft Israel Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
    • Data Centric ERM -Israeli Market Players Security -ERM Microsoft -Rights Management Services EMC- EMC Documentum IRM Product Suite Oracle - Oracle Information Rights Management Adobe –Adobe LifeCycle Rights Management SU: IsraeliYour Text here Your Text here Secure Islands -A provider of an advanced information protection and control (IPC) solution Covertix –Develops innovative software technology to track, monitor and control documents and files within and outside the organization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
    • Data Centric Security DB Protection –Market Status -DB Protections DB Protection Deployments Status -Israel 1Q09 Leading Israeli Players: “Not Therequot; Yet •Sentrigo 49% •Imperva Plan to •Oracle DB Vault Deploy Soon 30% •Guardium Text here Your Solution Your Text here Deployed 20% DB encryption: OtherDo Not Ged-i (Israeli SU): offers Know 1% high-level encryption to Storage Data Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
    • Data Centric Security Masking of Production Data -Data Masking Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
    • Data Centric Security Masking of Production Data -Data Masking  What is it? • The process of data masking is designed to “de-identify” data, such that the data remains based on real information, but no longer has any practical usage or application  What is the need? • The drive to outsource and offshore application development and Your Text here testing work means that organizations will have little control Your Text here over who gets to see their data • Test environments are not physically as secure as production systems  What can go wrong? • Sensitive data might be downloaded to laptops and stolen • Employees might misuse sensitive information and engage in fraudulent activity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
    • Data Centric Security Masking of Production Data -Data Masking Your Text here Your Text here Source: Securosis.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
    • SIEM/SOC SIEM/SOC Your Text here Your Text here 42
    • SIEM/SOC SIEM/SOC  What is SIEM? • Security Information & Event Management  What is SOC? • Security Operation Center  How does it work? • Collects and analyzes all log data and basic event management Your Text here Your Text here • monitors and manages all aspects of enterprise security in real time, from a single, centralized location • The NOC of security  Why do we need it? • Need for real-time awareness of internal/ external threats • Ensure business continuity and comply with regulations • A toolset for improving business logic (Security BI) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 43
    • Silos of Redundant Information SIEM/SOC Management Your Text here Your Text here Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 44
    • An Enterprise Platform for Compliance SIEM/SOC and Security Your Text here Your Text here SIEM Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
    • SIEM/SOC SIEM/SOC - Israeli Market Positioning 1Q09 Vendors to Watch: IBM -MSS TriGeo Local Support Player ArcSight Worldwide Leader EMC Fast Symantec Movement CA IBM Cisco This analysis should be used with its NetIQ supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
    • Next Generation SIEM/SOC: MSS SIEM/SOC -MSS What does MSS offer? -Comprehensive solution for security management: • Firewall/EP Management Service • Intrusion Detection & Prevention Management Service • Vulnerability Management Service Your Text here Your Text here Why should we go there? • Cost effective! • Use of best-of-breed security Why shouldn’t we? • Who owns my data? • No one else in Israel goes there…yet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
    • SIEM/SOC MSS Trends in Israel -MSS STKI observation: MSS is well accepted in SMB organizations, but Israeli CISOs in enterprises still strongly oppose this trend The current economic downturn should encourage Your Text here Your Text here some enterprises to reconsider MSS MSS providers addresses the management (CFOs and CEOs) in order to attract new clients Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
    • SIEM/SOC MSS –World Leaders -MSS Delivery Opportunities in Israel for: •Current world leaders (IBM, Symantec) • local ISPs •Network integrators •Traditional OS players Market Penetration (Source: Frost and Sullivan) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
    • Identity & Access Management (IDM/IAM) IDM/IAM Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
    • IDM Global Mega Trends IDM/IAM  Fraud and identity theft will increase strong authentication use  Strong authentication and SSO will strengthen their ties  Context-based authorization will put risk analysis here Your Text into Your Text here access control decisions  Physical and logical security will continue to converge  Federation will slowly grow Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
    • Trends in the Israeli Market IDM/IAM  Nov 2008: CA acquired Eurekify to enhance its role-based management suite  ERP based SOD solutions start to be seen, mainly for GRC reasons: • 2006: SAP acquired Virsa, enterprise risk management software Your Text here Your Text here provider, to bolster SAP’s software compliance skills • 2008: Oracle acquired Logical Apps, an automated GRC controls, for enterprise applications  Israeli new GRC enforcement Start-Ups: • Xpandion -Risk management and behavioral analyzing software solutions • SPATIQ –provides an automated tool for Entitlement Management Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
    • IAM/IDM IDM/IAM - Israeli Market Positioning 1Q09 Vendors to Watch: SPATIQ Local Support Player IBM Novell Sun (OS) Worldwide Leader CA Prominent WAM Player BMC Microsoft Oracle Velo (OS) This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
    • IDM/IAM Key Success Factors for Future IDM Project Consider IDM also as a business project, rather than a pure IT project Make sure the project bridges the gap between business and IT  StartYour Text here easier success (Single Signhere a small for On, Your Text vertical project)  Choose a step-by-step approach, rather than a mastodon implementation. Focus on basic functionalities not on the additional features Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
    • Information Security Consultants Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
    • Information Security Integrators Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
    • Information Security Distributors Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
    • Agenda Information 1 Information Security Security Communication 2 Networking Networking Your Text here Your Text here Green IT 3 Green IT Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
    • Networking Networking Networking market size (Ms of $) Your Text here Your Text here 2008 2009 2010 LAN 80.0 -25.00% 60.0 8.33% 65.0 equipment WAN 50.0 -20.00% 40.0 12.50% 45.0 equipment VoIP 40.0 -20.00% 32.0 25.00% 40.0 equipment Totals 170.0 -22.35% 132.0 13.64% 150.0 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
    • Networking Networking Future Trends Trends Datacenter Networking virtualization Next Generation Networking Internet Protocol (IP) Core and High Speed Broadband Green Networking IPv6 Your Text here Your Text here Network Operating systems Network intelligence and policy control Network Security Communication billing Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
    • Technologies Categorization 2009 Networking Trends Business Value Investment to make money SAAS/ Cut costs, Increase Cloud IT Project UC productivity Optimization Business Project Billing NGN Your Text here Your Text here VOIP IPv6 Commodity IT Size of figure = Networking Infra. complexity/ Vir. Services Network cost of project Security Investment for regulations Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
    • Networking Year of savings and productivity Trends What networking technologies are you investing-in to enhance employee productivity and collaboration in 2009? (Answer all that apply) 2009 2008 55% 52% 46% 36% 32% 31% 29% 23% Your Text here Your Text here 19% 13% 11% 9% 8% NA 1% NA Shahar Maor’s work Copyright 2009Source: Goldman Sachsor attribution from any graphic or portion of graphic @STKI Do not remove source Research 62
    • Networking STKI Madad 2008-9 Trends Optimization 2% Market Players 8% UC VOIP and IPTel 8% 20% Nortel 10% Network Infra Your Text here Your Text here 20% Trends Miscellaneous 10% Network Costs 12% Reduction 10% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
    • Local Area Network Trends Networking -LAN  Security embedded features in the LAN infra are imperative  Network Virtualization is already here  LAN vendors should support standard-based platforms Your Text here Your Text here  Israeli Trends: Corporate LAN to endpoints is stable: 100 MBIT Ethernet; • Backbone LAN: 2 X 1GBIT (10GBIT in some cases) Israeli enterprise tend to “count on” either Cisco or Nortel for their • backbone network. Other players appear on the network edges Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
    • LAN Networking -LAN - Israeli Market Positioning 1Q09 Vendors to Watch: Foundry Local Support Cisco Player Nortel Worldwide Leader Enterasys 3COM HP Juniper This analysis should be used with its Alcatel supporting documents Extreme Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
    • Networking The Nortel Crisis -Nortel From 90K to Feb 08: 30K Nortel says Nortel employees it will cut announces More and 2,100 jobs 1,300 more layoffs… layoffs Nortel says several Your Text here files Nortel Your Text here Nortel executives for bankruptcy Reports to leave in protection Financial 2009 Results for Q3 2008 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
    • The Nortel Crisis –What’s next? Networking -Nortel Nortel files for Chapter 11 to “deal decisively” with its historic debt burdens Nov 10’th 2008: A Nortel spokesman said the company had enough liquidity to sustain 12 to 18 months of operation under the current conditions Your Text here Your Text here Survival still possible for Nortel, but Companies that exit the bankruptcy process often emerge in smaller form and are frequently acquired in part or whole by larger suitors looking for a good deal 19.2.09: Radware has purchased Nortel’s Alteon… Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
    • The Nortel Crisis Networking –Israeli Market ”What if” Analysis -Nortel Acquiring parts of Nortel? HP Alliance with Avaya Cisco and Microsoft Acquire Nortel’s Juniper Telephony? Your Text here Your Text here •Enterasys (LAN and sec.) Gores •Siemens (Telephony) Goes deeper into the Alcatel Israeli market? Goes deeper into the 3COM Israeli market? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
    • Networking WAN Optimization -WAN WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN: VOIP Deployments Data Center Consolidation Your Text here Your Text here 2007 2008 Server Virtualization BCP/DRP 0% 10% 20% 30% 40% 50% 60% 70% 80% Source: Aberdeen Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
    • WAN Optimization Networking -WAN - Israeli Market Positioning 1Q09 Local Support Expand Player Riverbed F5 Worldwide Leader Cisco Blue Coat Citrix Radware Packeteer* Juniper This analysis should be used with its supporting documents *June 2008: A Blue Coat company Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
    • Networking Voice Over IP (VOIP) -VOIP STKI observation: Many enterprises are migrating, or planning to migrate, their telephony infrastructure from traditional circuit-switched technology to newer Internet Protocol (IP)-based systems Your Text here Your Text here  Motivations to actually migrate: End of life/end of support for current telephony infrastructure • Moving to a new office/office improvements •  Motivations to wait: “Phones are working” • Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 71
    • VOIP (Enterprise & Call Centers) Networking -VOIP - Israeli Market Positioning 1Q09 Vendors to Watch: Asterisk Cisco Local Support Player Nortel Worldwide Avaya* Leader Tadiran 3COM This analysis should be used with its Alcatel-Lucent supporting documents *Most CC in the market are Avaya Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 72
    • Networking Video Over IP –Video OIP  By 2011, 60% of Internet traffic is expected to be video traffic (Cisco)  Global organizations use it as a vital working tool – especially in order to cut travelling costs Your Text here Your Text here  Video technology is considered by many local organizations as mostly “nice to have”  Local organizations use this technology mainly for training/marketing purposes Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
    • Networking Video Over IP Map –Video OIP Your Text here Your Text here Source: http://www.video-over-ip.com/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
    • Networking Unified Communications (UC) –UC Why do we need this? Integration: Of any or all communications, collaborative, and business applications Presence: guides users to the most appropriate means of communications Your extends applications and integration here Your Text of Mobility: Text here applications every way you go Productivity: improves business processes Why now? Key drivers today are: Workforce virtualization, Cost reduction, Increasingly available tools, Business improvement opportunities Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
    • Networking UC Challenges –UC The problem: business justification for collaboration technologies comes down to “soft dollars”: • Productivity • Better Text here Your teamwork Your Text here • Better customer service How do you define “better”? What is its business value to the company? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
    • Networking UC Preferred Choice –UC 56% Cisco 41% Microsoft 22% Avaya 10% Nortel Alcatel-Lucent Text here 5% Your Your Text here 3% 3Com 2% Nokia-Siemens 4% Newer Vendors 4% Others 9% Unsure 0% 10% 20% 30% 40% 50% 60% Source: Goldman Sachs Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
    • Networking Integrators Networking - Israeli Market Positioning 1Q09 (Leaders) Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
    • Agenda Information 1 Information Security Security Communication 2 Networking Networking Your Text here Your Text here Green IT 3 Green IT Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
    • Green IT Small, incremental changes compounded many times can mean big savings for large-scale Text here organizations Your Your Text here 80
    • Green IT So, How Can I Be More Green? Trends Secure mobile Virtualized server access to networks, PC management and storage applications, and environments data State of the art Your Text here Your Text here Intelligent archiving Teleconferencing power and cooling (all around) Working Go digital! & environment (car Asset management Printing pool, working from consolidation home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
    • STKI Madad 2008-9 Green IT Trends (Not Including Printing) PC Energy Management Miscellaneous 9% Trends 12% 38% Market Players Your Text here Your Text here 15% DC Facilities 20% Asset Management 6% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 82
    • Green Data How Dense is Your Data Center? Center - Trends What is your average rack power demand (per rack)? 6% 10% 23% 0 kW to 3 kW 30% 4 kW to 6 kW 7 kW to 9 kW Your Text here10 kW to 11 kW Your Text here 31% 12 kW or More Data Center Environment –Israeli Market (Ms of $) 2008 2009 2010 30.0 33.33% 40.0 25.00% 50.0 Source: STKI, Information Week Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 83
    • Green Data Electricity Use Trends Center - Trends Your Text here Your Text here 36 Source: ASHRAE Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 84
    • Green Data Data Center Metrics Center - Trends Power Usage Effectiveness and its reciprocal, the DCiE is (PUE): defined as: PUE = Total Facility DCiE = 1÷ PUE = (IT Power ÷ IT Equipment Equipment Power ÷ Total Power Facility Power) x 100% Your Text here Your Text here Source: The Green Grid, EPA Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 85
    • Green Data Virtualization Calculations Center - Virtualization Assumptions (partial list): Average Server Utilization: %5 Number of peak hours:12 Cost per KwH: 11 cents Average servers growth rate per year: 15% Text here Your Text here Your Virtualization: • level of utilization of servers after virtualization: 50%-70% • Calculations are based on a maximum of two virtual machines per core Cooling: 1 watt of power for the server to 1.25 watts of power for cooling 86 Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
    • Green Data Virtualization Calculations Center - Virtualization Infrastructure Prior to Year 1 Year 2 Year 3 Year 4 Year 5 Virtualization Total Number of 540 641 714 821 944 Servers: Power Used for Servers: 1,037,500 1,193,125 1,372,094 1,577,908 1,814,594 (Watts) Your Text here Your Text here Server Electric Cost ($) $1,000,420 $1,150,483 $1,323,055 $1,521,514 $1,749,740 Per Year: Total Cooling Electric $1,250,525 $1,438,103 $1,653,819 $1,901,892 $2,187,176 Cost ($) Per Year: Total Power & Cooling $2,250,944 $2,588,586 $2,976,875 $3,423,406 $3,936,916 Cost ($) Per Year: 87 Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
    • Green Data Virtualization Calculations Center - Virtualization Infrastructure After Year 1 Year 2 Year 3 Year 4 Year 5 Virtualization Total Workloads: 4,170 4,796 5,515 6,342 7,293 Physical Systems 136 156 179 206 237 Needed: Power Used for Servers 68,000 78,200 89,700 102,925 118,450 (Peak Watts): Power Used forText here 45,560 Your Servers 68,960 Text here Your 52,394 60,099 79,361 (Off-Peak watts): Server Electric Cost ($) $65,570 $75,405 $86,716 $99,723 $114,682 Per Year (Peak): Server Electric Cost ($) $43,932 $50,521 $58,100 $66,815 $76,837 Per Year (Off-Peak): Total Cooling Electric $136,877 $157,408 $181,019 $208,172 $239,398 Cost ($) Per Year: Total Power & Cooling $246,378 $283,335 $325,835 $374,710 $430,917 88 Cost ($) Per Year:
    • Green Data Virtualization Calculations -ROI Center - Virtualization Year 1 Year 2 Year 3 Year 4 Year 5 Total (quot;-quot; means Savingsquot;) 50% Utilization 6,074,378$ -1,619,909$ -677,406$ 405,174$ 1,688,365$ 5,870,602$ 60% Utilization Your Text here Your Text here 1,911,717$ -2,367,498$ -2,129,390$ -1,822,708$ -1,524,026$ -5,931,905$ 70% Utilization 564,773$ -2,609,364$ -2,583,076$ -2,557,558$ -2,541,227$ -9,726,452$ 89 Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
    • VDI (Virtual Desktop Infrastructure) –Energy, Green IT - Virtualization Management and Security Efficiency Assumptions (Partial list): • Number of desktop devices under consideration: 500 • Desired virtualization software engine: VMware ESX • Average annual Sun VDS server administration costs per thinYour Text here client: 846.10 NIS Your Text here • FTEs desktop helpdesk support staff: 1.25 • FTEs desktop security management: 0.5 • Number of Desktop security incidents: 2 • Project Implementation Plan (months from kickoff to deployment): 2 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 90
    • VDI (Virtual Desktop Infrastructure) –Energy, Green IT - Virtualization Management and Security Efficiency TCO Comparison Solution A: Solution B: Sun Difference Difference Traditional Virtual Desktop Cumulative 3 Year (A - B) (A - B)% Desktop Devices Solution IT Costs Desktop Device Costs 3,259,204 NIS 670,834 NIS 2,588,370 NIS 79.4% Desktop Software Costs 782,627 NIS 461,522 NIS 321,104 NIS 41.0% Server Infrastructure Costs 296,448 NIS 1,248,949 NIS (952,501 NIS) -321.3% Desktop Management Labor Costs 5,724,578 NIS 2,137,760 NIS 3,586,818 NIS 62.7% Desktop Power Costs here 314,788 NIS 135,494 NIS Your Text here 57.0% 179,294 NIS Your Text Total IT Costs 10,377,645 NIS 4,654,559 NIS 5,723,085 NIS 55.1% Business Operating Costs Desktop User Productivity Impact 4,473,911 NIS 0 NIS 4,473,911 NIS 100.0% Business Risks 538,416 NIS 26,919 NIS 511,496 NIS 95.0% Total Business Operating Costs 5,012,327 NIS 26,919 NIS 4,985,408 NIS 99.5% Total 15,389,972 NIS 4,681,479 NIS 10,708,493 NIS 69.6% Source: www.alinean.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 91
    • VDI (Virtual Desktop Infrastructure) –Energy, Green IT - Virtualization Management and Security Efficiency ROI Analysis Initial Year 1 Year 2 Year 3 (Solution B) (Probable Case) Benefits (to Solution B from 0 NIS 3,115,969 NIS 3,505,821 NIS 3,681,630 NIS Current (AS IS)) Cumulative Benefits 3,115,969 NIS 6,621,790 NIS 10,303,420 NIS Investment (Solution B) here 1,604,296 NIS 312,617 NIS 170,099 NIS here Your Text 237,175 NIS Your Text Cumulative Investment 1,604,296 NIS 1,916,913 NIS 2,087,012 NIS 2,324,187 NIS Cash Flow (1,604,296 NIS) 2,803,351 NIS 3,335,722 NIS 3,444,456 NIS Cumulative Cash Flow (1,604,296 NIS) 1,199,055 NIS 4,534,777 NIS 7,979,233 NIS ROI 343% Risk Adjusted ROI 288% NPV Savings 6,361,354 NIS IRR 177% Source: www.alinean.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
    • PC -Energy Efficiency and Power Green IT - PC Consumption Why don’t you always shut down your PC when you have finished working for the day? (multiple responses allowed): 1 ‫סידרה‬ It's IT policy or procedure to leave it on My computer goes to hibernate, or to sleep mode It takes too long Your Text here Your Text here It's a habit I don't think it's important It's a hassle I forget 0% 10% 20% 30% 40% 50% Source: E1, PC Energy Report Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 93
    • Green IT - PC Costs Calculations PC 300*20 Senario 300*20 Senario & Vista 300*9 Senario 8 7 6 Annual Cost (Million ₪ ) 5 4 Your Text here Your Text here 3 2 1 0 Number of Computers Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 94
    • PC -Energy Efficiency and Power Green IT - PC Consumption: An Example Your Text here Your Text here Source: www.g-patrol.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 95
    • PC -Energy Efficiency and Power Green IT - PC Consumption: Israeli Market STKI observation: Some Israeli organizations, which address the issue of energy efficiency of PCs, use homemade script based solutions Players: IsraeliYour Text here Your Text here Microsoft • Symantec • BigFix • Gpatrol –Israeli SU • Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 96
    • Green IT - Printing Printing STOP PRINTING Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 97
    • Green IT - Israeli Output Statistics Printing Average A4s usage per year per employ: 2,000 4,607 10,000 Average color coverage per page: 1% 11% 71% Your Text here Your Text here Average cost per printed page: 0.045 NIS 0.24 NIS 1 NIS Average percentage of jobs of more than one page: 47% 75% 91% Source: Prime² (STKI’s modifications ) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 98
    • STKI Madad 2008-9 Green IT - Printing Miscellaneous Distribution Tools 11% Printing 17% Consolidation 20% Monitoring and Outsourcing Cost Reduction 9% 43% Your Text here Your Text here Printing Projects –Israeli Market Size (Ms of $) 2008 2009 2010 10.0 50.00% 15.0 66.67% 25.0 P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 99
    • Green IT - Printing Consolidation Printing In today’s world, printing has become a significant expenditure item for almost every organization A typical large financial organization in Israel spend dozens of millions of Shekels annually on office printing Israeli Office Printing Market has changed great deal since 2007: here Your Text Your Text here • Users start seeing the great potential in reorganizing their printing environment • The economic crisis pushes many to look for ways to cut costs • Printing consolidation projects usually have a fast, measurable ROI P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 100
    • Green IT - Printing Consolidation -Ratios Printing One of the ways to check the maturity of an organization printing environment is to check its printers/users ratio: Organization “Heavy Followers Consolidated High-Tech Type Printers” Printers/Users 1:1 1:5 – 1:15 1:15 – 1:30 1:30+ Ratio Your Text here Your Text here “Heavy Printers” –Consist of financial organizations, government agencies, law firms est. “High-Tech” –Truly paperless entities (start ups, agile high tech companies est.) P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 101
    • Green IT - Addressing Printing Consolidation Projects Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 102
    • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 103
    • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 104
    • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 105
    • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 106
    • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 107
    • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 108
    • Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info 109