Your SlideShare is downloading. ×
Changing                                           STKIData Center                                        Summit          ...
Agenda                        TechnologyMega Trends            Domain Trends                                     Pini Cohe...
We will present data on products and vendors1. Israeli vendors rating – state of the current market focused on the enterpr...
We will present data on products and vendors (cont.)3. Selected installations of products – projects in different stages ,...
STKI InfraOps annual survey                                 Pini Cohen and Sigal Russins                                  ...
Ratio Analysis:                                                              Sorted Metric                      Metric• 25...
PC Support Ratios• Support Per PC for FTE                   Per FTE     Service    Second Level    Third – Image    Total ...
Agenda for technology domains   Security   Networking and Printing   Storage   Servers   Desktops PC etc. (skipped) ...
Customers Main Issues in 2012• Cyber security -Smarter & Complexity attacks,    APT, DDOS•   BYOD - Security on Mobile –MD...
Security•   Security 2013•   Social engineering•   Identity management•   Cloud storage services                          ...
Security Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attributionfrom any slide, graph...
Industry groups represented by percent of breaches                                                                        ...
Social tactics by percent of breaches within Social                                                                       ...
SecuritySource: Ponemon Institute                            Pini Cohen and Sigal Russin’s work/                          ...
31    2        Pini Cohen and Sigal Russins work                      Copyright@2013            Do not remove source or at...
SecurityPini Cohen and Sigal Russin’s work/         Copyright@2013Do not remove source or attribution from any       slide...
Identity & Access Management                                Pini Cohen and Sigal Russins work                             ...
SecurityPini Cohen and Sigal Russin’s work/         Copyright@2013Do not remove source or attribution from any       slide...
Pini Cohen and Sigal Russin’s work/                            Copyright@2013                   Do not remove source or at...
Forrester: “Most data breaches caused by employees"30% - simple loss or theft‘                                            ...
Turn Insiders Into Assets - Security Awareness Program    Focus on changing user behavior- training your employee    (vide...
Most Intellectual Property Theft Involves Company Insiders• Perimeter defenses do not absolutely protect a network, vettin...
Best Practices for Defending Yourself Out of office replies- do not give a stranger personally identifiable information. E...
SecurityPini Cohen and Sigal Russin’s work/         Copyright@2013Do not remove source or attribution from any       slide...
Security           Pini Cohen and Sigal Russin’s work/                    Copyright@2013           Do not remove source or...
Don’t risk your Data!Source: Ponemon Institute                             Pini Cohen and Sigal Russin’s work/            ...
Cloud Storage Services Definition• A network of distributed data centers which typically uses cloud  computing technologie...
Cloud Storage Features                                                                                                    ...
Case Study : DROPBOX                                                                                 Security             ...
SecuritySource: The FixYa Cloud Storage Report. Novmber 2012                                                       Pini Co...
Security Concerns• SkyDrive uses SSL to encrypt files during transport, but files are  unencrypted once at rest on Microso...
Secured Alternative Solutions•   Use Local encryption for protecting your data•   IBM Collaboration Cloud•   Box.net      ...
WatchDox                                      Security  ACCESS documents on any deviceSHARE documents across organizations...
WatchDox Makes Document Security Easy                                Email SharingWatchDoxExchange                        ...
Recommendations•   Review your security policy related to social engineering•   DO NOT allow using free cloud storage OR• ...
Data Leakage Prevention -Israeli Market Positioning 1Q13                                                Websense        Lo...
Security Consultants -Israeli Market View 1Q13 (Partial List)Source: STKI                             *DataSec, **Oasis-Te...
Security System Integrators -Israeli Market   View 1Q13 (Partial List)  *Netcom  **Spider^Oasis-Tech ^^Decimus            ...
Security personal ratio• Number of Security personal in IT as percentage of total IT  employees:                     Per F...
Agenda for technology domains   Security   Networking and Printing   Storage   Servers   Desktops PC etc.   DBMS   ...
Networking General trends-2013   Software-        Wireless local      Network    defined         area network       visibi...
Network Visibility Benefits Improve the performance of your network with cloud computing,  video streaming, mobility etc....
Port Mirroring• Requires an engineer to configure the switch or switches.• Eliminate corrupt packets or packets which belo...
Cyber Security Challenges – No VisibilityNETWORK INFRASTRUCTURE                                  Traffic Growth           ...
Solution - Visibility with NPB   NETWORK                                           MONITORINGINFRASTRUCTURE               ...
Traffic Market Maker, Market LeaderGigamon -          Visibility Fabric
Networking active ports ratio• Number of active ports divided to total ports:                     Per FTE      Active port...
Networking personal ratio• Number of active ports divided to network staff members (voice  + data):                    Per...
Output Management-Israeli Market Positioning 1Q13                     Vendors to watch :             Consist              ...
HP Exstream               Pini Cohen and Sigal Russins work                        Copyright@2013              Do not remo...
Agenda for technology domains   Security   Networking and Printing   Storage   Servers   Desktops PC etc.   DBMS   ...
Storage essentials: more more more…                                                                                       ...
Storage Size and Growth in Selected IndustriesIndustry               2012 1Q Size    2013 1Q Size    Planned Growth per   ...
Storage growth forecast• Storage will continue to grow at even faster rates• What might harm the traditional storage vendo...
Storage essentials: 25% price decline per TB                                                                              ...
Storage cost saving initiatives•   Thin provisioning•   Storage virtualization•   Deduplication•   Compression•   ISCSI ha...
IBM Real Time Compression (SAN +NAS)Within one click:- Create Compressed Volume- Save up to 80% of the existing capacity a...
Compression Without Compromise                     Expected Compression Ratios• SAN Volume Controller Real-time Compressio...
Storage technology used: Israel vs. the world                                            Pini Cohen and Sigal Russins work...
Planned Projects                    Pini Cohen and Sigal Russins work                             Copyright@2013          ...
Isilon Scale Out NAS                                        Simple to Scale                                           – M...
NETAPP ONTAP 8.1.1 Cluster-ModeKey Attributes                                  Simpler data management via a single• Singl...
New HW technologies• RAM vs. Flash• Access method:      PCI-E      Internal (SAS interface)      External SAN (HBA)   ...
New HW alternatives and combinations : Flash  RAM                                                                         ...
SSD usage perception                                                                             Source: http://itbrandpul...
SSD typical usage                                                Source: http://itbrandpulse.com/Documents/Flash%20Memory%...
Many Categories many players                                                           Source: http://itbrandpulse.com/Doc...
E-Discovery and storage• Discovery in civil litigation which deals with the exchange of  information in electronic format....
Storage virtualization- the next big thing?!•   The logical step after server virtualization•   We have been expecting it ...
Storage virtualizationIs also thee basics of sophisticated Active-Active solutions?                                       ...
Use of storage virtualization•   Not sure if:•   Single vendor•   Heterogeneous vendors•   Storage virtualization via file...
Enhanced Storage Virtualization                                                                              BACKUP SNAPSH...
Assessing storage essentials• Performance:• For ReadWrite ratio and block size what is the:     IO per second (more impor...
Storage procurement trend• Instead of buying chassis, drives, cache, software, etc• Buy capacity with SLA (measured from t...
Inputs from STKI Round Table• Automatic tiring solutions (SSD to SAS to SATA) are not mature• Measuring the actual storage...
Inputs from STKI round table• Mid-range storage array are used increasingly for critical loads.• The debate about SAN vs. ...
Usable/Raw storage ratio• Net Storage in this research – usable for applications:     After Raids     After replication ...
Storage Ratios• Number of Raw TB and Usable TB per Storage Staff Member FTE (including backup and   DRP of storage):      ...
Market Status and Recommendations• Users are using these integrators (support, maintenance,  projects, etc.) in Storage•EM...
Market Status and Recommendations• Users are using these integrators (support, maintenance,  projects, etc.) in Backup•Tal...
Highend storage (including MF) Israeli Market Positioning 1Q13                      Vendors to watch:                     ...
Unified (midrange) storage - Israeli Market Positioning 1Q13                    Vendors to watch                          ...
Enterprise Backup SW - Israeli Market Positioning 1Q13                                                              Symant...
DEDUPVTL appliances or software*- Israeli Market Positioning 1Q13                        Vendors to watch                 ...
More emerging categories                Scale Out NAS – EMCIsilon, NETAPP clustered                mode, Panasas, IBM’s GP...
Agenda for technology domains   Security   Networking and Printing   Storage   Servers   Desktops PC etc.   DBMS   ...
Server essentials: plans                                           Servers                            Pini Cohen and Sigal...
Low power servers                                    Servers                     Pini Cohen and Sigal Russins work        ...
Why not considering low power servers?                                                         Servers                    ...
Intel vs. AMD servers                                        Servers                         Pini Cohen and Sigal Russins ...
Memory in X86 servers                                        Servers                         Pini Cohen and Sigal Russins ...
Importance of power and cooling efficiency                                                             Servers            ...
Server density                                 Servers                  Pini Cohen and Sigal Russins work                 ...
WW blade server market share                               Source: http://wikibon.org/wiki/v/Server_Growth_in_Blades_and_S...
Microservers• A microserver is:    Single socket;    Lightweight, low power and low cost; and    Part of a shared infra...
ARM servers: Calxeda                                                                                       Servers Source:...
Servers Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attributionfrom any slide, graph ...
Servers Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attributionfrom any slide, graph ...
The HP BladeSystem c7000 Platinum Enclosure•Enhanced fabric capabilities for demanding workloads • 40% increase in mid-pla...
Inputs from STKI Round Table• Users are looking for technology that will enable then use different    typesclassifications...
Inputs from STKI RT: What is important in server selection?• Price, reliability, availability, ILO , partners, energy cons...
Whitebox servers are rising?• Maybe because big data?!                                                                    ...
Super Micro Computers                                                                           Servers                   ...
Market Status and Recommendations• Users are using these integrators (support, maintenance,    virtualization projects, et...
Server Ratios - Windows• Number of Windows Servers (logical ) per System member                          Per FTE          ...
Percent of Production Windows server from all Windows servers                   Per FTE        Percent of prod            ...
Percent of SBC FTE vs. total FTE (system)                                                                                 ...
How many users are supported by SBC (Terminal ServerVDI) FTE                                                              ...
NOC, Operators Ratio*•   Number of production servers per NOC person:                                                   Pe...
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Upcoming SlideShare
Loading in...5
×

Stki summit2013 infra_pini sigaltechnologies_v5 final

10,151

Published on

This presentations gives high level overview of : networking, security, storage, end point devices (PC), Servers, Enterprise System Management and Development and SOA\integration domains. It includes staffing ratios, vendor and integrator positioning in Israel.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
10,151
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Stki summit2013 infra_pini sigaltechnologies_v5 final"

  1. 1. Changing STKIData Center Summit 2013 Pini Cohen Sigal Russin IT at the crossroads: Lead, follow or get out of the way
  2. 2. Agenda TechnologyMega Trends Domain Trends Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or 2 attribution from any slide, graph or portion of graph 2
  3. 3. We will present data on products and vendors1. Israeli vendors rating – state of the current market focused on the enterprise market (not SMB)  X – Market penetration (sales + installed base+ clients perspective)  Y – is X plus localization, support, development center, number and kind of integrators, etc.  Worldwide leaders marked, based on global positioning  Vendors to watch: Are only just entering Israeli market or making a big change so can’t be positioned but should be watched  Represents the current Israeli market and not necessarily what we recommend to our clients2. Products and selected resellers / implementers  The location within the list is random Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 3
  4. 4. We will present data on products and vendors (cont.)3. Selected installations of products – projects in different stages , production,implementation, after decision…4. Service providers that are used by users . I asked users – “which SI do you use in this category” and counted the result.5. Analysis by international and Israeli analysts  This complete information (1 to 5) should be used together, combined with the specific circumstances of each case when making a decision This subjective chart is the result of our objective research Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 4
  5. 5. STKI InfraOps annual survey Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or 5 attribution from any slide, graph or portion of graph 5
  6. 6. Ratio Analysis: Sorted Metric Metric• 25% percentile 36 43 57 36 50 117• 50% percentile = median 50 57 438 60 60 175• 75% percentile 68.6 25% percentile 60 71 150 143 100 120 100 50 109 250 117 125 117 280 120 60 120.0 50% percentile = Median 120 200 125 117 125 100 143 164 150 125 164 600 175 192 178.1 75% percentile 188 71 192 120 200 50 250 188 280 43 438 109 600 100 Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 6
  7. 7. PC Support Ratios• Support Per PC for FTE Per FTE Service Second Level Third – Image Total Support Desk per PC 25 percentile 188 250 1500 100 Median 315 450 3200 126 75 percentile 589 567 4000 247• Support per Employee for FTE Source: STKI Per FTE Service Second Level Third – Image Total Support Desk per Empl. 25 percentile 225 300 1500 124 Median 300 438 3000 152 75 percentile 475 567 4000 193 Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 7
  8. 8. Agenda for technology domains Security Networking and Printing Storage Servers Desktops PC etc. (skipped) DBMS Enterprise system management Development and SOA Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 8
  9. 9. Customers Main Issues in 2012• Cyber security -Smarter & Complexity attacks, APT, DDOS• BYOD - Security on Mobile –MDM• Network monitoring -SIEM• NAC –network access control• WI-FI as a service• Control & Monitoring of Administrative• Unauthorized Device Detection• DLP- Data loss prevention• Cloud security• Regulation – ISO Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 9
  10. 10. Security• Security 2013• Social engineering• Identity management• Cloud storage services Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 10
  11. 11. Security Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 11
  12. 12. Industry groups represented by percent of breaches Security Source: Verison , 2012 DATA BREACH INVESTIGATIONS REPORT Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 12
  13. 13. Social tactics by percent of breaches within Social Security Source: Verison , 2012 DATA BREACH INVESTIGATIONS REPORT Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 13
  14. 14. SecuritySource: Ponemon Institute Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 14
  15. 15. 31 2 Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 15
  16. 16. SecurityPini Cohen and Sigal Russin’s work/ Copyright@2013Do not remove source or attribution from any slide, graph or portion of graph 16
  17. 17. Identity & Access Management Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 17
  18. 18. SecurityPini Cohen and Sigal Russin’s work/ Copyright@2013Do not remove source or attribution from any slide, graph or portion of graph 18
  19. 19. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graphSource: veracode 19
  20. 20. Forrester: “Most data breaches caused by employees"30% - simple loss or theft‘ Security27% - inadvertant misuse by an employee‘25% - external attack‘12% - malicious insiders‘ Source: information week 2012 Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 20
  21. 21. Turn Insiders Into Assets - Security Awareness Program Focus on changing user behavior- training your employee (videos) Test and retest - testing employee reaction to an actual test like: phishing e-mails. Teach the individual- tailored training to the company and the individuals who work there (USB devices). Even a failure can be a success- employee reports, susceptible to social engineering. Source: information week 2012 Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 21
  22. 22. Most Intellectual Property Theft Involves Company Insiders• Perimeter defenses do not absolutely protect a network, vetting suppliers is not a sure way to protect against compromised hardware. You should monitor for anomalies in your network.• Keep Policy Up To Date! Security Source: information week 2012, Verison Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 22
  23. 23. Best Practices for Defending Yourself Out of office replies- do not give a stranger personally identifiable information. Email Links and Attachments-never open a link or an attachment from someone you don’t know. Phone Calls-requiring that employees use verbal code words to verify their identity. On-Premise Badge and Security- use cameras, guards and mantraps before a secure doorway. Unlocked Computers and Laptops- always be vigilant! Source: http://blog.neustar.biz/dont/social-engineering-5-tips-and-best-practices-for-defending-against-it/ Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 23
  24. 24. SecurityPini Cohen and Sigal Russin’s work/ Copyright@2013Do not remove source or attribution from any slide, graph or portion of graph 24
  25. 25. Security Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 25
  26. 26. Don’t risk your Data!Source: Ponemon Institute Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 26
  27. 27. Cloud Storage Services Definition• A network of distributed data centers which typically uses cloud computing technologies like virtualization, and offers some kind of interface for storing data.• To increase the availability of the data, it may be redundantly stored at different locations.• Many cloud storage providers are active on the market, offering various kinds of services to their customers. Security Source: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 27
  28. 28. Cloud Storage Features SecuritySource: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 28
  29. 29. Case Study : DROPBOX Security Browser API Dropbox uses Amazon Web Services (AWS) for storage and transfer. Dropbox does not verify the email address at registration, hence it is open for incrimination attacks. Client-side encryption is not supported. It is unclear which flavor of sharing is used if non-subscribers are included (closed user group vs. publication). In 2011 accounts could be accessed without a password, and in 2012 spam emails were sent to Dropbox users. SouIe: https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Cloud-Storage-Security_a4.pdf Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 29
  30. 30. SecuritySource: The FixYa Cloud Storage Report. Novmber 2012 Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 30
  31. 31. Security Concerns• SkyDrive uses SSL to encrypt files during transport, but files are unencrypted once at rest on Microsoft’s servers.• Data Leak Source: Ponemon Institute Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 31
  32. 32. Secured Alternative Solutions• Use Local encryption for protecting your data• IBM Collaboration Cloud• Box.net 67% viewed third-party• SpiderOak applications as a significant• Sharefile –Citrix risk – second to mobile• WatchDox security risk.• Acronis• Application Rapping • Symantec Security • F5 Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 32
  33. 33. WatchDox Security ACCESS documents on any deviceSHARE documents across organizations CONTROL documents at all times Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 33
  34. 34. WatchDox Makes Document Security Easy Email SharingWatchDoxExchange Group CollaborationWatchDoxWorkspaces Cross-Device SyncWatchDoxSync • Security is added seamlessly, automatically Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution • Documents encrypted at all times: rest, transit, use from any slide, graph or portion of graph
  35. 35. Recommendations• Review your security policy related to social engineering• DO NOT allow using free cloud storage OR• Allow employee BYOA but secure it with encryption tools• Use a collaboration tool for better productivity & security• Start Identity & access management project• Education ,awareness  Training! Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 37
  36. 36. Data Leakage Prevention -Israeli Market Positioning 1Q13 Websense Local Support Player Symantec Verdasys Fidelis Worldwide Leader GTB McAfee CA Safend Checkpoint EMC Market Presence/Perception Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 38
  37. 37. Security Consultants -Israeli Market View 1Q13 (Partial List)Source: STKI *DataSec, **Oasis-Tech Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 39
  38. 38. Security System Integrators -Israeli Market View 1Q13 (Partial List) *Netcom **Spider^Oasis-Tech ^^Decimus Source: STKI Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 40
  39. 39. Security personal ratio• Number of Security personal in IT as percentage of total IT employees: Per FTE Security % IT personal 25 percentile 2.2% Median 3.6% 75 percentile 5% Source: STKI Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 41
  40. 40. Agenda for technology domains Security Networking and Printing Storage Servers Desktops PC etc. DBMS Enterprise system management Development and SOA Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 42
  41. 41. Networking General trends-2013 Software- Wireless local Network defined area network visibility innetworking will (WLAN) for virtualizedreplace current guests and environments NAC BYOD (VoWLAN) Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 43
  42. 42. Network Visibility Benefits Improve the performance of your network with cloud computing, video streaming, mobility etc. Utilize security issues and application performance management. Good view of your network traffic down to the packet level. You don’t need to go through an emergency change control at the start of the incident just to get these taps! Networking Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 44
  43. 43. Port Mirroring• Requires an engineer to configure the switch or switches.• Eliminate corrupt packets or packets which below a minimum size.• Switches may drop layer 1 and select layer 2 errors depending on high priority.• Need to troubleshoot common physical layer problems such as faulty NIC.• A network devices can support a restricted number of port mirrors. It is very important for security and analysis the same data with many devices. Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 45
  44. 44. Cyber Security Challenges – No VisibilityNETWORK INFRASTRUCTURE Traffic Growth Number of links, Size of links, amount of traffic Traffic New Applications New Protocols, Encrypted Traffic Data Center BYOD Mixture of devices, Policies & Compliance Device Cloud / Virtualization Applications go virtual, Inter-VM traffic Cloud / Virtualization
  45. 45. Solution - Visibility with NPB NETWORK MONITORINGINFRASTRUCTURE TOOLS Network Packet Broker Traffic Data Center Device Cloud / Virtualization
  46. 46. Traffic Market Maker, Market LeaderGigamon - Visibility Fabric
  47. 47. Networking active ports ratio• Number of active ports divided to total ports: Per FTE Active ports ratio 25 percentile 62% Median 67% 75 percentile 79% Networking Source: STKI Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 49
  48. 48. Networking personal ratio• Number of active ports divided to network staff members (voice + data): Per FTE # of active ports 25 percentile 500 Median 1000 75 percentile 1800 Networking Source: STKI Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 50
  49. 49. Output Management-Israeli Market Positioning 1Q13 Vendors to watch : Consist HP Local Support Autofont Player Adobe Worldwide Leader ISIS-Papyrus Aman/Beeri Market Presence/Perception Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 51
  50. 50. HP Exstream Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 52
  51. 51. Agenda for technology domains Security Networking and Printing Storage Servers Desktops PC etc. DBMS Enterprise system management Development and SOA Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 53
  52. 52. Storage essentials: more more more… Storage Source: http://www.kajashi.com/?q=article/storage-market-and-opportunity Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 54
  53. 53. Storage Size and Growth in Selected IndustriesIndustry 2012 1Q Size 2013 1Q Size Planned Growth per RAW RAW yearDefense 500T-6P 1P-8P 50%- 75%Finance 600T-1.3P 600-2.5P 25% - 75%Health 140T-550T 300T-1500P 30%-50%Manufacturing – 100T-250T 200T-800T 20%-50%RetailTelco 2P-3P 2P-5P 30%-50%Governmental Public 100T-300T 100T-400T 25%-100% Storage Actual storage growth is based on procurement cycles Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 55
  54. 54. Storage growth forecast• Storage will continue to grow at even faster rates• What might harm the traditional storage vendors is:  Big Data (Hadoop, NoSQL DBMS) which basically comes as “simple servers with internal disks”  Software Defined Datacenter that might change storage architecture Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 56
  55. 55. Storage essentials: 25% price decline per TB Storage Source: http://www.kajashi.com/?q=article/storage-market-and-opportunity Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 57
  56. 56. Storage cost saving initiatives• Thin provisioning• Storage virtualization• Deduplication• Compression• ISCSI has matured Source: http://lssacademy.com/2010/06/01/3-practical-ways-to-immediately-reduce-costs/• Reconsider backup policy• Potentially switch storage vendors = negotiation Storage Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 58
  57. 57. IBM Real Time Compression (SAN +NAS)Within one click:- Create Compressed Volume- Save up to 80% of the existing capacity and future growth- No Performance compromising Storage- Complex Tasks become so simple in the V7000 Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 59
  58. 58. Compression Without Compromise Expected Compression Ratios• SAN Volume Controller Real-time Compression uses same proven Random- Access Compression Engine (RACE) as IBM RTC Appliances• Delivers similar levels of compression DB2 and Oracle databases Up to 80% Linux virtual OSes Up to 70% Virtual Servers (VMware) Windows virtual OSes Up to 50% 2003 Up to 60% Office 2007 or later Up to 20% CAD/CAM Up to 70%. Source: IBM Field experience and internal tests• IBM Compresstimator tool can be used to evaluate expected compression benefits for specific environments Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 60
  59. 59. Storage technology used: Israel vs. the world Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 61
  60. 60. Planned Projects Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 62
  61. 61. Isilon Scale Out NAS  Simple to Scale – Manage 15+ PBs like 1TB drive  Predictable Performance – Grows linearly with nodes  Efficient to Operate – Maximize utilization to 80%+ – Automated tieringScale Out Single File System > 15PB!  Available Always – Survives multiple failures  Native Hadoop HDFS – For Scale Out Big Data Storage • 60 Seconds to add a node – Connect and forget Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 63
  62. 62. NETAPP ONTAP 8.1.1 Cluster-ModeKey Attributes Simpler data management via a single• Single-Vserver cluster data store mount for multi-PB data store  Built on Cluster-Mode NAS Interface [NFS]  Uses FlexVols as constituents  Native storage efficiency Dedupe, compression, thin provisioning  Automatically balanced across nodes at NetApp Infinite Volume creation/ingest• FAS 6280, NFS v3 Cluster-wide Namespace• Scales to 20PB and 2 billion files• Container-wide snapshots and SnapMirror … … replication Data ONTAP 8 Cluster-Mode Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 64
  63. 63. New HW technologies• RAM vs. Flash• Access method:  PCI-E  Internal (SAS interface)  External SAN (HBA)  External via Ethernet card – NAS• Mode: Source: NASA  Monolithic (only one type of HW)  Hybrid (combination of HW type) Automatic tiered Storage Manual tiered Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 65
  64. 64. New HW alternatives and combinations : Flash RAM Source: http://itbrandpulse.com/Documents/Flash%20Memory%20Summit%20-%20IT%20Brand%20Pulse%20-%20SSD%20Buying%20Behavior.pdf Storage Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 66
  65. 65. SSD usage perception Source: http://itbrandpulse.com/Documents/Flash%20Memory%20Summit%20-%20IT%20Brand%20Pulse%20-%20SSD%20Buying%20Behavior.pdfPublished – August 2012 Storage Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 67
  66. 66. SSD typical usage Source: http://itbrandpulse.com/Documents/Flash%20Memory%20Summit%20-%20IT%20Brand%20Pulse%20-%20SSD%20Buying%20Behavior.pdf Storage Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 68
  67. 67. Many Categories many players Source: http://itbrandpulse.com/Documents/Flash%20Memory%20Summit%20-%20IT%20Brand%20Pulse%20-%20SSD%20Buying%20Behavior.pdf Storage Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 69
  68. 68. E-Discovery and storage• Discovery in civil litigation which deals with the exchange of information in electronic format.• Storage related tools are part of archiving market Storage Source: https://www.google.co.il/search?q=e-discovery&hl=iw&safe=off&source=lnms&tbm=isch&sa=X&ei=PMNFUfPmGOb07AbeyoHQAg&ved=0CAoQ_AUoAQ&biw=1920&bih=981#imgrc=BZREjMnP_Jt1TM%3A%3B0hfSQKdkIwWFNM%3Bhttp%253A%252F%252Fediscoverytimes.com%252Fwp-content%252Fuploads%252Fblogger%252F-NhWz12eZ2Gw%252FTl0l0cV_KJI%252FAAAAAAAAARQ%252FDqMlP1rrv28%252Fs1600%252FeDiscoveryMagic.jpg%3Bhttp%253A%252F%252Fediscoverytimes.com%252Fediscovery-from-magic-to-mainstream-technology%252F%3B425%3B426 Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 70
  69. 69. Storage virtualization- the next big thing?!• The logical step after server virtualization• We have been expecting it many years• Looks like it is progressing• PS – this slide is from last year… Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 71
  70. 70. Storage virtualizationIs also thee basics of sophisticated Active-Active solutions? RAC ESX/HA HACMP MSCS Veritas VCS Have the exact SAME information… In two separate locations… Storage Accessible at the SAME time Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 72
  71. 71. Use of storage virtualization• Not sure if:• Single vendor• Heterogeneous vendors• Storage virtualization via file system (example – Symantec storage foundation) Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 73
  72. 72. Enhanced Storage Virtualization BACKUP SNAPSHOTVirtual Servers Servers BC/DR Fc-sw TEST/DEV Actifio ARCHIVING 2500$ High End 500$/TB /TB 4000$/TB Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 74
  73. 73. Assessing storage essentials• Performance:• For ReadWrite ratio and block size what is the:  IO per second (more important for small block size)  Latency  Throughput (more important for large block size)• Functionality (and its influence on performance):  Copy’s and Snaps  Replication  Application Virtualization aware functionality  Deduplication  Thin provisionning  Etc. Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 75
  74. 74. Storage procurement trend• Instead of buying chassis, drives, cache, software, etc• Buy capacity with SLA (measured from the FC switch or storage box perspective)• SLA can be “worse case” or “average” (preferably the first choice) Storage Source: http://www.lablynx.com/AboutUs/DataCenter/ServiceLevelAgreement/tabid/342/Default.aspx Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 76
  75. 75. Inputs from STKI Round Table• Automatic tiring solutions (SSD to SAS to SATA) are not mature• Measuring the actual storage performance is tricky - from the “storage” or from the “application”.• Backup on DiskVTL with deduplication is standard but for long term retention physical tapes are still in use• All DR drills are not testing “real life” situation where some of the data is replicated synchronically, a-synchronicly and with DBMS replication technologies. This will cause business inconsistency in due date. Storage Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 77
  76. 76. Inputs from STKI round table• Mid-range storage array are used increasingly for critical loads.• The debate about SAN vs. NAS for VMWARE environments is not decided yet.• Enhanced shared file system (example: Symantec storage foundation) can help with storage virtualization but price is not trivial• Thin provisionning has matured but requires tight processes since with over provisionning– all applications will halt!• “Over commit” was suggested as 125% to 130% Storage Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 78
  77. 77. Usable/Raw storage ratio• Net Storage in this research – usable for applications:  After Raids  After replication to DRP  Without VTL’s  The term “Usable storage” is tricky since with snapshots application can see more storage then “Raw storage”• Slowly (but surely) the net/raw percentage is growing NETRAW Ratio 25 percentile 25% Median 50% 75 percentile 70% Source: STKI Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 79
  78. 78. Storage Ratios• Number of Raw TB and Usable TB per Storage Staff Member FTE (including backup and DRP of storage): Per FTE RAW Storage Usable Storage 25 percentile 148T 75T Median 350T 128T 75 percentile 575T 301T Source: STKI• The ratios have increased dramatically. This means that storage staff is understaffed! Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 80
  79. 79. Market Status and Recommendations• Users are using these integrators (support, maintenance, projects, etc.) in Storage•EMC• Ankor , Netapp, IBM• HDS, MALAM-TEAM• Bynet, One1-Harel, EMET, HP Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 81
  80. 80. Market Status and Recommendations• Users are using these integrators (support, maintenance, projects, etc.) in Backup•Taldor Glasshouse• Emet• IBM, Ankor, Terasky, Malam-Team• TrustIT, Bynet, HDS Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 82
  81. 81. Highend storage (including MF) Israeli Market Positioning 1Q13 Vendors to watch: Specific vendors that can deliver mush more IOPS than traditional Highend EMC systems – like Kaminario HDS Local Support IBM HP (XP) Market Presence/Perception Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 83
  82. 82. Unified (midrange) storage - Israeli Market Positioning 1Q13 Vendors to watch NETAPP HDS EMC Local Support IBM HP Midrange storage share is rising on the expenses of highend storage Market Presence Perception Pini Cohen and Sigal Russins 84 work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 84
  83. 83. Enterprise Backup SW - Israeli Market Positioning 1Q13 Symantec EMC Local Support IBM Commvault HP Actifio * Not really apples to apples Market Presence Perception Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 85
  84. 84. DEDUPVTL appliances or software*- Israeli Market Positioning 1Q13 Vendors to watch EMC HP Symantec Local Support IBM Commvault Actifio * Not really apples to apples Market Presence Perception Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 86
  85. 85. More emerging categories Scale Out NAS – EMCIsilon, NETAPP clustered mode, Panasas, IBM’s GPFS, etc. Storage virtualization- IBM’s SVC, EMC’s VPLEX Extended Storage virtualization – ActifioLocal Support Market Presence Perception Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 87
  86. 86. Agenda for technology domains Security Networking and Printing Storage Servers Desktops PC etc. DBMS Enterprise system management Development and SOA Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 88
  87. 87. Server essentials: plans Servers Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 89
  88. 88. Low power servers Servers Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 90
  89. 89. Why not considering low power servers? Servers Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 91
  90. 90. Intel vs. AMD servers Servers Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 92
  91. 91. Memory in X86 servers Servers Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 93
  92. 92. Importance of power and cooling efficiency Servers Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 94
  93. 93. Server density Servers Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 95
  94. 94. WW blade server market share Source: http://wikibon.org/wiki/v/Server_Growth_in_Blades_and_Scalable_Solutions Servers Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 96
  95. 95. Microservers• A microserver is:  Single socket;  Lightweight, low power and low cost; and  Part of a shared infrastructure environment whereby many small servers are packaged into a larger ecosystem. Servers Source: http://www.apm.com/global/x-gene/docs/2012_03_OPP%20Cloudy%20with%20a%20Chance%20of%20ARM.pdf Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 97
  96. 96. ARM servers: Calxeda Servers Source: http://www.cs.sandia.gov/Conferences/SOS16/talks/Freund.pdf Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 98
  97. 97. Servers Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 99
  98. 98. Servers Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 100
  99. 99. The HP BladeSystem c7000 Platinum Enclosure•Enhanced fabric capabilities for demanding workloads • 40% increase in mid-plane bandwidth • Support for the HP BLc 4x FDR IB Switch and Managed Switch up to 56Gb • 2x storage bandwidth with 16Gb Fibre Channel support• Intelligent Infrastructure • Standard 2400W Platinum Hot Plug Power Supply (80Plus Platinum certified) • Single Phase - Intelligent Power Module(IPDU) • Location Discovery Services Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 101
  100. 100. Inputs from STKI Round Table• Users are looking for technology that will enable then use different typesclassifications of networks in the same chassis (external, dmz, internal, “secret” x dev test prod…)• Virtual appliances issues (example – Nexus v1000) – how can I know if an error is in the virtual appliance or at the physical layer?• Who is responsible on the internal switch at the blade chassis?• Users are starting to deploy DBMS on virtual infrastructure.• VMWARE’s SRM is popular. Implementation requires “mini DR plan”• FCOE is not mature enough Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 102
  101. 101. Inputs from STKI RT: What is important in server selection?• Price, reliability, availability, ILO , partners, energy consumption – of course!• Single point of management• Enable functionality that is related to several domains. Example of domains: vmwarebladenetwork cardchassisnetwork switch• How many virtual NIC adaptors can be supported by physical NIC• Manage complete server profile from one location (bios, wwn, mac addresses, etc.)• Can I use the strongest Intel CPU’s?• How many chassis can you connect (storage, Ethernet) and manage together ?• Longevity of chassis technology Source: http://carastidbits.blogspot.co.il/2009_11_01_archive.html Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 103
  102. 102. Whitebox servers are rising?• Maybe because big data?! Servers Source: http://www.zdnet.com/asian-tech-companies-are-eating-hp-dell-and-ibms-cloud-lunch-7000008091/ Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 104
  103. 103. Super Micro Computers Servers Source: http://www.4-traders.com/SUPER-MICRO-COMPUTER-INC-47220/financials/ Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 105
  104. 104. Market Status and Recommendations• Users are using these integrators (support, maintenance, virtualization projects, etc.) in Servers-Platform Open area:•HP• EMET One1Harel• Malam-Team IBM• EMC Ubitech• Bynet Oracle Taldor Matrix Integrity-Software(SBC) Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 106
  105. 105. Server Ratios - Windows• Number of Windows Servers (logical ) per System member Per FTE All Win Servers Prod Win Servers 25 percentile 96 servers 55servers Median 117 Servers 73 Servers 75 percentile 145 Servers 92servers  Result is similar to last’s year  Server is either physical or virtual  This includes SBCVDI (CitrixWTSJetro) support• For development environment’s ratios can grow up to 600 servers per FTE• Organizations with 100% identical servers in branches can get ratios up to 1500 servers per FTE Source: STKI Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 107
  106. 106. Percent of Production Windows server from all Windows servers Per FTE Percent of prod servers 25 percentile 50% Median 64% 75 percentile 73% Server is either physical or virtual Source: STKI Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 108
  107. 107. Percent of SBC FTE vs. total FTE (system) Per FTE Percent of SBC FTE from total System FTESource: http://www.willowbrookcentral.org/new-years-day-willowbrook-dont-miss-it.html 25 percentile 17% Median 27% 75 percentile 38% Organization with significant SBC (Terminal ServerVDI) Source: STKI Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 109
  108. 108. How many users are supported by SBC (Terminal ServerVDI) FTE Per FTE Users per SBC FTE 25 percentile 333 Median 1271 75 percentile 3000Source: http://www.willowbrookcentral.org/new-years-day-willowbrook-dont-miss-it.html Users and not concurrent users Users might work completely on SBC or partly (just deliver several applications) The heavy SBC users (above 7500 users) will have “mini team” of 3-4 FTE The rest of the users will have 0.5 to 1 FTE as part of the general system team Source: STKI Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 110
  109. 109. NOC, Operators Ratio*• Number of production servers per NOC person: Per FTE Servers (win, linux, unix) 25 percentile 73 servers Median 108 Servers 75 percentile 196 Servers• Organizations will have generally 1 person in the day and 2 people at eveningnight (if organization is used to have changes during the night)• Huge variety of NOC responsibility:  Look only at monitoring screens  Batch operations (both production Control-M, FTP, and infra such as backup)  Change management  Service desk during night  Physical room – electricity, cooling• Mostly 7*24 withwithout Saturday• In organizations with no NOC the Service Desk will have to look at the monitoring screens• MF AS/400 not included in count• Last’s year data Source: STKI Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 111

×