• Save
Green Security
Upcoming SlideShare
Loading in...5
×
 

Green Security

on

  • 2,922 views

Does Green IT and Information Security combine?

Does Green IT and Information Security combine?
Check out this presentation to see some examples

Statistics

Views

Total Views
2,922
Views on SlideShare
2,915
Embed Views
7

Actions

Likes
1
Downloads
0
Comments
0

1 Embed 7

http://www.slideshare.net 7

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • מקור:http://www.complang.tuwien.ac.at/anton/computer-power-consumption.html0.067 0.003 10009 ,15 365 220.095 16.425 203.67 3285 5475 203670

Green Security Green Security Presentation Transcript

  • Your Text here Your Text here Shahar Geiger Maor shahar@stki.info Visit My Blog: http://shaharmaor.blogspot.com/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 1
  • On the one hand: Security…. Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  • Information Security GRC and Security market size (Ms of $) Your Text here 2008 2009 Your Text here 2010 Governance & Risk Management (also BCP) 35.0 42% 50.0 50% 75.0 Security (projects) 95.0 -10.53% 85.0 11.76% 95.0 Security (Software) 90.0 -5.56% 85.0 -5.88% 80.0 Total 220 0% 220 14% 250 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
  • Security/Privacy In the News Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
  • Security Trends Cloud Outsourcing cyber crime Virtualization computing Sensitive or Inability to properly confidential identify and Your Text here information may Your Text here authenticate users not be properly End-user’s to multiple systems protected organization is External threat of unable to control organized cyber the data criminal syndicates management environment Unauthorized Third parties might parties might be be able to access able to access private files without private files without authorization authorization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
  • Security Trends Data breaches involving Peer-to-peer file Web 2.0 and Mobility personal sharing mesh-ups information Unsupervised Use of P2P monitoring of Your Text here Sensitive or might result in Your Text here confidential the loss of employees’ use Inability to information that sensitive or of Web 2.0 properly ends up in the confidential applications can identify and hands of cyber business result in the loss authenticate of critical remote users criminals and information confidential identity thieves including trade secrets business data on the Internet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  • On the other hand: Green IT…. Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
  • Green IT Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  • Green IT –Sample Statistics Total CO2 emissions across countries (Million Ton): 200 150 Your Text here Your Text here 100 50 0 Source: Israel CBS , McKinsey analysis Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
  • Being Green Secure mobile access to Virtualized server, PC and PC management networks, applications, and storage environments data Your Text here Your Text here State of the art power and Intelligent archiving Teleconferencing cooling (all around) Working environment (car Printing consolidation Asset management pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  • Does Green IT and Security combine? Economics in Reducing costs = recession: “Show Green me the money” Your Text here Your Text here Security Its all about PR: considerations Almost anything are conceived as can be sold a burden under any given (“nudnik”) Green tag Security Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  • How does Green IT and Security combine? Secure mobile access to Virtualized server, PC and PC management networks, applications, and storage environments data Your Text here Your Text here State of the art power and Intelligent archiving Teleconferencing cooling (all around) Working environment (car Printing consolidation Asset management pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  • Servers Virtualization: UTM, Virtual FW est.… •Easier to manage = more Less space, less security power •What happens if the host has been penetrated? Your Text here More Your Text here Green? Secure? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  • VDI (Virtual Desktop Infrastructure) –Energy, Management and Security Efficiency TCO Comparison Solution A: Solution B: Sun Difference Difference Cumulative 3 Year Traditional Virtual Desktop (A - B) (A - B)% Desktop Devices Solution IT Costs Desktop Device Costs 3,259,204 NIS 670,834 NIS 2,588,370 NIS 79.4% Desktop Software Costs 782,627 NIS 461,522 NIS 321,104 NIS 41.0% Server Infrastructure Costs 296,448 NIS 1,248,949 NIS (952,501 NIS) -321.3% Desktop Management Labor Costs Your Text here 5,724,578 NIS 2,137,760 NIS 3,586,818 NIS Your Text here 62.7% Desktop Power Costs 314,788 NIS 135,494 NIS 179,294 NIS 57.0% Total IT Costs 10,377,645 NIS 4,654,559 NIS 5,723,085 NIS 55.1% Business Operating Costs Desktop User Productivity Impact 4,473,911 NIS 0 NIS 4,473,911 NIS 100.0% Business Risks 538,416 NIS 26,919 NIS 511,496 NIS 95.0% Total Business Operating Costs 5,012,327 NIS 26,919 NIS 4,985,408 NIS 99.5% Total 15,389,972 NIS 4,681,479 NIS 10,708,493 NIS 69.6% Source: www.alinean.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
  • How does Green IT and Security combine? Secure mobile access to Virtualized server, PC and PC management networks, applications, and storage environments data Your Text here Your Text here State of the art power and Intelligent archiving Teleconferencing cooling (all around) Working environment (car Printing consolidation Asset management pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  • PC -Energy Efficiency and Power Consumption Why don’t you always shut down your PC when you have finished working for the day (multiple responses allowed): It's IT policy or procedure to leave it on My computer goes to hibernate, or to sleep mode It takes too long Your Text here Your Text here It's a habit I don't think it's important It's a hassle I forget 0% 10% 20% 30% 40% 50% Source: E1, PC Energy Report Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  • PC -Energy Efficiency and Power Consumption Power Usage for Desktop PCs (watts) Idle Sleep Savings Mean of LBNL-measured Pentium- 4 67.3 3.3 64.0 machines Mean of 17-inch CRT monitors 61.2 1.8 59.4 Mean of 17-inch LCD monitors 35.3 2.3 33.0 Your Text here Energy Savings for Desktop Power draw Power draw here Your Text Savings per PCs (kWh) per per year year year (idle) (Sleep) (Sleep vs. idle) Typical P4 machine with 17- 791.56 31.42 760.14 inch CRT Typical P4 machine with 17- 632.02 34.50 597.52 inch LCD Source: Windows Hardware Developer Central Source: Windows Hardware Developer Central Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  • Energy Calculations Power Cost Total Watts Power Cost PC (W) Monitor (W) per Hour Used per Year (0.45 ₪/kWh) Basic PC with Flat-Screen 60 40 100 0.045 ₪ 394.2 ₪ Monitor Basic PC with 60 80 140 ₪ 551.88 ₪ CRT Monitor Your Text here Your Text here Office PC with Flat-Screen 0.067 ₪ 587 ₪ 110 (3.1) 40 (3.3) 150 (6.4) Monitor (0.003 ₪) (26.28 ₪) (sleep mode) Office PC with 110 80 190 0.08 ₪ 700 ₪ CRT Monitor High-End PC with Large 300 50 350 0.15 ₪ 1314 ₪ 18 Flat Screen
  • Endpoint Management Your Text here Your Text here http://www.symantec.com/business/solutions/enterprise.jsp Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  • How does Green IT and Security combine? Virtualized Secure mobile server, PC and access to PC management storage networks, applicati environments ons, and data Your Text here State of the art Your Text here Intelligent archiving power and cooling Teleconferencing (all around) Working Printing environment (car Asset management consolidation pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
  • Israeli Output Statistics Average A4s usage per year per employ: 2,000 4,607 10,000 Average color coverage per page: 1% 11% 71% Your Text here Your Text here Average cost per printed page: 0.045 NIS 0.24 NIS 1 NIS Average percentage of jobs of more than one page: 47% 75% 91% Source: Prime² (STKI’s modifications ) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
  • Secure Printing Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
  • How does Green IT and Security combine? Secure mobile access Virtualized server, PC to PC management and storage networks, applications, environments and data Your Text here State of the art power Your Text here Intelligent archiving and cooling (all Teleconferencing around) Working environment Printing consolidation Asset management (car pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
  • Green & Secure Billing Your Text here Your Text here Source: Comda Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
  • Interactive PDF Form Creation Process Copy Files PrintBOS Designer Tool Archive Database Designed Template with Static Data Interactive PDFs View PrintBOS Server Compose Your Text here Your Text here Add Distribute Static & Output Email Interactive Interactive Variable PDF File Att./URL Elements PDF Data Print Variable Data from Backend System (CRM, Billing, …) Fax Source: NessPro Israel Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
  • How does Green IT and Security combine? Secure mobile Virtualized server, access to networks, PC management PC and storage applications, and environments data Your Text here State of the art Your Text here Intelligent archiving power and cooling Teleconferencing (all around) Working Printing environment (car Asset management consolidation pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
  • Remote Access via SSLIPSec VPN Your Text here Your Text here Source: SonicWall Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  • One last thing: Data scrambling + Cloud Computing = Green Security Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
  • Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29