• Save
STKI Summit 2009 -Infrastructure Services Trends
Upcoming SlideShare
Loading in...5
×
 

STKI Summit 2009 -Infrastructure Services Trends

on

  • 3,605 views

A coprehensive version of Israeli market trends in the IT security, Networking and Grenn IT sectors

A coprehensive version of Israeli market trends in the IT security, Networking and Grenn IT sectors

Statistics

Views

Total Views
3,605
Views on SlideShare
3,524
Embed Views
81

Actions

Likes
2
Downloads
0
Comments
0

3 Embeds 81

http://securitypie.com 73
http://www.slideshare.net 6
http://www.techgig.com 2

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

STKI Summit 2009 -Infrastructure Services Trends STKI Summit 2009 -Infrastructure Services Trends Presentation Transcript

  • Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info Visit My Blog: http://shaharmaor.blogspot.com/ 1
  • Agenda Information 1 Information Security Security 2 Communication Networking Networking Your Text here Your Text here 3 Green IT Green IT Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  • 2009: Application to-do-list a. Flexible staffing based on good temps vendors b. Contract renegotiations and multisourcing of temps c. Requirement and portfolio management and rationalization d. Maintenance and requirement release management e. Application integration, reuse, atmaa and SOA f. Automating and outsourcing testing Your Text here Your Text here g. ERP instance consolidation h. Application Hosting and SaaS i. New licensing strategies j. Self service software (even e-learning) k. User authentication and password management l. Automated compliance software Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
  • 2009: Infrastructure to-do-list a. Desktop simplification b. End-user help desk c. Green IT and recycling d. Consolidation of servers, storage and end ser platforms e. Demand management Your Text here Your Text here f. Storage management and rationalizing g. Exception oversight h. Bandwidth prioritizing i. Open source software j. Print management k. Hosting and utility computing Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
  • Information Security Information Security GRC and Security market size (Ms of $) Your Text here 2008 2009 Your Text here 2010 Governance & Risk Management (also BCP) 35.0 42% 50.0 50% 75.0 Security (projects) 95.0 -10.53% 85.0 11.76% 95.0 Security (Software) 90.0 -5.56% 85.0 -5.88% 80.0 Total 220 0% 220 14% 250 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
  • Information Security/Privacy In the News Security -Trends Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  • Information Security Trends Security -Trends Cloud Outsourcing cyber crime Virtualization computing Sensitive or Inability to properly confidential identify and Your Text here information may Your Text here authenticate users not be properly End-user’s to multiple systems protected organization is External threat of unable to control organized cyber the data criminal syndicates management environment Unauthorized Third parties might parties might be be able to access able to access private files without private files without authorization authorization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
  • Information Security Trends Security -Trends Data breaches involving Peer-to-peer file Web 2.0 and Mobility personal sharing mesh-ups information Unsupervised Use of P2P monitoring of Your Text here Sensitive or might result in Your Text here confidential the loss of employees’ use Inability to information that sensitive or of Web 2.0 properly ends up in the confidential applications can identify and hands of cyber business result in the loss authenticate of critical remote users criminals and information confidential identity thieves including trade secrets business data on the Internet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  • Information Underground Economy Security -Trends Items for sale on underground servers, appearance and price: Your Text here Your Text here Source: Symantec Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
  • Information Underground Economy Security -Trends Items for sale on underground servers, appearance and price: Your Text here Your Text here Source: Symantec Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  • Information Technologies Categorization 2009 Security -Trends Business Value Investment to make money Remote Access Cut costs, Increase Manage Sec. productivity IAM/IDM Services IT Project Business SSO Cloud Project App. Your Text here Anti Your Text here Sec. DLP Size of figure = Commodity IT X Mobile complexity/ EPS SIEM/SOC Sec. Services cost of project DB Vir. Network NAC Sec. Sec. Security Investment for regulations GRC Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  • Information STKI Madad 2008-2009 Security -Trends Network DLP Hardening Market Players 5% 4% 3% 5% Access GRC 18% 5% Miscellaneous EPS/Anti x 6% Your Text here Your Text here 14% NAC DB Protection WAF & Apps 6% 7% 11% Management Trends 8% 8% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  • Information Security Ratios Security -Trends Organization Type Ratios of Security Personnel (Israel) Average Public Sector 0.1% of Total Users Your Text here Your Text here Sensitive Public Sector 0.5% of Total Users Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  • Information Sophisticated Threat Environment Security -Trends First-Stage Second-Stage Writers Middle Men End Value Abusers Abusers Hacker or Fame Tool Writers Direct Attack Compromised Host and Application Theft Malware Machine Extortionist Writers Harvesting DDoS for Hire Botnet Creation Espionage Worms Spammer Text here Your Text Information here Your Harvesting Botnet Extortion Management Viruses Internal Theft Phisher Abuse of Commercial Privilege Personal Sales Trojans Information Pharmer/DNS Poisoning Fraudulent Sales Information Spyware Brokerage Identity Theft Click Fraud Electronic IP Leakage Financial Fraud Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14 Source: Cisco Israel
  • Information Application Security Security -App. Sec STKI observation: Secure development should be an integral part of any new project and therefore should be calculated within the project’s budget. STKI survey shows that spendings on secure development scale from 0% of total project budget (Main-Frame based projects) up to 10% ( core web applications projects) of total project budget. here Your Text Your Text here Average spending on secure development is 5% of total project budget (including: training, code review and penetration tests) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  • Information Web Applications - Vulnerabilities Security -App. Sec Probability to detect vulnerabilities of different risk degree (results of 32,717 sites and 69,476 vulnerabilities of different degrees of severity) Your Text here Your Text here % Sites (All) % Sites (Scanned) % Sites (Black & Whitebox) Source: http://www.webappsec.org/projects/statistics/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  • Information Web Applications -Vulnerabilities Security -App. Sec Vulnerability frequency by types: 1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to system design errors 2. Information Leakage and Predictable Resource Location are often connected with improper system administration (for example, weak access control) Your Text here Your Text here Source: http://www.webappsec.org/projects/statistics/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  • Information Application Security –Dev. LifeCycle Security -App. Sec Security & Privacy Training Security Security Security Security Final Security & Security & & Public Security Security & Security Arch & Privacy & Push Security RTM Privacy Privacy Release Servicing & & Cost Privacy Attack Surface Best Dev Docs Best Privacy Privacy & Or Response Privacy Analysis Design Review Practices and Tools Test Response Review Pen Privacy RTW Execution Kickoff Best Risk For Plans Reviews and Tools Practices Testing Practices Analysis Product Traditional Microsoft Software Product Development Lifecycle Tasks and Processes Your Text here Your Text here Design Code Feature Lists Testing and Verification Product Support Specifications Signing + Quality Guidelines Service Packs/ Checkpoint RTM Arch Docs QFEs Security Development Express Schedules Functional Bug Fixes Signoff Updates Specifications of New Code Support Requirements Design Implementation Verification Release & Servicing Source: MICROSOFT SECURITYremove source or attribution from any graphic or(SDL)ofGUIDE Shahar Maor’s work Copyright 2009 @STKI Do not DEVELOPMENT LIFECYCLE portion graphic 18
  • Application Security Information Security –Israeli Players and Positioning -1Q09 -App. Sec Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  • Information Web Application Firewall Security -App. Sec What is it? "An intermediary device, sitting between a web-client and a web server, analyzing OSI Layer-7 messages for violations in the programmed security policy. A web application here Your Text firewall is used as a security Your Text here device protecting the web server from attack.― (WASC) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
  • Web Application Firewall Information Security –Israeli Market Players -App. Sec Solution What Should I Know? Representatives/ Integrators Applicure - dotDefender Host based Israeli WAF provider (On Apache and 2BSecure, (Apache and IIS) IIS web servers). Awarded Frost & Sullivan Award Comtec, for Successful Technology Innovation (Oct 08) Overline, Msecurity, Comda, New age Barracuda - Web Provides single point of protection for inbound Trek-IT, ABnet Application Firewall here Your Text and outbound traffic for all Web applications. Text here Your (fromerly Appliance that has SSL Acceleration and Load NetContinuum) Balancing capabilities. Breach Security - Typically deployed in an out-of-line mode so it Direct sales WebDefend present no latency threat to the network. Can locate indications for poor web applications design. Not quite common in Israel Citrix - Application Strong attack detection and protection, traffic Aman Computers Firewall (Formerly Teros) throttling and blocking. Excellent integration with the NetScaler suite. Weak GUI compare to other solutions. No projects in Israel yet. Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
  • Web Application Firewall Information Security –Israeli Market Players -App. Sec Solution What Should I Know? Representatives/ Integrators Cisco* - ACE XML A key component of the Cisco ACE family. It Bynet, Taldor, Gateway enables efficient deployment of secure, reliable, Bezeq Int., and accelerated XML applications and Web 2BSecure services. Few Deployments in Israel IBM* –Data Power Powerful XML FW with added values of WAF, load Tangram balancing and applications acceleration. Very (Matrix), Elad Your Text here strong presence in Israel as a XML FW solution. Group Your Text here Microsoft –IAG WAF IAG comes with built-in web application firewall Elad, Matrix, for known web applications like: Outlook Web DBNet, HP, Access, Share Point, iNotes, Domino Webmail, M-Security, Microsoft CRM and more. Quite successful in Securenet Israel Protegrity - Defiance Based on KaVaDo, Strong presence worldwide, 012 Smile, Matrix but few Israeli clients Radware - AppXcel WAF Based on Imperva Bynet, Netvision *Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
  • Web Application Firewall Information Security –Leading Players -1Q09 -App. Sec Solution What Should I Know? Representatives/ Integrators F5 - Application Security One of the best WAFs around. Features a good Trek-IT (Dis.), Manager (ASM) policy toolset for adaptive learning. Offer strong Artnet, integration to the TMOS family of products. Taldor, Spider, Superb load balancing capabilities. One of two Bezeq Int., One Your Text here leading solutions in Israel. Strong market Your Text here NewAge, Netcom presence Imperva – SecureSphere The first in the Israeli market. Imperva has an Comsec (Dis.), array of out-of-the-box policies and attack Netcom, Bynet, signatures as well as superior learning mode . A Taldor, NewAge, leading DB protection solution. Has a significant 012 Smile market share Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
  • Information Network Security Security -Network Sec Enterprise FWs have long become an essential security foundation FW selection should consider: • Capabilities (especially deep inspection, blocking Capabilities and throughput speed) Your Text here Your Text here • Ease of deployment • Integration with other network infrastructure • Cost The perimeter defense is not dead. Instead it got thickened: Network complexity triggered the use of virtual FWs running over one machine Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
  • Information Network Security Security -Network Sec Business operations and networks have become very complex FW solutions should have strong management and configurations capabilities in order to adjust themselves (Next Generation FW): New versions Text here offer a NGFW Your Text here Your of FWs built in IPS solution. This convergence is logical since both FW and IPS solutions are latency-sensitive and can work together in high speed Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
  • Information Israeli FW Market: Leading Solutions Security -Network Sec Network FW market share as % of total deployments 100% 90% 80% 70% 60% 50% 92% Your Text here Your Text here 40% 30% 20% 10% 22% 0% 20% 14% 30% CheckPoint Cisco Juniper Fortinet Other Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
  • Israeli FW Market: Information Security Leading Solutions and Integrators -Network Sec Checkpoint Juniper Cisco Fortinet Bynet x x x Taldor x x x Bezeq Int. x x x Netvision x x x Netcom x x 012Smile x x 2Bsecure x Your Text here x Your Text here Artnet x x IBM x EDS (HP) x Ness x One x Spider x Matrix x WE x ICT x Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  • Information Israeli IPS Market: Leading Solutions Security -Network Sec IPS market share as % Of total respondents 40% 35% 30% 25% 20% 38% Your Text here Your Text here 15% 10% 21% 32% 5% 0% 9% McAfee IBM (ISS) Juniper Other/None Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
  • Israeli IDS/IPS Market: Information Security Leading Solutions and Integrators -Network Sec McAfee IBM(ISS) Juniper Tipping point (3COM) Bynet x x x 2BSecure x x Netcom x x Aman x Netvision x Your Text here Your Text here Ness x Taldor x Spider x Calcom x WE x Matrix x One Securenet x Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
  • Information Network Access Control Security -Network Sec Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
  • Information NAC Insights Security -Network Sec NAC has not been ―fully digested‖ by Israeli customers in 2008. There should be more activity in 2009 NAC can be deployed less expensively when it is an embedded feature of an existing vendor and customers take notice of it Some network and security vendors alreadyText here Your Text here Your have solutions that can be part of the NAC process (AC, IPS) – An important starting point for market domination  Israeli customers first priority: implement a guest networking control Network or Security? NAC is a Layer 2 vs. Layer 3 match Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
  • Information NAC –Solutions Security -Network Sec Solution Value for Customer Notes Access Layers – •Multiple switch vendor support Strong Israeli Port Nox (Israeli •Agentless presence. vendor) •Score based authentication Integrators: •No 802.1x authentication Netcom, Netvision, 2BSecure, Trustnet CheckPoint –NAC •Strong personal firewall and VPN client software Strength in NAC (Israeli vendor) Text here Your player Your Text depends on ability here •EPS & NAC functionality in a single endpoint client to compete in the •OPSEC Alliance Endpoint •ease of implementation in remote access applications Protection market! CP is not a first choice Cisco -CNAC •Both Appliance & infrastructure-based approach Few projects and •Support of non-traditional endpoints POCs in Israel. •Large install base in Israel –cost effective solution Natural first choice for many users Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
  • Information NAC –Solutions Security -Network Sec Solution Value for Customer Notes Enterasys -Sentinel •Cross-vendor platform Penetration mainly on •MAC, 802.1x authentication and Enterasys install base in more Israel. Netcom, Artnet •Guest registration module are strong integrators ForeScout -CounterACT (Israeli •Out-of-band NAC appliance No packet filtering vendor) Your Text here •integration with a number of capabilities. Your Text here remediationdirectory solutions Few clients in Israel •Built-in RADIUS proxy for 802.1X support HP Pro-Curve - •Both appliance-based and HP Pro-curve is gaining Endpoint Integrity Agent ground in the Israeli LAN •Strong management system market and therefore (Identity Driven Manager) becoming an important NAC player. Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
  • Information NAC –Solutions Security -Network Sec Solution Value for Customer Notes Insightix –NAC (Israeli •Real-time "state" of all devices connected Few implementations in vendor) to the network Israel and abroad. •Agentless visibility functionality Integrators: Bynet and •Cross-vendor platform Overline Juniper -UAC •Impressive array of enforcement options Some of the features •supports third-party HW via 802.1x require other Juniper Your Text here Your Text here in the components network (FW, IDS…) McAfee -MNAC •comprehensive client security suite Best fit McAfee clients. •One of the better integration strategies Strong EP player with NAC with Microsoft NAP functionality Microsoft -NAP •Has one of the strongest access and Integrate with many other enforcement architectures NAC solutions. contributor •Uses Forefront and AD for superior to the standardization of policy management NAC 34
  • Information NAC –Solutions Security -Network Sec Solution Value for Customer Notes Nortel -SNA •Cross-platform device support unmanaged •Appliance that collects contextual user and device infrastructure information from multiple support -via NAP network sources Symantec -SNAC •Pure software-based solution Very good solution •Provide strong threat protection solutions for EPS customers Your Text here •One of the most comprehensive reporting Text here Your and auditing frameworks XOR –SWAT •MAC based NAC Dozens of (Israeli •Provides access control for switches and implementations in vendor) devices that don’t support 802.1x Israel •Cost effective 80-20 solution Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
  • Information STKI Israeli Positioning Security -Network Sec Not a technological positioning, refers only to Israeli market• Focused on enterprise market (not SMB)• Vendor A Not an STKI recommendation• Market Presence (X)  Vendor B Local Support Market share - existing and new sales (more emphasis)  Mind share (how user organizations rate vendors)  Local Support (Y) – is influenced by (X)  Worldwide Leader Experience & technical knowledge, localization,  support, number and kind of integrators Worldwide leaders marked, based on global positioning Vendors to watch: Are only just entering israeli market so can’t be positioned but should be watched Vendors to Watch: Vendor C Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
  • NAC Information Security -Network Sec - Israeli Market Positioning 1Q09 Vendors to Watch: HP Procurve Check Point Microsoft Local Support Cisco Player Symantec Worldwide Juniper XOR SWAT Access Layers Leader Enterasys Leap McAfee ForeScout Insightix Nortel This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
  • Information Endpoint Security Security -EPS Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
  • Information Endpoint Security -Threats Security -EPS Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
  • Information Endpoint Security -Protection Security -EPS Organization Outside Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
  • Information Endpoint Security -Protection Security -EPS Organization Outside Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
  • Information Endpoint Security -Protection Security -EPS Anti X DLP Organization NAC Outside Your Text here Your Text here Manageability Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 42
  • Anti -X Suites Information Security - Israeli Market Positioning 1Q09 (Enterprise Leaders Only) -EPS Symantec Local Support McAfee Trend Micro Player Worldwide Leader Microsoft This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 43
  • Data Centric Security Data Centric Security Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 44
  • Data Centric Data Centric Approach Security Your Text here Your Text here Build a wall – “perimeter “Business of Security” – Security security” is built into the business process Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
  • Data Centric Data Centric Security Arena Security DLP ERM Database Encryption Protection Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
  • Data Centric Data Centric Approach Security Business Efficiency Ubiquitous Regulatory access to Your Text here information Business Compliance here Your Text Goals for Security Today Protection Protection from of Assets Financial from Loss Threats Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
  • Data Centric Data Centric Approach Security Develop practical end–to-end solutions that will protect your information right now with what you Identifying, Defining now have & Assessing your Provide a pure and total Data, Intellectual focus on this complex, Capital and mission-critical area Your Electronic Assets Text here Your Text here Security is Business perspective an End-to-end view and full approach – top down life-cycle security ongoing Process Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
  • Data Centric Data Leak/Loss Prevention Security -DLP Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
  • Data Centric Data Leak /Loss Prevention Security -DLP  DLP is an overall framework into which different elements fit  There are three types of data that may leak: • Data at rest • Data in transit • Data on endpoints Your Text here Your Text here  No single DLP focus area is full proof, an optimal solution should cover all three areas  DLP is a growing area, and vendors react accordingly  It is suggested to use full-suite vendors in order to avoid integration problems Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
  • Data Centric DLP –Market Status Security -DLP DLP Deployments Status -Israel 1Q09 Solution Deployed 20% Your Text here PlanYour Text here to Deploy Not "There" Yet Soon 60% 20% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
  • Data Centric DLP–World Trends Security -DLP Your Text here Your Text here Source: Aberdeen Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
  • Data Centric DLP –Market Status & Players Security -DLP World Leaders (consolidation in progress…): • Symantec (Acquired Vontu, 2007, 350$ M) • Websense (Acquired PortAuthority 2007, 90$ M) • Reconnex (Acquired by McAfee, July 2008, 46$ M) • Tablus Text here Your (Acquired by RSA, 2007, 40$ M) Your Text here • Vericept ? Workshare? Main drivers for DLP are: • Regulations such as Payment Card Industry (PCI), Accountability Act (HIPAA) • e-mail security, instant messaging (IM) and endpoint monitoring solutions Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
  • Data Centric DLP - Israeli Market Positioning 1Q09 Security -DLP Vendors to Watch: ProofPoint Workshare IBM (ISS) Local Support Player Worldwide Leader Websense Fast Movement McAfee Verdasys Symantec This analysis should be used with its supporting documents RSA Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
  • Data Centric ERM Security (Enterprise Rights Management) -ERM Enterprise Rights Management (ERM) technology—also known as Enterprise DRM or Information Rights Management (IRM) What is it? • ERMYour Text hereencrypting files that contain Your Text hereand only entails content allowing those users or devices that have proper credentials to decrypt the files and access the content Awareness of ERM has increased ERM has been growing steadily since it became a technology category unto itself about five years ago Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
  • Applications and File Formats Data Centric Security Used in ERM Implementations -ERM Your Text here Your Text here Source: Gilbane Group Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
  • Data Centric ERM –How Does it Work? Security -DLP SQL Server Active Directory 1. New user is authorized to use RMS 2. The User defines set of rules and content usage rights for the data he wants to share – He is the data owner RMS Server 3. User distributes data to relevant recipients Your Text here Your Text here 4. When recipient tries to open a file –a 1 4 request is sent to the RMS Server in order to authorize/deny access 5. RMS enforces rules made by the data 2 3 5 owner Data owner Recipient Source: Microsoft Israel Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
  • Data Centric ERM -Israeli Market Players Security -ERM Microsoft -Rights Management Services EMC- EMC Documentum IRM Product Suite Oracle - Oracle Information Rights Management Adobe –Adobe LifeCycle Rights Management SU: IsraeliYour Text here Your Text here Secure Islands -A provider of an advanced information protection and control (IPC) solution Covertix –Develops innovative software technology to track, monitor and control documents and files within and outside the organization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
  • Data Centric Security DB Protection –Market Status -DB Protections DB Protection Deployments Status -Israel 1Q09 Leading Israeli Players: Not "There" •Sentrigo Yet 49% •Imperva Plan to •Oracle DB Vault Deploy Soon •Guardium Text here Your 30% Solution Your Text here Deployed 20% DB encryption: OtherDo Not Decru –by NetApp Know 1% Ged-i (Israeli SU): offers high-level encryption to Storage Data Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
  • Data Centric Security Masking of Production Data -Data Masking  What is it? • The process of data masking is designed to ―de-identify‖ data, such that the data remains based on real information, but no longer has any practical usage or application  What is the need? • The drive to outsource and offshore application development and Your Text here testing work means that organizations will have little control Your Text here over who gets to see their data • Test environments are not physically as secure as production systems  What can go wrong? • Sensitive data might be downloaded to laptops and stolen • Employees might misuse sensitive information and engage in fraudulent activity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
  • Data Centric Security Masking of Production Data -Data Masking Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
  • Data Centric Security Masking of Production Data -Data Masking Your Text here Your Text here Source: Securosis.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 62
  • Data Centric Security Masking of Production Data -Data Masking Israeli market players (alphabetize): • Compuware (File-AID) –Few implementations • DataVantage (Global) Your Text here Your Text here • IBM (Optim) –Few POCs • Informatica (PowerCenter) - Few POCs • Oracle (Enterprise Manager Data Masking) – For Oracle DBs only Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
  • SIEM/SOC SIEM/SOC Your Text here Your Text here 64
  • SIEM/SOC SIEM/SOC  What is SIEM? • Security Information & Event Management  What is SOC? • Security Operation Center • Collects and analyzes all log data and basic event management Your Text here Your Text here • monitors and manages all aspects of enterprise security in real time, from a single, centralized location • The NOC of security  Why do we need it? • Need for real-time awareness of internal/ external threats • Ensure business continuity and comply with regulations Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
  • Silos of Redundant Information SIEM/SOC Management Your Text here Your Text here Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
  • An Enterprise Platform for Compliance SIEM/SOC and Security Your Text here Your Text here SIEM Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
  • SIEM/SOC -Israeli Trends SIEM/SOC CA has been the first to enter the market and gained considerable market share in the high-end market ArcSight was introduced two years later. This solution was easer to deploy and much easer to manage End ofYour Text here 2007: Symantec SSIM and RSA Envision were Your Text here introduced to the market, both easy to deploy, scalable and relatively intuitive CA has lost some of it market share to the other new comers Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
  • SIEM/SOC -Israeli Players SIEM/SOC Solution Leading Integrators ArcSight We (Exclusive representative) CA 1. Netcom 2. TrustNet 3. Ness Cisco 1. Bynet Your Text here 2. Netcom Your Text here RSA 1. TrustNet 2. Xor 3. Bynet IBM Ness NetIQ Calcom (Exclusive representative) Symantec 1. Netcom 2. Bynet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
  • SIEM/SOC SIEM/SOC - Israeli Market Positioning 1Q09 Vendors to Watch: IBM -MSS TriGeo Local Support ArcSight Player Worldwide Leader RSA Fast Symantec Movement CA IBM Cisco This analysis should be used with its NetIQ supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
  • Next Generation SIEM/SOC: MSS SIEM/SOC -MSS What does MSS offer? -Comprehensive solution for security management: • Firewall/EP Management Service • Intrusion Detection & Prevention Management Service • Vulnerability Management Service Your Text here Your Text here Why should we go there? • Cost effective! • Use of best-of-breed security Why shouldn’t we? • Who owns my data? • No one else in Israel goes there…yet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 71
  • SIEM/SOC MSS Trends in Israel -MSS STKI observation: MSS is well accepted in SMB organizations, but Israeli CISOs in enterprises still strongly oppose this trend The current economic downturn should encourage Your Text here Your Text here some enterprises to reconsider MSS MSS providers addresses the management (CFOs and CEOs) in order to attract new clients Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 72
  • SIEM/SOC MSS –World Leaders -MSS Delivery Great Potential for: •Current world leaders (IBM, Symantec) • local ISPs •Network integrators •Traditional OS players Market Penetration (Source: Frost and Sullivan) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
  • Identity & Access Management (IDM/IAM) IDM/IAM Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
  • IDM Global Mega Trends IDM/IAM  Fraud and identity theft will increase strong authentication use  Strong authentication and SSO will strengthen their ties  Context-based authorization will put risk analysis here Your Text here Your Text into access control decisions  Physical and logical security will continue to converge  Federation will slowly grow Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
  • IDM/IAM Savings IDM/IAM Your Text here Your Text here Source: http://blogs.technet.com/mcs-ireland-infrastructure/default.aspx Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
  • IDM/IAM Market Lifecycle Positions IDM/IAM Your Text here Your Text here Source: Butler Group Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
  • Trends in the Israeli Market IDM/IAM  Nov 2008: CA acquired Eurekify to enhance its role-based management suite  ERP based SOD solutions start to be seen, mainly for GRC reasons: • 2006: SAP acquired Virsa, enterprise risk management software provider, to bolster SAP’s software compliance skills Your Text here Your Text here • 2008: Oracle acquired Logical Apps, an automated GRC controls, for enterprise applications  Israeli new GRC enforcement Start-Ups: • Xpandion -Risk management and behavioral analyzing software solutions • SPATIQ –provides an automated tool for Entitlement Management Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
  • IAM/IDM IDM/IAM - Israeli Market Positioning 1Q09 Vendors to Watch: SPATIQ Local Support IBM Player Novell Sun (OS) Worldwide Leader CA Prominent WAM Player BMC Microsoft Oracle Velo (OS) This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
  • Key Success Factors for Future IDM Project IDM/IAM Consider IDM also as a business project, rather than a pure IT project Make sure the project bridges the gap between business and IT  StartYour Text here easier success (Single Signhere a small for Your Text On, vertical project)  Choose a step-by-step approach, rather than a mastodon implementation. Focus on basic functionalities not on the additional features Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 80
  • IDM/IAM SSO Israeli Market -SSO  Players in Israel:  Imprivata -Easily integrate target systems, quick & painless deployment, but doesn't come cheap  Oracle, Citrix & RSA (EMC) -OEM with Passlogix  Novell Your Text here -OEM version of ActivIdentity SecureLogin Your Text here  CA -Script-based architecture, Part of eTrust IAM suite  IBM – Part of the TAM suite  Sun –Open SSO: Built in solution  BMC –Based on Java System Solutions Single Sign On  Microsoft –Built in solution to the ILM suite Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
  • IDM/IAM Strong Authentication -Options -Strong Auth. what are the current options for SA? 1. Biometric and smart-cards: excellent solutions, but require expensive readers on every user’s desktop (Atena, NITGEN, L-1, Visual Defense, SecuGen est.) 2. software tokens: Prone to virus attacks Your Text here easy to Your Text here and too share between users from the same household (Oracle, RSA est.) 3. USB tokens: Most are deployed with a certificate and work within PKI environments (RSA, Aladdin, Vasco est.) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 82
  • IDM/IAM Strong Authentication –Options -Strong Auth. 4. OTP fobs: Cost effective, but might not have robust encryption (Entrust, Vasco, RSA est.) 5. Voice delivered token: OTP via an automated voice call 6. Mobile OTP: Use an authenticator that theText here already Your Text here Your user has. Cost effective solution (Cidway, Vasco) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 83
  • Information Security Consultants Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 84
  • Information Security Integrators Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 85
  • Information Security Distributors Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 86
  • Networking Networking Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 87
  • Networking Networking Networking market size (Ms of $) Your Text here Your Text here 2008 2009 2010 LAN equipment 80.0 -25.00% 60.0 8.33% 65.0 WAN equipment 50.0 -20.00% 40.0 12.50% 45.0 VoIP equipment 40.0 -20.00% 32.0 25.00% 40.0 Totals 170.0 -22.35% 132.0 13.64% 150.0 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 88
  • Networking Networking Future Trends Trends Datacenter Networking virtualization Next Generation Networking Internet Protocol (IP) Core and High Speed Broadband Green Networking IPv6 Your Text here Your Text here Network Operating systems Network intelligence and policy control Network Security Communication billing Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 89
  • Networking Technologies Categorization 2009 Trends Business Value Investment to make money SAAS/ Cut costs, Increase Cloud IT Project productivity Optimization UC Business Project Billing NGN Your Text here Your Text here Commodity IT VOIP Networking IPv6 Size of figure = Infra. Vir. complexity/ Services Network cost of project Security Investment for regulations Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 90
  • Networking Year of savings and productivity Trends What networking technologies are you investing-in to enhance employee productivity and collaboration in 2009? (Answer all that apply) 2009 2008 52% 55% 46% 36% 29% 31% 32% Your Text here Your Text here 23% 19% 11% 13% 9% 8% 1% NA NA Shahar Maor’s work Copyright 2009Source: Goldman Sachsor attribution from any graphic or portion of graphic @STKI Do not remove source Research 91
  • Networking Ratios and Budgets -2008 Trends Network Ratios Israel World Network Staff Network Personnel/Total On average: 9.5% of total IT Users: (Israel: 3.5% -Low Network •1:200 in high-tech global prices, Short distances) organizations •1:1500 in industrials/governmental Your Text here Your Text here companies •1:2200 in low-tech/services sectors Budgets Trends •High-tech/finance –decrease On average: same as 2007 (~5%) •Services/government –same as 2007 •Retail/food/other traditional sectors –small increase Source: STKI, Computer Economics Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
  • Networking STKI Madad 2008-9 Trends Optimization Market Players 2% 8% UC 8% VOIP and IPTel 20% Nortel 10% Network Infra Your Text here Your Text here 20% Trends Miscellaneous Network Costs 10% 12% Reduction 10% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 93
  • Local Area Network Trends Networking -LAN  LAN vendors should support standard-based platforms  Security embedded features in the LAN infra are imperative  Network Virtualization is on the horizon  Israeli Trends: • Corporate here to endpoints is stable: 100 MBIT Ethernet; Your Text LAN Your Text here Backbone LAN: 2 X 1GBIT (10GBIT in some cases) • Israeli enterprise tend to ―count on‖ either Cisco or Nortel for their backbone network. Other players appear on the network edges Preferred Integrators for LAN issues: Netcom and Bynet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 94
  • LAN Networking -LAN - Israeli Market Positioning 1Q09 Vendors to Watch: Foundry Local Support Cisco Nortel Player Worldwide Leader Enterasys 3COM HP Juniper This analysis should be used with its Alcatel supporting documents Extreme Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 95
  • Networking The Nortel Crisis -Nortel From 90K to Feb 08: 30K Nortel says Nortel employees it will cut announces 2,100 jobs More and 1,300 more layoffs… layoffs Nortel says several Your Text here Nortel executives Your Text here files Nortel for bankruptcy Reports to leave in protection Financial 2009 Results for Q3 2008 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 96
  • The Nortel Crisis –What’s next? Networking -Nortel Nortel files for Chapter 11 to ―deal decisively‖ with its historic debt burdens Nov 10’th 2008: A Nortel spokesman said the company had enough liquidity to sustain 12 to 18 months of operation under the current conditions Your Text here Your Text here Survival still possible for Nortel, but Companies that exit the bankruptcy process often emerge in smaller form and are frequently acquired in part or whole by larger suitors looking for a good deal 19.2.09: Radware has purchased Nortel’s Alteon… Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 97
  • The Nortel Crisis Networking –Israeli Market ”What if” Analysis -Nortel Acquiring parts of Nortel? Alliance with Avaya Cisco HP and Microsoft Juniper Acquire Nortel’s Telephony? Your Text here Your Text here •Enterasys (LAN and sec.) Gores •Siemens (Telephony) Goes deeper into the Alcatel Israeli market? Goes deeper into the 3COM Israeli market? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 98
  • Networking WAN –Wide Area Network -WAN STKI Observation: Vast Majority of Global Israeli-based organizations use MPLS networks for interconnectivity of core applications Average Number Average Number Average Number of Employees of Remote Sites of MPLS Lines 1,300 20 10  What’s Your Text here the rush? Your Text here • Greater Performance problems than ever before  Why MPLS? • Provides diversified range of services (Layer 2, Layer 3 and Dial up VPNs) • Provides end to end single-point management with flexible SLAs for customers  Why not MPLS? • doesn’t come cheap…. Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 99
  • Networking WAN Optimization -WAN WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN: VOIP Deployments Data Center Consolidation Your Text here Your Text here 2007 2008 Server Virtualization BCP/DRP 0% 10% 20% 30% 40% 50% 60% 70% 80% Source: Aberdeen Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 100
  • Networking WAN Optimization Solutions -WAN If you are planning to deploy WAN optimization equipment in 2008, which vendores would you invite to bid? (Answer all that apply) Cisco 50% Juniper 24% Riverbed here Your Text 17% Your Text here Citrix 13% F5 12% Blue Coat/Packeteer 8% Expand 2% Silver Peak 2% Unsure 31% Shahar Maor’s work Copyright 2009 @STKI DoGoldmansource orResearch Source: not remove Sachs attribution from any graphic or portion of graphic 101
  • WAN Optimization: Networking -WAN Solutions and Integrators Solution Integrator/Representative Blue Coat -SG Appliances REL (VAD), Ankor, Taldor Cisco Systems –WAAS Bynet, Bezeq Int., IBM, Netcom, Taldor Citrix Systems –WANScaler Aman Computers Expand Networks Text here Your –Compass Taldor, Ankor Your Text here F5 Networks -WANJet, WebAccelerator Artnet, Taldor, Spider, NewAge, Bezeq Int., Netcom Juniper Networks –WXC Netcom, Netvision, Bezeq Int. Packeteer -PacketShaper, iShared, Bynet Radware -LinkProof Bynet, Ankor, Netvision Riverbed Technology –Steelhead, Interceptor Netcom, Innocom Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 102
  • WAN Optimization Networking -WAN - Israeli Market Positioning 1Q09 Local Support Expand Player Riverbed F5 Worldwide Leader Cisco Blue Coat Citrix Radware Packeteer* Juniper This analysis should be used with its supporting documents Market Presence *June 2008: A Blue Coat company Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 103
  • Networking Voice Over IP (VOIP): Terminology -VOIP Voice Over IP - Voice transmission over the internet or LAN/WAN, PC-to-PC, P2P Internet telephony - The use of Internet-based services to deliver voice traffic (Skype; Vonage). Originally for consumers but slowly for businesses as well Your Text here Your Text here IP telephony - The delivery and support of call processing functionality and features over IP (call setup, hold, forward, & transfer) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 104
  • Networking Voice Over IP (VOIP) -VOIP STKI observation: Many enterprises are migrating, or planning to migrate, their telephony infrastructure from traditional circuit-switched technology to newer Internet Protocol (IP)-based systems Your Text here Your Text here  Motivations to actually migrate: • End of life/end of support for current telephony infrastructure • Moving to a new office/office improvements  Motivations to wait: • ―Phones are working‖ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 105
  • VOIP Israeli Market Networking -VOIP  There are two kinds of project possible: enterprise IPTel and IP based Call-Centers  Israeli VOIP market is dominated by three main players: Cisco, Nortel and Avaya Your Text here Your Text here  Other players in Israel: • Tadiran Telecom –Large install base (Mostly non IP based) • 3COM, Alcatel –Lucent –Few implementations • Siemens is back in Israel??? (Gores [Enterasys] acquired 51% of Siemens, Oct 2008) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 106
  • VOIP (Enterprise & CC) Networking -VOIP - Israeli Market Positioning 1Q09 Vendors to Watch: Asterisk Cisco Local Support Player Nortel Worldwide Avaya* Leader Tadiran 3COM This analysis should be used with its Alcatel-Lucent supporting documents Market Presence *Most CC in the market are Avaya Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 107
  • Solutions and Integrators Networking -VOIP Solution Prominent Integrators Cisco 1. Bynet 2. IBM 3. Netcom Nortel Your Text here 1. Bezeq Int. Your Text here 2. Taldor 3. Bynet/Netcom Avaya 1. IT Navigator 2. NCR –Mittvoch 3. Netcom 4. IBM Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 108
  • Networking Video Over IP –Video OIP  By 2011, 60% of Internet traffic is expected to be video traffic (Cisco)  Video technology is considered by many local organizations as mostly ―nice to have‖ Your Text here Your Text here  Local organizations who use this technology does it mainly for training/marketing purposes  Global organizations use it as a vital working tool – especially in order to cut travelling costs Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 109
  • Networking Video Over IP Map –Video OIP Your Text here Your Text here Source: http://www.video-over-ip.com/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 110
  • Networking Unified Communications (UC) –UC Why do we need it? Integration: Of any or all communications, collaborative, and business applications Presence: guides users to the most appropriate means of communications Your extends applications and integration here Mobility: Text here Your Text of applications every way you go Productivity: Business Processes improve Why now? Key drivers today are: Workforce virtualization, Cost reduction, Increasingly available tools, Business improvement opportunities Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 111
  • Networking UC Architecture –UC Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 112 Source: Nemertes Research 2009
  • Networking UC Challenges –UC The problem: business justification for collaboration technologies comes down to ―soft dollars‖: • Productivity • Better Text here Your teamwork Your Text here • Better customer service How do you define “better”? What is its business value to the company? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 113
  • Networking Unified Messaging –UC This is a main feature of UC Growing demand • Replacement of aging voicemail systems • Reduced management costs • New features, flexibility, especially for mobile workers Your Text here Your Text here Challenges • System interoperability • Compliance/governance concerns Money talks (example): Unified messaging on PCs and PDAs saves traders 25 to 30 minutes/day retrieving voice mails and responding to peers and clients (Nemertes) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 114
  • Networking Real-Time Communications Dashboard –UC Unified ―buddy‖ list: • Aggregates presence from multiple services • May be integrated with additional applications via mash- ups Examples: Text here Your Your Text here • Alcatel-Lucent ―My Assistant‖ • Avaya oneX Desktop • Cisco ―Unified Personal Communicator‖ • IBM Lotus ―Sametime‖ • Microsoft Office Communicator • Nortel MCS Client Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 115
  • Networking UC Preferred Choice –UC Cisco 56% Microsoft 41% Avaya 22% Nortel 10% Alcatel-Lucent Text here 5% Your Your Text here 3Com 3% Nokia-Siemens 2% Newer Vendors 4% Others 4% Unsure 9% 0% 10% 20% 30% 40% 50% 60% Source: Goldman Sachs Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 116
  • Networking Integrators Networking - Israeli Market Positioning 1Q09 (Leaders) Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 117
  • Green IT Small, incremental changes compounded many times can mean big savings for large-scale Text here Your organizations Your Text here 118
  • Green IT So, How Can I Be More Green? Trends Secure mobile Virtualized server access to networks, PC management and storage applications, and environments data Your Text here State of the art Your Text here Intelligent archiving power and cooling Teleconferencing (all around) Working Printing environment (car Asset management consolidation pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 119
  • STKI Madad 2008-9 Green IT Trends (Not Including Printing) PC Energy Management 9% Miscellaneous 12% Trends 38% Market Players Your Text here 15% Your Text here DC Facilities 20% Asset Management 6% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 120
  • Green Data Green Data Center -Statistics Center - Trends Typical DC has annual energy costs per square foot 15-40 times that of typical office buildings Data Center electricity consumption is almost 5% of world production Average Text here center consumes energyYour Text here Your data equivalent to 25,000 households!! Source: Israel CBS , McKinsey analysis Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 121
  • Green Data Green Data Center -Statistics Center - Trends Total CO2 emissions across countries (Million Ton): 200 150 Your Text here Your Text here 100 50 0 Source: Israel CBS , McKinsey analysis Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 122
  • Green Data What’s New? Center - Trends Main motivation for Cost issues “Being Green”? Your Text here Electricity Text here Your What “hurts” consumption, the most? cooling costs and space How 2009 is “Doing more with different? less”… Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 123
  • Green Data How Dense is Your Data Center? Center - Trends What is your average rack power demand (per rack)? 6% 10% 23% 30% 0 kW to 3 kW 4 kW to 6 kW 7 kW to 9 kW Your Text here Your Text here10 kW to 11 kW 31% 12 kW or More Data Center Environment –Israeli Market (Ms of $) 2008 2009 2010 30.0 33.33% 40.0 25.00% 50.0 Source: STKI, Information Week Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 124
  • Green Data How Fast Your Rack Turn “Red”? Center - Trends Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 125 Source: Emerson
  • Green Data Electricity Use Trends Center - Trends Your Text here Your Text here 36 Source: ASHRAE Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 126
  • Green Data Data Center Metrics Center - Trends Power Usage Effectiveness and its reciprocal, the DCiE is (PUE): defined as: PUE = Total Facility DCiE = 1÷ PUE = (IT Power ÷ IT Equipment Equipment Power ÷ Total Power Facility Power) x 100% Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 127 Source: The Green Grid, EPA
  • Green Data Servers -Energy Efficiency Center - Virtualization Average CPU utilization of more than 5,000 servers during a six-month period Servers are rarely completely idle and seldom operate near their Your Text here Your Text here maximum utilization, instead operating most of the time at between 10 and 50 percent of their maximum 128 Source: IEEE Computer Society
  • Green Data Virtualization Calculations Center - Virtualization Assumptions: Average Server Utilization: %5 Number of peak hours:12 Cost per KwH: 11 cents Average servers growth rate per year: 15% Text here Your Text here Your Virtualization: • level of utilization of servers after virtualization: 50%-70% • Calculations are based on a maximum of two virtual machines per core Cooling: 1 watt of power for the server to 1.25 watts of power for cooling 129 Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
  • Green Data Virtualization Calculations Center - Virtualization Infrastructure Prior to Year 1 Year 2 Year 3 Year 4 Year 5 Virtualization Total Number of 540 641 714 821 944 Servers: Power Used for Servers: 1,037,500 1,193,125 1,372,094 1,577,908 1,814,594 (Watts) Your Text here Your Text here Server Electric Cost ($) $1,000,420 $1,150,483 $1,323,055 $1,521,514 $1,749,740 Per Year: Total Cooling Electric $1,250,525 $1,438,103 $1,653,819 $1,901,892 $2,187,176 Cost ($) Per Year: Total Power & Cooling $2,250,944 $2,588,586 $2,976,875 $3,423,406 $3,936,916 Cost ($) Per Year: 130 Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
  • Green Data Virtualization Calculations Center - Virtualization Infrastructure After Year 1 Year 2 Year 3 Year 4 Year 5 Virtualization Total Workloads: 4,170 4,796 5,515 6,342 7,293 Physical Systems 136 156 179 206 237 Needed: Power Used for Servers 68,000 78,200 89,700 102,925 118,450 (Peak Watts): Power Used forText here 45,560 Your Servers 52,394 60,099 68,960 Text here Your 79,361 (Off-Peak watts): Server Electric Cost ($) $65,570 $75,405 $86,716 $99,723 $114,682 Per Year (Peak): Server Electric Cost ($) $43,932 $50,521 $58,100 $66,815 $76,837 Per Year (Off-Peak): Total Cooling Electric $136,877 $157,408 $181,019 $208,172 $239,398 Cost ($) Per Year: Total Power & Cooling $246,378 $283,335 $325,835 $374,710 $430,917 Cost ($) Per Year: 131
  • Green Data Virtualization Calculations -ROI Center - Virtualization Year 1 Year 2 Year 3 Year 4 Year 5 Total ("-" means Savings") 50% Utilization 6,074,378$ -1,619,909$ -677,406$ 405,174$ 1,688,365$ 5,870,602$ 60% Utilization Your Text here Your Text here 1,911,717$ -2,367,498$ -2,129,390$ -1,822,708$ -1,524,026$ -5,931,905$ 70% Utilization 564,773$ -2,609,364$ -2,583,076$ -2,557,558$ -2,541,227$ -9,726,452$ 132 Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
  • VDI (Virtual Desktop Infrastructure) –Energy, Green IT - PC Management and Security Efficiency TCO Comparison Solution A: Solution B: Sun Difference Difference Cumulative 3 Year Traditional Virtual Desktop (A - B) (A - B)% Desktop Devices Solution IT Costs Desktop Device Costs 3,259,204 NIS 670,834 NIS 2,588,370 NIS 79.4% Desktop Software Costs 782,627 NIS 461,522 NIS 321,104 NIS 41.0% Server Infrastructure Costs 296,448 NIS 1,248,949 NIS (952,501 NIS) -321.3% Desktop Management Labor Costs Your Text here 5,724,578 NIS 2,137,760 NIS 3,586,818 NIS Your Text here 62.7% Desktop Power Costs 314,788 NIS 135,494 NIS 179,294 NIS 57.0% Total IT Costs 10,377,645 NIS 4,654,559 NIS 5,723,085 NIS 55.1% Business Operating Costs Desktop User Productivity Impact 4,473,911 NIS 0 NIS 4,473,911 NIS 100.0% Business Risks 538,416 NIS 26,919 NIS 511,496 NIS 95.0% Total Business Operating Costs 5,012,327 NIS 26,919 NIS 4,985,408 NIS 99.5% Total 15,389,972 NIS 4,681,479 NIS 10,708,493 NIS 69.6% Source: www.alinean.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 133
  • VDI (Virtual Desktop Infrastructure) –Energy, Green IT - PC Management and Security Efficiency ROI Analysis Initial Year 1 Year 2 Year 3 (Solution B) (Probable Case) Benefits (to Solution B from 0 NIS 3,115,969 NIS 3,505,821 NIS 3,681,630 NIS Current (AS IS)) Cumulative Benefits 3,115,969 NIS 6,621,790 NIS 10,303,420 NIS Investment (Solution B) here Your Text 1,604,296 NIS 312,617 NIS 170,099 NIS here Your Text 237,175 NIS Cumulative Investment 1,604,296 NIS 1,916,913 NIS 2,087,012 NIS 2,324,187 NIS Cash Flow (1,604,296 NIS) 2,803,351 NIS 3,335,722 NIS 3,444,456 NIS Cumulative Cash Flow (1,604,296 NIS) 1,199,055 NIS 4,534,777 NIS 7,979,233 NIS ROI 343% Risk Adjusted ROI 288% NPV Savings 6,361,354 NIS IRR 177% Source: www.alinean.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 134
  • Green Data Center Integrators Green Data Center - Israeli Market Positioning 1Q09 (Leaders) Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 135
  • PC -Energy Efficiency and Power Green IT - PC Consumption Why don’t you always shut down your PC when you have finished working for the day (multiple responses allowed): 1 ‫סידרה‬ It's IT policy or procedure to leave it on My computer goes to hibernate, or to sleep mode It takes too long Your Text here Your Text here It's a habit I don't think it's important It's a hassle I forget 0% 10% 20% 30% 40% 50% Source: E1, PC Energy Report Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 136
  • PC -Energy Efficiency and Power Green IT - PC Consumption Power Usage for Desktop PCs (watts) Idle Sleep Savings Mean of LBNL-measured Pentium- 4 67.3 3.3 64.0 machines Mean of 17-inch CRT monitors 61.2 1.8 59.4 Mean of 17-inch LCD monitors 35.3 2.3 33.0 Your Text here Energy Savings for Desktop Power draw Power draw here Your Text Savings per PCs (kWh) per per year year year (idle) (Sleep) (Sleep vs. idle) Typical P4 machine with 17- 791.56 31.42 760.14 inch CRT Typical P4 machine with 17- 632.02 34.50 597.52 inch LCD Source: Windows Hardware Developer Central Shahar Maor’s Source: WindowsDo not remove source or attribution from any graphic or portion of graphic work Copyright 2009 @STKI Hardware Developer Central 137
  • PC -Energy Efficiency and Power Green IT - PC Consumption Environmental Savings per Per PC with 17- Per PC with Windows Vista PC inch CRT 17-inch LCD Energy savings 760.14 kWh 597.52 kWh CO2 emissions reduction 1178.22 lb 926.16 lb ComparableText hereemissions Your auto 0.102 auto 0.080 auto Your Text here removed Trees not required to sequester 0.161 acre 0.126 acre CO2 emissions Equivalent homes powered 0.070 home 0.055 home Total Savings Per Year (0.67₪/kWh): 510 ₪ Source: Windows Hardware Developer Central Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 138
  • Green IT - PC Costs Calculations PC 300*9 Senario 300*20 Senario & Vista 300*20 Senario 8 7 6 Annual Cost (Million ₪ ) 5 4 Your Text here Your Text here 3 2 1 0 Number of Computers Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 139
  • PC -Energy Efficiency and Power Green IT - PC Consumption: Israeli Market STKI observation: Some Israeli organizations, which address the issue of energy efficiency of PCs, use homemade script based solutions Players: IsraeliYour Text here Your Text here • Microsoft • Symantec • BigFix • Gpatrol –Israeli SU Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 140
  • PC -Energy Efficiency and Power Green IT - PC Consumption: An Example Your Text here Your Text here Source: www.g-patrol.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 141
  • Green IT - Printing Printing STOP PRINTING Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 142
  • Green IT - Israeli Output Statistics Printing Average A4s usage per year per employ: 2,000 4,607 10,000 Average color coverage per page: 71% 11% 1% Your Text here Your Text here Average cost per printed page: 0.045 NIS 0.24 NIS 1 NIS Average percentage of jobs of more than one page: 91% 75% 47% Source: Prime² (STKI’s modifications ) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 143
  • STKI Madad 2008-9 Green IT - Printing Miscellaneous Distribution Tools 11% Printing 17% Consolidation 20% Your Text here Your Text here Outsourcing Monitoring and 9% Cost Reduction 43% P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 144
  • Green IT - Printing Consolidation Printing In today’s world, printing has become a significant expenditure item for almost every organization A typical large financial organization in Israel spend dozens of millions of Shekels annually on office printing Israeli Office Printing Market has changed great deal since 2007: here Your Text Your Text here • Users start seeing the great potential in reorganizing their printing environment • The economic crisis pushs many to look for ways to cut costs • Printing consolidation projects usually have a fast, measurable ROI P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 145
  • Green IT - Printing Consolidation -Ratios Printing One of the ways to check the maturity of an organization printing environment is checking its printers/users ratio: Organization “Heavy Followers Consolidated High-Tech Type Printers” Printers/Users 1:1 1:5 – 1:15 1:15 – 1:30 1:30+ Ratio Your Text here Your Text here “Heavy Printers” –Consist of financial organizations, government agencies, law firms est. High-Tech –Truly paperless entities (start ups, agile high tech companies est.) P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 146
  • Green IT - Addressing Printing Consolidation Projects Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 147
  • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 148
  • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 149
  • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 150
  • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 151
  • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 152
  • Green IT - Printing Consolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 153
  • Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info 154