STKI Summit 2010
Israeli Infrastructure Services Market




               Shahar Geiger Maor
               CISSP, Senior...
Presentation’s Agenda


Networking



Printing and Output Management Your Text here
   Your Text here




Information Secu...
We will present data on products and integrators:
                                   STKI Israeli Positioning
            ...
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

Appli...
Enterprise Networking: Israeli Market Size
                                                        (M$)
                 2...
Emerging Technology Roadmap Through
                2013




    Your Text here                                           ...
IP Traffic Growth




Your Text here                                                                            Your Text ...
Video related Traffic Growth




Your Text here                                                                           ...
Primary Technology Suitability




 Your Text here                                                                        ...
Technologies Categorization 2009
Business Value
Investment
to make money
                                                 ...
Technologies Categorization 2010
Business Value
Investment
to make money
                                                 ...
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

Appli...
Main Theme:
Your Text here
                     Cloud infrastructureYour Text here




    Shahar Maor’s work Copyright 20...
Interesting M&As in the Networking Market
Buyer (For how much?)                         Acquisition                       ...
Networking “Breaking News”




Your Text here                                                                             ...
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

Appli...
Main Theme:
Your Text here
                                   Complexity!                                             Your...
What have we had in mind?




Your Text here                                                                             Y...
What actually happened? Complexity!




   Your Text here                                                                 ...
10th grade mathematics – reliability chain




99%   Your Text here          99%                                          ...
The Converged Datacenter

                                                                                                ...
Future Datacenter Infrastructure




      Your Text here                                                                 ...
Giants Face-Off




Your Text here                                                                             Your Text h...
“Classic” Infrastructure Department: Before




    Your Text here                                                        ...
“Classic” Infrastructure Department: After




     Your Text here                                                        ...
Infrastructure Department:
             After DC Convergence



                                    Infra. Manager

 Your ...
Local Area Network Vendors
                              - Israeli Market Positioning 1Q10



                            ...
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

Appli...
Main Theme:
The Business is conquering the infrastructure
     Your Text here              Your Text here




       Shaha...
Three Pillars of Application Delivery




                                                                                ...
An ADC Player is Like A Decathlon Athlete




     Your Text here                                                         ...
Application Delivery Controllers:
           What is the Pressure?
Globalization: Pushing business process to the
network’...
Application Delivery Controllers:
     What is the Pressure?




Your Text here                                           ...
Solutions???




Your Text here                                                                             Your Text here...
Application Delivery Controllers (ADC)

  ADC are designed to improve the availability, efficiency,
   performance and sec...
Application Delivery Controllers (ADC)
                        - Israeli Market Positioning 1Q10
                Solutions...
WAN Optimization
                           - Israeli Market Positioning 1Q10
Local Support




                          ...
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

Appli...
Corporate Telephony




Your Text here                                                                             Your Te...
Main Theme (…again):
The Business is conquering the infrastructure
     Your Text here              Your Text here




   ...
Remember the “Classic” Infrastructure
          Department?




  Your Text here                                          ...
VOIP and UC -Technology Maturity


       VOIP




Your Text here                                                         ...
VOIP and UC -Technology Risk/Reward Analysis



                                  UC

     VOIP

      Your Text here     ...
Why Move to IPTel?
  upgrading the LAN/ moving to a new
                 office

               high management costs


  ...
What is the Importance of VOIP?




  Your Text here                                                                      ...
Changing the Way Your Business
        Communicates




Your Text here                                                    ...
Changing the Way Your Business
        Communicates




Your Text here                                                    ...
Moving-on to Unified Communications
    Which of the Following Justifies the Implementation of a UC
                      ...
Who Should Manage UC?
                                 Don't Know
                                    8%


            Com...
Future Telephony




Your Text here                                                                             Your Text ...
Contact Centers: Trends

SIP (Session Initiation Protocol) age
The arrival of web/videoconferencing
Going home, literal...
New Contact Centers: Focus on IP
      Signaling Gateways                                                                 ...
From Marketing-driven Architecture

                                                                                      ...
To Service-Driven Architecture

                                                                      Telephony




      ...
Contact Centers
   Preferred Communication Channels-Customers choice




Your Text here                                   ...
VOIP (Enterprise IP Telephony)
                        - Israeli Market Positioning 1Q10



                              ...
Contact Center Infrastructure
                                  - Israeli Market Positioning 1Q10

                Solutio...
Unified Communications
                        - Israeli Market Positioning 1Q10
Local Support




                       ...
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

Appli...
Main Theme:
Availability and reachable service
Your Text here             Your Text here




    Shahar Maor’s work Copyri...
Network Operations and Monitoring:
       What are the Business Needs?
Network should be available all the time
Highest le...
Network Operations and Monitoring:
      What is the Pressure?




   Your Text here                                      ...
Network Operation Centers




Your Text here                                                                          Your...
Network Operations and Monitoring:
   What Kind of Solutions are Available?
           Basic network monitors (SNMP based)...
Network Monitoring–Major Players

      Enterprise System                                                   Network
      ...
RSS Alert: Upcoming Round-Table




  Your Text here                                                                      ...
Networking Integrators
- Israeli Market Positioning 1Q10 (Leaders)




  Your Text here                                   ...
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

Appli...
Networking Staffing Ratios-Israel
                                                                                        ...
Networking Staffing Ratios


 Ratios of data/voice                                     Ratios of data/voice
networking Per...
Printing/Output Management’s Agenda



 Printing Consolidation

     Your Text here                                       ...
Main Theme:
Your Text here
               Efficiency & technology Text here
                                     Your




...
Printing: Israeli Market Size (M$)
                 2009           changes                2010            changes         ...
STKI Index-2009/2010
                               Distribution Tools
                                       7%
Miscellan...
Printing Maturity: Progress Graph
  The Higher you “climb” –The More efficient You Are

Output efficiency
80%
            ...
Optimize Infrastructure: The Beginning…




   Your Text here                                                             ...
Optimize Infrastructure: Assessment




    Your Text here                                                                ...
Optimize Infrastructure: Solution




  Your Text here                                                                    ...
Manage Environment: The Beginning…




    Your Text here                                                                 ...
Manage Environment: Assessment




  Your Text here                                                                       ...
Manage Environment: Find a Solution




      Your Text here                                                              ...
Manage Environment –Recommendations
                                                 • Printer consumables are often ad ho...
Manage Environment –Recommendations
                                                 • Printer consumables are often ad ho...
Printing Consolidation in “Real-Life”




    Your Text here                                                              ...
Printing Consolidation in “Real-Life”

                           Employees/printers ratio by months
                     ...
Printing/Output Management’s Agenda



 Printing Consolidation

     Your Text here                                       ...
The Need for Output Management
 Each application requires distinct business process definitions
    • Data Collection, Vi...
Output Management Architecture -PrintBOS




     Your Text here                                                          ...
Output Management Architecture -
                                                                    FreeForm
            ...
Output Management Round-Table Insights


Output management is very “close                                        Output ma...
Output Management
                              - Israeli Market Positioning 1Q10

                Solutions to Watch:

  ...
Output Management –Digital Signature

               Wiki: a mathematical scheme for demonstrating the
                 au...
Output Management –Digital Signature

                A comparison between digital signature
                     and hand...
Output Management –Digital Signature

Digital signature improve security, workflow and save
 money!
Growing demand for A...
"The security business has no future...The security industry is dead“ (IBM
                  ISS general manager, Val Raha...
Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText h...
Information Security:
                    Israeli Market Size (M$)
             2009           changes                2010...
What’s on the CISO’s Agenda?
                      (STKI Index 2009)

                                               Sec T...
Some Interesting M&As in the Security Market
Buyer (For how much?)                       Acquisition                      ...
Some Interesting M&As in the Security Market

 Active Acquirers: IT Security
 M&A Deals Since 2004




         Your Text ...
Types of Incidents (2000-2010)




 Your Text here                                                                        ...
Incidents by Vector (2000-2010)




 Your Text here                                                                       ...
Incidents by Vector (2009)




Your Text here                                                                            Y...
www.stki.info is in the Trend…




Your Text here                                                                         ...
“Our” Quick Response….
                                                                                                   ...
RSS Alert: Upcoming Round-Table




  Your Text here                                                                      ...
Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText h...
Main Theme:
Your Text here
                                Cautiousness                                              Your ...
Cloud Computing




Your Text here                                                                            Your Text he...
Cloud Characteristics




Your Text here                                                                            Your T...
Cloud Security




Your Text here                                                                            Your Text her...
Cloud Security
                   Reasons not to adopt SaaS:




Your Text here                                           ...
How Does Cloud Computing Affect the
         “Security Triad”?

                                       Confidentiality



...
Cloud Risk Assessment
                              NETWORK
  INSECURE OR                MANAGEMENT
                      ...
Cloud Regulations & Recommendations

No regulations so far….
Some sources of information and recommendations:
  •   Secu...
Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText h...
Main Theme:
Your Text here
                             “Mind the gap”                                               Your ...
Bridging the Gap




  Your Text here                                                                            Your Text...
Virtualization attacks
         Root Partition                                               Guest Partitions
            ...
How to Protect?




Your Text here                                                                            Your Text he...
What to Protect?
Both Guests and Host are subjected to attacks
Full disk encryption?
Some challenges of VM architecture...
Virtualization Security Solutions: Altor




     Your Text here                                                          ...
Virtualization Security Solutions: CatBird




    Your Text here                                                         ...
Virtualization Security Solutions: Reflex

            Change Control & Configuration Monitoring




                     ...
Virtualization Security Recommendations
 Follow best practices:
   • VMWare:
     http://www.vmware.com/pdf/vi3_301_201_s...
Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText h...
Main Theme:
Your Text here
                                 Fast-growing                                             Your ...
Remote Access -Customer Needs
Secure Access from Managed and Unmanaged Devices

Simplified and Granular Access Control

...
Connectivity Approach
Each session is tailored according to its user and the device in use,
maximizing security and produc...
Solution Architecture (UAG)
                                                                                              ...
Secure Remote Access
                        - Israeli Market Positioning 1Q10



                                        ...
“Strong” Authentication
                            - Israeli Market Positioning 1Q10

                Solutions to Watch:...
Mobile Security: What worries CISOs?
Internal users:
Central management
Corporate data on device (encryption, DLP)
Devi...
Mobile Security: What worries
         Customers?




Your Text here                                                      ...
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Upcoming SlideShare
Loading in …5
×

Stki Summit 2010 Infra Services V8

2,094 views

Published on

Trends in Networking, Printing, Output Management and Information Security from the STKI 2010 summit

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,094
On SlideShare
0
From Embeds
0
Number of Embeds
57
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Stki Summit 2010 Infra Services V8

  1. 1. STKI Summit 2010 Israeli Infrastructure Services Market Shahar Geiger Maor CISSP, Senior Analyst Infrastructure Services (Security, Networking and Green IT) www.shaharmaor.blogspot.com
  2. 2. Presentation’s Agenda Networking Printing and Output Management Your Text here Your Text here Information Security Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  3. 3. We will present data on products and integrators: STKI Israeli Positioning • Not a technological positioning, refers only to Israeli market • Represents current Israeli market and not our recommendation •Focused on enterprise market (not SMB) Vendor A  Market Presence (X) Vendor B Local Support  Market share - existing and new sales (more emphasis)  Mind share (how user organizations rate vendors) Your Text here Your Text here Worldwide  Local Support (Y) – is influenced by (X) Leader  Experience & technical knowledge, localization, support, number and kind of integrators  Worldwide leaders marked, based on global positioning  Vendors to watch: Are only just entering Israeli market Vendors to Watch: so can’t be positioned but should be watched Vendor C Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
  4. 4. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
  5. 5. Enterprise Networking: Israeli Market Size (M$) 2009 changes 2010 changes 2011 changes 2012 LAN 60.0 8.33% 65.0 15.38% 75.0 20.00% 90.0 equipment WAN 40.0 12.50% 45.0 37.78% 62.0 12.90% 70.0 equipment Text here Your Your Text here VoIP 32.0 9.38% 35.0 14.29% 40.0 12.50% 45.0 equipment VOIP 35.0 28.57% 45.0 22.22% 55.0 27.27% 70.0 Software totals 167.0 13.77% 190.0 22.11% 232.0 18.53% 275.0 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  6. 6. Emerging Technology Roadmap Through 2013 Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 7 Source: Infrastructure Executive Council
  7. 7. IP Traffic Growth Your Text here Your Text here Morgan Stanley, 2009 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  8. 8. Video related Traffic Growth Your Text here Your Text here Morgan Stanley, 2009 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
  9. 9. Primary Technology Suitability Your Text here Your Text here http://www.dbcde.gov.au/__data/assets/pdf_file/0003/54345/bro Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  10. 10. Technologies Categorization 2009 Business Value Investment to make money SAAS/ Cut costs, Increase Cloud IT Project productivity Optimization UC Business Project Billing NGN Your Text here Your Text here Commodity IT VOIP Networking IPv6 Size of figure = Infra. Vir. complexity/ Services Network cost of project Security Investment for regulations Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  11. 11. Technologies Categorization 2010 Business Value Investment to make money SAAS/ Cut costs, Increase Cloud IT Project productivity Application UC Delivery Major Changes Billing Networking Text here Your Text here Your Commodity IT Vir. (DC IPv6 Size of figure = Infra. VOIP complexity/ Services Network convergence) cost of project Security Investment for regulations Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  12. 12. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  13. 13. Main Theme: Your Text here Cloud infrastructureYour Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
  14. 14. Interesting M&As in the Networking Market Buyer (For how much?) Acquisition Comments HP (2.7B$) 3Com •Strengthens HP's converged data center product portfolio •To open up opportunities in China, where 3Com has a large presence Avaya (900M$) Nortel (Enterprise Large client base. Will try to leverage this Solutions) acquisition by using the Aura platform. What about Nortel’s data offerings??? Your Text here Your Text here Cisco (3.4B$) Tandberg To Push high-definition imaging systems and videoconferencing Logitech (405M$) LifeSize To offer HD video communications systems for other settings besides the desktop Riverbed (40M$) Expand Excessive demand for video compression and to avoid Cisco from “stealing” Expand Aman Computers (?) ArtNet Experts Small market –interesting changes: 2009’s downturn had had its tolls Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  15. 15. Networking “Breaking News” Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  16. 16. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  17. 17. Main Theme: Your Text here Complexity! Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
  18. 18. What have we had in mind? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  19. 19. What actually happened? Complexity! Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
  20. 20. 10th grade mathematics – reliability chain 99% Your Text here 99% 99% Your Text here 97% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
  21. 21. The Converged Datacenter Cisco UCS HP BladeSystem Matrix Data ERP CRM Warehouse Database Mail and Messaging File, Print, Infrastructure Your Text here Your Text here Resource Pool IBM CloudBurst Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
  22. 22. Future Datacenter Infrastructure Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 23 http://www.sincerelysustainable.com/buildings/google-utilizes-cool-climate-to-cool-its-
  23. 23. Giants Face-Off Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
  24. 24. “Classic” Infrastructure Department: Before Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
  25. 25. “Classic” Infrastructure Department: After Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
  26. 26. Infrastructure Department: After DC Convergence Infra. Manager Your Text here Your Text here PC System/Storage/Networking DBA Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  27. 27. Local Area Network Vendors - Israeli Market Positioning 1Q10 Cisco Local Support Player Your Text here Your Text here Worldwide Leader Juniper Enterasys HP 3COM Alcatel-Lucent Avaya-Nortel This analysis should be used with its Foundry supporting documents Extreme Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
  28. 28. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
  29. 29. Main Theme: The Business is conquering the infrastructure Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
  30. 30. Three Pillars of Application Delivery Technology Process People Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
  31. 31. An ADC Player is Like A Decathlon Athlete Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
  32. 32. Application Delivery Controllers: What is the Pressure? Globalization: Pushing business process to the network’s edge Centralization / Consolidation: Compliance, control, Cost cutting, Security, Efficiencies / resource utilization Text here Your Your Text here Enterprise & WebMonster Application: Architectures, Increased adoption of browser-based apps, Rich clients (AJAX), Web 2.0 technologies, SOA Service Provider Services Architectures: Next Generation Networks, Video, Messaging Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
  33. 33. Application Delivery Controllers: What is the Pressure? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 34
  34. 34. Solutions??? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
  35. 35. Application Delivery Controllers (ADC) ADC are designed to improve the availability, efficiency, performance and security of web-based or IP-based applications* Your Text here Your Text here L4-L7 Server off- redirection, TCP load (SSL Caching, Network- load- connection termination, NAT compression level security balancing multiplexing TCP and failover connection) * Gartner Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
  36. 36. Application Delivery Controllers (ADC) - Israeli Market Positioning 1Q10 Solutions to Watch: Array Barracuda Brocade Crescendo Local Support Player Your Text here Your Text here Worldwide F5 Leader Radware Cisco Citrix This analysis should be used with its supporting documents Market Presence *Most CC in the market are Avaya Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
  37. 37. WAN Optimization - Israeli Market Positioning 1Q10 Local Support Player Your Text here Riverbed Your Text here Worldwide Leader Cisco Blue Coat Citrix Radware F5 This analysis should be used with its supporting documents Juniper Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
  38. 38. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
  39. 39. Corporate Telephony Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
  40. 40. Main Theme (…again): The Business is conquering the infrastructure Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
  41. 41. Remember the “Classic” Infrastructure Department? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 42
  42. 42. VOIP and UC -Technology Maturity VOIP Your Text here Your Text here UC Shahar Maor’s work Copyright 2010 @STKI Do not remove source Economics from any graphic or portion of graphic Source: Computer or attribution 43
  43. 43. VOIP and UC -Technology Risk/Reward Analysis UC VOIP Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source Economics from any graphic or portion of graphic Source: Computer or attribution 44
  44. 44. Why Move to IPTel? upgrading the LAN/ moving to a new office high management costs ROI analysis justifies IPTel Your Text here Your Text here inadequate local support Current solution doesn't meet business requirements other 0% 10% 20% 30% 40% 50% 60% 70% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
  45. 45. What is the Importance of VOIP? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
  46. 46. Changing the Way Your Business Communicates Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
  47. 47. Changing the Way Your Business Communicates Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
  48. 48. Moving-on to Unified Communications Which of the Following Justifies the Implementation of a UC solution? Better Team Work 62% Higher User Experience Your Text here 54% Your Text here Unique Features 54% Long-Term Cost Savings 38% Higher Employ Productivity 23% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
  49. 49. Who Should Manage UC? Don't Know 8% CombinedOther 15% Your Text here Networkinghere Your Text Unit 54% Applications Unit 23% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
  50. 50. Future Telephony Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
  51. 51. Contact Centers: Trends SIP (Session Initiation Protocol) age The arrival of web/videoconferencing Going home, literally –Contact center mobility Your Text here Your Text here The live agent –A true skill-based routing Analyzed up the tailbone –More use of performance analytics and workforce optimization tools Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
  52. 52. New Contact Centers: Focus on IP Signaling Gateways Application Services I N A P / IS U P Your Text here H.248 Your Text here MGCP Speech Services Open Voice System RTP MRCP T D SIP M Media Gateways IP PBXes Source: Genesys Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
  53. 53. From Marketing-driven Architecture Telephony IVR Prepaid IVR Email Reader A1 Voice Service Call Center City Guide A1 for You Voice Mail Your Text here Your Text here Application Interface Billing, Customer Profile, CRM, Monitoring, Maintenance Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
  54. 54. To Service-Driven Architecture Telephony VoiceXML Browser A1 Voice Service Call Center Prepaid IVR Ringback Tones Mobile PBX Voice Mail Mobile Campaigning Your Text here Your Text here Standardised Interfaces Billing, Customer Profile, CRM, Monitoring, Maintenance Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
  55. 55. Contact Centers Preferred Communication Channels-Customers choice Your Text here Your Text here Italy United States http://www.genesyslab.com/system/files/Genesys_US_Survey09_screen.pdf Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
  56. 56. VOIP (Enterprise IP Telephony) - Israeli Market Positioning 1Q10 Cisco Local Support Player Your Text here Your Text here Worldwide Avaya-Nortel Leader Tadiran 3COM This analysis should be used with its Alcatel-Lucent supporting documents Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
  57. 57. Contact Center Infrastructure - Israeli Market Positioning 1Q10 Solutions to Watch: Solutions to Watch: Siemens Local Support Player Your Text here Avaya-Nortel Your Text here Worldwide Leader Genesys Aspect Cisco Alcatel-Lucent This analysis should be used with its Cosmocom supporting documents Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
  58. 58. Unified Communications - Israeli Market Positioning 1Q10 Local Support Player Your Text here Microsoft Your Text here Worldwide Leader Cisco Avaya-Nortel This analysis should be used with its Alcatel-Lucent supporting documents Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
  59. 59. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
  60. 60. Main Theme: Availability and reachable service Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
  61. 61. Network Operations and Monitoring: What are the Business Needs? Network should be available all the time Highest level of service possible (down goes the “night timeslot”…) Network failures should be located and responded-to ASAP! (money talks) here Your Text Your Text here Future network topology planning must be optimal and consistent with business growth Voice/video monitoring and SLAs by the candidate solution provider must be checked-out, when opting for new solutions Automatic discovery of all network devices: accounted and non- accounted for (who said “NAC”?!) Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 62
  62. 62. Network Operations and Monitoring: What is the Pressure? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
  63. 63. Network Operation Centers Your Text here Your Text here http://www.netscout.com/docs/thirdparty/NetScout_3pv_Metzler_Application_Delivery_Handbook.pdf Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
  64. 64. Network Operations and Monitoring: What Kind of Solutions are Available? Basic network monitors (SNMP based) • SNMP-Collectors Usually provide an on-line availability map Mission centric • Usually provide one function: protocol analysis, VOIP monitoring, system Your Text here etc. monitoring Your Text here Combined • systems that provide both basic network monitoring as well as specific functions (mission centric) Super Tools • general purpose, high volume (ESM solutions) Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
  65. 65. Network Monitoring–Major Players Enterprise System Network Management Monitoring BMC AvalonNet Centerity CA Your Text here EMC Your Text here HP Perform-Net IBM SolarWinds Others… Others… Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
  66. 66. RSS Alert: Upcoming Round-Table Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
  67. 67. Networking Integrators - Israeli Market Positioning 1Q10 (Leaders) Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
  68. 68. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
  69. 69. Networking Staffing Ratios-Israel Average IT size: 95 FTE Your Text here Your Text here 0-1 FTE 2-5 FTE >5 FTE Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
  70. 70. Networking Staffing Ratios Ratios of data/voice Ratios of data/voice networking Personnel networking Personnel (Israel) (Abroad) 6% of IT unit Your Text here 7.7% of ITText here Your unit Shahar Maor’s work Copyright Source for Do not remove source or attributionEconomics or portion of graphic 2010 @STKI abroad figure: Computer from any graphic 71
  71. 71. Printing/Output Management’s Agenda Printing Consolidation Your Text here Your Text here Output Management Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
  72. 72. Main Theme: Your Text here Efficiency & technology Text here Your Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
  73. 73. Printing: Israeli Market Size (M$) 2009 changes 2010 changes 2011 changes 2012 Departmenta l Printers 82.0 3.66% 85.0 7.06% 91.0 9.89% 100.0 Personal 65.0 -7.69% 60.0 3.33% 62.0 4.84% 65.0 Printers Your Text here Your Text here Output Management 38.0 5.26% 40.0 10.00% 44.0 9.09% 48.0 Printing VAS 30.0 16.67% 35.0 14.29% 40.0 12.50% 45.0 totals 215.0 2.33% 220.0 7.73% 237.0 8.86% 258.0 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
  74. 74. STKI Index-2009/2010 Distribution Tools 7% Miscellaneous 11% Output Management Miscellaneous 28% 13% Your Text here Your Text here Fax Services Prices & Cost 18% Reduction 25% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
  75. 75. Printing Maturity: Progress Graph The Higher you “climb” –The More efficient You Are Output efficiency 80% Mainly High-tech sector 60% 40% Followers Your Text here Your TextAverage here 20% Leaders 0% Mainly Financial/government sectors Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
  76. 76. Optimize Infrastructure: The Beginning… Your Text here Your Text here Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
  77. 77. Optimize Infrastructure: Assessment Your Text here Your Text here Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
  78. 78. Optimize Infrastructure: Solution Your Text here Your Text here Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 80
  79. 79. Manage Environment: The Beginning… Your Text here Your Text here Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
  80. 80. Manage Environment: Assessment Your Text here Your Text here Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 82
  81. 81. Manage Environment: Find a Solution Your Text here Your Text here Improve workflow!! Improve workflow { Before HP } 1 Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 83
  82. 82. Manage Environment –Recommendations • Printer consumables are often ad hoc purchases made at Centralize procurement the departmental level • Money can be saved if procurement is coordinated • “Regular” print jobs should use both sides of the “Duplexing” paper Your Text here • Don’t go beyond the printer specifications Your Text here Printer’s Specs • Establish some process controls and assessments In-house vs. Out-sourcing on when an outside vendor should be used • First distribute, then print Think Digital! Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 84
  83. 83. Manage Environment –Recommendations • Printer consumables are often ad hoc purchases made at Centralize procurement the departmental level • Money can be saved if procurement is coordinated • “Regular” print jobs should use both sides of the “Duplexing” paper Your Text here • Don’t go beyond the printer specifications Your Text here Printer’s Specs • Establish some process controls and assessments In-house vs. Out-sourcing on when an outside vendor should be used • First distribute, then print Think Digital! Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 85
  84. 84. Printing Consolidation in “Real-Life” Your Text here Your Text here Source: MalamTeam, 2009 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 86
  85. 85. Printing Consolidation in “Real-Life” Employees/printers ratio by months (target is 1 output device per 3 employees) Your Text here Your Text here Total output cost: 37% savings Total output cost: 2,634K₪ 1,661K₪ Source: MalamTeam, 2009 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 87
  86. 86. Printing/Output Management’s Agenda Printing Consolidation Your Text here Your Text here Output Management Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 88
  87. 87. The Need for Output Management  Each application requires distinct business process definitions • Data Collection, Visual enhancement, Document distribution  Duplicate effort - each separate output channels requires a new design…  Requires significant IT staff involvement  Document and Template design – complex, time consuming, requires expensive IT resources Your Text here Your Text here >20 >10 1-5 Number of different output-generation Platforms in Enterprise organizations >5 Source: Autofont Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 89
  88. 88. Output Management Architecture -PrintBOS Your Text here Your Text here Source: Consist Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 90
  89. 89. Output Management Architecture - FreeForm App1 App2 App3 FreeForm Data Interactive Data structures generated by enterprise applications Interfaces Data Data Data Interfaces to any application platform, enables gradual implementation Analyzers Others Watched Folder LPR/LPD Web Service Printer Queue Direct API Modular analyzers for treatment of any structured/ unstructured data, open to Others Application Name XSF Offset & Length Column & Row XML proprietary data structures Design Your Text here Your Text here for dynamic output Templates Rich design generation, based on templates, data values and Channels quantity (+scripting) Distribution Modular support for multiple distribution channels (print, view, etc) FreeForm Interactive Interactive and mixed-mode Email data feed into forms Print Display MMS Pint Press Internet Fax Other services Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 91
  90. 90. Output Management Round-Table Insights Output management is very “close Output management requires to the business” cross-unit thinking (IT and beyond) Your Text here Your Text here Managing many different output Some organizations in Israel are platforms have become too complex looking for holistic solutions Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
  91. 91. Output Management - Israeli Market Positioning 1Q10 Solutions to Watch: SAP Oracle EMC Local Support Consist (PrintBos) Player Your Text here Your Text here Autofont Worldwide (FreeForm) Leader InfoPrint Adobe BMC (LifeCycle) Aman (FormIT) ISIS-Papyrus This analysis should be used with its HP supporting documents Bottomline (FormScape) Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 93
  92. 92. Output Management –Digital Signature Wiki: a mathematical scheme for demonstrating the authenticity of a digital message or document Your Text here Your Text here Name: ID: Source: Comsign Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 94
  93. 93. Output Management –Digital Signature A comparison between digital signature and hand-written signature: Digital signature hand-written signature Court admission? Yes Yes Ease of use “Single click” Signing every Your Text here Your Text here individual page in some cases Archiving Digital –relatively Hard-copy. Storage small storage. consuming. Document can be Changes to the No real protection. forged? original document Much easier to “breaks” the forge than DS. signature Non-repudiation Yes No Shahar Maor’s work Copyright 2010 @STKI Do Source: Comsign not remove source or attribution from any graphic or portion of graphic 95
  94. 94. Output Management –Digital Signature Digital signature improve security, workflow and save money! Growing demand for Authentication and integrity in Israel should push (…at last) the use of DS forward Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 96
  95. 95. "The security business has no future...The security industry is dead“ (IBM ISS general manager, Val Rahamani 2008) Your Text here Your Text here “spam and other content security issues would be "solved" in a few years” (Bill Gates, 2006) Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 97
  96. 96. Security’s Agenda General trends Security Issues for Cloud Computing Virtualization security Mobile security NetworkText here Your security Your Text here Anti-X protection Data protection Security Monitoring & Control Best SU of 2009 Staffing and ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 98
  97. 97. Information Security: Israeli Market Size (M$) 2009 changes 2010 changes 2011 changes 2012 Security 85.0 23.53% 105.0 4.76% 110.0 9.09% 120.0 Software GRC & Your Text here 50.0 50.00% 75.0 9.33% 82.0 Your Text here 9.76% 90.0 BCP Security 85.0 11.76% 95.0 8.42% 103.0 6.80% 110.0 VAS totals 220.0 25.00% 275.0 7.27% 295.0 8.47% 320.0 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 99
  98. 98. What’s on the CISO’s Agenda? (STKI Index 2009) Sec Tools SIEM/SOC 5% Miscellaneous 5% 5% NAC Encryption 18% 9% Access/Authenti Market/Trends cation Your Text here Your 15% here Text 10% DB/DC SEC EPS/mobile 10% DLP 15% 10% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 100
  99. 99. Some Interesting M&As in the Security Market Buyer (For how much?) Acquisition Why? IBM (225M$) Guardium •expand its portfolio in this area •Added value ability to provide analytics about IT business processes Trend Micro (?) Third Brigade Trend is making Third Brigade a strategic acquisition to assist in its data-center vision CA (?) Orchestria Adds Orchestria's data leak prevention Your Text here Your Text here technology to CA's identity and access management product suites Oracle (7.3B$) Sun Because of Sun’s IDM solutions  Microsystems Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 101
  100. 100. Some Interesting M&As in the Security Market Active Acquirers: IT Security M&A Deals Since 2004 Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 102 http://updataadvisors.com/Advisors_Newsletters/Security/it_security_maupdat
  101. 101. Types of Incidents (2000-2010) Your Text here Your Text here http://datalossdb.org/statistics Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 103
  102. 102. Incidents by Vector (2000-2010) Your Text here Your Text here http://datalossdb.org/statistics Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 104
  103. 103. Incidents by Vector (2009) Your Text here Your Text here http://datalossdb.org/statistics Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 105
  104. 104. www.stki.info is in the Trend… Your Text here STKI.INFOhere Your Text HAS BEEN DEFACED 18.12.2009 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 106
  105. 105. “Our” Quick Response…. MODERN WORLD STRIKES BACK!!! 6.1.2010 Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 107
  106. 106. RSS Alert: Upcoming Round-Table Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 108
  107. 107. Security’s Agenda General trends Security Issues for Cloud Computing Virtualization security Mobile security NetworkText here Your security Your Text here Anti-X protection Data protection Security Monitoring & Control Best SU of 2009 Staffing and ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 109
  108. 108. Main Theme: Your Text here Cautiousness Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 110
  109. 109. Cloud Computing Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic http://www.powerpoint-search.com/what-is-cloud-computing-ppt.html 111
  110. 110. Cloud Characteristics Your Text here Your Text here http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk- Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 112
  111. 111. Cloud Security Your Text here Your Text here Source: http://csrc.nist.gov/groups/SNS/cloud-computing/ Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 113
  112. 112. Cloud Security Reasons not to adopt SaaS: Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI by IGT,remove source or attribution from any graphic 2010 Source: SaaS survey – Do not Israel SaaS center & STKI, March or portion of graphic 114
  113. 113. How Does Cloud Computing Affect the “Security Triad”? Confidentiality Your Text here Your Text here Availability Integrity Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 115
  114. 114. Cloud Risk Assessment NETWORK INSECURE OR MANAGEMENT Probability INEFFECTIVE DELETION OF DATA ISOLATION FAILURE CLOUD PROVIDER MALICIOUS INSIDER - ABUSE OF Your Text here HIGH Your Text here PRIVILEGE ROLES MANAGEMENT INTERFACE COMPROMISE (MANIPULATION, AVAILABILITY OF INFRASTRUCTURE) LOSS OF GOVERNANCE COMPLIANCE RISK FROM CHALLENGES CHANGES OF JURISDICTION Impact http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk- Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 116
  115. 115. Cloud Regulations & Recommendations No regulations so far…. Some sources of information and recommendations: • Security Guidance for Critical Areas of Focus in Cloud Computing, V2.1 • ENISA Cloud Computing Risk Assessment • OECD -Cloud Computing and Public Policy • World Privacy Forum Privacy In The Clouds ReportYour Text here Your Text here • NIST -Effectively and Securely Using the Cloud • "Cloud Computing Security: Raining On The Trendy New Parade," BlackHat • AWS Security Whitepaper Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 117
  116. 116. Security’s Agenda General trends Security Issues for Cloud Computing Virtualization security Mobile security NetworkText here Your security Your Text here Anti-X protection Data protection Security Monitoring & Control Best SU of 2009 Staffing and ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 118
  117. 117. Main Theme: Your Text here “Mind the gap” Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 119
  118. 118. Bridging the Gap Your Text here Your Text here Virtualization is moving rapidly into production environments Companies concerned about security issues and lack of security products Virtualization opens up gaps in traditional physical network analysis and security Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 120
  119. 119. Virtualization attacks Root Partition Guest Partitions Provided by: Ring 3: User Mode Virtualization Stack Windows WMI Provider Guest Applications Virtualization VM Worker VM Processes ISV Service Attackers Your Text here Your Text here Virtualization Service OS Server Core Virtualization Kernel Clients Service (VSCs) Windows Kernel Device Providers Drivers (VSPs) VMBus VMBus Enlightenments Ring 0: Kernel Mode Windows hypervisor Server Hardware Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 121
  120. 120. How to Protect? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 122
  121. 121. What to Protect? Both Guests and Host are subjected to attacks Full disk encryption? Some challenges of VM architecture: • separation of duties • Where, exactly, are my VMs located? Your Text here Your Text here • How to manage old VM images? • How to retire Virtual Machines? • Hypervisor vulnerabilities • Lack of solid auditing capabilities • More and more… Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 123
  122. 122. Virtualization Security Solutions: Altor Your Text here Your Text here http://altornetworks.com/news-events/rsa-10-most-interesting Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 124
  123. 123. Virtualization Security Solutions: CatBird Your Text here Your Text here http://www2.catbird.com/our_services/vmware.php Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 125
  124. 124. Virtualization Security Solutions: Reflex Change Control & Configuration Monitoring Virtual Security (FW/IDS/IPS) CPU, Memory, Network & Storage Performance Software Asset Management Your Text here Virtual Infrastructure Discovery & Mapping Your Text here Timeline & Alerts for Audit & Compliance Virtual Infrastructure Alarms & Alerts http://www.reflexsystems.com/Products/VMC Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 126
  125. 125. Virtualization Security Recommendations  Follow best practices: • VMWare: http://www.vmware.com/pdf/vi3_301_201_server_config.pdf • Microsoft: http://www.microsoft.com/downloads/details.aspx?displaylang= en&FamilyID=2220624b-a562-4e79-aa69-a7b3dffdd090 Your Text here Your Text here • Citrix: http://support.citrix.com/servlet/KbServlet/download/20639- 102-532852/user_security-1.0-5.5.0-en_gb.pdf • Explore (cautiously!!) third party’s solutions Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 127
  126. 126. Security’s Agenda General trends Security Issues for Cloud Computing Virtualization security Mobile security NetworkText here Your security Your Text here Anti-X protection Data protection Security Monitoring & Control Best SU of 2009 Staffing and ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 128
  127. 127. Main Theme: Your Text here Fast-growing Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 129
  128. 128. Remote Access -Customer Needs Secure Access from Managed and Unmanaged Devices Simplified and Granular Access Control Application Interoperability Outside the Corporate Network Text here Your Your Text here Full Enablement of Mobile Devices 2 factor authentication for all applications Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 130
  129. 129. Connectivity Approach Each session is tailored according to its user and the device in use, maximizing security and productivity for that session. Internal & External Managed & Private Users Unmanaged Devices Resources Financial Legacy Apps Partner or Home PC Limited Intranet Financial Agent Field Home PC Custom Financials Partner or Field Agent Your Text here Logistics Your Text here Kiosk Kiosk Limited Webmail: Partner no attachments Web Apps Logistics Partner Client-Server Apps Corporate Full Intranet Supply Chain Project Manager Laptop Legacy Apps Employee Payroll & HR File Access Project Manager Third-Party Apps Employee Corporate Remote Unmanaged Laptop Homegrown Apps Technician Managed Webmail Tech Support App Partner PC EmployeeRemote Unmanaged File Access Technician Partner PC Employee Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic download.microsoft.com/documents/uk/.../IGA2009_UAG_Bill_Orme.pptx 131
  130. 130. Solution Architecture (UAG) •Exchange •CRM •SharePoint Mobile •IIS based •IBM, SAP, Home / Friend / Oracle Kiosk Internet HTTPS (443) TS Direct Access Your Text here Your Text here Non web Business Partners / Authentication AD, ADFS, Sub - Contractors End-point health detection RADIUS, LDAP…. Enterprise Readiness Edge Ready Corporate Network Employees Managed Machines Information Leakage Prevention Internet / home / hotel / other company Non-Windows Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic download.microsoft.com/documents/uk/.../IGA2009_UAG_Bill_Orme.pptx 132
  131. 131. Secure Remote Access - Israeli Market Positioning 1Q10 Juniper Local Support Player Your Text here Checkpoint Your Text here Microsoft Worldwide Leader Citrix SonicWall Cisco This analysis should be used with its F5 supporting documents Array Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 133
  132. 132. “Strong” Authentication - Israeli Market Positioning 1Q10 Solutions to Watch: ANB Local Support Player Your Text here RSA Your Text here Safenet-Aladdin Worldwide Leader Cidway Vasco Fast Movement Atena biometric solutions* This analysis should be used with its supporting documents * Biometric solutions are still Market Presence considered “niche market” in Israel Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 134
  133. 133. Mobile Security: What worries CISOs? Internal users: Central management Corporate data on device (encryption, DLP) Devices welfare (AV) ? Your Text here Your Text here External users: Sensitive traffic interception Masquerading Identity theft Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 135
  134. 134. Mobile Security: What worries Customers? Your Text here Your Text here Source: Data Innovation, Inc. 2010 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 136

×