The document contains charts from Raddon Financial Group summarizing data from their national consumer research in Fall 2011. The charts show trends in consumers purchasing investment services from their primary financial institution, awareness of investment services offered, participation in work-related retirement plans, comfort levels with investment decisions and savings levels, and economic expectations. The charts also show spending and savings habits compared to a year ago and opinions on the current state of the economy.
The document contains several charts summarizing consumer survey data from Raddon Financial Group regarding consumer attitudes and behaviors related to personal finances and investments. The charts show trends over time related to areas such as consumer awareness of investment services offered by banks, participation in retirement plans, comfort levels making investment decisions, and economic expectations. One chart shows that in Fall 2011, 50% of consumers reported they had not changed their investment portfolio in response to a volatile stock market.
The documents present data on investment trends among US households:
- The percentage of households with investments peaked at 57% in 2007 but declined to 48% in 2011 as the Dow Jones Industrial Average fluctuated.
- In response to stock market volatility, 50% of consumers did not change their investment portfolio while 15% moved some money to safer mixes.
- 56% of consumers participate in a work-related retirement plan while 44% do not. Most consumers (64%) will not retire for over 5 years.
The 2011 Edelman Trust Barometer found that:
1) Trust in institutions increased globally, with the largest increases seen in business and NGOs. However, in India trust was highest in business and lowest in government.
2) Among Asia Pacific countries, India had the most trust in business but the least trust in government. Trust in business remained stable in India from 2010 to 2011.
3) Half of informed publics in India trusted the media, lower than most other Asia Pacific countries. Trust in NGOs has risen over time in India.
S&P Capital IQ Market Outlook 2012; Tech & O&G sector outlooksAhmad Halim
The document provides an outlook and analysis of global markets and economies from S&P Capital IQ. It summarizes that markets rallied in recent months due to positive actions by central banks and signs of improvement. However, risks remain for the US, Eurozone, and China. The US is expected to see slow growth, while the Eurozone may face a shallow recession in the first half of 2012 and debt issues remain an overhang. China's growth is projected to slow slightly but avoid recession lows.
Value and Engagement in the Era of Social Entertainment and Second ScreensEdelman
1) The document discusses research into consumer behavior and preferences around entertainment in the digital era. It finds that value placed on entertainment is at a three-year high, though cinema viewing continues to decline.
2) Television and the internet remain the most frequently used sources of entertainment, but consumers are increasingly watching content on other devices like laptops. Personal enjoyment and quality are top priorities for consumers.
3) Social networks like Facebook are popular for discussing entertainment, with most conversations occurring after consumption. However, audiences are wary of automated notifications and recommendations from brands. Personalization and an authentic voice are important to cut through increasing digital noise.
Sales Webinar | The State of the UK Sales Industry Altify
The webinar discussed the state of sales in the UK based on an analysis of the Dealmaker Index. Key findings included:
1) Reps who maximize revenue from key accounts, differentiate their offering, and maximize deal value are most likely to achieve their quotas.
2) UK reps showed particular opportunities in advising customers, maximizing revenue, differentiating offerings, and maximizing deal value.
3) Using the Dealmaker Index, reps can assess their own effectiveness, compare to peers, get advice, and help their company identify improvement areas.
The document contains charts from Raddon Financial Group summarizing data from their national consumer research in Fall 2011. The charts show trends in consumers purchasing investment services from their primary financial institution, awareness of investment services offered, participation in work-related retirement plans, comfort levels with investment decisions and savings levels, and economic expectations. The charts also show spending and savings habits compared to a year ago and opinions on the current state of the economy.
The document contains several charts summarizing consumer survey data from Raddon Financial Group regarding consumer attitudes and behaviors related to personal finances and investments. The charts show trends over time related to areas such as consumer awareness of investment services offered by banks, participation in retirement plans, comfort levels making investment decisions, and economic expectations. One chart shows that in Fall 2011, 50% of consumers reported they had not changed their investment portfolio in response to a volatile stock market.
The documents present data on investment trends among US households:
- The percentage of households with investments peaked at 57% in 2007 but declined to 48% in 2011 as the Dow Jones Industrial Average fluctuated.
- In response to stock market volatility, 50% of consumers did not change their investment portfolio while 15% moved some money to safer mixes.
- 56% of consumers participate in a work-related retirement plan while 44% do not. Most consumers (64%) will not retire for over 5 years.
The 2011 Edelman Trust Barometer found that:
1) Trust in institutions increased globally, with the largest increases seen in business and NGOs. However, in India trust was highest in business and lowest in government.
2) Among Asia Pacific countries, India had the most trust in business but the least trust in government. Trust in business remained stable in India from 2010 to 2011.
3) Half of informed publics in India trusted the media, lower than most other Asia Pacific countries. Trust in NGOs has risen over time in India.
S&P Capital IQ Market Outlook 2012; Tech & O&G sector outlooksAhmad Halim
The document provides an outlook and analysis of global markets and economies from S&P Capital IQ. It summarizes that markets rallied in recent months due to positive actions by central banks and signs of improvement. However, risks remain for the US, Eurozone, and China. The US is expected to see slow growth, while the Eurozone may face a shallow recession in the first half of 2012 and debt issues remain an overhang. China's growth is projected to slow slightly but avoid recession lows.
Value and Engagement in the Era of Social Entertainment and Second ScreensEdelman
1) The document discusses research into consumer behavior and preferences around entertainment in the digital era. It finds that value placed on entertainment is at a three-year high, though cinema viewing continues to decline.
2) Television and the internet remain the most frequently used sources of entertainment, but consumers are increasingly watching content on other devices like laptops. Personal enjoyment and quality are top priorities for consumers.
3) Social networks like Facebook are popular for discussing entertainment, with most conversations occurring after consumption. However, audiences are wary of automated notifications and recommendations from brands. Personalization and an authentic voice are important to cut through increasing digital noise.
Sales Webinar | The State of the UK Sales Industry Altify
The webinar discussed the state of sales in the UK based on an analysis of the Dealmaker Index. Key findings included:
1) Reps who maximize revenue from key accounts, differentiate their offering, and maximize deal value are most likely to achieve their quotas.
2) UK reps showed particular opportunities in advising customers, maximizing revenue, differentiating offerings, and maximizing deal value.
3) Using the Dealmaker Index, reps can assess their own effectiveness, compare to peers, get advice, and help their company identify improvement areas.
This document discusses cloud computing and cloud security. It provides an overview of cloud delivery models including public, private and hybrid clouds. It also discusses some of the key security considerations related to cloud computing including issues around network management, data isolation, insider threats, compliance challenges and changes in jurisdiction. The document recommends looking at resources from NIST, ENISA and OECD for security guidance and risk assessments related to cloud computing. It also includes brief analyses of the Israeli market positioning for email security and secure web gateway solutions from various vendors.
The document discusses trends in the Israeli infrastructure services market, with a focus on networking and green IT. It covers topics like mobile computing, data center convergence, virtualization, voice/collaboration technologies, and IPv6 migration. Mobile is presented as a new computing cycle driven by the mobile internet and near field communication (NFC) is highlighted as a key technology for success. Networking, voice/collaboration, and optimization were the top queries to the organization providing the analysis.
The document discusses data loss prevention (DLP) technologies. It covers the need for DLP, different types of DLP, challenges with DLP implementations, and how to approach DLP projects. Key topics include internal and external threats to information security, common data breach vectors like hacking and social engineering, and ensuring ROI while respecting user privacy with DLP solutions.
The 2010 CIO Bootcamp document discusses strategies for IT infrastructure in response to the recession. It suggests automating processes to simplify complexity and adopting new technologies. Examples mentioned include server virtualization, converged infrastructure solutions, and fiber channel over Ethernet. The document also addresses challenges like complexity, costs, and change management processes.
Cyber economics v2 -Measuring the true cost of CybercrimeShahar Geiger Maor
This document discusses measuring the true cost of cybercrime. It provides estimates that cybercrime costs $1 trillion worldwide annually and 1.8% of GDP in the UK (equivalent to 27 billion British pounds). In Israel, the cost of cybercrime is estimated at 4.5 billion dollars, which is about 66% of the country's 6.7 billion dollar IT market. However, accurately measuring the costs of cybercrime is challenging due to numerous data sources, underreporting, survey methodology issues, and differing definitions. The document also examines the costs of cybercrime to society in terms of defense costs, indirect losses, direct losses, criminal revenue, and costs to supporting infrastructure. It suggests government should encourage standardized tools and methodology for quant
The document discusses how green IT and information security can be combined. It provides examples of how virtualizing servers and storage, implementing intelligent archiving, printing consolidation, and asset management can both reduce costs and energy usage while also improving security. Remote access via VPNs and data scrambling with cloud computing are presented as ways to achieve green security.
This document discusses PCI-DSS compliance in the Israeli market and its challenges. It provides an overview of the Israeli information security market size and reviews the top priorities for Chief Information Security Officers. These include building and maintaining a secure network, protecting cardholder data, maintaining vulnerability management programs, and implementing strong access controls. It also examines PCI-DSS requirements and trends, including challenges around requirement 3 to protect stored cardholder data. Overall, it concludes that PCI compliance can help organizations improve security but should be seen as a baseline rather than ceiling for measures.
Trends In The Israeli Information Security Market 2008Shahar Geiger Maor
The document discusses trends in the Israeli information security market in 2008. It summarizes that inside threats from human errors are a major concern, as attackers know how to exploit human weaknesses. Careless behavior by employees is seen as the most serious internal security threat. It also notes that virtualization and mobile platforms grew significantly in importance but their full security implications are still being explored.
The document provides a historical overview of cyber attacks and malware from early computer viruses like Creeper in 1971 to more advanced threats today like Stuxnet. It discusses the evolution of hacking activities and groups, from early phreakers to organized cybercrime syndicates. Over time, attacks have grown more sophisticated, widespread and potentially destructive, as seen with Stuxnet which targeted industrial systems. Ongoing challenges include the growing number of unknown and low prevalence malware that evade detection as well as sophisticated targeted attacks by nation states.
This document discusses how to create products quickly through an agile innovation process in weeks rather than years. It provides tips for overcoming common challenges like ensuring projects stay within budget, determining when to hire more staff, developing sales teams, identifying the best leads, and streamlining sales bottlenecks. Graphs show past sales trends and lead sources which can help with planning. The conclusion advocates testing assumptions early to validate or fail ideas quickly before significant resources are spent.
Connecting and Engaging Customers Through Social Media - John FettoSFIMA
Connecting and Engaging Customers Through Social Media
John Fetto, Sr. Marketing Manager, Experian Simmons
Learn best practices in connecting, engaging and empowering customers through social media, e-mail and mobile. We’ll examine current industry trends, including case studies as well as plans for measuring and tracking behaviors of the digital consumer of the future.
Dave Carroll, a musician, had his guitar damaged by United Airlines baggage handlers. He posted a video about the incident on YouTube called "United Breaks Guitars". The video became very popular and it was claimed that United Airlines lost $180 million in share value as a result. Social media allows information to spread quickly and can impact companies. It is an important marketing channel because people spend a lot of time on social networks.
The document discusses compensation challenges in Vietnam. It notes that Vietnam has high inflation, around 10% in 2009. This has led to rising salaries. Pay differentials between jobs in Vietnam and other Asian countries are shown, with salaries in Vietnam being lower. Effective compensation strategies for high-performing companies in Vietnam include implementing variable pay, developing incentive plans for managers, and improving manager skills. Common challenges for companies in Vietnam include developing relationships, protecting intellectual property, competition, and managing talent. Retaining top talent and maintaining competitive pay are major concerns. The closing emphasizes focusing on high performers to retain them.
The document discusses consumer insights in Southeast Asia. It notes that the company Cimigo employs 300 professionals to advise clients reaching 3 billion consumers across India, Hong Kong, Vietnam, Indonesia, China, and the Philippines. Cimigo offers consulting and research services related to understanding consumer behavior. The document also provides details on a study of internet usage in Vietnam, finding continued growth with over 30 million users, more than half of the population now online including beyond major cities and gender. It suggests marketers should listen and engage consumers across more diverse segments through mobile and social platforms.
The document contains four charts from Raddon Financial Group that summarize consumer perceptions and experiences regarding the economy and employment status. The charts show that:
1) Nearly half of primary wage earners and a quarter of secondary wage earners are employed but concerned about their job security.
2) Over the past two years, many consumers or their family members have experienced job loss, reduced hours/pay, or cuts to salaries and benefits.
3) While some consumers see signs the recession is ending, most do not yet see clear evidence of economic improvement.
4) Consumers are cautiously optimistic about their personal financial situation in the next six months, with over half expecting it to remain about the same.
The document contains 7 charts from Raddon Chart of the Day publications between August 2012 and July 2012. The charts summarize consumer research findings related to banking and financial services. The key points from the charts are:
1) Consumer overdraft rates have decreased from 2010 to 2012.
2) Current prepaid debit card use is low but interest in using one is high.
3) Consolidating accounts for rewards points alone may not prompt consumers to switch institutions.
4) Interest in comprehensive rewards programs that award points for total accounts and card use is mixed.
The document summarizes key findings from Borrell Associates' Q4 2012 SMB survey of over 1,750 small and medium businesses. Some highlights include:
1) Most SMBs (54%) plan to spend the same amount on advertising in 2013 as in 2012, while 20% plan to spend more and 16% plan to spend less.
2) SMBs expect to increase spending on online advertising and stabilize spending on newspapers and radio in 2013 compared to 2012.
3) Newspapers and online media are the most popular types of advertising purchased by SMBs, chosen by 64% and 62% of respondents respectively.
4) Facebook is the top choice for SMB online advertising spending in 2013, chosen by
The document provides an overview of market trends in payments in 2012. It discusses the growth of mobile payments and forecasts for smartphone adoption. Several challenges and examples of emerging mobile payment technologies and platforms are presented, including NFC and digital wallet applications from Google, Apple, and others. Security issues and the challenges of implementing new mobile payment solutions are also examined.
The document discusses networking trends and focuses on IPv6. It provides an overview of IPv6 including its market status and recommendations for organizations. It also discusses key drivers for network transformation such as server virtualization, storage convergence, and east-west traffic patterns between virtual machines. Changes in technology are making server-to-server traffic a major networking issue.
Information security stki summit 2012-shahar geiger maorShahar Geiger Maor
This document summarizes a presentation on trends in information security. It discusses various topics relating to security across endpoints, networking, cloud computing, mobile device management, and collaboration. It also discusses specific security projects, tools, and challenges across different sectors. Metrics are presented on security queries and market positioning. Threats like DDoS attacks, advanced persistent threats, and generic cyber attacks are analyzed. National cyber security approaches and challenges are also examined.
The document discusses trends related to endpoints such as the shift to a post-PC era where desktop PCs are getting old and many different devices are used. It also discusses bring your own device (BYOD) and changing client architectures involving tablets, smartphones and other technologies. Mobile devices are consuming more of the digital experience and employees will use multiple devices syncing data via cloud.
This document discusses cloud computing and cloud security. It provides an overview of cloud delivery models including public, private and hybrid clouds. It also discusses some of the key security considerations related to cloud computing including issues around network management, data isolation, insider threats, compliance challenges and changes in jurisdiction. The document recommends looking at resources from NIST, ENISA and OECD for security guidance and risk assessments related to cloud computing. It also includes brief analyses of the Israeli market positioning for email security and secure web gateway solutions from various vendors.
The document discusses trends in the Israeli infrastructure services market, with a focus on networking and green IT. It covers topics like mobile computing, data center convergence, virtualization, voice/collaboration technologies, and IPv6 migration. Mobile is presented as a new computing cycle driven by the mobile internet and near field communication (NFC) is highlighted as a key technology for success. Networking, voice/collaboration, and optimization were the top queries to the organization providing the analysis.
The document discusses data loss prevention (DLP) technologies. It covers the need for DLP, different types of DLP, challenges with DLP implementations, and how to approach DLP projects. Key topics include internal and external threats to information security, common data breach vectors like hacking and social engineering, and ensuring ROI while respecting user privacy with DLP solutions.
The 2010 CIO Bootcamp document discusses strategies for IT infrastructure in response to the recession. It suggests automating processes to simplify complexity and adopting new technologies. Examples mentioned include server virtualization, converged infrastructure solutions, and fiber channel over Ethernet. The document also addresses challenges like complexity, costs, and change management processes.
Cyber economics v2 -Measuring the true cost of CybercrimeShahar Geiger Maor
This document discusses measuring the true cost of cybercrime. It provides estimates that cybercrime costs $1 trillion worldwide annually and 1.8% of GDP in the UK (equivalent to 27 billion British pounds). In Israel, the cost of cybercrime is estimated at 4.5 billion dollars, which is about 66% of the country's 6.7 billion dollar IT market. However, accurately measuring the costs of cybercrime is challenging due to numerous data sources, underreporting, survey methodology issues, and differing definitions. The document also examines the costs of cybercrime to society in terms of defense costs, indirect losses, direct losses, criminal revenue, and costs to supporting infrastructure. It suggests government should encourage standardized tools and methodology for quant
The document discusses how green IT and information security can be combined. It provides examples of how virtualizing servers and storage, implementing intelligent archiving, printing consolidation, and asset management can both reduce costs and energy usage while also improving security. Remote access via VPNs and data scrambling with cloud computing are presented as ways to achieve green security.
This document discusses PCI-DSS compliance in the Israeli market and its challenges. It provides an overview of the Israeli information security market size and reviews the top priorities for Chief Information Security Officers. These include building and maintaining a secure network, protecting cardholder data, maintaining vulnerability management programs, and implementing strong access controls. It also examines PCI-DSS requirements and trends, including challenges around requirement 3 to protect stored cardholder data. Overall, it concludes that PCI compliance can help organizations improve security but should be seen as a baseline rather than ceiling for measures.
Trends In The Israeli Information Security Market 2008Shahar Geiger Maor
The document discusses trends in the Israeli information security market in 2008. It summarizes that inside threats from human errors are a major concern, as attackers know how to exploit human weaknesses. Careless behavior by employees is seen as the most serious internal security threat. It also notes that virtualization and mobile platforms grew significantly in importance but their full security implications are still being explored.
The document provides a historical overview of cyber attacks and malware from early computer viruses like Creeper in 1971 to more advanced threats today like Stuxnet. It discusses the evolution of hacking activities and groups, from early phreakers to organized cybercrime syndicates. Over time, attacks have grown more sophisticated, widespread and potentially destructive, as seen with Stuxnet which targeted industrial systems. Ongoing challenges include the growing number of unknown and low prevalence malware that evade detection as well as sophisticated targeted attacks by nation states.
This document discusses how to create products quickly through an agile innovation process in weeks rather than years. It provides tips for overcoming common challenges like ensuring projects stay within budget, determining when to hire more staff, developing sales teams, identifying the best leads, and streamlining sales bottlenecks. Graphs show past sales trends and lead sources which can help with planning. The conclusion advocates testing assumptions early to validate or fail ideas quickly before significant resources are spent.
Connecting and Engaging Customers Through Social Media - John FettoSFIMA
Connecting and Engaging Customers Through Social Media
John Fetto, Sr. Marketing Manager, Experian Simmons
Learn best practices in connecting, engaging and empowering customers through social media, e-mail and mobile. We’ll examine current industry trends, including case studies as well as plans for measuring and tracking behaviors of the digital consumer of the future.
Dave Carroll, a musician, had his guitar damaged by United Airlines baggage handlers. He posted a video about the incident on YouTube called "United Breaks Guitars". The video became very popular and it was claimed that United Airlines lost $180 million in share value as a result. Social media allows information to spread quickly and can impact companies. It is an important marketing channel because people spend a lot of time on social networks.
The document discusses compensation challenges in Vietnam. It notes that Vietnam has high inflation, around 10% in 2009. This has led to rising salaries. Pay differentials between jobs in Vietnam and other Asian countries are shown, with salaries in Vietnam being lower. Effective compensation strategies for high-performing companies in Vietnam include implementing variable pay, developing incentive plans for managers, and improving manager skills. Common challenges for companies in Vietnam include developing relationships, protecting intellectual property, competition, and managing talent. Retaining top talent and maintaining competitive pay are major concerns. The closing emphasizes focusing on high performers to retain them.
The document discusses consumer insights in Southeast Asia. It notes that the company Cimigo employs 300 professionals to advise clients reaching 3 billion consumers across India, Hong Kong, Vietnam, Indonesia, China, and the Philippines. Cimigo offers consulting and research services related to understanding consumer behavior. The document also provides details on a study of internet usage in Vietnam, finding continued growth with over 30 million users, more than half of the population now online including beyond major cities and gender. It suggests marketers should listen and engage consumers across more diverse segments through mobile and social platforms.
The document contains four charts from Raddon Financial Group that summarize consumer perceptions and experiences regarding the economy and employment status. The charts show that:
1) Nearly half of primary wage earners and a quarter of secondary wage earners are employed but concerned about their job security.
2) Over the past two years, many consumers or their family members have experienced job loss, reduced hours/pay, or cuts to salaries and benefits.
3) While some consumers see signs the recession is ending, most do not yet see clear evidence of economic improvement.
4) Consumers are cautiously optimistic about their personal financial situation in the next six months, with over half expecting it to remain about the same.
The document contains 7 charts from Raddon Chart of the Day publications between August 2012 and July 2012. The charts summarize consumer research findings related to banking and financial services. The key points from the charts are:
1) Consumer overdraft rates have decreased from 2010 to 2012.
2) Current prepaid debit card use is low but interest in using one is high.
3) Consolidating accounts for rewards points alone may not prompt consumers to switch institutions.
4) Interest in comprehensive rewards programs that award points for total accounts and card use is mixed.
The document summarizes key findings from Borrell Associates' Q4 2012 SMB survey of over 1,750 small and medium businesses. Some highlights include:
1) Most SMBs (54%) plan to spend the same amount on advertising in 2013 as in 2012, while 20% plan to spend more and 16% plan to spend less.
2) SMBs expect to increase spending on online advertising and stabilize spending on newspapers and radio in 2013 compared to 2012.
3) Newspapers and online media are the most popular types of advertising purchased by SMBs, chosen by 64% and 62% of respondents respectively.
4) Facebook is the top choice for SMB online advertising spending in 2013, chosen by
The document provides an overview of market trends in payments in 2012. It discusses the growth of mobile payments and forecasts for smartphone adoption. Several challenges and examples of emerging mobile payment technologies and platforms are presented, including NFC and digital wallet applications from Google, Apple, and others. Security issues and the challenges of implementing new mobile payment solutions are also examined.
The document discusses networking trends and focuses on IPv6. It provides an overview of IPv6 including its market status and recommendations for organizations. It also discusses key drivers for network transformation such as server virtualization, storage convergence, and east-west traffic patterns between virtual machines. Changes in technology are making server-to-server traffic a major networking issue.
Information security stki summit 2012-shahar geiger maorShahar Geiger Maor
This document summarizes a presentation on trends in information security. It discusses various topics relating to security across endpoints, networking, cloud computing, mobile device management, and collaboration. It also discusses specific security projects, tools, and challenges across different sectors. Metrics are presented on security queries and market positioning. Threats like DDoS attacks, advanced persistent threats, and generic cyber attacks are analyzed. National cyber security approaches and challenges are also examined.
The document discusses trends related to endpoints such as the shift to a post-PC era where desktop PCs are getting old and many different devices are used. It also discusses bring your own device (BYOD) and changing client architectures involving tablets, smartphones and other technologies. Mobile devices are consuming more of the digital experience and employees will use multiple devices syncing data via cloud.
This document discusses risk management, regulations, and data protection. It covers topics such as what risk is, the benefits of risk management, examples of regulations like Sarbanes-Oxley, roles in information security like the CISO and data owners, challenges with PCI compliance, social engineering threats, and technologies of interest in 2010-2011.
The document discusses cloud security risks and awareness. It covers various types of cloud models including public, private, hybrid clouds. It identifies top threats to cloud computing such as abuse and malicious use, account hijacking, and data leakage. The document examines how to secure the cloud from the perspective of cloud providers and clients. It addresses concerns around governance, compliance and trust between cloud providers and organizations. Finally, it discusses the lack of regulations and standards in cloud computing and calls for the development of standards to improve cloud security.
The document summarizes trends in information security. It discusses how cyber warfare is becoming more sophisticated with threats that are targeted and vast in scale. Examples like Stuxnet have changed the landscape of cyber attacks. Risks come from social media, mobile devices, and cloud computing. The underground economy enables cybercrime through stolen financial and personal details traded online. Effective security requires standards, technology, and awareness as threats grow.
This document appears to be a presentation on information security trends and topics. It discusses general security trends in Israel and market sizes. It also summarizes topics on cloud security, data-centric security, mobile security, and PCI regulations. Slides include information on threat landscapes, vendor decisions, the CISO agenda, and challenges with PCI compliance.
The document summarizes an STKI Summit 2010 presentation on Israeli infrastructure services markets. It discusses trends in networking, including datacenter convergence and complexity. It provides market sizing and analysis for local area networking, application delivery controllers, and WAN optimization. It also covers trends in voice over IP telephony and unified communications. Key themes discussed include the growing complexity of infrastructure and how business needs are driving technological changes.
This document summarizes the Israeli information technology and security markets. It provides statistics on the market size of the Israeli IT market in 2008 and 2009. It also discusses topics such as the concerns of Israeli CISOs, local security vendors, network access control, data security, identity and access management, and governance, risk, and compliance. Key local security vendors and their positioning in various markets are mentioned. The conclusion encourages the reader to review analyst reports and consider alternative local solutions.
This document discusses trends in the Israeli information security market in 2009. It notes that the overall IT market size declined from 2008 to 2009 due to economic downturn. However, the information security market remained steady due to continued investment in compliance and regulations. The document outlines the top concerns for Chief Information Security Officers and trends in technologies like network access control, data loss prevention, identity and access management, and security information and event management.
Internet Protocol Version 6 (IPv6) is the next generation protocol for the Internet that supports 2^128 unique IP addresses and improvements like quality of service, reduced data loss and latency, better mobility support, and increased security. While IPv4 is running out of addresses, IPv6 adoption faces challenges including incremental deployment to avoid detrimental impacts and uncertainty around implementation and stability that can be addressed through education and testing.
This document discusses various topics related to information security. It provides an agenda that includes information security, communication/networking, and green IT. It also includes to-do lists for 2009 related to applications and infrastructure. Additionally, it discusses trends in information security such as the security market size, security in the news, and security trends. It provides information on various security-related topics such as the underground economy, technologies categorization, security ratios in Israel, and sophisticated threat environments.
Trends in the World and Israeli Green Data Centers (2008)Shahar Geiger Maor
Round Table meeting presentation for leading Israeli enterprises on current trends in the DC environment in Israel and abroad. 24/9/08 at STKI's office
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008Shahar Geiger Maor
The document discusses trends in the Israeli infrastructure services market from 2007-2008. It covers topics such as networking, information security, green IT, and printing. In the networking section, it discusses trends regarding LANs, WANs, wireless networking, VOIP, and the transition to IPv6. The information security section outlines threats like hackers, organized crime, and human errors. It also discusses security technologies and the costs of cybersecurity breaches.
The document discusses trends in the green IT market in Israel from 2007-2008. It covers topics like how IT contributes to global warming, green initiatives organizations are taking like consolidating servers and printers, and improving energy efficiency in data centers which typically use 50% of their power on cooling. A survey found that over half of organizations plan to build a new or refurbished data center within the next two years in order to improve energy efficiency.
The document summarizes discussions from two round table meetings on green data centers and printing management strategies. For green data centers, key issues included space constraints in old facilities, electricity and cooling challenges, and data center arrangements. Consolidation and virtualization were discussed as solutions. For printing management, discussions centered around contract negotiations, monitoring costs, and educating organizations. The insights note that Israeli IT is running low on power reserves and that IT must learn to highlight cost savings from printing management to executives.
Green IT refers to implementing, managing, optimizing, and retiring IT in an environmentally friendly and energy efficient manner. Israel is facing an electricity crisis as demand is rising 4% annually while reserves are low. Practical green IT solutions include data center assessments, virtualization, power management for PCs, duplex printing, reducing paper usage, and videoconferencing. Future Israeli trends may include more data center consolidation and virtualization, alternative energy sources, and environmental responsibility programs to address the electricity shortage and rising costs while improving sustainability.
The document summarizes discussions from two round table meetings about green data centers and printing management strategies. For green data centers, key issues included outdated space and equipment leading to inefficiency problems with electricity, cooling, and arrangements. Consolidation and virtualization were proposed solutions. For printing management, discussions focused on finding cost savings through contracts, prices, supplies, and vendor value while also implementing controls, monitoring, and secure practices with organizational training.
1. Yes, I’ve got life outside Facebook!
(…But I forgot the password)
Shahar Geiger Maor, Senior Analyst
www.shaharmaor.blogspot.com http://www.facebook.com/shahar.maor http://twitter.com/shaharmaor
2. So, What’s new in the Social Media
These Days?
http://www.facebook.com/pages/Planking-Australia/147452668649160#!/pages/Planking-
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
Australia/147452668649160?closeTheater=1
3. So, What’s new in the Social Media
These Days?
http://www.bbc.co.uk/news/world-middle-east-13417930graphic
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of 3
4. So, What’s new in the Social Media
These Days?
http://bits.blogs.nytimes.com/2011/05/17/a-social-network-for-making-future-plans/
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
5. Decisions will be based on:
Friends recommendations
Future Rewards
Relevance privileges
Coupons
miles
Analytics
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
6. You can’t afford to ignore
the “social elephant” in your room
For more info:
http://www.slideshare.net/Galit/social-media-and-mobile-presentation-2011
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
7. 2010 –The REAL Beginning of
Enterprise Social Media
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
8. Many Channels, One Strategy
What kind of new channels strategy do you have for 2011?
Full multichannel integration strategy 23%
Dealing with new channels now &
integration later 57%
Wait to see how these new markets will
20%
evolve
Shahar Maor’s work Copyright 2011 @STKI Do not remove Surveyattribution from any graphic or portion of graphic
Source: STKI source or 2011 8
9. “Social Security”
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
10. Malicious Websites by Search Term
31% Is social network related
http://www.symantec.com/business/threatreport/build.jsp
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
11. What’s going on Abroad?
Source: Nemertes
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
12. Internet Policy –Allowing Facebook?
Israel: Cross-Sector, March 2011
Limited Yes
27% 38%
No
35%
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
Source: STKI 12
13. Internet Policy –Allowing Facebook?
Industry Healthcare Finance
Yes
Yes Yes
Limited 12%
37% 33%
38% No
25%
Limited
No 63%
67%
No
25%
Services High-Tech Government
Limited No Limited Yes
14% 17% 23% 15%
No
14%
Yes
72% Yes No
83% 62%
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
Source: STKI 13
14. Internet Policy –Allowing Skype?
Israel: Cross-Sector, March 2011
Limited
4%
Yes
18%
No
78%
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
Source: STKI 14
15. Internet Policy –Allowing YouTube?
Israel: Cross-Sector, March 2011
Limited Yes
24% 38%
No
38%
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
Source: STKI 15
16. Internet Policy –Allowing YouTube?
Industry Healthcare Finance
Yes
Limited Yes Yes
25%
25% 37% 33%
No
Limited 12%
No 63%
No 67%
38%
Services High-Tech Government
Limited Limited Limited Yes
14% 17% 15% 31%
Yes
No 50%
29% Yes
57% No
33% No
54%
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
Source: STKI 16
17. Internet Policy
–Allowing Streaming (in general)?
Israel: Cross-Sector, March 2011
Limited Yes
24% 25%
No
51%
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
Source: STKI 17
18. Internet Policy –Allowing Gmail?
Israel: Cross-Sector, March 2011
Limited
18%
No
Yes
24%
58%
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
Source: STKI 18
19. Internet Policy –Allowing P2P?
Israel: Cross-Sector, March 2011
Limited
4%
No
96%
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
Source: STKI 19
20. 10 Steps to Social-Computing
Compliance
Step 3 – Formal Step 4– Strong
Step 1 – Take Step 2 –Establish
education password
ownership policy
program management
Step 5 – Content Step 6 – Selective Step 7– Routine
Step 8 – Regular
monitoring and blocking of audits and review
policy review
logging content of logs
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
21. “Social Security” –Key Takeaways
• Social media is all around us
• Corporate network is opening up?
• Most employees use social media for leisure time
• From Perimeter security to data security
• Recommendations:
– CIO’s: Find the balance between business necessity,
productivity, network considerations and security
– CISO: Get involved!
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
22. Thank you!
Shahar Maor’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic 22