Your Text here                         Your Text here



Shahar Geiger Maor
  VP & Senior Analyst
   shahar@stki.info

Visit My Blog: http://shaharmaor.blogspot.com/

                                                                  1
Agenda
                                                                                                  Information
1   Information Security                                                                            Security




2   Communication
    Networking                                                                                   Networking


    Your Text here                                                                            Your Text here
3   Green IT                                                                                        Green IT




         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   2
2009: Application to-do-list
a. Flexible staffing based on good temps vendors
b. Contract renegotiations and multisourcing of temps
c. Requirement and portfolio management and rationalization
d. Maintenance and requirement release management
e. Application integration, reuse, atmaa and SOA
f. Automating and outsourcing testing
           Your Text here                         Your Text here
g. ERP instance consolidation
h. Application Hosting and SaaS
i. New licensing strategies
j. Self service software (even e-learning)
k. User authentication and password management
l. Automated compliance software

             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   3
2009: Infrastructure to-do-list

a. Desktop simplification
b. End-user help desk
c. Green IT and recycling
d. Consolidation of servers, storage and end ser platforms
e. Demand management
          Your Text here                     Your Text here
f. Storage management and rationalizing
g. Exception oversight
h. Bandwidth prioritizing
i. Open source software
j. Print management
k. Hosting and utility computing
            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   4
Information Security
                                                                                                                                  Information
                                                                                                                                    Security




                     GRC and Security market size (Ms of $)



        Your Text here                       2008                                    2009 Your Text here                      2010
Governance & Risk Management
          (also BCP)                         35.0   42%                              50.0               50%   75.0
     Security (projects)                     95.0 -10.53%                            85.0              11.76% 95.0
    Security (Software)                      90.0 -5.56%                             85.0              -5.88% 80.0
            Total                             220                0%                   220                   14%                   250




             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            5
Information

Security/Privacy In the News                                                                                                   Security
                                                                                                                                -Trends




   Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            6
Information

                               Security Trends                                                                                             Security
                                                                                                                                            -Trends




  Cloud
                                 Outsourcing                                cyber crime                              Virtualization
computing

                                         Sensitive or
                                                                                                                   Inability to properly
                                         confidential
                                                                                                                       identify and
           Your Text here             information may                                                    Your Text here
                                                                                                                    authenticate users
                                       not be properly
   End-user’s                                                                                                      to multiple systems
                                          protected
 organization is
                                                                               External threat of
unable to control
                                                                                organized cyber
    the data
                                                                              criminal syndicates
  management
  environment                         Unauthorized
                                                                                                                        Third parties might
                                     parties might be
                                                                                                                         be able to access
                                      able to access
                                                                                                                        private files without
                                   private files without
                                                                                                                            authorization
                                       authorization



                    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            7
Information

                            Security Trends                                                                                             Security
                                                                                                                                         -Trends




                               Data breaches
                                  involving                            Peer-to-peer file                              Web 2.0 and
 Mobility
                                  personal                                 sharing                                     mesh-ups
                                information
                                                                                                        Unsupervised
                                                                               Use of P2P               monitoring of
         Your Text here            Sensitive or                             might result in Your Text here
                                   confidential                                the loss of             employees’ use
  Inability to
                                information that                              sensitive or               of Web 2.0
   properly
                                 ends up in the                               confidential            applications can
 identify and
                                 hands of cyber                                 business              result in the loss
authenticate
                                                                                                          of critical
remote users                      criminals and                               information                confidential
                                 identity thieves                           including trade
                                                                                 secrets                business data
                                                                                                       on the Internet



                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            8
Information

            Underground Economy                                                                                                       Security
                                                                                                                                       -Trends




Items for sale on underground servers, appearance and price:




          Your Text here                                                                            Your Text here




                                                         Source: Symantec
               Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            9
Information

            Underground Economy                                                                                                      Security
                                                                                                                                      -Trends




Items for sale on underground servers, appearance and price:




          Your Text here                                                                            Your Text here




                                                         Source: Symantec
              Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           10
Information
     Technologies Categorization 2009                                                                                                     Security
                                                                                                                                           -Trends

Business Value
Investment
to make money                        Remote
                                     Access
Cut costs, Increase                                                                                    Manage Sec.
productivity                                        IAM/IDM                                             Services                           IT Project
                                                                                                                                           Business
                                                     SSO                                                               Cloud               Project
                   App.
            Your Text here         Anti                                                                 Your Text here
                    Sec.                                                                  DLP                                          Size of figure =
Commodity IT                        X                                                                       Mobile
                                                                                                                                       complexity/
                                 EPS SIEM/SOC                                                                Sec.
Services                                                                                                                               cost of project

                                                                                        DB
                                                                                                            Vir.
                             Network                                     NAC
                                                                                        Sec.                Sec.
                             Security
Investment
for regulations
                                                      GRC
                                     Using                     Implementing                              Looking
                                                            Market Maturity
                  Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic               11
Information

                    STKI Madad 2008-2009
                                                                                                                                         Security
                                                                                                                                          -Trends




                         Network DLP                                                          Hardening
   Market Players
                           5% 4%                                                                 3%
        5%
                                                                                   Access
     GRC                                                                            18%
     5%
Miscellaneous                                                                                               EPS/Anti x
     6%      Your Text here                                                                             Your Text here
                                                                                                                14%


     NAC        DB Protection                                                                         WAF & Apps
     6%              7%                                                                                  11%
                                       Management                         Trends
                                           8%                               8%




                  Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           12
Information

               Security Ratios                                                                                              Security
                                                                                                                             -Trends




Organization Type                                           Ratios of Security
                                                            Personnel (Israel)

Average Public Sector                                       0.1% of Total Users
 Your Text here                                                                            Your Text here

Sensitive Public Sector                                     0.5% of Total Users




     Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           13
Information

Sophisticated Threat Environment                                                                                                        Security
                                                                                                                                         -Trends


                          First-Stage                                                       Second-Stage
    Writers                                                 Middle Men                                                         End Value
                           Abusers                                                            Abusers

                        Hacker or                                                                                                     Fame
 Tool Writers
                       Direct Attack
                                                        Compromised
                                                          Host and
                                                         Application                                                                  Theft
  Malware                 Machine                                                          Extortionist
  Writers                Harvesting                                                       DDoS for Hire
                                                       Botnet Creation                                                         Espionage
   Worms                                                                                      Spammer Text here
             Your Text Information
                       here                                                                       Your
                         Harvesting                        Botnet                                                               Extortion
                                                         Management
   Viruses             Internal Theft                                                          Phisher
                         Abuse of                                                                                             Commercial
                          Privilege                         Personal                                                            Sales
   Trojans                                                Information                      Pharmer/DNS
                                                                                            Poisoning                          Fraudulent
                                                                                                                                 Sales
                                                          Information
  Spyware                                                  Brokerage                       Identity Theft
                                                                                                                              Click Fraud
                                                         Electronic IP
                                                           Leakage                                                         Financial Fraud
                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           14
                                                         Source: Cisco Israel
Information

               Application Security                                                                                             Security
                                                                                                                               -App. Sec




STKI observation: Secure development should be an
  integral part of any new project and therefore should be
  calculated within the project’s budget. STKI survey shows
  that spendings on secure development scale from 0% of
  total project budget (Main-Frame based projects) up to
  10% ( core web applications projects) of total project
  budget. here
     Your Text                              Your Text here
  Average spending on secure development is 5% of total
  project budget (including: training, code review and
  penetration tests)




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           15
Information

Web Applications - Vulnerabilities                                                                                              Security
                                                                                                                               -App. Sec




    Probability to detect vulnerabilities of
    different risk degree (results of 32,717 sites
    and 69,476 vulnerabilities of different
    degrees of severity)
    Your Text here                                                                            Your Text here




      % Sites (All)                              % Sites (Scanned)                      % Sites (Black & Whitebox)

                Source: http://www.webappsec.org/projects/statistics/
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           16
Information

   Web Applications -Vulnerabilities                                                                                                   Security
                                                                                                                                      -App. Sec


Vulnerability frequency by types:
1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to
    system design errors
2. Information Leakage and Predictable Resource Location are often connected with
    improper system administration (for example, weak access control)



           Your Text here                                                                            Your Text here




                       Source: http://www.webappsec.org/projects/statistics/
               Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           17
Information

       Application Security –Dev. LifeCycle
                                                                                                                       Security
                                                                                                                      -App. Sec



           Security & Privacy Training                   Security
                                              Security            Security                    Security Final
                 Security                                   &                Security
                                                  &                   &                Public                        Security
Security             &     Security Arch &               Privacy                &              Push Security RTM
                                               Privacy             Privacy            Release                       Servicing &
   &     Cost     Privacy Attack Surface      Best Dev
                                                          Docs
                                                                    Best
                                                                             Privacy
                                                                                      Privacy
                                                                                                         &     Or
                                                                                                                     Response
Privacy Analysis Design Review                Practices
                                                        and Tools
                                                                    Test
                                                                            Response
                                                                                      Review Pen
                                                                                                      Privacy RTW
                                                                                                                     Execution
 Kickoff           Best                  Risk              For                Plans                   Reviews
                                              and Tools           Practices                   Testing
                 Practices           Analysis            Product


    Traditional Microsoft Software Product Development Lifecycle Tasks and Processes
                 Your Text here                                                            Your Text here
                                       Design                                                       Code
  Feature Lists                                           Testing and Verification                              Product Support
                                Specifications                                                   Signing +
Quality Guidelines                                                                                               Service Packs/
                                                                                                 Checkpoint RTM
   Arch Docs                                                                                                     QFEs Security
                                                   Development                                    Express
   Schedules         Functional                                             Bug Fixes              Signoff
                                                                                                                    Updates
                     Specifications                of New Code


                                                                                                                    Support
Requirements                Design               Implementation            Verification             Release             &
                                                                                                                    Servicing


                       Source: MICROSOFT SECURITYremove source or attribution from any graphic or(SDL)ofGUIDE
                       Shahar Maor’s work Copyright 2009 @STKI Do not DEVELOPMENT LIFECYCLE portion graphic                     18
Application Security                                                                                                Information
                                                                                                                                 Security

–Israeli Players and Positioning -1Q09
                                                                                                                                -App. Sec




     Your Text here                                                                            Your Text here




         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           19
Information

      Web Application Firewall                                                                                                     Security
                                                                                                                                  -App. Sec




What is it?
 "An intermediary device, sitting between a web-client
 and a web server, analyzing OSI Layer-7 messages for
 violations in the programmed security policy. A web
 application here
        Your Text
                  firewall is used as a security Your Text here
                                                 device
 protecting the web server from attack.― (WASC)




           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           20
Web Application Firewall
                                                                                                                         Information
                                                                                                                            Security

                                    –Israeli Market Players
                                                                                                                           -App. Sec

Solution                              What Should I Know?                                                      Representatives/
                                                                                                               Integrators
Applicure - dotDefender               Host based Israeli WAF provider (On Apache and                           2BSecure,
(Apache and IIS)                      IIS web servers). Awarded Frost & Sullivan Award                         Comtec,
                                      for Successful Technology Innovation (Oct 08)                            Overline,
                                                                                                               Msecurity,
                                                                                                               Comda, New age
Barracuda - Web                       Provides single point of protection for inbound      Trek-IT, ABnet
Application Firewall here
              Your Text               and outbound traffic for all Web applications. Text here
                                                                                 Your
(fromerly                             Appliance that has SSL Acceleration and Load
NetContinuum)                         Balancing capabilities.
Breach Security -                     Typically deployed in an out-of-line mode so it                          Direct sales
WebDefend                             present no latency threat to the network. Can
                                      locate indications for poor web applications
                                      design. Not quite common in Israel
Citrix - Application              Strong attack detection and protection, traffic                                         Aman Computers
Firewall (Formerly Teros) throttling and blocking. Excellent integration with
                                  the NetScaler suite. Weak GUI compare to other
                                  solutions. No projects in Israel yet.
                   Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
Web Application Firewall
                                                                                                                                        Information
                                                                                                                                           Security

                                –Israeli Market Players
                                                                                                                                          -App. Sec

Solution                           What Should I Know?                                                                     Representatives/
                                                                                                                           Integrators
Cisco* - ACE XML                   A key component of the Cisco ACE family. It                                             Bynet, Taldor,
Gateway                            enables efficient deployment of secure, reliable,                                       Bezeq Int.,
                                   and accelerated XML applications and Web                                                2BSecure
                                   services. Few Deployments in Israel
IBM* –Data Power            Powerful XML FW with added values of WAF, load Tangram
                            balancing and applications acceleration. Very        (Matrix), Elad
             Your Text here strong presence in Israel as a XML FW solution.      Group
                                                                      Your Text here
Microsoft –IAG WAF                 IAG comes with built-in web application firewall                                        Elad, Matrix,
                                   for known web applications like: Outlook Web                                            DBNet, HP,
                                   Access, Share Point, iNotes, Domino Webmail,                                            M-Security,
                                   Microsoft CRM and more. Quite successful in                                             Securenet
                                   Israel
Protegrity - Defiance              Based on KaVaDo, Strong presence worldwide,                                             012 Smile, Matrix
                                   but few Israeli clients
Radware - AppXcel WAF              Based on Imperva                                                                        Bynet, Netvision
              *Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list
                   Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           22
Web Application Firewall
                                                                                                                                       Information
                                                                                                                                          Security

                           –Leading Players -1Q09
                                                                                                                                         -App. Sec




Solution                          What Should I Know?                                                                     Representatives/
                                                                                                                          Integrators
F5 - Application Security   One of the best WAFs around. Features a good          Trek-IT (Dis.),
Manager (ASM)               policy toolset for adaptive learning. Offer strong    Artnet,
                            integration to the TMOS family of products.           Taldor, Spider,
                            Superb load balancing capabilities. One of two        Bezeq Int., One
             Your Text here leading solutions in Israel. Strong market Your Text here
                                                                                  NewAge, Netcom
                            presence
Imperva – SecureSphere            The first in the Israeli market. Imperva has an                                         Comsec (Dis.),
                                  array of out-of-the-box policies and attack                                             Netcom, Bynet,
                                  signatures as well as superior learning mode . A                                        Taldor, NewAge,
                                  leading DB protection solution. Has a significant                                       012 Smile
                                  market share




                  Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           23
Information

                    Network Security                                                                                               Security
                                                                                                                                -Network Sec




Enterprise FWs have long become an essential security
 foundation
FW selection should consider:
  • Capabilities (especially deep inspection, blocking
    Capabilities and throughput speed)
        Your Text here                        Your Text here
  • Ease of deployment
  • Integration with other network infrastructure
  • Cost
The perimeter defense is not dead. Instead it got
 thickened: Network complexity triggered the use of
 virtual FWs running over one machine
           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            24
Information

                      Network Security                                                                                             Security
                                                                                                                                -Network Sec




Business operations and networks have become very
 complex
FW solutions should have strong management and
 configurations capabilities in order to adjust themselves
         (Next Generation FW): New versions Text here offer a
NGFW Your Text here                       Your of FWs
 built in IPS solution. This convergence is logical since
 both FW and IPS solutions are latency-sensitive and can
 work together in high speed




           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            25
Information

Israeli FW Market: Leading Solutions
                                                                                                                                 Security
                                                                                                                              -Network Sec



       Network FW market share as % of total deployments
 100%
  90%
  80%
  70%
   60%
   50%           92%
      Your Text here                                                                           Your Text here
   40%
   30%
    20%
    10%                                 22%
     0%                                                      20%
                                                                                  14%                     30%
          CheckPoint               Cisco
                                                      Juniper
                                                                            Fortinet
                                                                                                      Other

         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            26
Israeli FW Market:                                                                                                      Information
                                                                                                                                           Security
          Leading Solutions and Integrators                                                                                             -Network Sec

             Checkpoint                     Juniper                                    Cisco                                   Fortinet
  Bynet           x                               x                                        x
 Taldor           x                                                                        x                                            x
Bezeq Int.        x                                                                        x                                            x
Netvision         x                                                                        x                                            x
 Netcom                                           x                                        x
012Smile          x                                                                                                                     x
2Bsecure          x
             Your Text here                       x                                                     Your Text here
 Artnet           x                                                                                                                     x
   IBM                                                                                     x
EDS (HP)          x
  Ness            x
  One             x
 Spider           x
 Matrix                                            x
   WE                                              x
   ICT                                             x
                 Shahar Maor’s work Copyright 2009 @STKI   Do not remove source or attribution from any graphic or portion of graphic            27
Information
Israeli IPS Market: Leading Solutions                                                                                           Security
                                                                                                                             -Network Sec



          IPS market share as % Of total respondents
 40%
 35%
 30%
  25%
  20%            38%
    Your Text here                                                                            Your Text here
  15%
  10%                                         21%                                                    32%
   5%
   0%                                                                    9%

             McAfee
                                     IBM (ISS)
                                                                  Juniper
                                                                                           Other/None

        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            28
Israeli IDS/IPS Market:                                                                                                  Information
                                                                                                                                     Security
     Leading Solutions and Integrators                                                                                            -Network Sec


                        McAfee                           IBM(ISS)                          Juniper                     Tipping point
                                                                                                                          (3COM)
 Bynet                        x                                                                  x                                 x
2BSecure                      x                                 x
 Netcom                       x                                                                  x
 Aman                         x
Netvision                                                                                                                          x
         Your Text here                                                                            Your Text here
  Ness                        x
 Taldor                                                        x
 Spider                                                        x
 Calcom                       x
   WE                                                                                            x
 Matrix                                                                                          x
  One
Securenet                                                      x
             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            29
Information

Network Access Control
                                                                                                                                  Security
                                                                                                                               -Network Sec




      Your Text here                                                                            Your Text here




          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            30
Information

                          NAC Insights                                                                                            Security
                                                                                                                               -Network Sec




NAC has not been ―fully digested‖ by Israeli customers in
  2008. There should be more activity in 2009
NAC can be deployed less expensively when it is an
  embedded feature of an existing vendor and customers
  take notice of it
Some network and security vendors alreadyText here
        Your Text here                     Your have

  solutions that can be part of the NAC process (AC, IPS) –
  An important starting point for market domination
 Israeli customers first priority: implement a guest
  networking control
Network or Security?
NAC is a Layer 2 vs. Layer 3 match
          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            31
Information

                                        NAC –Solutions                                                                                      Security
                                                                                                                                         -Network Sec


Solution                 Value for Customer                                                                              Notes

Access Layers –          •Multiple switch vendor support                                                                 Strong Israeli
Port Nox (Israeli        •Agentless                                                                                      presence.
vendor)                  •Score based authentication                                                                     Integrators:
                         •No 802.1x authentication                                                                       Netcom, Netvision,
                                                                                                                         2BSecure, Trustnet
CheckPoint –NAC •Strong personal firewall and VPN client software              Strength in NAC
(Israeli vendor) Text here
              Your player                                            Your Text depends on ability
                                                                               here
                    •EPS & NAC functionality in a single endpoint client       to compete in the
                    •OPSEC Alliance                                            Endpoint
                    •ease of implementation in remote access applications Protection market!
                                                                               CP is not a first
                                                                               choice
Cisco -CNAC              •Both Appliance & infrastructure-based approach                                                 Few projects and
                         •Support of non-traditional endpoints                                                           POCs in Israel.
                         •Large install base in Israel –cost effective solution                                          Natural first choice
                                                                                                                         for many users
                    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            32
Information

                                     NAC –Solutions                                                                                      Security
                                                                                                                                      -Network Sec


Solution                                   Value for Customer                                               Notes

Enterasys -Sentinel                        •Cross-vendor platform                                           Penetration mainly on
                                           •MAC, 802.1x authentication and                                  Enterasys install base in
                                           more                                                             Israel. Netcom, Artnet
                                           •Guest registration module                                       are strong integrators

ForeScout -CounterACT (Israeli •Out-of-band NAC appliance                                                No packet filtering
vendor)      Your Text here    •integration with a number of                                             capabilities.
                                                                                                       Your Text here
                               remediationdirectory solutions                                           Few clients in Israel
                               •Built-in RADIUS proxy for 802.1X
                               support
HP Pro-Curve -                             •Both appliance-based and                                        HP Pro-curve is gaining
                                           Endpoint Integrity Agent                                         ground in the Israeli LAN
                                           •Strong management system                                        market and therefore
                                           (Identity Driven Manager)                                        becoming an important
                                                                                                            NAC player.


                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            33
Information

                           NAC –Solutions                                                   Security
                                                                                         -Network Sec


Solution                   Value for Customer                            Notes

Insightix –NAC (Israeli    •Real-time "state" of all devices connected   Few implementations in
vendor)                    to the network                                Israel and abroad.
                           •Agentless visibility functionality           Integrators: Bynet and
                           •Cross-vendor platform                        Overline
Juniper -UAC               •Impressive array of enforcement options       Some of the features
                           •supports third-party HW via 802.1x            require other Juniper
               Your Text here                                            Your Text here in the
                                                                          components
                                                                          network (FW, IDS…)
McAfee -MNAC               •comprehensive client security suite          Best fit McAfee clients.
                           •One of the better integration strategies     Strong EP player with NAC
                           with Microsoft NAP                            functionality

Microsoft -NAP             •Has one of the strongest access and          Integrate with many other
                           enforcement architectures                     NAC solutions. contributor
                           •Uses Forefront and AD for superior           to the standardization of
                           policy management                             NAC
                                                                                              34
Information

                          NAC –Solutions                                                                                               Security
                                                                                                                                    -Network Sec


Solution                       Value for Customer                                                               Notes

    Nortel -SNA                •Cross-platform device support                                                   unmanaged
                               •Appliance that collects contextual                                              user and device
                               infrastructure information from multiple                                         support -via NAP
                               network sources
    Symantec -SNAC        •Pure software-based solution                 Very good solution
                          •Provide strong threat protection solutions   for EPS customers
           Your Text here •One of the most comprehensive reporting Text here
                                                                   Your
                          and auditing frameworks
    XOR –SWAT                  •MAC based NAC                                                                   Dozens of
       (Israeli                •Provides access control for switches and                                        implementations in
       vendor)                 devices that don’t support 802.1x                                                Israel
                               •Cost effective 80-20 solution




               Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            35
Information

                           STKI Israeli Positioning
                                                                                                                                                   Security
                                                                                                                                                -Network Sec



                Not a technological positioning, refers only to Israeli market•
                Focused on enterprise market (not SMB)•
                                                                                                               Vendor A
                Not an STKI recommendation•
                Market Presence (X)                                                          Vendor B
Local Support




                Market share - existing and new sales (more emphasis) 
                Mind share (how user organizations rate vendors) 
                Local Support (Y) – is influenced by (X)                                                                                       Worldwide
                                                                                                                                                Leader
                Experience & technical knowledge, localization, 
                support, number and kind of integrators
                Worldwide leaders marked, based on global positioning
                Vendors to watch: Are only just entering israeli market
                so can’t be positioned but should be watched
 Vendors to Watch:
                Vendor C
                                                      Market Presence
                           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            36
NAC                                                                       Information
                                                                                                                                                   Security
                                                                                                                                                -Network Sec
                             - Israeli Market Positioning 1Q09

                Vendors to Watch:
                   HP Procurve
                   Check Point

                                 Microsoft
Local Support




                    Cisco
                                                                                                                                                 Player
                    Symantec
                                                                                                                                                 Worldwide
                  Juniper                                                                                XOR SWAT
                                                                    Access Layers                                                                Leader
                                              Enterasys                                                                                          Leap
                           McAfee
                              ForeScout
                               Insightix
                  Nortel
                                                                                      This analysis should be used with its
                                                                                      supporting documents


                                                      Market Presence
                           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             37
Information

Endpoint Security                                                                                                              Security
                                                                                                                                 -EPS




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           38
Information

Endpoint Security -Threats                                                                                                   Security
                                                                                                                               -EPS




  Your Text here                                                                            Your Text here




      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           39
Information

          Endpoint Security -Protection                                                                                                   Security
                                                                                                                                            -EPS
Organization




                                                                                                                                             Outside
               Your Text here                                                                            Your Text here




                   Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           40
Information

          Endpoint Security -Protection                                                                                                   Security
                                                                                                                                            -EPS
Organization




                                                                                                                                             Outside
               Your Text here                                                                            Your Text here




                   Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           41
Information

          Endpoint Security -Protection                                                                                                   Security
                                                                                                                                            -EPS




                                                                 Anti X
                  DLP
Organization




                                                                                                         NAC




                                                                                                                                             Outside
               Your Text here                                                                            Your Text here

               Manageability




                   Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           42
Anti -X Suites                                                                                                      Information
                                                                                                                                        Security
- Israeli Market Positioning 1Q09 (Enterprise Leaders Only)                                                                               -EPS




                                                              Symantec
 Local Support




                                                                         McAfee
                                                        Trend Micro                                                                   Player

                                                                                                                                       Worldwide
                                                                                                                                       Leader


                 Microsoft



                                                                            This analysis should be used with its
                                                                            supporting documents


                                            Market Presence
                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            43
Data Centric Security                                                                                                       Data Centric
                                                                                                                              Security




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            44
Data Centric
         Data Centric Approach                                                                                                Security




   Your Text here                                                                            Your Text here




Build a wall – “perimeter                                        “Business of Security” – Security
        security”                                                is built into the business process



       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            45
Data Centric

Data Centric Security Arena                                                                                            Security




              DLP                                                      ERM


                                                           Database
Encryption
                                                           Protection


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            46
Data Centric
      Data Centric Approach                                                                                                Security




                                                Business
                                                Efficiency



            Ubiquitous                                                         Regulatory
             access to
Your Text here
           information                         Business                        Compliance here
                                                                                    Your Text
                                               Goals for
                                               Security
                                                Today

                          Protection                                Protection
                             from                                    of Assets
                           Financial                                   from
                              Loss                                    Threats

    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            47
Data Centric
              Data Centric Approach                                                                                                Security




                                                 Develop practical
                                               end–to-end solutions
                                               that will protect your
                                                 information right
                                                now with what you
         Identifying, Defining
                                                     now have
           & Assessing your                                                            Provide a pure and total
           Data, Intellectual                                                           focus on this complex,
               Capital and                                                               mission-critical area
       Your Electronic Assets
            Text here                                                                             Your Text here




                                                    Security is
Business perspective                                   an                                              End-to-end view and full
approach – top down                                                                                       life-cycle security
                                                     ongoing
                                                     Process

            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            48
Data Centric

Data Leak/Loss Prevention                                                                                                      Security
                                                                                                                                 -DLP




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            49
Data Centric

     Data Leak /Loss Prevention                                                                                                    Security
                                                                                                                                     -DLP




 DLP is an overall framework into which different elements fit
 There are three types of data that may leak:
   • Data at rest
   • Data in transit
   • Data on endpoints
          Your Text here                         Your Text here
 No single DLP focus area is full proof, an optimal solution
  should cover all three areas
 DLP is a growing area, and vendors react accordingly
 It is suggested to use full-suite vendors in order
  to avoid integration problems


            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            50
Data Centric

    DLP –Market Status                                                                                                     Security
                                                                                                                             -DLP




                 DLP Deployments Status -Israel 1Q09



                                                          Solution Deployed
                                                                 20%
Your Text here
                                                                                   PlanYour Text here
                                                                                        to Deploy
    Not "There" Yet                                                                     Soon
         60%                                                                            20%




    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            51
Data Centric

                     DLP–World Trends                                                                                      Security
                                                                                                                             -DLP




Your Text here                                                                            Your Text here




                                     Source: Aberdeen Research
    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            52
Data Centric

      DLP –Market Status & Players                                                                                                  Security
                                                                                                                                      -DLP




World Leaders (consolidation in progress…):
  •   Symantec (Acquired Vontu, 2007, 350$ M)
  •   Websense (Acquired PortAuthority 2007, 90$ M)
  •   Reconnex (Acquired by McAfee, July 2008, 46$ M)
  •   Tablus Text here
          Your (Acquired by RSA, 2007, 40$ M) Your Text here
  •   Vericept ? Workshare?
Main drivers for DLP are:
  • Regulations such as Payment Card Industry (PCI),
    Accountability Act (HIPAA)
  • e-mail security, instant messaging (IM) and
    endpoint monitoring solutions
             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            53
Data Centric
                DLP - Israeli Market Positioning 1Q09                                                                                           Security
                                                                                                                                                  -DLP




                Vendors to Watch:
                    ProofPoint
                    Workshare
                    IBM (ISS)
Local Support




                                                                                                                                               Player

                                                                                                                                               Worldwide
                                                                                                                                               Leader
                                                Websense
                                                                                                                                               Fast
                                                                                                                                               Movement

                           McAfee
                      Verdasys
                   Symantec
                                                                                    This analysis should be used with its
                                                                                    supporting documents
                  RSA

                                                    Market Presence
                         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             54
Data Centric

  ERM
                                                                                                                                    Security
            (Enterprise Rights Management)                                                                                           -ERM




Enterprise Rights Management (ERM) technology—also
 known as Enterprise DRM or Information Rights
 Management (IRM)
What is it?
   • ERMYour Text hereencrypting files that contain Your Text hereand only
          entails                                   content
     allowing those users or devices that have proper
     credentials to decrypt the files and access the content

Awareness of ERM has increased
ERM has been growing steadily since it became a
 technology category unto itself about five years ago
             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            55
Applications and File Formats                                                                                   Data Centric
                                                                                                                           Security

          Used in ERM Implementations                                                                                       -ERM




Your Text here                                                                            Your Text here




                                         Source: Gilbane Group
    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            56
Data Centric

ERM –How Does it Work?
                                                                                                                                           Security
                                                                                                                                             -DLP




   SQL Server
                                                          Active Directory        1. New user is authorized to use RMS

                                                                                   2. The User defines set of rules and content
                                                                                      usage rights for the data he wants to
                                                                                      share – He is the data owner
                            RMS Server                                             3. User distributes data to relevant recipients
                Your Text here                                                                    Your Text here
                                                                                   4. When recipient tries to open a file –a
                       1                     4                                        request is sent to the RMS Server in
                                                                                      order to authorize/deny access

                                                                                   5. RMS enforces rules made by the data
                2                3                            5                       owner


   Data owner                                           Recipient




                                                       Source: Microsoft Israel
                    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            57
Data Centric

    ERM -Israeli Market Players                                                                                                  Security
                                                                                                                                  -ERM




Microsoft -Rights Management Services
EMC- EMC Documentum IRM Product Suite
Oracle - Oracle Information Rights Management
Adobe –Adobe LifeCycle Rights Management
         SU:
IsraeliYour Text here                   Your Text here

Secure Islands -A provider of an advanced information
 protection and control (IPC) solution
Covertix –Develops innovative software technology to
 track, monitor and control documents and files within
 and outside the organization

          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            58
Data Centric
                                                                                                                                     Security
    DB Protection –Market Status                                                                                                       -DB
                                                                                                                                   Protections


                                    DB Protection Deployments Status -Israel 1Q09

Leading Israeli Players:                                                        Not "There"
•Sentrigo                                                                           Yet
                                                                                   49%
•Imperva                                   Plan to
•Oracle DB Vault                         Deploy Soon
•Guardium Text here
          Your                              30%                                     Solution Your Text here
                                                                                    Deployed
                                                                                      20%
DB encryption:                                                                                                               OtherDo Not
Decru –by NetApp                                                                                                                Know
                                                                                                                                  1%
Ged-i (Israeli SU): offers
high-level encryption to
Storage Data

              Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            59
Data Centric
                                                                                                                                   Security
      Masking of Production Data                                                                                                    -Data
                                                                                                                                  Masking



 What is it?
   • The process of data masking is designed to ―de-identify‖ data,
     such that the data remains based on real information, but no
     longer has any practical usage or application
 What is the need?
   • The drive to outsource and offshore application development
     and Your Text here
         testing work means that organizations will have little control
                                                  Your Text here
     over who gets to see their data
   • Test environments are not physically as secure as production
     systems
 What can go wrong?
   • Sensitive data might be downloaded to laptops and stolen
   • Employees might misuse sensitive information and engage in
     fraudulent activity


            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            60
Data Centric
                                                                                                                               Security
Masking of Production Data                                                                                                      -Data
                                                                                                                              Masking




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            61
Data Centric
                                                                                                                               Security
Masking of Production Data                                                                                                      -Data
                                                                                                                              Masking




    Your Text here                                                                            Your Text here




                                         Source: Securosis.com
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            62
Data Centric
                                                                                                                                Security
   Masking of Production Data                                                                                                    -Data
                                                                                                                               Masking




Israeli market players (alphabetize):
 • Compuware (File-AID) –Few
   implementations
 • DataVantage (Global)
      Your Text here              Your Text here

 • IBM (Optim) –Few POCs
 • Informatica (PowerCenter) - Few POCs
 • Oracle (Enterprise Manager Data Masking) –
   For Oracle DBs only

         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            63
SIEM/SOC                              SIEM/SOC




    Your Text here   Your Text here




                                         64
SIEM/SOC                                                                              SIEM/SOC




 What is SIEM?
   • Security Information & Event Management
 What is SOC?
   • Security Operation Center

   • Collects and analyzes all log data and basic event management
         Your Text here                            Your Text here
   • monitors and manages all aspects of enterprise security in real
     time, from a single, centralized location
   • The NOC of security
 Why do we need it?
   • Need for real-time awareness of internal/ external threats
   • Ensure business continuity and comply with regulations

            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         65
Silos of Redundant Information                                                                                             SIEM/SOC

          Management




  Your Text here                                                                            Your Text here




                                            Source: Network Intelligence
      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         66
An Enterprise Platform for Compliance                                                                                         SIEM/SOC

             and Security




     Your Text here                                                                            Your Text here
                                                          SIEM




                                                                                                        Source: Network Intelligence
         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         67
SIEM/SOC -Israeli Trends                                                                                                SIEM/SOC




CA has been the first to enter the market and gained
 considerable market share in the high-end market
ArcSight was introduced two years later. This solution was
 easer to deploy and much easer to manage
End ofYour Text here
        2007: Symantec SSIM and RSA Envision were
                                          Your Text here
 introduced to the market, both easy to deploy, scalable
 and relatively intuitive
CA has lost some of it market share to the other new
 comers



          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         68
SIEM/SOC -Israeli Players                                                                                                    SIEM/SOC




Solution                                                   Leading Integrators
ArcSight                                                   We (Exclusive representative)
CA                                                         1. Netcom
                                                           2. TrustNet
                                                           3. Ness
Cisco                                                      1. Bynet
  Your Text here                                           2. Netcom                          Your Text here
RSA                                                        1. TrustNet
                                                           2. Xor
                                                           3. Bynet
IBM                                                        Ness
NetIQ                                                      Calcom (Exclusive representative)
Symantec                                                   1. Netcom
                                                           2. Bynet

        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         69
SIEM/SOC                                                                        SIEM/SOC

                        - Israeli Market Positioning 1Q09
                Vendors to Watch:
                   IBM -MSS
                     TriGeo
Local Support




                                                                 ArcSight                                                                    Player

                                                                                                                                             Worldwide
                                                                                                                                             Leader
                                       RSA
                                                                                                                                             Fast
                                  Symantec
                                                                                                                                             Movement

                                                                               CA
                  IBM
                         Cisco
                                                                                   This analysis should be used with its
                     NetIQ                                                         supporting documents


                                                   Market Presence
                        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            70
Next Generation SIEM/SOC: MSS
                                                                                                                                SIEM/SOC
                                                                                                                                   -MSS




What does MSS offer?
  -Comprehensive solution for security management:
  • Firewall/EP Management Service
  • Intrusion Detection & Prevention Management Service
  • Vulnerability Management Service
       Your Text here                                                                            Your Text here
Why should we go there?
  • Cost effective!
  • Use of best-of-breed security
Why shouldn’t we?
  • Who owns my data?
  • No one else in Israel goes there…yet

           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         71
SIEM/SOC
               MSS Trends in Israel                                                                                            -MSS




STKI observation: MSS is well accepted in SMB
  organizations, but Israeli CISOs in enterprises still
  strongly oppose this trend

The current economic downturn should encourage
   Your Text here                      Your Text here
 some enterprises to reconsider MSS
MSS providers addresses the management (CFOs and
 CEOs) in order to attract new clients




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         72
SIEM/SOC
                       MSS –World Leaders                                                                                          -MSS

Delivery




                                                    Great Potential for:
                                                    •Current world leaders (IBM, Symantec)
                                                    • local ISPs
                                                    •Network integrators
                                                    •Traditional OS players


                                             Market Penetration



                                                      (Source: Frost and Sullivan)
           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         73
Identity & Access Management (IDM/IAM)
                                                                                                                               IDM/IAM




      Your Text here                                                                            Your Text here




          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         74
IDM Global Mega Trends                                                                                                IDM/IAM




 Fraud and identity theft will increase strong
  authentication use

 Strong authentication and SSO will strengthen their ties

 Context-based authorization will put risk analysis here
        Your Text here                        Your Text into
  access control decisions

 Physical and logical security will continue to converge

 Federation will slowly grow



            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         75
IDM/IAM Savings                                                                                                              IDM/IAM




    Your Text here                                                                            Your Text here




       Source: http://blogs.technet.com/mcs-ireland-infrastructure/default.aspx
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         76
IDM/IAM Market Lifecycle Positions
                                                                                                                            IDM/IAM




   Your Text here                                                                            Your Text here




                                          Source: Butler Group
       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         77
Trends in the Israeli Market                                                                                             IDM/IAM




 Nov 2008: CA acquired Eurekify to enhance its role-based
  management suite
 ERP based SOD solutions start to be seen, mainly for GRC
  reasons:
   • 2006: SAP acquired Virsa, enterprise risk management software
     provider, to bolster SAP’s software compliance skills
         Your Text here                           Your Text here

   • 2008: Oracle acquired Logical Apps, an automated GRC controls,
     for enterprise applications
 Israeli new GRC enforcement Start-Ups:
   • Xpandion -Risk management and behavioral analyzing software
     solutions
   • SPATIQ –provides an automated tool for Entitlement Management

           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         78
IAM/IDM                                                                                               IDM/IAM

                          - Israeli Market Positioning 1Q09

                Vendors to Watch:


                     SPATIQ
Local Support




                                                                 IBM                                                                         Player
                                                  Novell                  Sun (OS)
                                                                                                                                             Worldwide
                                                                                                                                             Leader
                                                    CA                                                                                       Prominent
                                                                                                                                             WAM Player
                                       BMC
                   Microsoft
                           Oracle
                  Velo (OS)                                                        This analysis should be used with its
                                                                                   supporting documents


                                                   Market Presence
                        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            79
Key Success Factors for Future IDM Project
                                                                                                                                IDM/IAM




Consider IDM also as a business project, rather
 than a pure IT project
Make sure the project bridges the gap between
 business and IT
 StartYour Text here easier success (Single Signhere a
        small for                           Your Text
                                                      On,
 vertical project)
 Choose a step-by-step approach, rather than a
 mastodon implementation.
Focus on basic functionalities not on the
 additional features
           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         80
IDM/IAM
                 SSO Israeli Market                                                                                                  -SSO




 Players in Israel:

   Imprivata -Easily integrate target systems, quick & painless deployment,
    but doesn't come cheap

   Oracle, Citrix & RSA (EMC) -OEM with Passlogix

   Novell Your Text here
            -OEM version of ActivIdentity SecureLogin                                               Your Text here

   CA -Script-based architecture, Part of eTrust IAM suite

   IBM – Part of the TAM suite

   Sun –Open SSO: Built in solution

   BMC –Based on Java System Solutions Single Sign On

   Microsoft –Built in solution to the ILM suite
              Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         81
IDM/IAM
   Strong Authentication -Options                                                                                               -Strong Auth.




what are the current options for SA?
1. Biometric and smart-cards: excellent solutions, but
   require expensive readers on every user’s desktop
   (Atena, NITGEN, L-1, Visual Defense, SecuGen est.)
2. software tokens: Prone to virus attacks Your Text here easy to
        Your Text here                      and too
   share between users from the same household (Oracle,
   RSA est.)
3. USB tokens: Most are deployed with a certificate and
   work within PKI environments (RSA, Aladdin, Vasco est.)



           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             82
IDM/IAM
          Strong Authentication –Options                                                                                        -Strong Auth.




4. OTP fobs: Cost effective, but might not have robust
   encryption (Entrust, Vasco, RSA est.)
5. Voice delivered token: OTP via an automated voice call
6. Mobile OTP: Use an authenticator that theText here already
        Your Text here                     Your
                                                user
   has. Cost effective solution (Cidway, Vasco)




           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             83
Information
          Security Consultants                                                                                                 Security
                                                                                                                               -Market
-Israeli Market Positioning 1Q09 (Leaders)                                                                                      Players




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           84
Information
          Security Integrators                                                                                                 Security
                                                                                                                               -Market
-Israeli Market Positioning 1Q09 (Leaders)                                                                                      Players




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           85
Information
          Security Distributors                                                                                                Security
                                                                                                                               -Market
-Israeli Market Positioning 1Q09 (Leaders)                                                                                      Players




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           86
Networking                                                                                                                 Networking




  Your Text here                                                                            Your Text here




      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          87
Networking                                                                                                                 Networking




                            Networking market size (Ms of $)
  Your Text here                                                                            Your Text here
                              2008                                   2009                                    2010
        LAN
     equipment                 80.0            -25.00%                 60.0               8.33%               65.0
       WAN
     equipment                 50.0            -20.00%                 40.0              12.50%               45.0
        VoIP
     equipment                 40.0            -20.00%                 32.0              25.00%               40.0
         Totals               170.0            -22.35%                132.0              13.64%              150.0

      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          88
Networking
        Networking Future Trends                                                                                                 Trends




Datacenter Networking virtualization
Next Generation Networking Internet Protocol (IP) Core
 and High Speed Broadband
Green Networking
IPv6 Your Text here                     Your Text here

Network Operating systems
Network intelligence and policy control
Network Security
Communication billing


          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          89
Networking
     Technologies Categorization 2009                                                                                                    Trends

Business Value
Investment
to make money
                                                                                                   SAAS/
Cut costs, Increase                                                                                Cloud
                                                                                                                                           IT Project
productivity                                      Optimization
                                                                                          UC
                                                                                                                                           Business
                                                                                                                                           Project
                                               Billing                                              NGN
            Your Text here                                                                            Your Text here
Commodity IT                                                                  VOIP             Networking             IPv6             Size of figure =
                             Infra.                                                               Vir.                                 complexity/
Services                                            Network                                                                            cost of project

                                                    Security
Investment
for regulations

                                     Using                     Implementing                              Looking
                                                            Market Maturity
                  Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic               90
Networking
Year of savings and productivity                                                                                         Trends



   What networking technologies are you investing-in to enhance employee
       productivity and collaboration in 2009? (Answer all that apply)
                                                 2009          2008

                                                                                               52%            55%
                                                                                             46%
                                                             36%
                                          29%              31%              32%
     Your Text here                                                                       Your Text here               23%
                         19%
            11%            13%
          9%                                                                        8%
 1% NA                                            NA




         Shahar Maor’s work Copyright 2009Source: Goldman Sachsor attribution from any graphic or portion of graphic
                                           @STKI Do not remove source Research                                                91
Networking
    Ratios and Budgets -2008                                                                                                            Trends




Network Ratios                             Israel                                                 World
Network Staff                              Network Personnel/Total                                On average: 9.5% of total IT
                                           Users:                                                 (Israel: 3.5% -Low Network
                                           •1:200 in high-tech global                             prices, Short distances)
                                           organizations
                                           •1:1500 in
                                           industrials/governmental
            Your Text here                                                                             Your Text here
                                           companies
                                           •1:2200 in low-tech/services
                                           sectors
Budgets Trends                             •High-tech/finance –decrease                           On average: same as 2007
                                           (~5%)
                                           •Services/government –same
                                           as 2007
                                           •Retail/food/other traditional
                                           sectors –small increase
                                                                                            Source: STKI, Computer Economics
                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          92
Networking
                     STKI Madad 2008-9                                                                                                 Trends



                                                  Optimization
        Market Players                                2%
             8%                                       UC
                                                      8%                  VOIP and IPTel
                                                                              20%
                Nortel
                 10%
                                                                                                  Network Infra
          Your Text here                                                                            Your Text here
                                                                                                      20%

                                          Trends                  Miscellaneous
Network Costs                              10%                        12%
  Reduction
    10%




                Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          93
Local Area Network Trends
                                                                                                                                   Networking
                                                                                                                                      -LAN




 LAN vendors should support standard-based platforms
 Security embedded features in the LAN infra are imperative
 Network Virtualization is on the horizon
 Israeli Trends:
   •   Corporate here to endpoints is stable: 100 MBIT Ethernet;
          Your Text LAN                                 Your Text here
       Backbone LAN: 2 X 1GBIT (10GBIT in some cases)
   •   Israeli enterprise tend to ―count on‖ either Cisco or Nortel for their
       backbone network. Other players appear on the network edges
       Preferred Integrators for LAN issues: Netcom and Bynet




              Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          94
LAN                                                                      Networking
                                                                                                                                                    -LAN
                              - Israeli Market Positioning 1Q09

                Vendors to Watch:


                     Foundry
Local Support




                                                                  Cisco
                                                                                 Nortel                                                           Player


                                                                                                                                                  Worldwide
                                                                                                                                                  Leader


                              Enterasys                          3COM
                                       HP
                               Juniper

                                                                                       This analysis should be used with its
                  Alcatel                                                              supporting documents
                 Extreme
                                                       Market Presence
                            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             95
Networking
The Nortel Crisis                                                                                                                 -Nortel

        From 90K to
                                   Feb 08:
           30K
                                 Nortel says                         Nortel
         employees
                                  it will cut                      announces
                                 2,100 jobs                                                                         More and
                                                                      1,300
                                                                                                                   more layoffs…
                                                                     layoffs




                                                                           Nortel says
                                                                             several
        Your Text here
   Nortel                                                                  executives
                                                                                                 Your Text here files
                                                                                                             Nortel
                                                                                                                 for bankruptcy
  Reports                                                                  to leave in                             protection
  Financial                                                                   2009
 Results for
  Q3 2008




           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          96
The Nortel Crisis –What’s next?
                                                                                                                               Networking
                                                                                                                                 -Nortel




Nortel files for Chapter 11 to ―deal decisively‖ with its
 historic debt burdens
Nov 10’th 2008: A Nortel spokesman said the company
 had enough liquidity to sustain 12 to 18 months of
 operation under the current conditions Your Text here
        Your Text here
Survival still possible for Nortel, but Companies that exit
 the bankruptcy process often emerge in smaller form and
 are frequently acquired in part or whole by larger suitors
 looking for a good deal
19.2.09: Radware has purchased Nortel’s Alteon…


          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          97
The Nortel Crisis                                                                                                            Networking

–Israeli Market ”What if” Analysis                                                                                             -Nortel



                      Acquiring parts of Nortel?
                                                                                                            Alliance with Avaya
  Cisco                                                                                  HP                 and Microsoft



                                                                              Juniper                Acquire Nortel’s
                                                                                                     Telephony?
    Your Text here                                                                            Your Text here

                                                                                       •Enterasys (LAN and sec.)
                                                                         Gores
                                                                                       •Siemens (Telephony)



                                                                          Goes deeper into the
                                                             Alcatel
                                                                          Israeli market?

                                                                  Goes deeper into the
                                                3COM              Israeli market?
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          98
Networking
              WAN –Wide Area Network                                                                                                  -WAN




       STKI Observation: Vast Majority of Global Israeli-based organizations
           use MPLS networks for interconnectivity of core applications

                       Average Number                   Average Number                    Average Number
                       of Employees                     of Remote Sites                   of MPLS Lines
                                 1,300                               20                                10
 What’s Your Text here
          the rush?                                                                                  Your Text here

   •     Greater Performance problems than ever before
 Why MPLS?
   • Provides diversified range of services (Layer 2, Layer 3 and Dial up VPNs)
   • Provides end to end single-point management with flexible SLAs for
     customers
 Why not MPLS?
  •   doesn’t come cheap….


               Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          99
Networking

                              WAN Optimization                                                                                         -WAN



WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN:


       VOIP Deployments



Data Center Consolidation
            Your Text here                                                                             Your Text here
                                                                                                                                          2007
                                                                                                                                          2008
      Server Virtualization



                  BCP/DRP


                                  0%        10% 20% 30% 40% 50% 60% 70% 80%

                                                  Source: Aberdeen Research
                Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          100
Networking
        WAN Optimization Solutions                                                                                                 -WAN




         If you are planning to deploy WAN optimization equipment in 2008,
            which vendores would you invite to bid? (Answer all that apply)

              Cisco
                                                                                                                                      50%
            Juniper                                                               24%
          Riverbed here
             Your Text                                            17%                                Your Text here
              Citrix                                     13%
                 F5                                   12%
Blue Coat/Packeteer                          8%
            Expand             2%
        Silver Peak            2%
            Unsure                                                                                 31%

                 Shahar Maor’s work Copyright 2009 @STKI DoGoldmansource orResearch
                                                   Source: not remove Sachs attribution from any graphic or portion of graphic          101
WAN Optimization:                                                                                         Networking
                                                                                                                                       -WAN
                        Solutions and Integrators

Solution                                                               Integrator/Representative
Blue Coat -SG Appliances                                               REL (VAD), Ankor, Taldor
Cisco Systems –WAAS                                                    Bynet, Bezeq Int., IBM, Netcom, Taldor
Citrix Systems –WANScaler                                              Aman Computers
Expand Networks Text here
           Your –Compass                                               Taldor, Ankor                   Your Text here
F5 Networks -WANJet, WebAccelerator                                    Artnet, Taldor, Spider, NewAge, Bezeq Int.,
                                                                       Netcom
Juniper Networks –WXC                                                  Netcom, Netvision, Bezeq Int.
Packeteer -PacketShaper, iShared,                                      Bynet
Radware -LinkProof                                                     Bynet, Ankor, Netvision
Riverbed Technology –Steelhead, Interceptor                            Netcom, Innocom

                Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          102
WAN Optimization                                                                                          Networking
                                                                                                                                             -WAN
                          - Israeli Market Positioning 1Q09
Local Support




                                                                     Expand                                                                 Player
                                                   Riverbed
                                                       F5                                                                                   Worldwide
                                                                                                                                            Leader
                              Cisco

                          Blue Coat
                                    Citrix
                Radware            Packeteer*
                Juniper                                                           This analysis should be used with its
                                                                                  supporting documents


                                                  Market Presence                                 *June 2008: A Blue Coat company
                      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             103
Networking
Voice Over IP (VOIP): Terminology                                                                                                -VOIP




Voice Over IP - Voice transmission over the internet or
 LAN/WAN, PC-to-PC, P2P
Internet telephony - The use of Internet-based services
 to deliver voice traffic (Skype; Vonage).
  Originally for consumers but slowly for businesses as well
        Your Text here                     Your Text here

IP telephony - The delivery and support of call processing
 functionality and features over IP (call setup, hold,
 forward, & transfer)




          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          104
Networking
                       Voice Over IP (VOIP)                                                                                          -VOIP




       STKI observation: Many enterprises are migrating, or
   planning to migrate, their telephony infrastructure from
   traditional circuit-switched technology to newer Internet
   Protocol (IP)-based systems
           Your Text here                                                                            Your Text here

 Motivations to actually migrate:
   •    End of life/end of support for current telephony infrastructure
   •    Moving to a new office/office improvements
 Motivations to wait:
   •    ―Phones are working‖


              Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          105
VOIP Israeli Market
                                                                                                                                Networking
                                                                                                                                  -VOIP




 There are two kinds of project possible: enterprise IPTel
   and IP based Call-Centers
 Israeli VOIP market is dominated by three main players:
   Cisco, Nortel and Avaya
        Your Text here                                                                            Your Text here

 Other players in Israel:
  •   Tadiran Telecom –Large install base (Mostly non IP based)
  •   3COM, Alcatel –Lucent –Few implementations
  •   Siemens is back in Israel??? (Gores [Enterasys] acquired 51% of
      Siemens, Oct 2008)

           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          106
VOIP (Enterprise & CC)                                                                                       Networking
                                                                                                                                                -VOIP
                             - Israeli Market Positioning 1Q09

                Vendors to Watch:
                     Asterisk

                                                                                               Cisco
Local Support




                                                                                                                                               Player
                                                         Nortel
                                                                                                                                               Worldwide
                                                         Avaya*                                                                                Leader




                         Tadiran

                  3COM
                                                                                     This analysis should be used with its
                 Alcatel-Lucent                                                      supporting documents


                                                     Market Presence                                 *Most CC in the market are Avaya
                         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             107
Solutions and Integrators
                                                                                                                                   Networking
                                                                                                                                     -VOIP




Solution                                                             Prominent Integrators
Cisco                                                                1. Bynet
                                                                     2. IBM
                                                                     3. Netcom
Nortel     Your Text here                                            1. Bezeq Int. Your Text here
                                                                     2. Taldor
                                                                     3. Bynet/Netcom
Avaya                                                                1. IT Navigator
                                                                     2. NCR –Mittvoch
                                                                     3. Netcom
                                                                     4. IBM
              Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          108
Networking
                                  Video Over IP                                                                                 –Video OIP




 By 2011, 60% of Internet traffic is expected to be video
   traffic (Cisco)
 Video technology is considered by many local organizations as
   mostly ―nice to have‖
        Your Text here                                                                            Your Text here

 Local organizations who use this technology does it mainly
   for training/marketing purposes
 Global organizations use it as a vital working tool –
   especially in order to cut travelling costs

           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          109
Networking
Video Over IP Map                                                                                                         –Video OIP




  Your Text here                                                                            Your Text here




                            Source: http://www.video-over-ip.com/
     Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          110
Networking
   Unified Communications (UC)                                                                                                    –UC




Why do we need it?
Integration: Of any or all communications, collaborative,
 and business applications
Presence: guides users to the most appropriate means of
 communications
       Your extends applications and integration here
Mobility: Text here                       Your Text of
 applications every way you go
Productivity: Business Processes improve
Why now?
Key drivers today are: Workforce virtualization,
 Cost reduction, Increasingly available tools,
 Business improvement opportunities

          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          111
Networking
UC Architecture                                                                                                              –UC




  Your Text here                                                                            Your Text here




     Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          112
                                  Source: Nemertes Research 2009
Networking
                                  UC Challenges                                                                                     –UC




The problem:
business justification for collaboration technologies comes
down to ―soft dollars‖:
   • Productivity
   • Better Text here
        Your teamwork                                                                              Your Text here

   • Better customer service


How do you define “better”?
What is its business value to the company?


            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          113
Networking
                         Unified Messaging                                                                                          –UC



This is a main feature of UC
Growing demand
  • Replacement of aging voicemail systems
  • Reduced management costs
  • New features, flexibility, especially for mobile workers
         Your Text here                                                                            Your Text here
Challenges
  • System interoperability
  • Compliance/governance concerns

 Money talks (example):
 Unified messaging on PCs and PDAs saves traders 25 to 30 minutes/day
 retrieving voice mails and responding to peers and clients (Nemertes)

            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          114
Networking
 Real-Time Communications Dashboard                                                                                                 –UC




Unified ―buddy‖ list:
   • Aggregates presence from multiple services
   • May be integrated with additional applications via mash-
     ups
Examples: Text here
       Your                                                                                        Your Text here
   •   Alcatel-Lucent ―My Assistant‖
   •   Avaya oneX Desktop
   •   Cisco ―Unified Personal Communicator‖
   •   IBM Lotus ―Sametime‖
   •   Microsoft Office Communicator
   •   Nortel MCS Client
            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          115
Networking
                     UC Preferred Choice                                                                                             –UC




        Cisco                                                                                                                       56%
    Microsoft                                                                                             41%
        Avaya                                                      22%
       Nortel                             10%
Alcatel-Lucent Text here 5%
           Your                                                                                     Your Text here

         3Com          3%
Nokia-Siemens            2%
Newer Vendors                4%
       Others               4%
      Unsure                           9%

                0%               10%                  20%                 30%                 40%                  50%               60%

                                                 Source: Goldman Sachs Research
             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           116
Networking Integrators                                                                                             Networking

- Israeli Market Positioning 1Q09 (Leaders)




     Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          117
Green IT




Small, incremental changes
compounded many times can
mean big savings for
large-scale Text here
        Your
             organizations   Your Text here




                                                118
Green IT
So, How Can I Be More Green?                                                                                                  Trends



                                                                                            Secure mobile
                                           Virtualized server
                                                                                          access to networks,
 PC management                                and storage
                                                                                           applications, and
                                             environments
                                                                                                  data


     Your Text here                        State of the art                                    Your Text here
Intelligent archiving                     power and cooling                                 Teleconferencing
                                             (all around)


                                                                                               Working
     Printing                                                                              environment (car
                                         Asset management
   consolidation                                                                          pool, working from
                                                                                                home…)
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic        119
STKI Madad 2008-9                                                                                          Green IT
                                                                                                                             Trends
               (Not Including Printing)

 PC Energy
Management
    9%                            Miscellaneous
                                      12%                                                 Trends
                                                                                           38%

     Market Players
    Your Text here
           15%                                                                                Your Text here




                                                       DC Facilities
                                                          20%

   Asset
Management
    6%

       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic        120
Green Data

Green Data Center -Statistics                                                                                                  Center -
                                                                                                                                Trends




Typical DC has annual energy costs per square foot
 15-40 times that of typical office buildings
Data Center electricity consumption is almost 5% of
 world production
Average Text here center consumes energyYour Text here
      Your data                           equivalent to
 25,000 households!!




                                  Source: Israel CBS , McKinsey analysis
         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          121
Green Data

Green Data Center -Statistics                                                                                                    Center -
                                                                                                                                  Trends




Total CO2 emissions across countries (Million Ton):


         200

         150
        Your Text here                                                                            Your Text here

         100

          50

            0




                                    Source: Israel CBS , McKinsey analysis
           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          122
Green Data

What’s New?                                                                                                                Center -
                                                                                                                            Trends




                    Main
                motivation for                                                Cost issues
               “Being Green”?

  Your Text here
                                                                             Electricity Text here
                                                                                     Your
                  What “hurts”                                             consumption,
                   the most?                                            cooling costs and
                                                                              space



                   How 2009 is                                          “Doing more with
                    different?                                               less”…


     Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          123
Green Data
How Dense is Your Data Center?                                                                                                Center -
                                                                                                                               Trends


       What is your average rack power demand (per rack)?
                                                    6%          10%
                        23%
                                                                                                30%                  0 kW to 3 kW
                                                                                                                     4 kW to 6 kW
                                                                                                                     7 kW to 9 kW
     Your Text here                                                                            Your Text here10 kW to 11 kW
                                       31%
                                                                                                                     12 kW or More




          Data Center Environment –Israeli Market (Ms of $)

                  2008                                 2009                                  2010
                   30.0           33.33%                40.0              25.00%              50.0
                                     Source: STKI, Information Week
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          124
Green Data
How Fast Your Rack Turn “Red”?                                                                                              Center -
                                                                                                                             Trends




   Your Text here                                                                            Your Text here




      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          125
                                                Source: Emerson
Green Data
            Electricity Use Trends                                                                                       Center -
                                                                                                                          Trends




Your Text here                                                                            Your Text here




                                               36


                                              Source: ASHRAE
   Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          126
Green Data
                  Data Center Metrics                                                                                          Center -
                                                                                                                                Trends




Power Usage Effectiveness                                           and its reciprocal, the DCiE is
         (PUE):                                                               defined as:
 PUE = Total Facility                                                  DCiE = 1÷ PUE = (IT
Power ÷ IT Equipment                                                 Equipment Power ÷ Total
       Power                                                          Facility Power) x 100%
      Your Text here                                                                            Your Text here




         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          127
                                         Source: The Green Grid, EPA
Green Data

Servers -Energy Efficiency                                                  Center -
                                                                          Virtualization



                   Average CPU utilization of more than
                   5,000 servers during a six-month period




                                                Servers are rarely completely idle
                                                 and seldom operate near their
  Your Text here                                          Your Text here
                                                  maximum utilization, instead
                                                 operating most of the time at
                                                 between 10 and 50 percent of
                                                         their maximum




                                                                               128
                         Source: IEEE Computer Society
Green Data

     Virtualization Calculations                                                               Center -
                                                                                              Virtualization




Assumptions:
Average Server Utilization: %5
Number of peak hours:12
Cost per KwH: 11 cents
Average servers growth rate per year: 15% Text here
       Your Text here                    Your
Virtualization:
   • level of utilization of servers after virtualization: 50%-70%
   • Calculations are based on a maximum of two virtual
     machines per core
Cooling: 1 watt of power for the server to 1.25 watts of
 power for cooling
                                                                                                   129
           Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
Green Data

    Virtualization Calculations                                                                 Center -
                                                                                               Virtualization



Infrastructure Prior to     Year 1         Year 2          Year 3         Year 4         Year 5
Virtualization
Total Number of             540            641             714            821            944
Servers:
Power Used for Servers: 1,037,500 1,193,125                1,372,094 1,577,908           1,814,594
(Watts)
         Your Text here                                                    Your Text here
Server Electric Cost ($)    $1,000,420 $1,150,483 $1,323,055 $1,521,514 $1,749,740
Per Year:
Total Cooling Electric      $1,250,525 $1,438,103 $1,653,819 $1,901,892 $2,187,176
Cost ($) Per Year:


Total Power & Cooling       $2,250,944 $2,588,586 $2,976,875 $3,423,406 $3,936,916
Cost ($) Per Year:

                                                                                                    130
            Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
Green Data

       Virtualization Calculations                                                Center -
                                                                                Virtualization


Infrastructure After     Year 1     Year 2     Year 3     Year 4       Year 5
Virtualization
Total Workloads:         4,170      4,796      5,515      6,342        7,293
Physical Systems         136        156        179        206          237
Needed:
Power Used for Servers 68,000       78,200     89,700     102,925      118,450
(Peak Watts):
Power Used forText here 45,560
          Your Servers              52,394     60,099     68,960 Text here
                                                             Your       79,361
(Off-Peak watts):
Server Electric Cost ($) $65,570    $75,405    $86,716    $99,723      $114,682
Per Year (Peak):
Server Electric Cost ($) $43,932    $50,521    $58,100    $66,815      $76,837
Per Year (Off-Peak):
Total Cooling Electric   $136,877   $157,408   $181,019   $208,172     $239,398
Cost ($) Per Year:
Total Power & Cooling    $246,378   $283,335   $325,835   $374,710     $430,917
Cost ($) Per Year:                                                                   131
Green Data

     Virtualization Calculations -ROI                                                                  Center -
                                                                                                      Virtualization




              Year 1       Year 2            Year 3            Year 4         Year 5         Total ("-" means
                                                                                             Savings")
50%
Utilization
              6,074,378$ -1,619,909$            -677,406$        405,174$ 1,688,365$                5,870,602$
60%
Utilization   Your Text here                                                    Your Text here
              1,911,717$ -2,367,498$           -2,129,390$ -1,822,708$ -1,524,026$               -5,931,905$
70%
Utilization
               564,773$        -2,609,364$     -2,583,076$ -2,557,558$ -2,541,227$               -9,726,452$




                                                                                                           132
                 Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
VDI (Virtual Desktop Infrastructure) –Energy,                                                                                                 Green IT -
                                                                                                                                                 PC
    Management and Security Efficiency

TCO Comparison                                  Solution A:                       Solution B: Sun                 Difference                Difference
Cumulative 3 Year                               Traditional                       Virtual Desktop                 (A - B)                   (A - B)%
                                                Desktop Devices                   Solution
IT Costs
Desktop Device Costs                            3,259,204 NIS                     670,834 NIS                     2,588,370 NIS             79.4%
Desktop Software Costs                          782,627 NIS                       461,522 NIS                     321,104 NIS               41.0%
Server Infrastructure Costs                     296,448 NIS                       1,248,949 NIS                   (952,501 NIS)             -321.3%
Desktop Management Labor Costs
           Your Text here                       5,724,578 NIS                     2,137,760 NIS                 3,586,818 NIS
                                                                                                              Your Text here                62.7%
Desktop Power Costs                             314,788 NIS                       135,494 NIS                   179,294 NIS                 57.0%
Total IT Costs                                  10,377,645 NIS                    4,654,559 NIS                   5,723,085 NIS             55.1%



Business Operating Costs
Desktop User Productivity Impact                4,473,911 NIS                     0 NIS                           4,473,911 NIS             100.0%

Business Risks                                  538,416 NIS                       26,919 NIS                      511,496 NIS               95.0%
Total Business Operating Costs                  5,012,327 NIS                     26,919 NIS                      4,985,408 NIS             99.5%



Total                                           15,389,972 NIS                    4,681,479 NIS                   10,708,493 NIS            69.6%


                                                              Source: www.alinean.com
                       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             133
VDI (Virtual Desktop Infrastructure) –Energy,                                                                                            Green IT -
                                                                                                                                            PC
    Management and Security Efficiency

ROI Analysis                               Initial                          Year 1                   Year 2                  Year 3
(Solution B)
(Probable Case)
Benefits (to Solution B from               0 NIS                            3,115,969 NIS            3,505,821 NIS 3,681,630 NIS
Current (AS IS))
Cumulative Benefits                                                         3,115,969 NIS            6,621,790 NIS 10,303,420 NIS
Investment (Solution B) here
              Your Text                    1,604,296 NIS                    312,617 NIS              170,099 NIS here
                                                                                                         Your Text 237,175 NIS
Cumulative Investment                      1,604,296 NIS                    1,916,913 NIS            2,087,012 NIS 2,324,187 NIS
Cash Flow                                  (1,604,296 NIS)                  2,803,351 NIS            3,335,722 NIS 3,444,456 NIS
Cumulative Cash Flow                       (1,604,296 NIS)                  1,199,055 NIS            4,534,777 NIS 7,979,233 NIS
ROI                                        343%
Risk Adjusted ROI                          288%
NPV Savings                                6,361,354 NIS
IRR                                        177%




                                                           Source: www.alinean.com
                    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          134
Green Data Center Integrators                                                                                       Green Data
                                                                                                                           Center
- Israeli Market Positioning 1Q09 (Leaders)




 Your Text here                                                                            Your Text here




    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          135
PC -Energy Efficiency and Power                                                                                                Green IT -
                                                                                                                                         PC
                Consumption
        Why don’t you always shut down your PC when you have finished working for
                          the day (multiple responses allowed):
                                                              1 ‫סידרה‬

          It's IT policy or procedure to leave it on
My computer goes to hibernate, or to sleep mode
                                             It takes too long
             Your Text here                                                                             Your Text here
                                                       It's a habit
                            I don't think it's important
                                                      It's a hassle
                                                             I forget

                                                                           0%          10%          20%           30%           40%        50%
                                                  Source: E1, PC Energy Report
                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          136
PC -Energy Efficiency and Power                                                                                  Green IT -
                                                                                                                         PC
              Consumption
Power Usage for Desktop PCs (watts)                                             Idle Sleep Savings
Mean of LBNL-measured Pentium- 4                                                67.3 3.3    64.0
machines
Mean of 17-inch CRT monitors                                                    61.2               1.8                59.4
Mean of 17-inch LCD monitors                                                    35.3               2.3                33.0
         Your Text here
Energy Savings for Desktop                     Power draw Power draw here
                                                                  Your Text
                                                                              Savings per
PCs (kWh)                                          per      per year             year
                                                year (idle)  (Sleep)        (Sleep vs. idle)
Typical P4 machine with 17-                      791.56       31.42             760.14
inch CRT
Typical P4 machine with 17-                          632.02                        34.50                        597.52
inch LCD
                              Source: Windows Hardware Developer Central
            Shahar Maor’s Source: WindowsDo not remove source or attribution from any graphic or portion of graphic
                          work Copyright 2009 @STKI Hardware Developer Central                                               137
PC -Energy Efficiency and Power                                                                                            Green IT -
                                                                                                                                  PC
             Consumption

Environmental Savings per                                          Per PC with 17- Per PC with
Windows Vista PC                                                   inch CRT        17-inch LCD

Energy savings                                                     760.14 kWh                          597.52 kWh
CO2 emissions reduction                                            1178.22 lb                          926.16 lb
ComparableText hereemissions
        Your
             auto                                                  0.102 auto                          0.080 auto
                                                                                                 Your Text here
removed
Trees not required to sequester                                    0.161 acre                             0.126 acre
CO2 emissions
Equivalent homes powered                                           0.070 home                             0.055 home

  Total Savings Per Year
 (0.67₪/kWh): 510 ₪
                            Source: Windows Hardware Developer Central
          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          138
Green IT -
                                            PC Costs Calculations                                                                                             PC



                                       300*9 Senario                    300*20 Senario & Vista                            300*20 Senario

                           8
                           7
                           6
Annual Cost (Million ₪ )




                           5
                           4
                                   Your Text here                                                                            Your Text here
                           3
                               2
                               1
                               0




                                                                    Number of Computers

                                      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          139
PC -Energy Efficiency and Power                                                                                        Green IT -
                                                                                                                                     PC
             Consumption: Israeli Market
          STKI observation: Some Israeli
        organizations, which address the issue of
        energy efficiency of PCs, use homemade
                  script based solutions

         Players:
IsraeliYour Text here                                                                              Your Text here


   •   Microsoft
   •   Symantec
   •   BigFix
   •   Gpatrol –Israeli SU
             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          140
PC -Energy Efficiency and Power                                                                                            Green IT -
                                                                                                                              PC
Consumption: An Example




   Your Text here                                                                            Your Text here




                                            Source: www.g-patrol.com
      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          141
Green IT -
Printing                                                                                                                   Printing




 STOP PRINTING
  Your Text here                                                                            Your Text here




   P Please think of the environment before printing this presentation
     Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          142
Green IT -
Israeli Output Statistics                                                                                                     Printing



 Average A4s usage per year per employ:
      2,000                                           4,607                                              10,000

 Average color coverage per page:
       71%                                             11%                                                    1%
     Your Text here                                                                            Your Text here
 Average cost per printed page:
     0.045 NIS                                      0.24 NIS                                                 1 NIS
Average percentage of jobs of more than one page:

       91%                                             75%                                                  47%


                                     Source: Prime² (STKI’s modifications )
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          143
STKI Madad 2008-9                                                                                          Green IT -
                                                                                                                         Printing




                               Miscellaneous               Distribution Tools
                                   11%
      Printing                                                    17%
    Consolidation
        20%
Your Text here                                                                            Your Text here

   Outsourcing                                                               Monitoring and
       9%                                                                    Cost Reduction
                                                                                  43%




P Please think of the environment before printing this presentation
   Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          144
Green IT -
               Printing Consolidation                                                                                            Printing




In today’s world, printing has become a significant
 expenditure item for almost every organization
A typical large financial organization in Israel spend
 dozens of millions of Shekels annually on office printing
Israeli Office Printing Market has changed great deal
 since 2007: here
        Your Text                           Your Text here

   • Users start seeing the great potential in reorganizing their
     printing environment
   • The economic crisis pushs many to look for ways to cut
     costs
   • Printing consolidation projects usually have a fast,
     measurable ROI

         P Please think of the environment before printing this presentation
           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          145
Green IT -
  Printing Consolidation -Ratios                                                                                                       Printing


  One of the ways to check the maturity of an organization
  printing environment is checking its printers/users ratio:
Organization         “Heavy                            Followers                        Consolidated                      High-Tech
Type                 Printers”
Printers/Users       1:1                               1:5 – 1:15                       1:15 – 1:30                       1:30+
Ratio
           Your Text here                                                                               Your Text here

“Heavy Printers” –Consist of financial organizations,
  government agencies, law firms est.
High-Tech –Truly paperless entities (start ups, agile high tech
  companies est.)

            P Please think of the environment before printing this presentation
                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          146
Green IT -
Addressing Printing Consolidation Projects                                                                                    Printing




     Your Text here                                                                            Your Text here




     P Please think of the environment before printing this presentation
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          147
Green IT -
Printing Consolidation –Bottom Line                                                                                           Printing




     Your Text here                                                                            Your Text here




      P Please think of the environment before printing this presentation
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          148
Green IT -
Printing Consolidation –Bottom Line                                                                                           Printing




     Your Text here                                                                            Your Text here




      P Please think of the environment before printing this presentation
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          149
Green IT -
Printing Consolidation –Bottom Line                                                                                           Printing




     Your Text here                                                                            Your Text here




      P Please think of the environment before printing this presentation
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          150
Green IT -
Printing Consolidation –Bottom Line                                                                                           Printing




     Your Text here                                                                            Your Text here




      P Please think of the environment before printing this presentation
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          151
Green IT -
Printing Consolidation –Bottom Line                                                                                           Printing




     Your Text here                                                                            Your Text here




      P Please think of the environment before printing this presentation
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          152
Green IT -
Printing Consolidation –Bottom Line                                                                                           Printing




     Your Text here                                                                            Your Text here




      P Please think of the environment before printing this presentation
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          153
Your Text here   Your Text here




Shahar Geiger Maor
 VP & Senior Analyst
  shahar@stki.info


                                         154

STKI Summit 2009 -Infrastructure Services Trends

  • 1.
    Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info Visit My Blog: http://shaharmaor.blogspot.com/ 1
  • 2.
    Agenda Information 1 Information Security Security 2 Communication Networking Networking Your Text here Your Text here 3 Green IT Green IT Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  • 3.
    2009: Application to-do-list a.Flexible staffing based on good temps vendors b. Contract renegotiations and multisourcing of temps c. Requirement and portfolio management and rationalization d. Maintenance and requirement release management e. Application integration, reuse, atmaa and SOA f. Automating and outsourcing testing Your Text here Your Text here g. ERP instance consolidation h. Application Hosting and SaaS i. New licensing strategies j. Self service software (even e-learning) k. User authentication and password management l. Automated compliance software Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
  • 4.
    2009: Infrastructure to-do-list a.Desktop simplification b. End-user help desk c. Green IT and recycling d. Consolidation of servers, storage and end ser platforms e. Demand management Your Text here Your Text here f. Storage management and rationalizing g. Exception oversight h. Bandwidth prioritizing i. Open source software j. Print management k. Hosting and utility computing Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
  • 5.
    Information Security Information Security GRC and Security market size (Ms of $) Your Text here 2008 2009 Your Text here 2010 Governance & Risk Management (also BCP) 35.0 42% 50.0 50% 75.0 Security (projects) 95.0 -10.53% 85.0 11.76% 95.0 Security (Software) 90.0 -5.56% 85.0 -5.88% 80.0 Total 220 0% 220 14% 250 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
  • 6.
    Information Security/Privacy In theNews Security -Trends Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  • 7.
    Information Security Trends Security -Trends Cloud Outsourcing cyber crime Virtualization computing Sensitive or Inability to properly confidential identify and Your Text here information may Your Text here authenticate users not be properly End-user’s to multiple systems protected organization is External threat of unable to control organized cyber the data criminal syndicates management environment Unauthorized Third parties might parties might be be able to access able to access private files without private files without authorization authorization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
  • 8.
    Information Security Trends Security -Trends Data breaches involving Peer-to-peer file Web 2.0 and Mobility personal sharing mesh-ups information Unsupervised Use of P2P monitoring of Your Text here Sensitive or might result in Your Text here confidential the loss of employees’ use Inability to information that sensitive or of Web 2.0 properly ends up in the confidential applications can identify and hands of cyber business result in the loss authenticate of critical remote users criminals and information confidential identity thieves including trade secrets business data on the Internet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  • 9.
    Information Underground Economy Security -Trends Items for sale on underground servers, appearance and price: Your Text here Your Text here Source: Symantec Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
  • 10.
    Information Underground Economy Security -Trends Items for sale on underground servers, appearance and price: Your Text here Your Text here Source: Symantec Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  • 11.
    Information Technologies Categorization 2009 Security -Trends Business Value Investment to make money Remote Access Cut costs, Increase Manage Sec. productivity IAM/IDM Services IT Project Business SSO Cloud Project App. Your Text here Anti Your Text here Sec. DLP Size of figure = Commodity IT X Mobile complexity/ EPS SIEM/SOC Sec. Services cost of project DB Vir. Network NAC Sec. Sec. Security Investment for regulations GRC Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  • 12.
    Information STKI Madad 2008-2009 Security -Trends Network DLP Hardening Market Players 5% 4% 3% 5% Access GRC 18% 5% Miscellaneous EPS/Anti x 6% Your Text here Your Text here 14% NAC DB Protection WAF & Apps 6% 7% 11% Management Trends 8% 8% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  • 13.
    Information Security Ratios Security -Trends Organization Type Ratios of Security Personnel (Israel) Average Public Sector 0.1% of Total Users Your Text here Your Text here Sensitive Public Sector 0.5% of Total Users Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  • 14.
    Information Sophisticated Threat Environment Security -Trends First-Stage Second-Stage Writers Middle Men End Value Abusers Abusers Hacker or Fame Tool Writers Direct Attack Compromised Host and Application Theft Malware Machine Extortionist Writers Harvesting DDoS for Hire Botnet Creation Espionage Worms Spammer Text here Your Text Information here Your Harvesting Botnet Extortion Management Viruses Internal Theft Phisher Abuse of Commercial Privilege Personal Sales Trojans Information Pharmer/DNS Poisoning Fraudulent Sales Information Spyware Brokerage Identity Theft Click Fraud Electronic IP Leakage Financial Fraud Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14 Source: Cisco Israel
  • 15.
    Information Application Security Security -App. Sec STKI observation: Secure development should be an integral part of any new project and therefore should be calculated within the project’s budget. STKI survey shows that spendings on secure development scale from 0% of total project budget (Main-Frame based projects) up to 10% ( core web applications projects) of total project budget. here Your Text Your Text here Average spending on secure development is 5% of total project budget (including: training, code review and penetration tests) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  • 16.
    Information Web Applications -Vulnerabilities Security -App. Sec Probability to detect vulnerabilities of different risk degree (results of 32,717 sites and 69,476 vulnerabilities of different degrees of severity) Your Text here Your Text here % Sites (All) % Sites (Scanned) % Sites (Black & Whitebox) Source: http://www.webappsec.org/projects/statistics/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  • 17.
    Information Web Applications -Vulnerabilities Security -App. Sec Vulnerability frequency by types: 1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to system design errors 2. Information Leakage and Predictable Resource Location are often connected with improper system administration (for example, weak access control) Your Text here Your Text here Source: http://www.webappsec.org/projects/statistics/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  • 18.
    Information Application Security –Dev. LifeCycle Security -App. Sec Security & Privacy Training Security Security Security Security Final Security & Security & & Public Security Security & Security Arch & Privacy & Push Security RTM Privacy Privacy Release Servicing & & Cost Privacy Attack Surface Best Dev Docs Best Privacy Privacy & Or Response Privacy Analysis Design Review Practices and Tools Test Response Review Pen Privacy RTW Execution Kickoff Best Risk For Plans Reviews and Tools Practices Testing Practices Analysis Product Traditional Microsoft Software Product Development Lifecycle Tasks and Processes Your Text here Your Text here Design Code Feature Lists Testing and Verification Product Support Specifications Signing + Quality Guidelines Service Packs/ Checkpoint RTM Arch Docs QFEs Security Development Express Schedules Functional Bug Fixes Signoff Updates Specifications of New Code Support Requirements Design Implementation Verification Release & Servicing Source: MICROSOFT SECURITYremove source or attribution from any graphic or(SDL)ofGUIDE Shahar Maor’s work Copyright 2009 @STKI Do not DEVELOPMENT LIFECYCLE portion graphic 18
  • 19.
    Application Security Information Security –Israeli Players and Positioning -1Q09 -App. Sec Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  • 20.
    Information Web Application Firewall Security -App. Sec What is it? "An intermediary device, sitting between a web-client and a web server, analyzing OSI Layer-7 messages for violations in the programmed security policy. A web application here Your Text firewall is used as a security Your Text here device protecting the web server from attack.― (WASC) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
  • 21.
    Web Application Firewall Information Security –Israeli Market Players -App. Sec Solution What Should I Know? Representatives/ Integrators Applicure - dotDefender Host based Israeli WAF provider (On Apache and 2BSecure, (Apache and IIS) IIS web servers). Awarded Frost & Sullivan Award Comtec, for Successful Technology Innovation (Oct 08) Overline, Msecurity, Comda, New age Barracuda - Web Provides single point of protection for inbound Trek-IT, ABnet Application Firewall here Your Text and outbound traffic for all Web applications. Text here Your (fromerly Appliance that has SSL Acceleration and Load NetContinuum) Balancing capabilities. Breach Security - Typically deployed in an out-of-line mode so it Direct sales WebDefend present no latency threat to the network. Can locate indications for poor web applications design. Not quite common in Israel Citrix - Application Strong attack detection and protection, traffic Aman Computers Firewall (Formerly Teros) throttling and blocking. Excellent integration with the NetScaler suite. Weak GUI compare to other solutions. No projects in Israel yet. Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
  • 22.
    Web Application Firewall Information Security –Israeli Market Players -App. Sec Solution What Should I Know? Representatives/ Integrators Cisco* - ACE XML A key component of the Cisco ACE family. It Bynet, Taldor, Gateway enables efficient deployment of secure, reliable, Bezeq Int., and accelerated XML applications and Web 2BSecure services. Few Deployments in Israel IBM* –Data Power Powerful XML FW with added values of WAF, load Tangram balancing and applications acceleration. Very (Matrix), Elad Your Text here strong presence in Israel as a XML FW solution. Group Your Text here Microsoft –IAG WAF IAG comes with built-in web application firewall Elad, Matrix, for known web applications like: Outlook Web DBNet, HP, Access, Share Point, iNotes, Domino Webmail, M-Security, Microsoft CRM and more. Quite successful in Securenet Israel Protegrity - Defiance Based on KaVaDo, Strong presence worldwide, 012 Smile, Matrix but few Israeli clients Radware - AppXcel WAF Based on Imperva Bynet, Netvision *Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
  • 23.
    Web Application Firewall Information Security –Leading Players -1Q09 -App. Sec Solution What Should I Know? Representatives/ Integrators F5 - Application Security One of the best WAFs around. Features a good Trek-IT (Dis.), Manager (ASM) policy toolset for adaptive learning. Offer strong Artnet, integration to the TMOS family of products. Taldor, Spider, Superb load balancing capabilities. One of two Bezeq Int., One Your Text here leading solutions in Israel. Strong market Your Text here NewAge, Netcom presence Imperva – SecureSphere The first in the Israeli market. Imperva has an Comsec (Dis.), array of out-of-the-box policies and attack Netcom, Bynet, signatures as well as superior learning mode . A Taldor, NewAge, leading DB protection solution. Has a significant 012 Smile market share Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
  • 24.
    Information Network Security Security -Network Sec Enterprise FWs have long become an essential security foundation FW selection should consider: • Capabilities (especially deep inspection, blocking Capabilities and throughput speed) Your Text here Your Text here • Ease of deployment • Integration with other network infrastructure • Cost The perimeter defense is not dead. Instead it got thickened: Network complexity triggered the use of virtual FWs running over one machine Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
  • 25.
    Information Network Security Security -Network Sec Business operations and networks have become very complex FW solutions should have strong management and configurations capabilities in order to adjust themselves (Next Generation FW): New versions Text here offer a NGFW Your Text here Your of FWs built in IPS solution. This convergence is logical since both FW and IPS solutions are latency-sensitive and can work together in high speed Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
  • 26.
    Information Israeli FW Market:Leading Solutions Security -Network Sec Network FW market share as % of total deployments 100% 90% 80% 70% 60% 50% 92% Your Text here Your Text here 40% 30% 20% 10% 22% 0% 20% 14% 30% CheckPoint Cisco Juniper Fortinet Other Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
  • 27.
    Israeli FW Market: Information Security Leading Solutions and Integrators -Network Sec Checkpoint Juniper Cisco Fortinet Bynet x x x Taldor x x x Bezeq Int. x x x Netvision x x x Netcom x x 012Smile x x 2Bsecure x Your Text here x Your Text here Artnet x x IBM x EDS (HP) x Ness x One x Spider x Matrix x WE x ICT x Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  • 28.
    Information Israeli IPS Market:Leading Solutions Security -Network Sec IPS market share as % Of total respondents 40% 35% 30% 25% 20% 38% Your Text here Your Text here 15% 10% 21% 32% 5% 0% 9% McAfee IBM (ISS) Juniper Other/None Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
  • 29.
    Israeli IDS/IPS Market: Information Security Leading Solutions and Integrators -Network Sec McAfee IBM(ISS) Juniper Tipping point (3COM) Bynet x x x 2BSecure x x Netcom x x Aman x Netvision x Your Text here Your Text here Ness x Taldor x Spider x Calcom x WE x Matrix x One Securenet x Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
  • 30.
    Information Network Access Control Security -Network Sec Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
  • 31.
    Information NAC Insights Security -Network Sec NAC has not been ―fully digested‖ by Israeli customers in 2008. There should be more activity in 2009 NAC can be deployed less expensively when it is an embedded feature of an existing vendor and customers take notice of it Some network and security vendors alreadyText here Your Text here Your have solutions that can be part of the NAC process (AC, IPS) – An important starting point for market domination  Israeli customers first priority: implement a guest networking control Network or Security? NAC is a Layer 2 vs. Layer 3 match Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
  • 32.
    Information NAC –Solutions Security -Network Sec Solution Value for Customer Notes Access Layers – •Multiple switch vendor support Strong Israeli Port Nox (Israeli •Agentless presence. vendor) •Score based authentication Integrators: •No 802.1x authentication Netcom, Netvision, 2BSecure, Trustnet CheckPoint –NAC •Strong personal firewall and VPN client software Strength in NAC (Israeli vendor) Text here Your player Your Text depends on ability here •EPS & NAC functionality in a single endpoint client to compete in the •OPSEC Alliance Endpoint •ease of implementation in remote access applications Protection market! CP is not a first choice Cisco -CNAC •Both Appliance & infrastructure-based approach Few projects and •Support of non-traditional endpoints POCs in Israel. •Large install base in Israel –cost effective solution Natural first choice for many users Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
  • 33.
    Information NAC –Solutions Security -Network Sec Solution Value for Customer Notes Enterasys -Sentinel •Cross-vendor platform Penetration mainly on •MAC, 802.1x authentication and Enterasys install base in more Israel. Netcom, Artnet •Guest registration module are strong integrators ForeScout -CounterACT (Israeli •Out-of-band NAC appliance No packet filtering vendor) Your Text here •integration with a number of capabilities. Your Text here remediationdirectory solutions Few clients in Israel •Built-in RADIUS proxy for 802.1X support HP Pro-Curve - •Both appliance-based and HP Pro-curve is gaining Endpoint Integrity Agent ground in the Israeli LAN •Strong management system market and therefore (Identity Driven Manager) becoming an important NAC player. Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
  • 34.
    Information NAC –Solutions Security -Network Sec Solution Value for Customer Notes Insightix –NAC (Israeli •Real-time "state" of all devices connected Few implementations in vendor) to the network Israel and abroad. •Agentless visibility functionality Integrators: Bynet and •Cross-vendor platform Overline Juniper -UAC •Impressive array of enforcement options Some of the features •supports third-party HW via 802.1x require other Juniper Your Text here Your Text here in the components network (FW, IDS…) McAfee -MNAC •comprehensive client security suite Best fit McAfee clients. •One of the better integration strategies Strong EP player with NAC with Microsoft NAP functionality Microsoft -NAP •Has one of the strongest access and Integrate with many other enforcement architectures NAC solutions. contributor •Uses Forefront and AD for superior to the standardization of policy management NAC 34
  • 35.
    Information NAC –Solutions Security -Network Sec Solution Value for Customer Notes Nortel -SNA •Cross-platform device support unmanaged •Appliance that collects contextual user and device infrastructure information from multiple support -via NAP network sources Symantec -SNAC •Pure software-based solution Very good solution •Provide strong threat protection solutions for EPS customers Your Text here •One of the most comprehensive reporting Text here Your and auditing frameworks XOR –SWAT •MAC based NAC Dozens of (Israeli •Provides access control for switches and implementations in vendor) devices that don’t support 802.1x Israel •Cost effective 80-20 solution Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
  • 36.
    Information STKI Israeli Positioning Security -Network Sec Not a technological positioning, refers only to Israeli market• Focused on enterprise market (not SMB)• Vendor A Not an STKI recommendation• Market Presence (X)  Vendor B Local Support Market share - existing and new sales (more emphasis)  Mind share (how user organizations rate vendors)  Local Support (Y) – is influenced by (X)  Worldwide Leader Experience & technical knowledge, localization,  support, number and kind of integrators Worldwide leaders marked, based on global positioning Vendors to watch: Are only just entering israeli market so can’t be positioned but should be watched Vendors to Watch: Vendor C Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
  • 37.
    NAC Information Security -Network Sec - Israeli Market Positioning 1Q09 Vendors to Watch: HP Procurve Check Point Microsoft Local Support Cisco Player Symantec Worldwide Juniper XOR SWAT Access Layers Leader Enterasys Leap McAfee ForeScout Insightix Nortel This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
  • 38.
    Information Endpoint Security Security -EPS Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
  • 39.
    Information Endpoint Security -Threats Security -EPS Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
  • 40.
    Information Endpoint Security -Protection Security -EPS Organization Outside Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
  • 41.
    Information Endpoint Security -Protection Security -EPS Organization Outside Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
  • 42.
    Information Endpoint Security -Protection Security -EPS Anti X DLP Organization NAC Outside Your Text here Your Text here Manageability Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 42
  • 43.
    Anti -X Suites Information Security - Israeli Market Positioning 1Q09 (Enterprise Leaders Only) -EPS Symantec Local Support McAfee Trend Micro Player Worldwide Leader Microsoft This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 43
  • 44.
    Data Centric Security Data Centric Security Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 44
  • 45.
    Data Centric Data Centric Approach Security Your Text here Your Text here Build a wall – “perimeter “Business of Security” – Security security” is built into the business process Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
  • 46.
    Data Centric Data CentricSecurity Arena Security DLP ERM Database Encryption Protection Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
  • 47.
    Data Centric Data Centric Approach Security Business Efficiency Ubiquitous Regulatory access to Your Text here information Business Compliance here Your Text Goals for Security Today Protection Protection from of Assets Financial from Loss Threats Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
  • 48.
    Data Centric Data Centric Approach Security Develop practical end–to-end solutions that will protect your information right now with what you Identifying, Defining now have & Assessing your Provide a pure and total Data, Intellectual focus on this complex, Capital and mission-critical area Your Electronic Assets Text here Your Text here Security is Business perspective an End-to-end view and full approach – top down life-cycle security ongoing Process Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
  • 49.
    Data Centric Data Leak/LossPrevention Security -DLP Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
  • 50.
    Data Centric Data Leak /Loss Prevention Security -DLP  DLP is an overall framework into which different elements fit  There are three types of data that may leak: • Data at rest • Data in transit • Data on endpoints Your Text here Your Text here  No single DLP focus area is full proof, an optimal solution should cover all three areas  DLP is a growing area, and vendors react accordingly  It is suggested to use full-suite vendors in order to avoid integration problems Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
  • 51.
    Data Centric DLP –Market Status Security -DLP DLP Deployments Status -Israel 1Q09 Solution Deployed 20% Your Text here PlanYour Text here to Deploy Not "There" Yet Soon 60% 20% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
  • 52.
    Data Centric DLP–World Trends Security -DLP Your Text here Your Text here Source: Aberdeen Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
  • 53.
    Data Centric DLP –Market Status & Players Security -DLP World Leaders (consolidation in progress…): • Symantec (Acquired Vontu, 2007, 350$ M) • Websense (Acquired PortAuthority 2007, 90$ M) • Reconnex (Acquired by McAfee, July 2008, 46$ M) • Tablus Text here Your (Acquired by RSA, 2007, 40$ M) Your Text here • Vericept ? Workshare? Main drivers for DLP are: • Regulations such as Payment Card Industry (PCI), Accountability Act (HIPAA) • e-mail security, instant messaging (IM) and endpoint monitoring solutions Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
  • 54.
    Data Centric DLP - Israeli Market Positioning 1Q09 Security -DLP Vendors to Watch: ProofPoint Workshare IBM (ISS) Local Support Player Worldwide Leader Websense Fast Movement McAfee Verdasys Symantec This analysis should be used with its supporting documents RSA Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
  • 55.
    Data Centric ERM Security (Enterprise Rights Management) -ERM Enterprise Rights Management (ERM) technology—also known as Enterprise DRM or Information Rights Management (IRM) What is it? • ERMYour Text hereencrypting files that contain Your Text hereand only entails content allowing those users or devices that have proper credentials to decrypt the files and access the content Awareness of ERM has increased ERM has been growing steadily since it became a technology category unto itself about five years ago Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
  • 56.
    Applications and FileFormats Data Centric Security Used in ERM Implementations -ERM Your Text here Your Text here Source: Gilbane Group Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
  • 57.
    Data Centric ERM –HowDoes it Work? Security -DLP SQL Server Active Directory 1. New user is authorized to use RMS 2. The User defines set of rules and content usage rights for the data he wants to share – He is the data owner RMS Server 3. User distributes data to relevant recipients Your Text here Your Text here 4. When recipient tries to open a file –a 1 4 request is sent to the RMS Server in order to authorize/deny access 5. RMS enforces rules made by the data 2 3 5 owner Data owner Recipient Source: Microsoft Israel Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
  • 58.
    Data Centric ERM -Israeli Market Players Security -ERM Microsoft -Rights Management Services EMC- EMC Documentum IRM Product Suite Oracle - Oracle Information Rights Management Adobe –Adobe LifeCycle Rights Management SU: IsraeliYour Text here Your Text here Secure Islands -A provider of an advanced information protection and control (IPC) solution Covertix –Develops innovative software technology to track, monitor and control documents and files within and outside the organization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
  • 59.
    Data Centric Security DB Protection –Market Status -DB Protections DB Protection Deployments Status -Israel 1Q09 Leading Israeli Players: Not "There" •Sentrigo Yet 49% •Imperva Plan to •Oracle DB Vault Deploy Soon •Guardium Text here Your 30% Solution Your Text here Deployed 20% DB encryption: OtherDo Not Decru –by NetApp Know 1% Ged-i (Israeli SU): offers high-level encryption to Storage Data Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
  • 60.
    Data Centric Security Masking of Production Data -Data Masking  What is it? • The process of data masking is designed to ―de-identify‖ data, such that the data remains based on real information, but no longer has any practical usage or application  What is the need? • The drive to outsource and offshore application development and Your Text here testing work means that organizations will have little control Your Text here over who gets to see their data • Test environments are not physically as secure as production systems  What can go wrong? • Sensitive data might be downloaded to laptops and stolen • Employees might misuse sensitive information and engage in fraudulent activity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
  • 61.
    Data Centric Security Masking of Production Data -Data Masking Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
  • 62.
    Data Centric Security Masking of Production Data -Data Masking Your Text here Your Text here Source: Securosis.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 62
  • 63.
    Data Centric Security Masking of Production Data -Data Masking Israeli market players (alphabetize): • Compuware (File-AID) –Few implementations • DataVantage (Global) Your Text here Your Text here • IBM (Optim) –Few POCs • Informatica (PowerCenter) - Few POCs • Oracle (Enterprise Manager Data Masking) – For Oracle DBs only Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
  • 64.
    SIEM/SOC SIEM/SOC Your Text here Your Text here 64
  • 65.
    SIEM/SOC SIEM/SOC  What is SIEM? • Security Information & Event Management  What is SOC? • Security Operation Center • Collects and analyzes all log data and basic event management Your Text here Your Text here • monitors and manages all aspects of enterprise security in real time, from a single, centralized location • The NOC of security  Why do we need it? • Need for real-time awareness of internal/ external threats • Ensure business continuity and comply with regulations Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
  • 66.
    Silos of RedundantInformation SIEM/SOC Management Your Text here Your Text here Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
  • 67.
    An Enterprise Platformfor Compliance SIEM/SOC and Security Your Text here Your Text here SIEM Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
  • 68.
    SIEM/SOC -Israeli Trends SIEM/SOC CA has been the first to enter the market and gained considerable market share in the high-end market ArcSight was introduced two years later. This solution was easer to deploy and much easer to manage End ofYour Text here 2007: Symantec SSIM and RSA Envision were Your Text here introduced to the market, both easy to deploy, scalable and relatively intuitive CA has lost some of it market share to the other new comers Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
  • 69.
    SIEM/SOC -Israeli Players SIEM/SOC Solution Leading Integrators ArcSight We (Exclusive representative) CA 1. Netcom 2. TrustNet 3. Ness Cisco 1. Bynet Your Text here 2. Netcom Your Text here RSA 1. TrustNet 2. Xor 3. Bynet IBM Ness NetIQ Calcom (Exclusive representative) Symantec 1. Netcom 2. Bynet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
  • 70.
    SIEM/SOC SIEM/SOC - Israeli Market Positioning 1Q09 Vendors to Watch: IBM -MSS TriGeo Local Support ArcSight Player Worldwide Leader RSA Fast Symantec Movement CA IBM Cisco This analysis should be used with its NetIQ supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
  • 71.
    Next Generation SIEM/SOC:MSS SIEM/SOC -MSS What does MSS offer? -Comprehensive solution for security management: • Firewall/EP Management Service • Intrusion Detection & Prevention Management Service • Vulnerability Management Service Your Text here Your Text here Why should we go there? • Cost effective! • Use of best-of-breed security Why shouldn’t we? • Who owns my data? • No one else in Israel goes there…yet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 71
  • 72.
    SIEM/SOC MSS Trends in Israel -MSS STKI observation: MSS is well accepted in SMB organizations, but Israeli CISOs in enterprises still strongly oppose this trend The current economic downturn should encourage Your Text here Your Text here some enterprises to reconsider MSS MSS providers addresses the management (CFOs and CEOs) in order to attract new clients Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 72
  • 73.
    SIEM/SOC MSS –World Leaders -MSS Delivery Great Potential for: •Current world leaders (IBM, Symantec) • local ISPs •Network integrators •Traditional OS players Market Penetration (Source: Frost and Sullivan) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
  • 74.
    Identity & AccessManagement (IDM/IAM) IDM/IAM Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
  • 75.
    IDM Global MegaTrends IDM/IAM  Fraud and identity theft will increase strong authentication use  Strong authentication and SSO will strengthen their ties  Context-based authorization will put risk analysis here Your Text here Your Text into access control decisions  Physical and logical security will continue to converge  Federation will slowly grow Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
  • 76.
    IDM/IAM Savings IDM/IAM Your Text here Your Text here Source: http://blogs.technet.com/mcs-ireland-infrastructure/default.aspx Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
  • 77.
    IDM/IAM Market LifecyclePositions IDM/IAM Your Text here Your Text here Source: Butler Group Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
  • 78.
    Trends in theIsraeli Market IDM/IAM  Nov 2008: CA acquired Eurekify to enhance its role-based management suite  ERP based SOD solutions start to be seen, mainly for GRC reasons: • 2006: SAP acquired Virsa, enterprise risk management software provider, to bolster SAP’s software compliance skills Your Text here Your Text here • 2008: Oracle acquired Logical Apps, an automated GRC controls, for enterprise applications  Israeli new GRC enforcement Start-Ups: • Xpandion -Risk management and behavioral analyzing software solutions • SPATIQ –provides an automated tool for Entitlement Management Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
  • 79.
    IAM/IDM IDM/IAM - Israeli Market Positioning 1Q09 Vendors to Watch: SPATIQ Local Support IBM Player Novell Sun (OS) Worldwide Leader CA Prominent WAM Player BMC Microsoft Oracle Velo (OS) This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
  • 80.
    Key Success Factorsfor Future IDM Project IDM/IAM Consider IDM also as a business project, rather than a pure IT project Make sure the project bridges the gap between business and IT  StartYour Text here easier success (Single Signhere a small for Your Text On, vertical project)  Choose a step-by-step approach, rather than a mastodon implementation. Focus on basic functionalities not on the additional features Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 80
  • 81.
    IDM/IAM SSO Israeli Market -SSO  Players in Israel:  Imprivata -Easily integrate target systems, quick & painless deployment, but doesn't come cheap  Oracle, Citrix & RSA (EMC) -OEM with Passlogix  Novell Your Text here -OEM version of ActivIdentity SecureLogin Your Text here  CA -Script-based architecture, Part of eTrust IAM suite  IBM – Part of the TAM suite  Sun –Open SSO: Built in solution  BMC –Based on Java System Solutions Single Sign On  Microsoft –Built in solution to the ILM suite Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
  • 82.
    IDM/IAM Strong Authentication -Options -Strong Auth. what are the current options for SA? 1. Biometric and smart-cards: excellent solutions, but require expensive readers on every user’s desktop (Atena, NITGEN, L-1, Visual Defense, SecuGen est.) 2. software tokens: Prone to virus attacks Your Text here easy to Your Text here and too share between users from the same household (Oracle, RSA est.) 3. USB tokens: Most are deployed with a certificate and work within PKI environments (RSA, Aladdin, Vasco est.) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 82
  • 83.
    IDM/IAM Strong Authentication –Options -Strong Auth. 4. OTP fobs: Cost effective, but might not have robust encryption (Entrust, Vasco, RSA est.) 5. Voice delivered token: OTP via an automated voice call 6. Mobile OTP: Use an authenticator that theText here already Your Text here Your user has. Cost effective solution (Cidway, Vasco) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 83
  • 84.
    Information Security Consultants Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 84
  • 85.
    Information Security Integrators Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 85
  • 86.
    Information Security Distributors Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 86
  • 87.
    Networking Networking Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 87
  • 88.
    Networking Networking Networking market size (Ms of $) Your Text here Your Text here 2008 2009 2010 LAN equipment 80.0 -25.00% 60.0 8.33% 65.0 WAN equipment 50.0 -20.00% 40.0 12.50% 45.0 VoIP equipment 40.0 -20.00% 32.0 25.00% 40.0 Totals 170.0 -22.35% 132.0 13.64% 150.0 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 88
  • 89.
    Networking Networking Future Trends Trends Datacenter Networking virtualization Next Generation Networking Internet Protocol (IP) Core and High Speed Broadband Green Networking IPv6 Your Text here Your Text here Network Operating systems Network intelligence and policy control Network Security Communication billing Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 89
  • 90.
    Networking Technologies Categorization 2009 Trends Business Value Investment to make money SAAS/ Cut costs, Increase Cloud IT Project productivity Optimization UC Business Project Billing NGN Your Text here Your Text here Commodity IT VOIP Networking IPv6 Size of figure = Infra. Vir. complexity/ Services Network cost of project Security Investment for regulations Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 90
  • 91.
    Networking Year of savingsand productivity Trends What networking technologies are you investing-in to enhance employee productivity and collaboration in 2009? (Answer all that apply) 2009 2008 52% 55% 46% 36% 29% 31% 32% Your Text here Your Text here 23% 19% 11% 13% 9% 8% 1% NA NA Shahar Maor’s work Copyright 2009Source: Goldman Sachsor attribution from any graphic or portion of graphic @STKI Do not remove source Research 91
  • 92.
    Networking Ratios and Budgets -2008 Trends Network Ratios Israel World Network Staff Network Personnel/Total On average: 9.5% of total IT Users: (Israel: 3.5% -Low Network •1:200 in high-tech global prices, Short distances) organizations •1:1500 in industrials/governmental Your Text here Your Text here companies •1:2200 in low-tech/services sectors Budgets Trends •High-tech/finance –decrease On average: same as 2007 (~5%) •Services/government –same as 2007 •Retail/food/other traditional sectors –small increase Source: STKI, Computer Economics Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
  • 93.
    Networking STKI Madad 2008-9 Trends Optimization Market Players 2% 8% UC 8% VOIP and IPTel 20% Nortel 10% Network Infra Your Text here Your Text here 20% Trends Miscellaneous Network Costs 10% 12% Reduction 10% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 93
  • 94.
    Local Area NetworkTrends Networking -LAN  LAN vendors should support standard-based platforms  Security embedded features in the LAN infra are imperative  Network Virtualization is on the horizon  Israeli Trends: • Corporate here to endpoints is stable: 100 MBIT Ethernet; Your Text LAN Your Text here Backbone LAN: 2 X 1GBIT (10GBIT in some cases) • Israeli enterprise tend to ―count on‖ either Cisco or Nortel for their backbone network. Other players appear on the network edges Preferred Integrators for LAN issues: Netcom and Bynet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 94
  • 95.
    LAN Networking -LAN - Israeli Market Positioning 1Q09 Vendors to Watch: Foundry Local Support Cisco Nortel Player Worldwide Leader Enterasys 3COM HP Juniper This analysis should be used with its Alcatel supporting documents Extreme Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 95
  • 96.
    Networking The Nortel Crisis -Nortel From 90K to Feb 08: 30K Nortel says Nortel employees it will cut announces 2,100 jobs More and 1,300 more layoffs… layoffs Nortel says several Your Text here Nortel executives Your Text here files Nortel for bankruptcy Reports to leave in protection Financial 2009 Results for Q3 2008 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 96
  • 97.
    The Nortel Crisis–What’s next? Networking -Nortel Nortel files for Chapter 11 to ―deal decisively‖ with its historic debt burdens Nov 10’th 2008: A Nortel spokesman said the company had enough liquidity to sustain 12 to 18 months of operation under the current conditions Your Text here Your Text here Survival still possible for Nortel, but Companies that exit the bankruptcy process often emerge in smaller form and are frequently acquired in part or whole by larger suitors looking for a good deal 19.2.09: Radware has purchased Nortel’s Alteon… Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 97
  • 98.
    The Nortel Crisis Networking –Israeli Market ”What if” Analysis -Nortel Acquiring parts of Nortel? Alliance with Avaya Cisco HP and Microsoft Juniper Acquire Nortel’s Telephony? Your Text here Your Text here •Enterasys (LAN and sec.) Gores •Siemens (Telephony) Goes deeper into the Alcatel Israeli market? Goes deeper into the 3COM Israeli market? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 98
  • 99.
    Networking WAN –Wide Area Network -WAN STKI Observation: Vast Majority of Global Israeli-based organizations use MPLS networks for interconnectivity of core applications Average Number Average Number Average Number of Employees of Remote Sites of MPLS Lines 1,300 20 10  What’s Your Text here the rush? Your Text here • Greater Performance problems than ever before  Why MPLS? • Provides diversified range of services (Layer 2, Layer 3 and Dial up VPNs) • Provides end to end single-point management with flexible SLAs for customers  Why not MPLS? • doesn’t come cheap…. Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 99
  • 100.
    Networking WAN Optimization -WAN WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN: VOIP Deployments Data Center Consolidation Your Text here Your Text here 2007 2008 Server Virtualization BCP/DRP 0% 10% 20% 30% 40% 50% 60% 70% 80% Source: Aberdeen Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 100
  • 101.
    Networking WAN Optimization Solutions -WAN If you are planning to deploy WAN optimization equipment in 2008, which vendores would you invite to bid? (Answer all that apply) Cisco 50% Juniper 24% Riverbed here Your Text 17% Your Text here Citrix 13% F5 12% Blue Coat/Packeteer 8% Expand 2% Silver Peak 2% Unsure 31% Shahar Maor’s work Copyright 2009 @STKI DoGoldmansource orResearch Source: not remove Sachs attribution from any graphic or portion of graphic 101
  • 102.
    WAN Optimization: Networking -WAN Solutions and Integrators Solution Integrator/Representative Blue Coat -SG Appliances REL (VAD), Ankor, Taldor Cisco Systems –WAAS Bynet, Bezeq Int., IBM, Netcom, Taldor Citrix Systems –WANScaler Aman Computers Expand Networks Text here Your –Compass Taldor, Ankor Your Text here F5 Networks -WANJet, WebAccelerator Artnet, Taldor, Spider, NewAge, Bezeq Int., Netcom Juniper Networks –WXC Netcom, Netvision, Bezeq Int. Packeteer -PacketShaper, iShared, Bynet Radware -LinkProof Bynet, Ankor, Netvision Riverbed Technology –Steelhead, Interceptor Netcom, Innocom Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 102
  • 103.
    WAN Optimization Networking -WAN - Israeli Market Positioning 1Q09 Local Support Expand Player Riverbed F5 Worldwide Leader Cisco Blue Coat Citrix Radware Packeteer* Juniper This analysis should be used with its supporting documents Market Presence *June 2008: A Blue Coat company Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 103
  • 104.
    Networking Voice Over IP(VOIP): Terminology -VOIP Voice Over IP - Voice transmission over the internet or LAN/WAN, PC-to-PC, P2P Internet telephony - The use of Internet-based services to deliver voice traffic (Skype; Vonage). Originally for consumers but slowly for businesses as well Your Text here Your Text here IP telephony - The delivery and support of call processing functionality and features over IP (call setup, hold, forward, & transfer) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 104
  • 105.
    Networking Voice Over IP (VOIP) -VOIP STKI observation: Many enterprises are migrating, or planning to migrate, their telephony infrastructure from traditional circuit-switched technology to newer Internet Protocol (IP)-based systems Your Text here Your Text here  Motivations to actually migrate: • End of life/end of support for current telephony infrastructure • Moving to a new office/office improvements  Motivations to wait: • ―Phones are working‖ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 105
  • 106.
    VOIP Israeli Market Networking -VOIP  There are two kinds of project possible: enterprise IPTel and IP based Call-Centers  Israeli VOIP market is dominated by three main players: Cisco, Nortel and Avaya Your Text here Your Text here  Other players in Israel: • Tadiran Telecom –Large install base (Mostly non IP based) • 3COM, Alcatel –Lucent –Few implementations • Siemens is back in Israel??? (Gores [Enterasys] acquired 51% of Siemens, Oct 2008) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 106
  • 107.
    VOIP (Enterprise &CC) Networking -VOIP - Israeli Market Positioning 1Q09 Vendors to Watch: Asterisk Cisco Local Support Player Nortel Worldwide Avaya* Leader Tadiran 3COM This analysis should be used with its Alcatel-Lucent supporting documents Market Presence *Most CC in the market are Avaya Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 107
  • 108.
    Solutions and Integrators Networking -VOIP Solution Prominent Integrators Cisco 1. Bynet 2. IBM 3. Netcom Nortel Your Text here 1. Bezeq Int. Your Text here 2. Taldor 3. Bynet/Netcom Avaya 1. IT Navigator 2. NCR –Mittvoch 3. Netcom 4. IBM Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 108
  • 109.
    Networking Video Over IP –Video OIP  By 2011, 60% of Internet traffic is expected to be video traffic (Cisco)  Video technology is considered by many local organizations as mostly ―nice to have‖ Your Text here Your Text here  Local organizations who use this technology does it mainly for training/marketing purposes  Global organizations use it as a vital working tool – especially in order to cut travelling costs Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 109
  • 110.
    Networking Video Over IPMap –Video OIP Your Text here Your Text here Source: http://www.video-over-ip.com/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 110
  • 111.
    Networking Unified Communications (UC) –UC Why do we need it? Integration: Of any or all communications, collaborative, and business applications Presence: guides users to the most appropriate means of communications Your extends applications and integration here Mobility: Text here Your Text of applications every way you go Productivity: Business Processes improve Why now? Key drivers today are: Workforce virtualization, Cost reduction, Increasingly available tools, Business improvement opportunities Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 111
  • 112.
    Networking UC Architecture –UC Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 112 Source: Nemertes Research 2009
  • 113.
    Networking UC Challenges –UC The problem: business justification for collaboration technologies comes down to ―soft dollars‖: • Productivity • Better Text here Your teamwork Your Text here • Better customer service How do you define “better”? What is its business value to the company? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 113
  • 114.
    Networking Unified Messaging –UC This is a main feature of UC Growing demand • Replacement of aging voicemail systems • Reduced management costs • New features, flexibility, especially for mobile workers Your Text here Your Text here Challenges • System interoperability • Compliance/governance concerns Money talks (example): Unified messaging on PCs and PDAs saves traders 25 to 30 minutes/day retrieving voice mails and responding to peers and clients (Nemertes) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 114
  • 115.
    Networking Real-Time CommunicationsDashboard –UC Unified ―buddy‖ list: • Aggregates presence from multiple services • May be integrated with additional applications via mash- ups Examples: Text here Your Your Text here • Alcatel-Lucent ―My Assistant‖ • Avaya oneX Desktop • Cisco ―Unified Personal Communicator‖ • IBM Lotus ―Sametime‖ • Microsoft Office Communicator • Nortel MCS Client Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 115
  • 116.
    Networking UC Preferred Choice –UC Cisco 56% Microsoft 41% Avaya 22% Nortel 10% Alcatel-Lucent Text here 5% Your Your Text here 3Com 3% Nokia-Siemens 2% Newer Vendors 4% Others 4% Unsure 9% 0% 10% 20% 30% 40% 50% 60% Source: Goldman Sachs Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 116
  • 117.
    Networking Integrators Networking - Israeli Market Positioning 1Q09 (Leaders) Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 117
  • 118.
    Green IT Small, incrementalchanges compounded many times can mean big savings for large-scale Text here Your organizations Your Text here 118
  • 119.
    Green IT So, HowCan I Be More Green? Trends Secure mobile Virtualized server access to networks, PC management and storage applications, and environments data Your Text here State of the art Your Text here Intelligent archiving power and cooling Teleconferencing (all around) Working Printing environment (car Asset management consolidation pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 119
  • 120.
    STKI Madad 2008-9 Green IT Trends (Not Including Printing) PC Energy Management 9% Miscellaneous 12% Trends 38% Market Players Your Text here 15% Your Text here DC Facilities 20% Asset Management 6% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 120
  • 121.
    Green Data Green DataCenter -Statistics Center - Trends Typical DC has annual energy costs per square foot 15-40 times that of typical office buildings Data Center electricity consumption is almost 5% of world production Average Text here center consumes energyYour Text here Your data equivalent to 25,000 households!! Source: Israel CBS , McKinsey analysis Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 121
  • 122.
    Green Data Green DataCenter -Statistics Center - Trends Total CO2 emissions across countries (Million Ton): 200 150 Your Text here Your Text here 100 50 0 Source: Israel CBS , McKinsey analysis Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 122
  • 123.
    Green Data What’s New? Center - Trends Main motivation for Cost issues “Being Green”? Your Text here Electricity Text here Your What “hurts” consumption, the most? cooling costs and space How 2009 is “Doing more with different? less”… Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 123
  • 124.
    Green Data How Denseis Your Data Center? Center - Trends What is your average rack power demand (per rack)? 6% 10% 23% 30% 0 kW to 3 kW 4 kW to 6 kW 7 kW to 9 kW Your Text here Your Text here10 kW to 11 kW 31% 12 kW or More Data Center Environment –Israeli Market (Ms of $) 2008 2009 2010 30.0 33.33% 40.0 25.00% 50.0 Source: STKI, Information Week Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 124
  • 125.
    Green Data How FastYour Rack Turn “Red”? Center - Trends Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 125 Source: Emerson
  • 126.
    Green Data Electricity Use Trends Center - Trends Your Text here Your Text here 36 Source: ASHRAE Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 126
  • 127.
    Green Data Data Center Metrics Center - Trends Power Usage Effectiveness and its reciprocal, the DCiE is (PUE): defined as: PUE = Total Facility DCiE = 1÷ PUE = (IT Power ÷ IT Equipment Equipment Power ÷ Total Power Facility Power) x 100% Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 127 Source: The Green Grid, EPA
  • 128.
    Green Data Servers -EnergyEfficiency Center - Virtualization Average CPU utilization of more than 5,000 servers during a six-month period Servers are rarely completely idle and seldom operate near their Your Text here Your Text here maximum utilization, instead operating most of the time at between 10 and 50 percent of their maximum 128 Source: IEEE Computer Society
  • 129.
    Green Data Virtualization Calculations Center - Virtualization Assumptions: Average Server Utilization: %5 Number of peak hours:12 Cost per KwH: 11 cents Average servers growth rate per year: 15% Text here Your Text here Your Virtualization: • level of utilization of servers after virtualization: 50%-70% • Calculations are based on a maximum of two virtual machines per core Cooling: 1 watt of power for the server to 1.25 watts of power for cooling 129 Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
  • 130.
    Green Data Virtualization Calculations Center - Virtualization Infrastructure Prior to Year 1 Year 2 Year 3 Year 4 Year 5 Virtualization Total Number of 540 641 714 821 944 Servers: Power Used for Servers: 1,037,500 1,193,125 1,372,094 1,577,908 1,814,594 (Watts) Your Text here Your Text here Server Electric Cost ($) $1,000,420 $1,150,483 $1,323,055 $1,521,514 $1,749,740 Per Year: Total Cooling Electric $1,250,525 $1,438,103 $1,653,819 $1,901,892 $2,187,176 Cost ($) Per Year: Total Power & Cooling $2,250,944 $2,588,586 $2,976,875 $3,423,406 $3,936,916 Cost ($) Per Year: 130 Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
  • 131.
    Green Data Virtualization Calculations Center - Virtualization Infrastructure After Year 1 Year 2 Year 3 Year 4 Year 5 Virtualization Total Workloads: 4,170 4,796 5,515 6,342 7,293 Physical Systems 136 156 179 206 237 Needed: Power Used for Servers 68,000 78,200 89,700 102,925 118,450 (Peak Watts): Power Used forText here 45,560 Your Servers 52,394 60,099 68,960 Text here Your 79,361 (Off-Peak watts): Server Electric Cost ($) $65,570 $75,405 $86,716 $99,723 $114,682 Per Year (Peak): Server Electric Cost ($) $43,932 $50,521 $58,100 $66,815 $76,837 Per Year (Off-Peak): Total Cooling Electric $136,877 $157,408 $181,019 $208,172 $239,398 Cost ($) Per Year: Total Power & Cooling $246,378 $283,335 $325,835 $374,710 $430,917 Cost ($) Per Year: 131
  • 132.
    Green Data Virtualization Calculations -ROI Center - Virtualization Year 1 Year 2 Year 3 Year 4 Year 5 Total ("-" means Savings") 50% Utilization 6,074,378$ -1,619,909$ -677,406$ 405,174$ 1,688,365$ 5,870,602$ 60% Utilization Your Text here Your Text here 1,911,717$ -2,367,498$ -2,129,390$ -1,822,708$ -1,524,026$ -5,931,905$ 70% Utilization 564,773$ -2,609,364$ -2,583,076$ -2,557,558$ -2,541,227$ -9,726,452$ 132 Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
  • 133.
    VDI (Virtual DesktopInfrastructure) –Energy, Green IT - PC Management and Security Efficiency TCO Comparison Solution A: Solution B: Sun Difference Difference Cumulative 3 Year Traditional Virtual Desktop (A - B) (A - B)% Desktop Devices Solution IT Costs Desktop Device Costs 3,259,204 NIS 670,834 NIS 2,588,370 NIS 79.4% Desktop Software Costs 782,627 NIS 461,522 NIS 321,104 NIS 41.0% Server Infrastructure Costs 296,448 NIS 1,248,949 NIS (952,501 NIS) -321.3% Desktop Management Labor Costs Your Text here 5,724,578 NIS 2,137,760 NIS 3,586,818 NIS Your Text here 62.7% Desktop Power Costs 314,788 NIS 135,494 NIS 179,294 NIS 57.0% Total IT Costs 10,377,645 NIS 4,654,559 NIS 5,723,085 NIS 55.1% Business Operating Costs Desktop User Productivity Impact 4,473,911 NIS 0 NIS 4,473,911 NIS 100.0% Business Risks 538,416 NIS 26,919 NIS 511,496 NIS 95.0% Total Business Operating Costs 5,012,327 NIS 26,919 NIS 4,985,408 NIS 99.5% Total 15,389,972 NIS 4,681,479 NIS 10,708,493 NIS 69.6% Source: www.alinean.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 133
  • 134.
    VDI (Virtual DesktopInfrastructure) –Energy, Green IT - PC Management and Security Efficiency ROI Analysis Initial Year 1 Year 2 Year 3 (Solution B) (Probable Case) Benefits (to Solution B from 0 NIS 3,115,969 NIS 3,505,821 NIS 3,681,630 NIS Current (AS IS)) Cumulative Benefits 3,115,969 NIS 6,621,790 NIS 10,303,420 NIS Investment (Solution B) here Your Text 1,604,296 NIS 312,617 NIS 170,099 NIS here Your Text 237,175 NIS Cumulative Investment 1,604,296 NIS 1,916,913 NIS 2,087,012 NIS 2,324,187 NIS Cash Flow (1,604,296 NIS) 2,803,351 NIS 3,335,722 NIS 3,444,456 NIS Cumulative Cash Flow (1,604,296 NIS) 1,199,055 NIS 4,534,777 NIS 7,979,233 NIS ROI 343% Risk Adjusted ROI 288% NPV Savings 6,361,354 NIS IRR 177% Source: www.alinean.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 134
  • 135.
    Green Data CenterIntegrators Green Data Center - Israeli Market Positioning 1Q09 (Leaders) Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 135
  • 136.
    PC -Energy Efficiencyand Power Green IT - PC Consumption Why don’t you always shut down your PC when you have finished working for the day (multiple responses allowed): 1 ‫סידרה‬ It's IT policy or procedure to leave it on My computer goes to hibernate, or to sleep mode It takes too long Your Text here Your Text here It's a habit I don't think it's important It's a hassle I forget 0% 10% 20% 30% 40% 50% Source: E1, PC Energy Report Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 136
  • 137.
    PC -Energy Efficiencyand Power Green IT - PC Consumption Power Usage for Desktop PCs (watts) Idle Sleep Savings Mean of LBNL-measured Pentium- 4 67.3 3.3 64.0 machines Mean of 17-inch CRT monitors 61.2 1.8 59.4 Mean of 17-inch LCD monitors 35.3 2.3 33.0 Your Text here Energy Savings for Desktop Power draw Power draw here Your Text Savings per PCs (kWh) per per year year year (idle) (Sleep) (Sleep vs. idle) Typical P4 machine with 17- 791.56 31.42 760.14 inch CRT Typical P4 machine with 17- 632.02 34.50 597.52 inch LCD Source: Windows Hardware Developer Central Shahar Maor’s Source: WindowsDo not remove source or attribution from any graphic or portion of graphic work Copyright 2009 @STKI Hardware Developer Central 137
  • 138.
    PC -Energy Efficiencyand Power Green IT - PC Consumption Environmental Savings per Per PC with 17- Per PC with Windows Vista PC inch CRT 17-inch LCD Energy savings 760.14 kWh 597.52 kWh CO2 emissions reduction 1178.22 lb 926.16 lb ComparableText hereemissions Your auto 0.102 auto 0.080 auto Your Text here removed Trees not required to sequester 0.161 acre 0.126 acre CO2 emissions Equivalent homes powered 0.070 home 0.055 home Total Savings Per Year (0.67₪/kWh): 510 ₪ Source: Windows Hardware Developer Central Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 138
  • 139.
    Green IT - PC Costs Calculations PC 300*9 Senario 300*20 Senario & Vista 300*20 Senario 8 7 6 Annual Cost (Million ₪ ) 5 4 Your Text here Your Text here 3 2 1 0 Number of Computers Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 139
  • 140.
    PC -Energy Efficiencyand Power Green IT - PC Consumption: Israeli Market STKI observation: Some Israeli organizations, which address the issue of energy efficiency of PCs, use homemade script based solutions Players: IsraeliYour Text here Your Text here • Microsoft • Symantec • BigFix • Gpatrol –Israeli SU Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 140
  • 141.
    PC -Energy Efficiencyand Power Green IT - PC Consumption: An Example Your Text here Your Text here Source: www.g-patrol.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 141
  • 142.
    Green IT - Printing Printing STOP PRINTING Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 142
  • 143.
    Green IT - IsraeliOutput Statistics Printing Average A4s usage per year per employ: 2,000 4,607 10,000 Average color coverage per page: 71% 11% 1% Your Text here Your Text here Average cost per printed page: 0.045 NIS 0.24 NIS 1 NIS Average percentage of jobs of more than one page: 91% 75% 47% Source: Prime² (STKI’s modifications ) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 143
  • 144.
    STKI Madad 2008-9 Green IT - Printing Miscellaneous Distribution Tools 11% Printing 17% Consolidation 20% Your Text here Your Text here Outsourcing Monitoring and 9% Cost Reduction 43% P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 144
  • 145.
    Green IT - Printing Consolidation Printing In today’s world, printing has become a significant expenditure item for almost every organization A typical large financial organization in Israel spend dozens of millions of Shekels annually on office printing Israeli Office Printing Market has changed great deal since 2007: here Your Text Your Text here • Users start seeing the great potential in reorganizing their printing environment • The economic crisis pushs many to look for ways to cut costs • Printing consolidation projects usually have a fast, measurable ROI P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 145
  • 146.
    Green IT - Printing Consolidation -Ratios Printing One of the ways to check the maturity of an organization printing environment is checking its printers/users ratio: Organization “Heavy Followers Consolidated High-Tech Type Printers” Printers/Users 1:1 1:5 – 1:15 1:15 – 1:30 1:30+ Ratio Your Text here Your Text here “Heavy Printers” –Consist of financial organizations, government agencies, law firms est. High-Tech –Truly paperless entities (start ups, agile high tech companies est.) P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 146
  • 147.
    Green IT - AddressingPrinting Consolidation Projects Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 147
  • 148.
    Green IT - PrintingConsolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 148
  • 149.
    Green IT - PrintingConsolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 149
  • 150.
    Green IT - PrintingConsolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 150
  • 151.
    Green IT - PrintingConsolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 151
  • 152.
    Green IT - PrintingConsolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 152
  • 153.
    Green IT - PrintingConsolidation –Bottom Line Printing Your Text here Your Text here P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 153
  • 154.
    Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info 154