Shahar Maor Infrastructure Services Market 2009

  • Uploaded by: Dr Jimmy Schwarzkopf
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Shahar Maor Infrastructure Services Market 2009 as PDF for free.

More details

  • Words: 7,221
  • Pages: 109
Your Text here

Your Text here

Shahar Geiger Maor VP & Senior Analyst [email protected]

Visit My Blog: http://shaharmaor.blogspot.com/ 1

Agenda 1

Information Security

2

Communication Networking

3

Your Text here

Green IT

Information Security

Networking Your Text here Green IT

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

2

Information Security

Information Security

GRC and Security market size (Ms of $)

Your Text here Governance & Risk Management (also BCP)

Security (projects) Security (Software) Total

2008

2009 Your Text here

35.0 42% 95.0 -10.53% 90.0 -5.56%

50.0 85.0 85.0

220

0%

220

2010

50% 75.0 11.76% 95.0 -5.88% 80.0 14%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

250

3

Security/Privacy In the News

Your Text here

Information Security -Trends

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

4

Information Security -Trends

Security Trends Cloud computing

Outsourcing

Your Text here End-user’s organization is unable to control the data management environment

Sensitive or confidential information may not be properly protected

cyber crime

Virtualization

Inability to properly identify and Your Text here authenticate users to multiple systems External threat of organized cyber criminal syndicates

Unauthorized parties might be able to access private files without authorization

Third parties might be able to access private files without authorization

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

5

Information Security -Trends

Security Trends Data breaches involving personal information

Mobility

Your Text here

Inability to properly identify and authenticate remote users

Sensitive or confidential information that ends up in the hands of cyber criminals and identity thieves

Peer-to-peer file sharing

Web 2.0 and mesh-ups

Unsupervised Use of P2P monitoring of might result in Your Text here employees’ use the loss of of Web 2.0 sensitive or applications can confidential result in the loss business of critical information confidential including trade business data secrets on the Internet

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

6

Information Security -Trends

Technologies Categorization 2009 Business Value Investment to make money

Remote Access

Cut costs, Increase productivity

IAM/IDM

App. Your Text here Sec.

Commodity IT Services

Investment for regulations

Manage Sec. Services

SSO

IT Project Business Project

Cloud

Anti X EPS SIEM/SOC

Network Security

DLP NAC

DB Sec.

Your Text here Mobile Sec.

Vir. Sec.

Size of figure = complexity/ cost of project

GRC Using

Implementing

Looking

Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

7

Information Security -Trends

STKI Madad 2008-2009 Market Players 5%

Network DLP 5% 4% Access 18%

GRC 5% Miscellaneous 6% Your Text here

NAC 6%

DB Protection 7%

Hardening 3%

EPS/Anti x Your Text14% here

Management 8%

Trends 8%

WAF & Apps 11%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

8

Information Security -Trends

Sophisticated Threat Environment Writers Tool Writers

Malware Writers

First-Stage Abusers Hacker or Direct Attack

Machine Harvesting

Middle Men

Second-Stage Abusers

End Value Fame

Compromised Host and Application

Theft Extortionist DDoS for Hire

Botnet Creation Worms

Your Text Information here Harvesting

Viruses

Internal Theft Abuse of Privilege

Espionage Spammer Your Text here

Botnet Management

Trojans

Personal Information

Spyware

Information Brokerage

Extortion Phisher Pharmer/DNS Poisoning

Commercial Sales Fraudulent Sales

Identity Theft Click Fraud

Electronic IP Leakage

Financial Fraud

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: Cisco Israel

9

Application Security

Information Security -App. Sec

STKI observation: Secure development should be an integral part of any new project and therefore should be calculated within the project’s budget. STKI survey shows that spendings on secure development scale from 0% of total project budget (Main-Frame based projects) up to 10% ( core web applications projects) of total project budget. Your Text here Your Text here Average spending on secure development is 5% of total project budget (including: training, code review and penetration tests)

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

10

Web Applications - Vulnerabilities

Information Security -App. Sec

Probability to detect vulnerabilities of different risk degree (results of 32,717 sites and 69,476 vulnerabilities of different degrees of severity) Your Text here

% Sites (All)

Your Text here

% Sites (Scanned)

% Sites (Black & Whitebox)

Source: http://www.webappsec.org/projects/statistics/

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

11

Web Applications -Vulnerabilities

Information Security -App. Sec

Vulnerability frequency by types: 1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to system design errors 2. Information Leakage and Predictable Resource Location are often connected with improper system administration (for example, weak access control)

Your Text here

Your Text here

Source: http://www.webappsec.org/projects/statistics/

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

12

Web Application Firewall –Israeli Market Players

Information Security -App. Sec

Applicure - dotDefender (Apache and IIS)

Cisco* - ACE XML Gateway

Barracuda - Web Application Firewall (fromerly NetContinuum)

IBM* –Data Power

Your Text here

Your Text here

Breach Security - WebDefend

Microsoft –IAG WAF

Citrix - Application Firewall (Formerly Teros)

Protegrity - Defiance

*Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

13

Information Security -App. Sec

Web Application Firewall –Leading Players -1Q09 Solution

What Should I Know?

Representatives/ Integrators

F5 - Application Security Manager (ASM)

One of the best WAFs around. Features a good Trek-IT (Dis.), policy toolset for adaptive learning. Offer strong Artnet, integration to the TMOS family of products. Taldor, Spider, Superb load balancing capabilities. One of two Bezeq Int., One Your Text here leading solutions in Israel. Strong market Your Text here NewAge, Netcom presence

Imperva – SecureSphere

The first in the Israeli market. Imperva has an array of out-of-the-box policies and attack signatures as well as superior learning mode . A leading DB protection solution. Has a significant market share

Comsec (Dis.), Netcom, Bynet, Taldor, NewAge, 012 Smile

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

14

Application Security –Israeli Players and Positioning -1Q09

Your Text here

Information Security -App. Sec

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

15

Network Access Control

Your Text here

Information Security -Network Sec

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

16

NAC Insights

Information Security -Network Sec

NAC has not been “fully digested” by Israeli customers in 2008. There should be more activity in 2009 NAC can be deployed less expensively when it is an embedded feature of an existing vendor and customers take notice of it Your Text here Your Text here Israeli customers first priority: implementing a guest networking control Network Security or Endpoint Security?

NAC is a Layer 2 vs. Layer 3 match Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

17

STKI Israeli Positioning

Information Security -Network Sec

• Not a technological positioning, refers only to Israeli market • Focused on enterprise market (not SMB) • Not an STKI recommendation Local Support

 Market Presence (X)

Vendor A Vendor B

 Market share - existing and new sales (more emphasis)  Mind share (how user organizations rate vendors)  Local Support (Y) – is influenced by (X)  Experience & technical knowledge, localization, support, number and kind of integrators

Worldwide Leader

 Worldwide leaders marked, based on global positioning  Vendors to watch: Are only just entering israeli market Vendors to Watch:

Vendor C

so can’t be positioned but should be watched Market Presence

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

18

NAC

- Israeli Market Positioning 1Q09

Information Security -Network Sec

Vendors to Watch:

HP Procurve

Local Support

Check Point Microsoft Cisco Player

Symantec Juniper

Access Layers

XOR SWAT

Enterasys

Leap

McAfee ForeScout Insightix Nortel

Worldwide Leader

This analysis should be used with its supporting documents

Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

19

Information Security -EPS

Endpoint Security

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

20

Endpoint Security -Threats

Your Text here

Information Security -EPS

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

21

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Outside

Organization

Endpoint Security -Protection

Information Security -EPS

22

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Outside

Organization

Endpoint Security -Protection

Information Security -EPS

23

Endpoint Security -Protection

Information Security -EPS

Anti X NAC Your Text here

Your Text here

Manageability

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Outside

Organization

DLP

24

Local Support

Anti -X Suites - Israeli Market Positioning 1Q09 (Enterprise Leaders Only)

Information Security -EPS

Symantec McAfee Trend Micro

Player Worldwide Leader

Microsoft

This analysis should be used with its supporting documents

Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

25

Data Centric Security

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Data Centric Security

26

Data Centric Approach

Your Text here

Build a wall – “perimeter security”

Data Centric Security

Your Text here

“Business of Security” – Security is built into the business process

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

27

Data Centric Security Arena

DLP

ERM

Encryption

Database Protection

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Data Centric Security

28

Data Leak/Loss Prevention

Your Text here

Data Centric Security -DLP

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

29

Data Leak /Loss Prevention

Data Centric Security -DLP

 DLP is an overall framework into which different elements fit  There are three types of data that may leak: • Data at rest • DataYour in transit Text here

Your Text here

• Data on endpoints

 No single DLP focus area is full proof, an optimal solution should cover all three areas  DLP is a growing area, and vendors react accordingly Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

30

DLP –Market Status & Players

Data Centric Security -DLP

World Leaders (consolidation in progress…): • • • • •

Symantec (Acquired Vontu, 2007, 350$ M) Websense (Acquired PortAuthority 2007, 90$ M) Reconnex (Acquired by McAfee, July 2008, 46$ M) Tablus (Acquired by RSA, 2007, 40$ M) Your Text here Your Text here Vericept ? Workshare?

Main drivers for DLP are: • Regulations such as Payment Card Industry (PCI), Accountability Act (HIPAA) • e-mail security, instant messaging (IM) and endpoint monitoring solutions Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

31

DLP –Market Status

Data Centric Security -DLP

DLP Deployments Status -Israel 1Q09

Solution Deployed 20% Your Text here

“Not There" Yet 60%

Text here PlanYour to Deploy Soon 20%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

32

DLP - Israeli Market Positioning 1Q09

Data Centric Security -DLP

Vendors to Watch:

ProofPoint Workshare

Local Support

IBM (ISS) Player Worldwide Leader

Websense

Fast Movement

McAfee Verdasys Symantec RSA

This analysis should be used with its supporting documents

Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

33

ERM

(Enterprise Rights Management)

Data Centric Security -ERM

Enterprise Rights Management (ERM) technology—also known as Enterprise DRM or Information Rights Management (IRM) What is it? • ERMYour entails content Text hereencrypting files that contain Your Text hereand only allowing those users or devices that have proper credentials to decrypt the files and access the content

Awareness of ERM has increased ERM has been growing steadily since it became a technology category unto itself about five years ago Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

34

Applications and File Formats Used in ERM Implementations

Your Text here

Data Centric Security -ERM

Your Text here

Source: Gilbane Group

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

35

Data Centric Security -DLP

ERM –How Does it Work? SQL Server

Active Directory

1. New user is authorized to use RMS 2. The User defines set of rules and content usage rights for the data he wants to share – He is the data owner 3. User distributes data to relevant recipients Your Text here 4. When recipient tries to open a file –a request is sent to the RMS Server in order to authorize/deny access

RMS Server

Your Text here 4

1

2

Data owner

3

5

5. RMS enforces rules made by the data owner

Recipient

Source: Microsoft Israel

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

36

ERM -Israeli Market Players

Data Centric Security -ERM

Microsoft -Rights Management Services EMC- EMC Documentum IRM Product Suite Oracle - Oracle Information Rights Management Adobe –Adobe LifeCycle Rights Management Your Text here IsraeliYour SU:Text here Secure Islands -A provider of an advanced information protection and control (IPC) solution Covertix –Develops innovative software technology to track, monitor and control documents and files within and outside the organization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

37

Data Centric Security -DB Protections

DB Protection –Market Status

DB Protection Deployments Status -Israel 1Q09

Leading Israeli Players: •Sentrigo •Imperva •Oracle DB Vault •GuardiumYour Text here DB encryption: Ged-i (Israeli SU): offers high-level encryption to Storage Data

Plan to Deploy Soon 30%

“Not There" Yet 49% Solution Your Text here Deployed 20%

Other\Do Not Know 1%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

38

Masking of Production Data

Your Text here

Data Centric Security -Data Masking

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

39

Masking of Production Data

Data Centric Security -Data Masking

 What is it?

• The process of data masking is designed to “de-identify” data, such that the data remains based on real information, but no longer has any practical usage or application

 What is the need?

• The drive to outsource and offshore application development and Your testing work means that organizations will little control Text here Yourhave Text here over who gets to see their data • Test environments are not physically as secure as production systems

 What can go wrong?

• Sensitive data might be downloaded to laptops and stolen • Employees might misuse sensitive information and engage in fraudulent activity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

40

Masking of Production Data

Your Text here

Data Centric Security -Data Masking

Your Text here

Source: Securosis.com

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

41

SIEM/SOC

Your Text here

SIEM/SOC

Your Text here

42

SIEM/SOC

SIEM/SOC

 What is SIEM?

• Security Information & Event Management

 What is SOC?

• Security Operation Center

 How does it work?

• Collects and analyzes all log data and basic event management Your Text here Your Text here • monitors and manages all aspects of enterprise security in real time, from a single, centralized location • The NOC of security

 Why do we need it?

• Need for real-time awareness of internal/ external threats • Ensure business continuity and comply with regulations • A toolset for improving business logic (Security BI) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

43

Silos of Redundant Information Management

Your Text here

SIEM/SOC

Your Text here

Network Intelligence Shahar Maor’s work Copyright 2009 @STKISource: Do not remove source or attribution from any graphic or portion of graphic

44

An Enterprise Platform for Compliance and Security

Your Text here

SIEM/SOC

Your Text here

SIEM

Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

45

SIEM/SOC

- Israeli Market Positioning 1Q09

SIEM/SOC

Vendors to Watch:

IBM -MSS

Local Support

TriGeo

Player

ArcSight

Worldwide Leader

EMC Symantec

Fast Movement

CA IBM Cisco NetIQ

This analysis should be used with its supporting documents

Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

46

Next Generation SIEM/SOC: MSS

SIEM/SOC -MSS

What does MSS offer? -Comprehensive solution for security management: • Firewall/EP Management Service • Intrusion Detection & Prevention Management Service • Vulnerability Management Service Your Text here

Why should we go there?

Your Text here

• Cost effective! • Use of best-of-breed security

Why shouldn’t we? • Who owns my data? • No one else in Israel goes there…yet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

47

MSS Trends in Israel

SIEM/SOC -MSS

STKI observation: MSS is well accepted in SMB organizations, but Israeli CISOs in enterprises still strongly oppose this trend

TheYour current Text here economic downturn should Yourencourage Text here some enterprises to reconsider MSS MSS providers addresses the management (CFOs and CEOs) in order to attract new clients

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

48

Delivery

MSS –World Leaders

SIEM/SOC -MSS

Opportunities in Israel for: •Current world leaders (IBM, Symantec) • local ISPs •Network integrators •Traditional OS players

Market Penetration

(Source: Frost and Sullivan)

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

49

Identity & Access Management (IDM/IAM)

Your Text here

IDM/IAM

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

50

IDM Global Mega Trends

IDM/IAM

 Fraud and identity theft will increase strong

authentication use

 Strong authentication and SSO will strengthen their ties  Context-based into Your Text hereauthorization will put risk analysis Your Text here

access control decisions

 Physical and logical security will continue to converge  Federation will slowly grow

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

51

Trends in the Israeli Market

IDM/IAM

 Nov 2008: CA acquired Eurekify to enhance its role-based management suite  ERP based SOD solutions start to be seen, mainly for GRC reasons: • 2006: SAP acquired Virsa, enterprise risk management software Your Textto here Yourskills Text here provider, bolster SAP’s software compliance • 2008: Oracle acquired Logical Apps, an automated GRC controls, for enterprise applications

 Israeli new GRC enforcement Start-Ups: • Xpandion -Risk management and behavioral analyzing software solutions • SPATIQ –provides an automated tool for Entitlement Management Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

52

IAM/IDM - Israeli Market Positioning 1Q09

IDM/IAM

Vendors to Watch:

Local Support

SPATIQ

Player

IBM Novell

Sun (OS)

CA

Worldwide Leader Prominent WAM Player

BMC Microsoft Oracle Velo (OS)

This analysis should be used with its supporting documents

Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

53

Key Success Factors for Future IDM Project

IDM/IAM

Consider IDM also as a business project, rather than a pure IT project Make sure the project bridges the gap between business and IT Text here Text here  StartYour small for easier success (SingleYour Sign On, a vertical project)  Choose a step-by-step approach, rather than a mastodon implementation. Focus on basic functionalities not on the additional features Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

54

Security Consultants -Israeli Market Positioning 1Q09 (Leaders)

Your Text here

Information Security -Market Players

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

55

Security Integrators -Israeli Market Positioning 1Q09 (Leaders)

Your Text here

Information Security -Market Players

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

56

Security Distributors -Israeli Market Positioning 1Q09 (Leaders)

Your Text here

Information Security -Market Players

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

57

Agenda 1

Information Security

2

Communication Networking

3

Your Text here

Green IT

Information Security

Networking Your Text here Green IT

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

58

Networking

Networking

Networking market size (Ms of $) Your Text here

LAN equipment WAN equipment VoIP equipment Totals

Your Text here

2008

2009

2010

80.0

-25.00%

60.0

8.33%

65.0

50.0

-20.00%

40.0

12.50%

45.0

40.0

-20.00%

32.0

25.00%

40.0

170.0

-22.35%

132.0

13.64%

150.0

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

59

Networking Future Trends

Networking Trends

Datacenter Networking virtualization Next Generation Networking Internet Protocol (IP) Core and High Speed Broadband Green Networking Your Text here IPv6 Your Text here Network Operating systems Network intelligence and policy control Network Security Communication billing

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

60

Technologies Categorization 2009

Networking Trends

Business Value Investment to make money SAAS/ Cloud

Cut costs, Increase productivity

Optimization

Billing

Your Text here

Commodity IT Services

IT Project

UC

Infra.

VOIP Network Security

NGN Your Text here Networking Vir.

IPv6

Business Project Size of figure = complexity/ cost of project

Investment for regulations Using

Implementing

Looking

Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

61

Networking Trends

Year of savings and productivity

What networking technologies are you investing-in to enhance employee productivity and collaboration in 2009? (Answer all that apply) 2009

2008 52% 46%

Your Text here

1% NA

9%11%

36% 31%

29% 19% 13% NA

55%

32% Your Text here

23%

8%

Shahar Maor’s work Copyright 2009Source: @STKI Do not remove Sachs source or attribution from any graphic or portion of graphic Goldman Research

62

STKI Madad 2008-9 Market Players 8%

Optimization 2% UC 8%

Nortel 10%

VOIP and IPTel 20% Network Infra Your Text here 20%

Your Text here

Network Costs Reduction 10%

Networking Trends

Trends 10%

Miscellaneous 12%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

63

Local Area Network Trends

Networking -LAN

 Security embedded features in the LAN infra are imperative  Network Virtualization is already here  LAN vendors should support standard-based platforms Your Text here

 Israeli Trends: •

Your Text here

Corporate LAN to endpoints is stable: 100 MBIT Ethernet; Backbone LAN: 2 X 1GBIT (10GBIT in some cases)



Israeli enterprise tend to “count on” either Cisco or Nortel for their backbone network. Other players appear on the network edges

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

64

LAN

- Israeli Market Positioning 1Q09

Networking -LAN

Vendors to Watch:

Local Support

Foundry

Cisco Nortel

Player Worldwide Leader

Enterasys HP Juniper Alcatel Extreme

3COM

This analysis should be used with its supporting documents

Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

65

Networking -Nortel

The Nortel Crisis From 90K to 30K employees

Your Text here Nortel Reports Financial Results for Q3 2008

Feb 08: Nortel says it will cut 2,100 jobs

Nortel announces 1,300 layoffs

Nortel says several executives to leave in 2009

More and more layoffs…

Nortel files Your Text here

for bankruptcy protection

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

66

The Nortel Crisis –What’s next?

Networking -Nortel

Nortel files for Chapter 11 to “deal decisively” with its historic debt burdens Nov 10’th 2008: A Nortel spokesman said the company had enough liquidity to sustain 12 to 18 months of operation under the current conditions Your Text here Your Text here Survival still possible for Nortel, but Companies that exit the bankruptcy process often emerge in smaller form and are frequently acquired in part or whole by larger suitors looking for a good deal 19.2.09: Radware has purchased Nortel’s Alteon… Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

67

The Nortel Crisis –Israeli Market ”What if” Analysis

Cisco

Acquiring parts of Nortel?

HP Juniper

Your Text here

Networking -Nortel

Alliance with Avaya and Microsoft

Acquire Nortel’s Telephony?

Your Text here Gores

Alcatel

3COM

•Enterasys (LAN and sec.) •Siemens (Telephony)

Goes deeper into the Israeli market?

Goes deeper into the Israeli market?

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

68

WAN Optimization

Networking -WAN

WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN:

VOIP Deployments

Data Center Consolidation Your Text here

Your Text here

2007 2008

Server Virtualization

BCP/DRP

0%

10% 20% 30% 40% 50% 60% 70% 80% Source: Aberdeen Research

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

69

Local Support

WAN Optimization - Israeli Market Positioning 1Q09

Expand

Networking -WAN

Player

Riverbed F5

Worldwide Leader

Cisco Blue Coat Radware Juniper

Citrix Packeteer* This analysis should be used with its supporting documents

Market Presence

*June 2008: A Blue Coat company

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

70

Voice Over IP (VOIP)

Networking -VOIP

STKI observation: Many enterprises are migrating, or planning to migrate, their telephony infrastructure from traditional circuit-switched technology to newer Internet Protocol (IP)-based systems Your Text here

Your Text here

 Motivations to actually migrate: •

End of life/end of support for current telephony infrastructure



Moving to a new office/office improvements

 Motivations to wait: •

“Phones are working”

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

71

VOIP (Enterprise & Call Centers) - Israeli Market Positioning 1Q09

Networking -VOIP

Vendors to Watch:

Asterisk

Local Support

Cisco

Player

Nortel Worldwide Leader

Avaya*

Tadiran 3COM Alcatel-Lucent

This analysis should be used with its supporting documents

Market Presence

*Most CC in the market are Avaya

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

72

Video Over IP

Networking –Video OIP

 By 2011, 60% of Internet traffic is expected to be video traffic (Cisco)  Global organizations use it as a vital working tool – especially order to cut travelling costs Your Text here Your Textin here  Video technology is considered by many local organizations as mostly “nice to have”  Local organizations use this technology mainly for training/marketing purposes Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

73

Networking –Video OIP

Video Over IP Map

Your Text here

Your Text here

Source: http://www.video-over-ip.com/

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

74

Unified Communications (UC)

Networking –UC

Why do we need this? Integration: Of any or all communications, collaborative, and business applications Presence: guides users to the most appropriate means of communications Mobility: extends applications and integration of Your Text here Your Text here applications every way you go Productivity: improves business processes Why now?

Key drivers today are: Workforce virtualization, Cost reduction, Increasingly available tools, Business improvement opportunities Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

75

Networking –UC

UC Challenges

The problem: business justification for collaboration technologies comes down to “soft dollars”: • Productivity Your Text here • Better teamwork • Better customer service

Your Text here

How do you define “better”? What is its business value to the company?

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

76

Networking –UC

UC Preferred Choice

56%

Cisco 41%

Microsoft 22%

Avaya 10%

Nortel Your Text here 5% Alcatel-Lucent 3% 3Com

Your Text here

2%

Nokia-Siemens Newer Vendors

4%

Others

4% 9%

Unsure 0%

10%

20%

30%

40%

Source: Goldman Sachs Research

50%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

60% 77

Networking Integrators - Israeli Market Positioning 1Q09 (Leaders)

Your Text here

Networking

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

78

Agenda 1

Information Security

2

Communication Networking

3

Your Text here

Green IT

Information Security

Networking Your Text here Green IT

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

79

Green IT

Small, incremental changes compounded many times can mean big savings for Your Text here large-scale organizations

Your Text here

80

So, How Can I Be More Green? PC management

Your Text here

Intelligent archiving

Go digital! & Printing consolidation

Virtualized server and storage environments

Green IT Trends

Secure mobile access to networks, applications, and data

State of the art power and cooling (all around)

Teleconferencing

Asset management

Working environment (car pool, working from home…)

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

81

STKI Madad 2008-9 (Not Including Printing) PC Energy Management 9%

Miscellaneous 12%

Market Players Your Text here 15%

Green IT Trends

Trends 38% Your Text here

DC Facilities 20% Asset Management 6% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

82

How Dense is Your Data Center?

Green Data Center Trends

What is your average rack power demand (per rack)? 6%

10%

23% 30%

0 kW to 3 kW 4 kW to 6 kW 7 kW to 9 kW

Your Text here

Your Text here10 kW to 11 kW

31%

12 kW or More

Data Center Environment –Israeli Market (Ms of $)

2008 30.0

2009 33.33%

40.0

2010 25.00%

Source: STKI, Information Week

50.0

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

83

Electricity Use Trends

Your Text here

Green Data Center Trends

Your Text here

36

Source: ASHRAE

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

84

Data Center Metrics

Green Data Center Trends

Power Usage Effectiveness (PUE):

and its reciprocal, the DCiE is defined as:

PUE = Total Facility Power ÷ IT Equipment Power

DCiE = 1÷ PUE = (IT Equipment Power ÷ Total Facility Power) x 100%

Your Text here

Your Text here

Source: The Green Grid, EPA

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

85

Virtualization Calculations

Green Data Center Virtualization

Assumptions (partial list): Average Server Utilization: %5 Number of peak hours:12 Cost per KwH: 11 cents Average growth rate per year: 15% Yourservers Text here Your Text here Virtualization: • level of utilization of servers after virtualization: 50%-70% • Calculations are based on a maximum of two virtual machines per core

Cooling: 1 watt of power for the server to 1.25 watts of power for cooling Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=

86

Green Data Center -

Virtualization Calculations

Virtualization

Infrastructure Prior to Virtualization

Year 1

Year 2

Year 3

Year 4

Year 5

Total Number of Servers:

540

641

714

821

944

Power Used for Servers: 1,037,500 1,193,125 (Watts) Your Text here

1,372,094 1,577,908

1,814,594

Your Text here

Server Electric Cost ($) Per Year:

$1,000,420 $1,150,483 $1,323,055 $1,521,514 $1,749,740

Total Cooling Electric Cost ($) Per Year:

$1,250,525 $1,438,103 $1,653,819 $1,901,892 $2,187,176

Total Power & Cooling Cost ($) Per Year:

$2,250,944 $2,588,586 $2,976,875 $3,423,406 $3,936,916

Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=

87

Virtualization Calculations

Green Data Center Virtualization

Infrastructure After Virtualization

Year 1

Year 2

Year 3

Year 4

Year 5

Total Workloads:

4,170

4,796

5,515

6,342

7,293

Physical Systems Needed:

136

156

179

206

237

Power Used for Servers 68,000 (Peak Watts):

78,200

89,700

102,925

118,450

Your here 45,560 Power Used forText Servers (Off-Peak watts):

52,394

60,099

Your Text here 68,960 79,361

Server Electric Cost ($) $65,570 Per Year (Peak):

$75,405

$86,716

$99,723

$114,682

Server Electric Cost ($) $43,932 Per Year (Off-Peak):

$50,521

$58,100

$66,815

$76,837

Total Cooling Electric Cost ($) Per Year:

$136,877

$157,408

$181,019

$208,172

$239,398

Total Power & Cooling Cost ($) Per Year:

$246,378

$283,335

$325,835

$374,710

$430,917 88

Green Data Center -

Virtualization Calculations -ROI Year 1 50% Utilization 60% Utilization 70% Utilization

Year 2

6,074,378$ -1,619,909$ Your Text here

1,911,717$ -2,367,498$ 564,773$

-2,609,364$

Year 3

-677,406$

Year 4

Year 5

Virtualization

Total ("-" means Savings")

405,174$ 1,688,365$ Your Text here

5,870,602$

-2,129,390$ -1,822,708$ -1,524,026$

-5,931,905$

-2,583,076$ -2,557,558$ -2,541,227$

-9,726,452$

Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=

89

VDI (Virtual Desktop Infrastructure) –Energy, Management and Security Efficiency

Green IT Virtualization

Assumptions (Partial list): • Number of desktop devices under consideration: 500 • Desired virtualization software engine: VMware ESX • Average annual Sun VDS server administration costs per thinYour client: 846.10 NIS Text here Your Text here • FTEs desktop helpdesk support staff: 1.25 • FTEs desktop security management: 0.5 • Number of Desktop security incidents: 2 • Project Implementation Plan (months from kickoff to deployment): 2

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

90

VDI (Virtual Desktop Infrastructure) –Energy, Management and Security Efficiency TCO Comparison Cumulative 3 Year

Green IT Virtualization

Solution A: Traditional Desktop Devices

Solution B: Sun Virtual Desktop Solution

Difference (A - B)

Difference (A - B)%

Desktop Device Costs

3,259,204 NIS

670,834 NIS

2,588,370 NIS

79.4%

Desktop Software Costs

782,627 NIS

461,522 NIS

321,104 NIS

41.0%

Server Infrastructure Costs

296,448 NIS

1,248,949 NIS

(952,501 NIS)

-321.3%

Desktop Management Labor Costs

5,724,578 NIS

2,137,760 NIS

3,586,818 NIS

62.7%

Desktop Power YourCosts Text here Total IT Costs

314,788 NIS 10,377,645 NIS

135,494 NIS 4,654,559 NIS

Desktop User Productivity Impact

4,473,911 NIS

0 NIS

4,473,911 NIS

100.0%

Business Risks

538,416 NIS

26,919 NIS

511,496 NIS

95.0%

Total Business Operating Costs 5,012,327 NIS

26,919 NIS

4,985,408 NIS 99.5%

Total

4,681,479 NIS

IT Costs

179,294 NIS 57.0% Your Text here 5,723,085 NIS 55.1%

Business Operating Costs

15,389,972 NIS

Source: www.alinean.com

10,708,493 NIS 69.6%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

91

VDI (Virtual Desktop Infrastructure) –Energy, Management and Security Efficiency

Green IT Virtualization

ROI Analysis (Solution B) (Probable Case)

Initial

Year 1

Year 2

Benefits (to Solution B from Current (AS IS)) Cumulative Benefits Investment (Solution B) here Your Text Cumulative Investment Cash Flow Cumulative Cash Flow ROI

0 NIS

3,115,969 NIS

3,505,821 NIS 3,681,630 NIS

3,115,969 NIS 312,617 NIS 1,916,913 NIS 2,803,351 NIS 1,199,055 NIS

6,621,790 NIS 10,303,420 NIS 170,099 237,175 NIS Your NIS Text here 2,087,012 NIS 2,324,187 NIS 3,335,722 NIS 3,444,456 NIS 4,534,777 NIS 7,979,233 NIS

Risk Adjusted ROI NPV Savings IRR

288% 6,361,354 NIS 177%

1,604,296 NIS 1,604,296 NIS (1,604,296 NIS) (1,604,296 NIS) 343%

Source: www.alinean.com

Year 3

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

92

PC -Energy Efficiency and Power Consumption

Green IT PC

Why don’t you always shut down your PC when you have finished working for the day? (multiple responses allowed):

1 ‫סידרה‬

It's IT policy or procedure to leave it on My computer goes to hibernate, or to sleep mode It takes too long Your Text here

Your Text here

It's a habit

I don't think it's important It's a hassle I forget 0%

10%

20%

30%

40%

50%

Source: E1, PC Energy Report Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

93

PC Costs Calculations 300*20 Senario

300*20 Senario & Vista

Green IT PC

300*9 Senario

8

Annual Cost (Million ₪ )

7 6 5 4 3

Your Text here

Your Text here

2 1 0

Number of Computers Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

94

PC -Energy Efficiency and Power Consumption: An Example

Your Text here

Green IT PC

Your Text here

Source: www.g-patrol.com

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

95

PC -Energy Efficiency and Power Consumption: Israeli Market

Green IT PC

STKI observation: Some Israeli organizations, which address the issue of energy efficiency of PCs, use homemade script based solutions Text here IsraeliYour Players:

• • • •

Your Text here

Microsoft Symantec BigFix Gpatrol –Israeli SU Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

96

Green IT Printing

Printing

STOP PRINTING Your Text here

Your Text here

P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

97

Green IT Printing

Israeli Output Statistics Average A4s usage per year per employ: 2,000

4,607

10,000

Average color coverage per page: 1%

11%

Your Text here

Average cost per printed page: 0.045 NIS

71% Your Text here

0.24 NIS

1 NIS

Average percentage of jobs of more than one page: 47%

75% Source: Prime² (STKI’s modifications )

91%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

98

STKI Madad 2008-9

Green IT Printing

Miscellaneous Distribution Tools 11% Printing 17% Consolidation 20% Monitoring and Cost Reduction 43% Your Text here

Outsourcing 9%

Your Text here

Printing Projects –Israeli Market Size (Ms of $)

2008

10.0

2009

50.00%

15.0

2010

66.67%

25.0

P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

99

Printing Consolidation

Green IT Printing

In today’s world, printing has become a significant expenditure item for almost every organization A typical large financial organization in Israel spend dozens of millions of Shekels annually on office printing Israeli Office Printing Market has changed great deal Your Text here Your Text here since 2007: • Users start seeing the great potential in reorganizing their printing environment • The economic crisis pushes many to look for ways to cut costs • Printing consolidation projects usually have a fast, measurable ROI

P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

100

Printing Consolidation -Ratios

Green IT Printing

One of the ways to check the maturity of an organization printing environment is to check its printers/users ratio: Organization Type

“Heavy Printers”

Followers

Consolidated

High-Tech

Printers/Users Ratio

1:1

1:5 – 1:15

1:15 – 1:30

1:30+

Your Text here

Your Text here

“Heavy Printers” –Consist of financial organizations, government agencies, law firms est. “High-Tech” –Truly paperless entities (start ups, agile high tech companies est.)

P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

101

Addressing Printing Consolidation Projects

Your Text here

Green IT Printing

Your Text here

P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

102

Printing Consolidation –Bottom Line

Your Text here

Green IT Printing

Your Text here

P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

103

Printing Consolidation –Bottom Line

Your Text here

Green IT Printing

Your Text here

P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

104

Printing Consolidation –Bottom Line

Your Text here

Green IT Printing

Your Text here

P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

105

Printing Consolidation –Bottom Line

Your Text here

Green IT Printing

Your Text here

P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

106

Printing Consolidation –Bottom Line

Your Text here

Green IT Printing

Your Text here

P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

107

Printing Consolidation –Bottom Line

Your Text here

Green IT Printing

Your Text here

P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

108

Your Text here

Your Text here

Shahar Geiger Maor VP & Senior Analyst [email protected]

109

Related Documents


More Documents from ""