Your Text here
Your Text here
Shahar Geiger Maor VP & Senior Analyst
[email protected]
Visit My Blog: http://shaharmaor.blogspot.com/ 1
Agenda 1
Information Security
2
Communication Networking
3
Your Text here
Green IT
Information Security
Networking Your Text here Green IT
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
2
Information Security
Information Security
GRC and Security market size (Ms of $)
Your Text here Governance & Risk Management (also BCP)
Security (projects) Security (Software) Total
2008
2009 Your Text here
35.0 42% 95.0 -10.53% 90.0 -5.56%
50.0 85.0 85.0
220
0%
220
2010
50% 75.0 11.76% 95.0 -5.88% 80.0 14%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
250
3
Security/Privacy In the News
Your Text here
Information Security -Trends
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
4
Information Security -Trends
Security Trends Cloud computing
Outsourcing
Your Text here End-user’s organization is unable to control the data management environment
Sensitive or confidential information may not be properly protected
cyber crime
Virtualization
Inability to properly identify and Your Text here authenticate users to multiple systems External threat of organized cyber criminal syndicates
Unauthorized parties might be able to access private files without authorization
Third parties might be able to access private files without authorization
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
5
Information Security -Trends
Security Trends Data breaches involving personal information
Mobility
Your Text here
Inability to properly identify and authenticate remote users
Sensitive or confidential information that ends up in the hands of cyber criminals and identity thieves
Peer-to-peer file sharing
Web 2.0 and mesh-ups
Unsupervised Use of P2P monitoring of might result in Your Text here employees’ use the loss of of Web 2.0 sensitive or applications can confidential result in the loss business of critical information confidential including trade business data secrets on the Internet
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
6
Information Security -Trends
Technologies Categorization 2009 Business Value Investment to make money
Remote Access
Cut costs, Increase productivity
IAM/IDM
App. Your Text here Sec.
Commodity IT Services
Investment for regulations
Manage Sec. Services
SSO
IT Project Business Project
Cloud
Anti X EPS SIEM/SOC
Network Security
DLP NAC
DB Sec.
Your Text here Mobile Sec.
Vir. Sec.
Size of figure = complexity/ cost of project
GRC Using
Implementing
Looking
Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
7
Information Security -Trends
STKI Madad 2008-2009 Market Players 5%
Network DLP 5% 4% Access 18%
GRC 5% Miscellaneous 6% Your Text here
NAC 6%
DB Protection 7%
Hardening 3%
EPS/Anti x Your Text14% here
Management 8%
Trends 8%
WAF & Apps 11%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
8
Information Security -Trends
Sophisticated Threat Environment Writers Tool Writers
Malware Writers
First-Stage Abusers Hacker or Direct Attack
Machine Harvesting
Middle Men
Second-Stage Abusers
End Value Fame
Compromised Host and Application
Theft Extortionist DDoS for Hire
Botnet Creation Worms
Your Text Information here Harvesting
Viruses
Internal Theft Abuse of Privilege
Espionage Spammer Your Text here
Botnet Management
Trojans
Personal Information
Spyware
Information Brokerage
Extortion Phisher Pharmer/DNS Poisoning
Commercial Sales Fraudulent Sales
Identity Theft Click Fraud
Electronic IP Leakage
Financial Fraud
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
Source: Cisco Israel
9
Application Security
Information Security -App. Sec
STKI observation: Secure development should be an integral part of any new project and therefore should be calculated within the project’s budget. STKI survey shows that spendings on secure development scale from 0% of total project budget (Main-Frame based projects) up to 10% ( core web applications projects) of total project budget. Your Text here Your Text here Average spending on secure development is 5% of total project budget (including: training, code review and penetration tests)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
10
Web Applications - Vulnerabilities
Information Security -App. Sec
Probability to detect vulnerabilities of different risk degree (results of 32,717 sites and 69,476 vulnerabilities of different degrees of severity) Your Text here
% Sites (All)
Your Text here
% Sites (Scanned)
% Sites (Black & Whitebox)
Source: http://www.webappsec.org/projects/statistics/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
11
Web Applications -Vulnerabilities
Information Security -App. Sec
Vulnerability frequency by types: 1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to system design errors 2. Information Leakage and Predictable Resource Location are often connected with improper system administration (for example, weak access control)
Your Text here
Your Text here
Source: http://www.webappsec.org/projects/statistics/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
12
Web Application Firewall –Israeli Market Players
Information Security -App. Sec
Applicure - dotDefender (Apache and IIS)
Cisco* - ACE XML Gateway
Barracuda - Web Application Firewall (fromerly NetContinuum)
IBM* –Data Power
Your Text here
Your Text here
Breach Security - WebDefend
Microsoft –IAG WAF
Citrix - Application Firewall (Formerly Teros)
Protegrity - Defiance
*Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
13
Information Security -App. Sec
Web Application Firewall –Leading Players -1Q09 Solution
What Should I Know?
Representatives/ Integrators
F5 - Application Security Manager (ASM)
One of the best WAFs around. Features a good Trek-IT (Dis.), policy toolset for adaptive learning. Offer strong Artnet, integration to the TMOS family of products. Taldor, Spider, Superb load balancing capabilities. One of two Bezeq Int., One Your Text here leading solutions in Israel. Strong market Your Text here NewAge, Netcom presence
Imperva – SecureSphere
The first in the Israeli market. Imperva has an array of out-of-the-box policies and attack signatures as well as superior learning mode . A leading DB protection solution. Has a significant market share
Comsec (Dis.), Netcom, Bynet, Taldor, NewAge, 012 Smile
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
14
Application Security –Israeli Players and Positioning -1Q09
Your Text here
Information Security -App. Sec
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
15
Network Access Control
Your Text here
Information Security -Network Sec
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
16
NAC Insights
Information Security -Network Sec
NAC has not been “fully digested” by Israeli customers in 2008. There should be more activity in 2009 NAC can be deployed less expensively when it is an embedded feature of an existing vendor and customers take notice of it Your Text here Your Text here Israeli customers first priority: implementing a guest networking control Network Security or Endpoint Security?
NAC is a Layer 2 vs. Layer 3 match Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
17
STKI Israeli Positioning
Information Security -Network Sec
• Not a technological positioning, refers only to Israeli market • Focused on enterprise market (not SMB) • Not an STKI recommendation Local Support
Market Presence (X)
Vendor A Vendor B
Market share - existing and new sales (more emphasis) Mind share (how user organizations rate vendors) Local Support (Y) – is influenced by (X) Experience & technical knowledge, localization, support, number and kind of integrators
Worldwide Leader
Worldwide leaders marked, based on global positioning Vendors to watch: Are only just entering israeli market Vendors to Watch:
Vendor C
so can’t be positioned but should be watched Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
18
NAC
- Israeli Market Positioning 1Q09
Information Security -Network Sec
Vendors to Watch:
HP Procurve
Local Support
Check Point Microsoft Cisco Player
Symantec Juniper
Access Layers
XOR SWAT
Enterasys
Leap
McAfee ForeScout Insightix Nortel
Worldwide Leader
This analysis should be used with its supporting documents
Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
19
Information Security -EPS
Endpoint Security
Your Text here
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
20
Endpoint Security -Threats
Your Text here
Information Security -EPS
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
21
Your Text here
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
Outside
Organization
Endpoint Security -Protection
Information Security -EPS
22
Your Text here
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
Outside
Organization
Endpoint Security -Protection
Information Security -EPS
23
Endpoint Security -Protection
Information Security -EPS
Anti X NAC Your Text here
Your Text here
Manageability
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
Outside
Organization
DLP
24
Local Support
Anti -X Suites - Israeli Market Positioning 1Q09 (Enterprise Leaders Only)
Information Security -EPS
Symantec McAfee Trend Micro
Player Worldwide Leader
Microsoft
This analysis should be used with its supporting documents
Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
25
Data Centric Security
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
Data Centric Security
26
Data Centric Approach
Your Text here
Build a wall – “perimeter security”
Data Centric Security
Your Text here
“Business of Security” – Security is built into the business process
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
27
Data Centric Security Arena
DLP
ERM
Encryption
Database Protection
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
Data Centric Security
28
Data Leak/Loss Prevention
Your Text here
Data Centric Security -DLP
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
29
Data Leak /Loss Prevention
Data Centric Security -DLP
DLP is an overall framework into which different elements fit There are three types of data that may leak: • Data at rest • DataYour in transit Text here
Your Text here
• Data on endpoints
No single DLP focus area is full proof, an optimal solution should cover all three areas DLP is a growing area, and vendors react accordingly Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
30
DLP –Market Status & Players
Data Centric Security -DLP
World Leaders (consolidation in progress…): • • • • •
Symantec (Acquired Vontu, 2007, 350$ M) Websense (Acquired PortAuthority 2007, 90$ M) Reconnex (Acquired by McAfee, July 2008, 46$ M) Tablus (Acquired by RSA, 2007, 40$ M) Your Text here Your Text here Vericept ? Workshare?
Main drivers for DLP are: • Regulations such as Payment Card Industry (PCI), Accountability Act (HIPAA) • e-mail security, instant messaging (IM) and endpoint monitoring solutions Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
31
DLP –Market Status
Data Centric Security -DLP
DLP Deployments Status -Israel 1Q09
Solution Deployed 20% Your Text here
“Not There" Yet 60%
Text here PlanYour to Deploy Soon 20%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
32
DLP - Israeli Market Positioning 1Q09
Data Centric Security -DLP
Vendors to Watch:
ProofPoint Workshare
Local Support
IBM (ISS) Player Worldwide Leader
Websense
Fast Movement
McAfee Verdasys Symantec RSA
This analysis should be used with its supporting documents
Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
33
ERM
(Enterprise Rights Management)
Data Centric Security -ERM
Enterprise Rights Management (ERM) technology—also known as Enterprise DRM or Information Rights Management (IRM) What is it? • ERMYour entails content Text hereencrypting files that contain Your Text hereand only allowing those users or devices that have proper credentials to decrypt the files and access the content
Awareness of ERM has increased ERM has been growing steadily since it became a technology category unto itself about five years ago Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
34
Applications and File Formats Used in ERM Implementations
Your Text here
Data Centric Security -ERM
Your Text here
Source: Gilbane Group
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
35
Data Centric Security -DLP
ERM –How Does it Work? SQL Server
Active Directory
1. New user is authorized to use RMS 2. The User defines set of rules and content usage rights for the data he wants to share – He is the data owner 3. User distributes data to relevant recipients Your Text here 4. When recipient tries to open a file –a request is sent to the RMS Server in order to authorize/deny access
RMS Server
Your Text here 4
1
2
Data owner
3
5
5. RMS enforces rules made by the data owner
Recipient
Source: Microsoft Israel
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
36
ERM -Israeli Market Players
Data Centric Security -ERM
Microsoft -Rights Management Services EMC- EMC Documentum IRM Product Suite Oracle - Oracle Information Rights Management Adobe –Adobe LifeCycle Rights Management Your Text here IsraeliYour SU:Text here Secure Islands -A provider of an advanced information protection and control (IPC) solution Covertix –Develops innovative software technology to track, monitor and control documents and files within and outside the organization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
37
Data Centric Security -DB Protections
DB Protection –Market Status
DB Protection Deployments Status -Israel 1Q09
Leading Israeli Players: •Sentrigo •Imperva •Oracle DB Vault •GuardiumYour Text here DB encryption: Ged-i (Israeli SU): offers high-level encryption to Storage Data
Plan to Deploy Soon 30%
“Not There" Yet 49% Solution Your Text here Deployed 20%
Other\Do Not Know 1%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
38
Masking of Production Data
Your Text here
Data Centric Security -Data Masking
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
39
Masking of Production Data
Data Centric Security -Data Masking
What is it?
• The process of data masking is designed to “de-identify” data, such that the data remains based on real information, but no longer has any practical usage or application
What is the need?
• The drive to outsource and offshore application development and Your testing work means that organizations will little control Text here Yourhave Text here over who gets to see their data • Test environments are not physically as secure as production systems
What can go wrong?
• Sensitive data might be downloaded to laptops and stolen • Employees might misuse sensitive information and engage in fraudulent activity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
40
Masking of Production Data
Your Text here
Data Centric Security -Data Masking
Your Text here
Source: Securosis.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
41
SIEM/SOC
Your Text here
SIEM/SOC
Your Text here
42
SIEM/SOC
SIEM/SOC
What is SIEM?
• Security Information & Event Management
What is SOC?
• Security Operation Center
How does it work?
• Collects and analyzes all log data and basic event management Your Text here Your Text here • monitors and manages all aspects of enterprise security in real time, from a single, centralized location • The NOC of security
Why do we need it?
• Need for real-time awareness of internal/ external threats • Ensure business continuity and comply with regulations • A toolset for improving business logic (Security BI) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
43
Silos of Redundant Information Management
Your Text here
SIEM/SOC
Your Text here
Network Intelligence Shahar Maor’s work Copyright 2009 @STKISource: Do not remove source or attribution from any graphic or portion of graphic
44
An Enterprise Platform for Compliance and Security
Your Text here
SIEM/SOC
Your Text here
SIEM
Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
45
SIEM/SOC
- Israeli Market Positioning 1Q09
SIEM/SOC
Vendors to Watch:
IBM -MSS
Local Support
TriGeo
Player
ArcSight
Worldwide Leader
EMC Symantec
Fast Movement
CA IBM Cisco NetIQ
This analysis should be used with its supporting documents
Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
46
Next Generation SIEM/SOC: MSS
SIEM/SOC -MSS
What does MSS offer? -Comprehensive solution for security management: • Firewall/EP Management Service • Intrusion Detection & Prevention Management Service • Vulnerability Management Service Your Text here
Why should we go there?
Your Text here
• Cost effective! • Use of best-of-breed security
Why shouldn’t we? • Who owns my data? • No one else in Israel goes there…yet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
47
MSS Trends in Israel
SIEM/SOC -MSS
STKI observation: MSS is well accepted in SMB organizations, but Israeli CISOs in enterprises still strongly oppose this trend
TheYour current Text here economic downturn should Yourencourage Text here some enterprises to reconsider MSS MSS providers addresses the management (CFOs and CEOs) in order to attract new clients
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
48
Delivery
MSS –World Leaders
SIEM/SOC -MSS
Opportunities in Israel for: •Current world leaders (IBM, Symantec) • local ISPs •Network integrators •Traditional OS players
Market Penetration
(Source: Frost and Sullivan)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
49
Identity & Access Management (IDM/IAM)
Your Text here
IDM/IAM
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
50
IDM Global Mega Trends
IDM/IAM
Fraud and identity theft will increase strong
authentication use
Strong authentication and SSO will strengthen their ties Context-based into Your Text hereauthorization will put risk analysis Your Text here
access control decisions
Physical and logical security will continue to converge Federation will slowly grow
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
51
Trends in the Israeli Market
IDM/IAM
Nov 2008: CA acquired Eurekify to enhance its role-based management suite ERP based SOD solutions start to be seen, mainly for GRC reasons: • 2006: SAP acquired Virsa, enterprise risk management software Your Textto here Yourskills Text here provider, bolster SAP’s software compliance • 2008: Oracle acquired Logical Apps, an automated GRC controls, for enterprise applications
Israeli new GRC enforcement Start-Ups: • Xpandion -Risk management and behavioral analyzing software solutions • SPATIQ –provides an automated tool for Entitlement Management Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
52
IAM/IDM - Israeli Market Positioning 1Q09
IDM/IAM
Vendors to Watch:
Local Support
SPATIQ
Player
IBM Novell
Sun (OS)
CA
Worldwide Leader Prominent WAM Player
BMC Microsoft Oracle Velo (OS)
This analysis should be used with its supporting documents
Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
53
Key Success Factors for Future IDM Project
IDM/IAM
Consider IDM also as a business project, rather than a pure IT project Make sure the project bridges the gap between business and IT Text here Text here StartYour small for easier success (SingleYour Sign On, a vertical project) Choose a step-by-step approach, rather than a mastodon implementation. Focus on basic functionalities not on the additional features Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
54
Security Consultants -Israeli Market Positioning 1Q09 (Leaders)
Your Text here
Information Security -Market Players
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
55
Security Integrators -Israeli Market Positioning 1Q09 (Leaders)
Your Text here
Information Security -Market Players
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
56
Security Distributors -Israeli Market Positioning 1Q09 (Leaders)
Your Text here
Information Security -Market Players
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
57
Agenda 1
Information Security
2
Communication Networking
3
Your Text here
Green IT
Information Security
Networking Your Text here Green IT
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
58
Networking
Networking
Networking market size (Ms of $) Your Text here
LAN equipment WAN equipment VoIP equipment Totals
Your Text here
2008
2009
2010
80.0
-25.00%
60.0
8.33%
65.0
50.0
-20.00%
40.0
12.50%
45.0
40.0
-20.00%
32.0
25.00%
40.0
170.0
-22.35%
132.0
13.64%
150.0
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
59
Networking Future Trends
Networking Trends
Datacenter Networking virtualization Next Generation Networking Internet Protocol (IP) Core and High Speed Broadband Green Networking Your Text here IPv6 Your Text here Network Operating systems Network intelligence and policy control Network Security Communication billing
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
60
Technologies Categorization 2009
Networking Trends
Business Value Investment to make money SAAS/ Cloud
Cut costs, Increase productivity
Optimization
Billing
Your Text here
Commodity IT Services
IT Project
UC
Infra.
VOIP Network Security
NGN Your Text here Networking Vir.
IPv6
Business Project Size of figure = complexity/ cost of project
Investment for regulations Using
Implementing
Looking
Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
61
Networking Trends
Year of savings and productivity
What networking technologies are you investing-in to enhance employee productivity and collaboration in 2009? (Answer all that apply) 2009
2008 52% 46%
Your Text here
1% NA
9%11%
36% 31%
29% 19% 13% NA
55%
32% Your Text here
23%
8%
Shahar Maor’s work Copyright 2009Source: @STKI Do not remove Sachs source or attribution from any graphic or portion of graphic Goldman Research
62
STKI Madad 2008-9 Market Players 8%
Optimization 2% UC 8%
Nortel 10%
VOIP and IPTel 20% Network Infra Your Text here 20%
Your Text here
Network Costs Reduction 10%
Networking Trends
Trends 10%
Miscellaneous 12%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
63
Local Area Network Trends
Networking -LAN
Security embedded features in the LAN infra are imperative Network Virtualization is already here LAN vendors should support standard-based platforms Your Text here
Israeli Trends: •
Your Text here
Corporate LAN to endpoints is stable: 100 MBIT Ethernet; Backbone LAN: 2 X 1GBIT (10GBIT in some cases)
•
Israeli enterprise tend to “count on” either Cisco or Nortel for their backbone network. Other players appear on the network edges
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
64
LAN
- Israeli Market Positioning 1Q09
Networking -LAN
Vendors to Watch:
Local Support
Foundry
Cisco Nortel
Player Worldwide Leader
Enterasys HP Juniper Alcatel Extreme
3COM
This analysis should be used with its supporting documents
Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
65
Networking -Nortel
The Nortel Crisis From 90K to 30K employees
Your Text here Nortel Reports Financial Results for Q3 2008
Feb 08: Nortel says it will cut 2,100 jobs
Nortel announces 1,300 layoffs
Nortel says several executives to leave in 2009
More and more layoffs…
Nortel files Your Text here
for bankruptcy protection
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
66
The Nortel Crisis –What’s next?
Networking -Nortel
Nortel files for Chapter 11 to “deal decisively” with its historic debt burdens Nov 10’th 2008: A Nortel spokesman said the company had enough liquidity to sustain 12 to 18 months of operation under the current conditions Your Text here Your Text here Survival still possible for Nortel, but Companies that exit the bankruptcy process often emerge in smaller form and are frequently acquired in part or whole by larger suitors looking for a good deal 19.2.09: Radware has purchased Nortel’s Alteon… Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
67
The Nortel Crisis –Israeli Market ”What if” Analysis
Cisco
Acquiring parts of Nortel?
HP Juniper
Your Text here
Networking -Nortel
Alliance with Avaya and Microsoft
Acquire Nortel’s Telephony?
Your Text here Gores
Alcatel
3COM
•Enterasys (LAN and sec.) •Siemens (Telephony)
Goes deeper into the Israeli market?
Goes deeper into the Israeli market?
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
68
WAN Optimization
Networking -WAN
WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN:
VOIP Deployments
Data Center Consolidation Your Text here
Your Text here
2007 2008
Server Virtualization
BCP/DRP
0%
10% 20% 30% 40% 50% 60% 70% 80% Source: Aberdeen Research
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
69
Local Support
WAN Optimization - Israeli Market Positioning 1Q09
Expand
Networking -WAN
Player
Riverbed F5
Worldwide Leader
Cisco Blue Coat Radware Juniper
Citrix Packeteer* This analysis should be used with its supporting documents
Market Presence
*June 2008: A Blue Coat company
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
70
Voice Over IP (VOIP)
Networking -VOIP
STKI observation: Many enterprises are migrating, or planning to migrate, their telephony infrastructure from traditional circuit-switched technology to newer Internet Protocol (IP)-based systems Your Text here
Your Text here
Motivations to actually migrate: •
End of life/end of support for current telephony infrastructure
•
Moving to a new office/office improvements
Motivations to wait: •
“Phones are working”
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
71
VOIP (Enterprise & Call Centers) - Israeli Market Positioning 1Q09
Networking -VOIP
Vendors to Watch:
Asterisk
Local Support
Cisco
Player
Nortel Worldwide Leader
Avaya*
Tadiran 3COM Alcatel-Lucent
This analysis should be used with its supporting documents
Market Presence
*Most CC in the market are Avaya
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
72
Video Over IP
Networking –Video OIP
By 2011, 60% of Internet traffic is expected to be video traffic (Cisco) Global organizations use it as a vital working tool – especially order to cut travelling costs Your Text here Your Textin here Video technology is considered by many local organizations as mostly “nice to have” Local organizations use this technology mainly for training/marketing purposes Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
73
Networking –Video OIP
Video Over IP Map
Your Text here
Your Text here
Source: http://www.video-over-ip.com/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
74
Unified Communications (UC)
Networking –UC
Why do we need this? Integration: Of any or all communications, collaborative, and business applications Presence: guides users to the most appropriate means of communications Mobility: extends applications and integration of Your Text here Your Text here applications every way you go Productivity: improves business processes Why now?
Key drivers today are: Workforce virtualization, Cost reduction, Increasingly available tools, Business improvement opportunities Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
75
Networking –UC
UC Challenges
The problem: business justification for collaboration technologies comes down to “soft dollars”: • Productivity Your Text here • Better teamwork • Better customer service
Your Text here
How do you define “better”? What is its business value to the company?
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
76
Networking –UC
UC Preferred Choice
56%
Cisco 41%
Microsoft 22%
Avaya 10%
Nortel Your Text here 5% Alcatel-Lucent 3% 3Com
Your Text here
2%
Nokia-Siemens Newer Vendors
4%
Others
4% 9%
Unsure 0%
10%
20%
30%
40%
Source: Goldman Sachs Research
50%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
60% 77
Networking Integrators - Israeli Market Positioning 1Q09 (Leaders)
Your Text here
Networking
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
78
Agenda 1
Information Security
2
Communication Networking
3
Your Text here
Green IT
Information Security
Networking Your Text here Green IT
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
79
Green IT
Small, incremental changes compounded many times can mean big savings for Your Text here large-scale organizations
Your Text here
80
So, How Can I Be More Green? PC management
Your Text here
Intelligent archiving
Go digital! & Printing consolidation
Virtualized server and storage environments
Green IT Trends
Secure mobile access to networks, applications, and data
State of the art power and cooling (all around)
Teleconferencing
Asset management
Working environment (car pool, working from home…)
Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
81
STKI Madad 2008-9 (Not Including Printing) PC Energy Management 9%
Miscellaneous 12%
Market Players Your Text here 15%
Green IT Trends
Trends 38% Your Text here
DC Facilities 20% Asset Management 6% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
82
How Dense is Your Data Center?
Green Data Center Trends
What is your average rack power demand (per rack)? 6%
10%
23% 30%
0 kW to 3 kW 4 kW to 6 kW 7 kW to 9 kW
Your Text here
Your Text here10 kW to 11 kW
31%
12 kW or More
Data Center Environment –Israeli Market (Ms of $)
2008 30.0
2009 33.33%
40.0
2010 25.00%
Source: STKI, Information Week
50.0
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
83
Electricity Use Trends
Your Text here
Green Data Center Trends
Your Text here
36
Source: ASHRAE
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
84
Data Center Metrics
Green Data Center Trends
Power Usage Effectiveness (PUE):
and its reciprocal, the DCiE is defined as:
PUE = Total Facility Power ÷ IT Equipment Power
DCiE = 1÷ PUE = (IT Equipment Power ÷ Total Facility Power) x 100%
Your Text here
Your Text here
Source: The Green Grid, EPA
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
85
Virtualization Calculations
Green Data Center Virtualization
Assumptions (partial list): Average Server Utilization: %5 Number of peak hours:12 Cost per KwH: 11 cents Average growth rate per year: 15% Yourservers Text here Your Text here Virtualization: • level of utilization of servers after virtualization: 50%-70% • Calculations are based on a maximum of two virtual machines per core
Cooling: 1 watt of power for the server to 1.25 watts of power for cooling Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
86
Green Data Center -
Virtualization Calculations
Virtualization
Infrastructure Prior to Virtualization
Year 1
Year 2
Year 3
Year 4
Year 5
Total Number of Servers:
540
641
714
821
944
Power Used for Servers: 1,037,500 1,193,125 (Watts) Your Text here
1,372,094 1,577,908
1,814,594
Your Text here
Server Electric Cost ($) Per Year:
$1,000,420 $1,150,483 $1,323,055 $1,521,514 $1,749,740
Total Cooling Electric Cost ($) Per Year:
$1,250,525 $1,438,103 $1,653,819 $1,901,892 $2,187,176
Total Power & Cooling Cost ($) Per Year:
$2,250,944 $2,588,586 $2,976,875 $3,423,406 $3,936,916
Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
87
Virtualization Calculations
Green Data Center Virtualization
Infrastructure After Virtualization
Year 1
Year 2
Year 3
Year 4
Year 5
Total Workloads:
4,170
4,796
5,515
6,342
7,293
Physical Systems Needed:
136
156
179
206
237
Power Used for Servers 68,000 (Peak Watts):
78,200
89,700
102,925
118,450
Your here 45,560 Power Used forText Servers (Off-Peak watts):
52,394
60,099
Your Text here 68,960 79,361
Server Electric Cost ($) $65,570 Per Year (Peak):
$75,405
$86,716
$99,723
$114,682
Server Electric Cost ($) $43,932 Per Year (Off-Peak):
$50,521
$58,100
$66,815
$76,837
Total Cooling Electric Cost ($) Per Year:
$136,877
$157,408
$181,019
$208,172
$239,398
Total Power & Cooling Cost ($) Per Year:
$246,378
$283,335
$325,835
$374,710
$430,917 88
Green Data Center -
Virtualization Calculations -ROI Year 1 50% Utilization 60% Utilization 70% Utilization
Year 2
6,074,378$ -1,619,909$ Your Text here
1,911,717$ -2,367,498$ 564,773$
-2,609,364$
Year 3
-677,406$
Year 4
Year 5
Virtualization
Total ("-" means Savings")
405,174$ 1,688,365$ Your Text here
5,870,602$
-2,129,390$ -1,822,708$ -1,524,026$
-5,931,905$
-2,583,076$ -2,557,558$ -2,541,227$
-9,726,452$
Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
89
VDI (Virtual Desktop Infrastructure) –Energy, Management and Security Efficiency
Green IT Virtualization
Assumptions (Partial list): • Number of desktop devices under consideration: 500 • Desired virtualization software engine: VMware ESX • Average annual Sun VDS server administration costs per thinYour client: 846.10 NIS Text here Your Text here • FTEs desktop helpdesk support staff: 1.25 • FTEs desktop security management: 0.5 • Number of Desktop security incidents: 2 • Project Implementation Plan (months from kickoff to deployment): 2
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
90
VDI (Virtual Desktop Infrastructure) –Energy, Management and Security Efficiency TCO Comparison Cumulative 3 Year
Green IT Virtualization
Solution A: Traditional Desktop Devices
Solution B: Sun Virtual Desktop Solution
Difference (A - B)
Difference (A - B)%
Desktop Device Costs
3,259,204 NIS
670,834 NIS
2,588,370 NIS
79.4%
Desktop Software Costs
782,627 NIS
461,522 NIS
321,104 NIS
41.0%
Server Infrastructure Costs
296,448 NIS
1,248,949 NIS
(952,501 NIS)
-321.3%
Desktop Management Labor Costs
5,724,578 NIS
2,137,760 NIS
3,586,818 NIS
62.7%
Desktop Power YourCosts Text here Total IT Costs
314,788 NIS 10,377,645 NIS
135,494 NIS 4,654,559 NIS
Desktop User Productivity Impact
4,473,911 NIS
0 NIS
4,473,911 NIS
100.0%
Business Risks
538,416 NIS
26,919 NIS
511,496 NIS
95.0%
Total Business Operating Costs 5,012,327 NIS
26,919 NIS
4,985,408 NIS 99.5%
Total
4,681,479 NIS
IT Costs
179,294 NIS 57.0% Your Text here 5,723,085 NIS 55.1%
Business Operating Costs
15,389,972 NIS
Source: www.alinean.com
10,708,493 NIS 69.6%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
91
VDI (Virtual Desktop Infrastructure) –Energy, Management and Security Efficiency
Green IT Virtualization
ROI Analysis (Solution B) (Probable Case)
Initial
Year 1
Year 2
Benefits (to Solution B from Current (AS IS)) Cumulative Benefits Investment (Solution B) here Your Text Cumulative Investment Cash Flow Cumulative Cash Flow ROI
0 NIS
3,115,969 NIS
3,505,821 NIS 3,681,630 NIS
3,115,969 NIS 312,617 NIS 1,916,913 NIS 2,803,351 NIS 1,199,055 NIS
6,621,790 NIS 10,303,420 NIS 170,099 237,175 NIS Your NIS Text here 2,087,012 NIS 2,324,187 NIS 3,335,722 NIS 3,444,456 NIS 4,534,777 NIS 7,979,233 NIS
Risk Adjusted ROI NPV Savings IRR
288% 6,361,354 NIS 177%
1,604,296 NIS 1,604,296 NIS (1,604,296 NIS) (1,604,296 NIS) 343%
Source: www.alinean.com
Year 3
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
92
PC -Energy Efficiency and Power Consumption
Green IT PC
Why don’t you always shut down your PC when you have finished working for the day? (multiple responses allowed):
1 סידרה
It's IT policy or procedure to leave it on My computer goes to hibernate, or to sleep mode It takes too long Your Text here
Your Text here
It's a habit
I don't think it's important It's a hassle I forget 0%
10%
20%
30%
40%
50%
Source: E1, PC Energy Report Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
93
PC Costs Calculations 300*20 Senario
300*20 Senario & Vista
Green IT PC
300*9 Senario
8
Annual Cost (Million ₪ )
7 6 5 4 3
Your Text here
Your Text here
2 1 0
Number of Computers Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
94
PC -Energy Efficiency and Power Consumption: An Example
Your Text here
Green IT PC
Your Text here
Source: www.g-patrol.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
95
PC -Energy Efficiency and Power Consumption: Israeli Market
Green IT PC
STKI observation: Some Israeli organizations, which address the issue of energy efficiency of PCs, use homemade script based solutions Text here IsraeliYour Players:
• • • •
Your Text here
Microsoft Symantec BigFix Gpatrol –Israeli SU Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
96
Green IT Printing
Printing
STOP PRINTING Your Text here
Your Text here
P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
97
Green IT Printing
Israeli Output Statistics Average A4s usage per year per employ: 2,000
4,607
10,000
Average color coverage per page: 1%
11%
Your Text here
Average cost per printed page: 0.045 NIS
71% Your Text here
0.24 NIS
1 NIS
Average percentage of jobs of more than one page: 47%
75% Source: Prime² (STKI’s modifications )
91%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
98
STKI Madad 2008-9
Green IT Printing
Miscellaneous Distribution Tools 11% Printing 17% Consolidation 20% Monitoring and Cost Reduction 43% Your Text here
Outsourcing 9%
Your Text here
Printing Projects –Israeli Market Size (Ms of $)
2008
10.0
2009
50.00%
15.0
2010
66.67%
25.0
P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
99
Printing Consolidation
Green IT Printing
In today’s world, printing has become a significant expenditure item for almost every organization A typical large financial organization in Israel spend dozens of millions of Shekels annually on office printing Israeli Office Printing Market has changed great deal Your Text here Your Text here since 2007: • Users start seeing the great potential in reorganizing their printing environment • The economic crisis pushes many to look for ways to cut costs • Printing consolidation projects usually have a fast, measurable ROI
P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
100
Printing Consolidation -Ratios
Green IT Printing
One of the ways to check the maturity of an organization printing environment is to check its printers/users ratio: Organization Type
“Heavy Printers”
Followers
Consolidated
High-Tech
Printers/Users Ratio
1:1
1:5 – 1:15
1:15 – 1:30
1:30+
Your Text here
Your Text here
“Heavy Printers” –Consist of financial organizations, government agencies, law firms est. “High-Tech” –Truly paperless entities (start ups, agile high tech companies est.)
P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
101
Addressing Printing Consolidation Projects
Your Text here
Green IT Printing
Your Text here
P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
102
Printing Consolidation –Bottom Line
Your Text here
Green IT Printing
Your Text here
P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
103
Printing Consolidation –Bottom Line
Your Text here
Green IT Printing
Your Text here
P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
104
Printing Consolidation –Bottom Line
Your Text here
Green IT Printing
Your Text here
P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
105
Printing Consolidation –Bottom Line
Your Text here
Green IT Printing
Your Text here
P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
106
Printing Consolidation –Bottom Line
Your Text here
Green IT Printing
Your Text here
P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
107
Printing Consolidation –Bottom Line
Your Text here
Green IT Printing
Your Text here
P Please think of the environment before printing this presentation Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic
108
Your Text here
Your Text here
Shahar Geiger Maor VP & Senior Analyst
[email protected]
109