Beruflich Dokumente
Kultur Dokumente
1
Agenda
Information
1 Information Security Security
2 Communication
Networking Networking
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
Information Security
Information
Security
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
Information
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
Information
Cloud
Outsourcing cyber crime Virtualization
computing
Sensitive or
Inability to properly
confidential
identify and
Your Text here information may Your Text here
authenticate users
not be properly
End-user’s to multiple systems
protected
organization is
External threat of
unable to control
organized cyber
the data
criminal syndicates
management
environment Unauthorized
Third parties might
parties might be
be able to access
able to access
private files without
private files without
authorization
authorization
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
Information
Data breaches
involving Peer-to-peer file Web 2.0 and
Mobility
personal sharing mesh-ups
information
Unsupervised
Use of P2P monitoring of
Your Text here Sensitive or might result in Your Text here
confidential the loss of employees’ use
Inability to
information that sensitive or of Web 2.0
properly
ends up in the confidential applications can
identify and
hands of cyber business result in the loss
authenticate
of critical
remote users criminals and information confidential
identity thieves including trade
secrets business data
on the Internet
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
Information
Technologies Categorization 2009 Security
-Trends
Business Value
Investment
to make money Remote
Access
Cut costs, Increase Manage Sec.
productivity IAM/IDM Services IT Project
Business
SSO Cloud Project
App.
Your Text here Anti Your Text here
Sec. DLP
Commodity IT X Mobile
Size of figure =
EPS SIEM/SOC Sec.
complexity/
Services cost of project
DB
Vir.
Network NAC
Sec. Sec.
Security
Investment
for regulations
GRC
Using Implementing Looking
Market Maturity
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
Information
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
Information
First-Stage Second-Stage
Writers Middle Men End Value
Abusers Abusers
Hacker or Fame
Tool Writers
Direct Attack
Compromised
Host and
Application Theft
Malware Machine Extortionist
Writers Harvesting DDoS for Hire
Botnet Creation Espionage
Worms
Your Text Information
here Your Text here
Spammer
Harvesting Botnet Extortion
Management
Viruses Internal Theft Phisher
Abuse of Commercial
Privilege Personal Sales
Trojans Information Pharmer/DNS
Poisoning Fraudulent
Sales
Information
Spyware Brokerage Identity Theft
Click Fraud
Electronic IP
Leakage Financial Fraud
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
Source: Cisco Israel
Information
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
Information
Source: http://www.webappsec.org/projects/statistics/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
Information
Source: http://www.webappsec.org/projects/statistics/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
Information
Web Application Firewall Security
-App. Sec
–Israeli Market Players
*Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
Information
Web Application Firewall Security
-App. Sec
–Leading Players -1Q09
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
Application Security Information
Security
-App. Sec
–Israeli Players and Positioning -1Q09
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
Information
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
Information
Vendors to Watch:
HP Procurve
Check Point
Microsoft
Local Support
Cisco
Player
Symantec
Worldwide
Juniper XOR SWAT
Access Layers Leader
Enterasys Leap
McAfee
ForeScout
Insightix
Nortel
This analysis should be used with its
supporting documents
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
Information
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
Information
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
Information
Outside
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
Information
Outside
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
Information
Anti X
DLP
Organization
NAC
Outside
Your Text here Your Text here
Manageability
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
Anti -X Suites Information
Security
- Israeli Market Positioning 1Q09 (Enterprise Leaders Only) -EPS
Symantec
Local Support
McAfee
Trend Micro Player
Worldwide
Leader
Microsoft
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
Data Centric Security Data Centric
Security
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
Data Centric
Data Centric Approach Security
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
Data Centric
DLP ERM
Database
Encryption
Protection
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
Data Centric
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
Data Centric
• DataYour
in transit
Text here Your Text here
• Data on endpoints
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
Data Centric
Solution Deployed
20%
Your Text here
PlanYour Text here
to Deploy
“Not There" Yet Soon
60% 20%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
Data Centric
DLP - Israeli Market Positioning 1Q09 Security
-DLP
Vendors to Watch:
ProofPoint
Workshare
IBM (ISS)
Local Support
Player
Worldwide
Leader
Websense
Fast
Movement
McAfee
Verdasys
Symantec
This analysis should be used with its
supporting documents
RSA
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
Data Centric
ERM
Security
(Enterprise Rights Management) -ERM
SQL Server
Active Directory 1. New user is authorized to use RMS
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
Data Centric
Security
DB Protection –Market Status -DB
Protections
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
Data Centric
Security
Masking of Production Data -Data
Masking
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
Data Centric
Security
Masking of Production Data -Data
Masking
What is it?
• The process of data masking is designed to “de-identify” data,
such that the data remains based on real information, but no
longer has any practical usage or application
What is the need?
• The drive to outsource and offshore application development
and Your
testing work means that organizations will
Text here Yourhave little control
Text here
over who gets to see their data
• Test environments are not physically as secure as production
systems
What can go wrong?
• Sensitive data might be downloaded to laptops and stolen
• Employees might misuse sensitive information and engage in
fraudulent activity
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
Data Centric
Security
Masking of Production Data -Data
Masking
Source: Securosis.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
SIEM/SOC SIEM/SOC
42
SIEM/SOC SIEM/SOC
What is SIEM?
• Security Information & Event Management
What is SOC?
• Security Operation Center
How does it work?
• Collects and analyzes all log data and basic event management
Your Text here Your Text here
• monitors and manages all aspects of enterprise security in real
time, from a single, centralized location
• The NOC of security
Why do we need it?
• Need for real-time awareness of internal/ external threats
• Ensure business continuity and comply with regulations
• A toolset for improving business logic (Security BI)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 43
Silos of Redundant Information SIEM/SOC
Management
and Security
ArcSight Player
Worldwide
Leader
EMC
Fast
Symantec
Movement
CA
IBM
Cisco
This analysis should be used with its
NetIQ supporting documents
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
Next Generation SIEM/SOC: MSS
SIEM/SOC
-MSS
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
SIEM/SOC
MSS Trends in Israel -MSS
current
TheYour Text here economic downturn should
Yourencourage
Text here
some enterprises to reconsider MSS
MSS providers addresses the management (CFOs and
CEOs) in order to attract new clients
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
SIEM/SOC
MSS –World Leaders -MSS
Delivery
Market Penetration
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
IDM Global Mega Trends IDM/IAM
Context-based
Your Text hereauthorization will put risk analysis into
Your Text here
access control decisions
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
Trends in the Israeli Market IDM/IAM
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
IAM/IDM IDM/IAM
Vendors to Watch:
SPATIQ
Local Support
IBM Player
Novell Sun (OS)
Worldwide
Leader
CA Prominent
WAM Player
BMC
Microsoft
Oracle
Velo (OS) This analysis should be used with its
supporting documents
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
IDM/IAM
Key Success Factors for Future IDM Project
vertical project)
Choose a step-by-step approach, rather than a
mastodon implementation.
Focus on basic functionalities not on the
additional features
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
Information
Security Consultants Security
-Market
-Israeli Market Positioning 1Q09 (Leaders) Players
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
Information
Security Integrators Security
-Market
-Israeli Market Positioning 1Q09 (Leaders) Players
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
Information
Security Distributors Security
-Market
-Israeli Market Positioning 1Q09 (Leaders) Players
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
Agenda
Information
1 Information Security Security
2 Communication
Networking Networking
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
Networking Networking
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
Networking
Networking Future Trends Trends
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
Technologies Categorization 2009 Networking
Trends
Business Value
Investment
to make money
SAAS/
Cut costs, Increase Cloud
IT Project
productivity Optimization
UC
Business
Project
Billing NGN
Your Text here Your Text here
Commodity IT VOIP Networking IPv6 Size of figure =
Infra. Vir. complexity/
Services Network cost of project
Security
Investment
for regulations
52% 55%
46%
36%
29% 31% 32%
Your Text here Your Text here 23%
19%
13%
9%11% 8%
1% NA NA
Optimization
Market Players 2%
8% UC
8% VOIP and IPTel
20%
Nortel
10%
Network Infra
Your Text here Your
20%Text here
Trends Miscellaneous
Network Costs 10% 12%
Reduction
10%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
Local Area Network Trends
Networking
-LAN
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
LAN Networking
-LAN
- Israeli Market Positioning 1Q09
Vendors to Watch:
Foundry
Local Support
Cisco
Nortel Player
Worldwide
Leader
Enterasys 3COM
HP
Juniper
From 90K to
Feb 08:
30K
Nortel says Nortel
employees
it will cut announces
2,100 jobs More and
1,300
more layoffs…
layoffs
Nortel says
several Nortel files
Your Text here
Nortel executives
Your Text here
for bankruptcy
Reports to leave in protection
Financial 2009
Results for
Q3 2008
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
The Nortel Crisis –What’s next?
Networking
-Nortel
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
The Nortel Crisis Networking
WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN:
VOIP Deployments
BCP/DRP
Expand Player
Riverbed
F5 Worldwide
Leader
Cisco
Blue Coat
Citrix
Radware Packeteer*
Juniper This analysis should be used with its
supporting documents
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 71
VOIP (Enterprise & Call Centers) Networking
-VOIP
- Israeli Market Positioning 1Q09
Vendors to Watch:
Asterisk
Cisco
Local Support
Player
Nortel
Worldwide
Avaya* Leader
Tadiran
3COM
This analysis should be used with its
Alcatel-Lucent supporting documents
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
Networking
Video Over IP Map –Video OIP
Source: http://www.video-over-ip.com/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
Networking
Unified Communications (UC) –UC
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
Networking
UC Challenges –UC
The problem:
business justification for collaboration technologies comes
down to “soft dollars”:
• Productivity
• Better teamwork
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
Networking
UC Preferred Choice –UC
Cisco 56%
Microsoft 41%
Avaya 22%
Nortel 10%
Your Text here 5%
Alcatel-Lucent Your Text here
3Com 3%
Nokia-Siemens 2%
Newer Vendors 4%
Others 4%
Unsure 9%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
Agenda
Information
1 Information Security Security
2 Communication
Networking Networking
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
Green IT
80
Green IT
So, How Can I Be More Green? Trends
Secure mobile
Virtualized server
access to networks,
PC management and storage
applications, and
environments
data
Working
Go digital! &
environment (car
Printing Asset management
pool, working from
consolidation
home…)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
STKI Madad 2008-9 Green IT
Trends
(Not Including Printing)
PC Energy
Management
9% Miscellaneous
12% Trends
38%
Market Players
Your Text
15%here Your Text here
DC Facilities
20%
Asset
Management
6%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 82
Green Data
How Dense is Your Data Center? Center -
Trends
36
Source: ASHRAE
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 84
Green Data
Data Center Metrics Center -
Trends
87
Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
Green Data
89
Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
VDI (Virtual Desktop Infrastructure) –Energy, Green IT -
Virtualization
Management and Security Efficiency
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 90
VDI (Virtual Desktop Infrastructure) –Energy, Green IT -
Virtualization
Management and Security Efficiency
TCO Comparison Solution A: Solution B: Sun Difference Difference
Cumulative 3 Year Traditional Virtual Desktop (A - B) (A - B)%
Desktop Devices Solution
IT Costs
Desktop Device Costs 3,259,204 NIS 670,834 NIS 2,588,370 NIS 79.4%
Desktop Software Costs 782,627 NIS 461,522 NIS 321,104 NIS 41.0%
Server Infrastructure Costs 296,448 NIS 1,248,949 NIS (952,501 NIS) -321.3%
Desktop Management Labor Costs 5,724,578 NIS 2,137,760 NIS 3,586,818 NIS 62.7%
Desktop PowerYourCosts
Text here 314,788 NIS 135,494 NIS 179,294
Your NIS 57.0%
Text here
Total IT Costs 10,377,645 NIS 4,654,559 NIS 5,723,085 NIS 55.1%
Source: www.alinean.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 91
VDI (Virtual Desktop Infrastructure) –Energy, Green IT -
Virtualization
Management and Security Efficiency
Source: www.alinean.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
PC -Energy Efficiency and Power Green IT -
PC
Consumption
Why don’t you always shut down your PC when you have finished working for
the day? (multiple responses allowed):
1 סידרה
8
7
6
Annual Cost (Million ₪ )
5
4
Your Text here Your Text here
3
2
1
0
Number of Computers
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 94
PC -Energy Efficiency and Power Green IT -
PC
Consumption: An Example
Source: www.g-patrol.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 95
PC -Energy Efficiency and Power Green IT -
PC
Consumption: Israeli Market
STKI observation: Some Israeli
organizations, which address the issue of
energy efficiency of PCs, use homemade
script based solutions
Players:
IsraeliYour Text here Your Text here
• Microsoft
• Symantec
• BigFix
• Gpatrol –Israeli SU
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 96
Green IT -
Printing Printing
STOP PRINTING
Your Text here Your Text here
Miscellaneous
11% Distribution Tools
Printing
17%
Consolidation
20%
Monitoring and
Outsourcing Cost Reduction
9% 43%
Your Text here Your Text here
109