Sie sind auf Seite 1von 109

Your Text here Your Text here

Shahar Geiger Maor


VP & Senior Analyst
shahar@stki.info

Visit My Blog: http://shaharmaor.blogspot.com/

1
Agenda
Information
1 Information Security Security

2 Communication
Networking Networking

Your Text here Your Text here


3 Green IT Green IT

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
Information Security
Information
Security

GRC and Security market size (Ms of $)

Your Text here 2008 2009 Your Text here 2010


Governance & Risk Management
(also BCP) 35.0 42% 50.0 50% 75.0
Security (projects) 95.0 -10.53% 85.0 11.76% 95.0
Security (Software) 90.0 -5.56% 85.0 -5.88% 80.0
Total 220 0% 220 14% 250

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
Information

Security/Privacy In the News Security


-Trends

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
Information

Security Trends Security


-Trends

Cloud
Outsourcing cyber crime Virtualization
computing

Sensitive or
Inability to properly
confidential
identify and
Your Text here information may Your Text here
authenticate users
not be properly
End-user’s to multiple systems
protected
organization is
External threat of
unable to control
organized cyber
the data
criminal syndicates
management
environment Unauthorized
Third parties might
parties might be
be able to access
able to access
private files without
private files without
authorization
authorization

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
Information

Security Trends Security


-Trends

Data breaches
involving Peer-to-peer file Web 2.0 and
Mobility
personal sharing mesh-ups
information
Unsupervised
Use of P2P monitoring of
Your Text here Sensitive or might result in Your Text here
confidential the loss of employees’ use
Inability to
information that sensitive or of Web 2.0
properly
ends up in the confidential applications can
identify and
hands of cyber business result in the loss
authenticate
of critical
remote users criminals and information confidential
identity thieves including trade
secrets business data
on the Internet

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
Information
Technologies Categorization 2009 Security
-Trends

Business Value
Investment
to make money Remote
Access
Cut costs, Increase Manage Sec.
productivity IAM/IDM Services IT Project
Business
SSO Cloud Project
App.
Your Text here Anti Your Text here
Sec. DLP
Commodity IT X Mobile
Size of figure =
EPS SIEM/SOC Sec.
complexity/
Services cost of project

DB
Vir.
Network NAC
Sec. Sec.
Security
Investment
for regulations
GRC
Using Implementing Looking
Market Maturity
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
Information

STKI Madad 2008-2009


Security
-Trends

Network DLP Hardening


Market Players
5% 4% 3%
5%
Access
GRC 18%
5%
Miscellaneous EPS/Anti x
6% Your Text here Your Text14%
here

NAC DB Protection WAF & Apps


6% 7% 11%
Management Trends
8% 8%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
Information

Sophisticated Threat Environment Security


-Trends

First-Stage Second-Stage
Writers Middle Men End Value
Abusers Abusers

Hacker or Fame
Tool Writers
Direct Attack
Compromised
Host and
Application Theft
Malware Machine Extortionist
Writers Harvesting DDoS for Hire
Botnet Creation Espionage
Worms
Your Text Information
here Your Text here
Spammer
Harvesting Botnet Extortion
Management
Viruses Internal Theft Phisher
Abuse of Commercial
Privilege Personal Sales
Trojans Information Pharmer/DNS
Poisoning Fraudulent
Sales
Information
Spyware Brokerage Identity Theft
Click Fraud
Electronic IP
Leakage Financial Fraud
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
Source: Cisco Israel
Information

Application Security Security


-App. Sec

STKI observation: Secure development should be an


integral part of any new project and therefore should be
calculated within the project’s budget. STKI survey shows
that spendings on secure development scale from 0% of
total project budget (Main-Frame based projects) up to
10% ( core web applications projects) of total project
budget.
Your Text here Your Text here
Average spending on secure development is 5% of total
project budget (including: training, code review and
penetration tests)

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
Information

Web Applications - Vulnerabilities Security


-App. Sec

Probability to detect vulnerabilities of


different risk degree (results of 32,717 sites
and 69,476 vulnerabilities of different
degrees of severity)
Your Text here Your Text here

% Sites (All) % Sites (Scanned) % Sites (Black & Whitebox)

Source: http://www.webappsec.org/projects/statistics/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
Information

Web Applications -Vulnerabilities Security


-App. Sec

Vulnerability frequency by types:


1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to
system design errors
2. Information Leakage and Predictable Resource Location are often connected with
improper system administration (for example, weak access control)

Your Text here Your Text here

Source: http://www.webappsec.org/projects/statistics/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
Information
Web Application Firewall Security
-App. Sec
–Israeli Market Players

Applicure - dotDefender (Apache and IIS) Cisco* - ACE XML Gateway

Barracuda - Web Application Firewall IBM* –Data Power


(fromerly NetContinuum)
Your Text here Your Text here
Breach Security - WebDefend Microsoft –IAG WAF

Citrix - Application Firewall (Formerly Protegrity - Defiance


Teros)

*Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
Information
Web Application Firewall Security
-App. Sec
–Leading Players -1Q09

Solution What Should I Know? Representatives/


Integrators
F5 - Application Security One of the best WAFs around. Features a good Trek-IT (Dis.),
Manager (ASM) policy toolset for adaptive learning. Offer strong Artnet,
integration to the TMOS family of products. Taldor, Spider,
Superb load balancing capabilities. One of two Bezeq Int., One
Your Text here leading solutions in Israel. Strong market Your Text here
NewAge, Netcom
presence
Imperva – SecureSphere The first in the Israeli market. Imperva has an Comsec (Dis.),
array of out-of-the-box policies and attack Netcom, Bynet,
signatures as well as superior learning mode . A Taldor, NewAge,
leading DB protection solution. Has a significant 012 Smile
market share

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
Application Security Information
Security
-App. Sec
–Israeli Players and Positioning -1Q09

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
Information

Network Access Control Security


-Network Sec

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
Information

NAC Insights Security


-Network Sec

NAC has not been “fully digested” by Israeli customers in


2008. There should be more activity in 2009
NAC can be deployed less expensively when it is an
embedded feature of an existing vendor and customers
take notice of it
Your Text here Your Text here
Israeli customers first priority: implementing a guest
networking control
Network Security or Endpoint Security?

NAC is a Layer 2 vs. Layer 3 match


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
Information

STKI Israeli Positioning


Security
-Network Sec

• Not a technological positioning, refers only to Israeli market


• Focused on enterprise market (not SMB)
Vendor A
• Not an STKI recommendation
 Market Presence (X) Vendor B
Local Support

 Market share - existing and new sales (more emphasis)


 Mind share (how user organizations rate vendors)
 Local Support (Y) – is influenced by (X) Worldwide
Leader
 Experience & technical knowledge, localization,
support, number and kind of integrators
 Worldwide leaders marked, based on global positioning
 Vendors to watch: Are only just entering israeli market
Vendors to Watch:
so can’t be positioned but should be watched
Vendor C
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
NAC Information
Security
-Network Sec
- Israeli Market Positioning 1Q09

Vendors to Watch:
HP Procurve
Check Point

Microsoft
Local Support

Cisco
Player
Symantec
Worldwide
Juniper XOR SWAT
Access Layers Leader
Enterasys Leap
McAfee
ForeScout
Insightix
Nortel
This analysis should be used with its
supporting documents

Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
Information

Endpoint Security Security


-EPS

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
Information

Endpoint Security -Threats Security


-EPS

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
Information

Endpoint Security -Protection Security


-EPS
Organization

Outside
Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
Information

Endpoint Security -Protection Security


-EPS
Organization

Outside
Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
Information

Endpoint Security -Protection Security


-EPS

Anti X
DLP
Organization

NAC

Outside
Your Text here Your Text here

Manageability

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
Anti -X Suites Information
Security
- Israeli Market Positioning 1Q09 (Enterprise Leaders Only) -EPS

Symantec
Local Support

McAfee
Trend Micro Player

Worldwide
Leader

Microsoft

This analysis should be used with its


supporting documents

Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
Data Centric Security Data Centric
Security

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
Data Centric
Data Centric Approach Security

Your Text here Your Text here

Build a wall – “perimeter “Business of Security” – Security


security” is built into the business process

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
Data Centric

Data Centric Security Arena Security

DLP ERM

Database
Encryption
Protection

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
Data Centric

Data Leak/Loss Prevention Security


-DLP

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
Data Centric

Data Leak /Loss Prevention Security


-DLP

 DLP is an overall framework into which different elements fit

 There are three types of data that may leak:


• Data at rest

• DataYour
in transit
Text here Your Text here

• Data on endpoints

 No single DLP focus area is full proof, an optimal solution


should cover all three areas

 DLP is a growing area, and vendors react accordingly

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
Data Centric

DLP –Market Status & Players Security


-DLP

World Leaders (consolidation in progress…):


• Symantec (Acquired Vontu, 2007, 350$ M)
• Websense (Acquired PortAuthority 2007, 90$ M)
• Reconnex (Acquired by McAfee, July 2008, 46$ M)
• Tablus (Acquired
Your Text here by RSA, 2007, 40$ M) Your Text here
• Vericept ? Workshare?
Main drivers for DLP are:
• Regulations such as Payment Card Industry (PCI),
Accountability Act (HIPAA)
• e-mail security, instant messaging (IM) and
endpoint monitoring solutions
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
Data Centric

DLP –Market Status Security


-DLP

DLP Deployments Status -Israel 1Q09

Solution Deployed
20%
Your Text here
PlanYour Text here
to Deploy
“Not There" Yet Soon
60% 20%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
Data Centric
DLP - Israeli Market Positioning 1Q09 Security
-DLP

Vendors to Watch:
ProofPoint
Workshare
IBM (ISS)
Local Support

Player

Worldwide
Leader
Websense
Fast
Movement

McAfee
Verdasys
Symantec
This analysis should be used with its
supporting documents
RSA

Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
Data Centric

ERM
Security
(Enterprise Rights Management) -ERM

Enterprise Rights Management (ERM) technology—also


known as Enterprise DRM or Information Rights
Management (IRM)
What is it?
• ERMYour
entails
Text hereencrypting files that contain Your
content
Text hereand only
allowing those users or devices that have proper
credentials to decrypt the files and access the content

Awareness of ERM has increased


ERM has been growing steadily since it became a
technology category unto itself about five years ago
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 34
Applications and File Formats Data Centric
Security

Used in ERM Implementations -ERM

Your Text here Your Text here

Source: Gilbane Group


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
Data Centric

ERM –How Does it Work?


Security
-DLP

SQL Server
Active Directory 1. New user is authorized to use RMS

2. The User defines set of rules and content


usage rights for the data he wants to
share – He is the data owner
RMS Server 3. User distributes data to relevant recipients
Your Text here Your Text here
4. When recipient tries to open a file –a
1 4 request is sent to the RMS Server in
order to authorize/deny access

5. RMS enforces rules made by the data


2 3 5 owner

Data owner Recipient

Source: Microsoft Israel


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
Data Centric

ERM -Israeli Market Players Security


-ERM

Microsoft -Rights Management Services


EMC- EMC Documentum IRM Product Suite
Oracle - Oracle Information Rights Management
Adobe –Adobe LifeCycle Rights Management
SU:Text here
IsraeliYour Your Text here

Secure Islands -A provider of an advanced information


protection and control (IPC) solution
Covertix –Develops innovative software technology to
track, monitor and control documents and files within
and outside the organization

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
Data Centric
Security
DB Protection –Market Status -DB
Protections

DB Protection Deployments Status -Israel 1Q09

Leading Israeli Players: “Not There"


•Sentrigo Yet
49%
•Imperva Plan to
•Oracle DB Vault Deploy Soon
•GuardiumYour Text here 30% Solution Your Text here
Deployed
20%
DB encryption: Other\Do Not
Ged-i (Israeli SU): offers Know
1%
high-level encryption to
Storage Data

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
Data Centric
Security
Masking of Production Data -Data
Masking

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
Data Centric
Security
Masking of Production Data -Data
Masking

 What is it?
• The process of data masking is designed to “de-identify” data,
such that the data remains based on real information, but no
longer has any practical usage or application
 What is the need?
• The drive to outsource and offshore application development
and Your
testing work means that organizations will
Text here Yourhave little control
Text here
over who gets to see their data
• Test environments are not physically as secure as production
systems
 What can go wrong?
• Sensitive data might be downloaded to laptops and stolen
• Employees might misuse sensitive information and engage in
fraudulent activity

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
Data Centric
Security
Masking of Production Data -Data
Masking

Your Text here Your Text here

Source: Securosis.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
SIEM/SOC SIEM/SOC

Your Text here Your Text here

42
SIEM/SOC SIEM/SOC

 What is SIEM?
• Security Information & Event Management
 What is SOC?
• Security Operation Center
 How does it work?
• Collects and analyzes all log data and basic event management
Your Text here Your Text here
• monitors and manages all aspects of enterprise security in real
time, from a single, centralized location
• The NOC of security
 Why do we need it?
• Need for real-time awareness of internal/ external threats
• Ensure business continuity and comply with regulations
• A toolset for improving business logic (Security BI)

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 43
Silos of Redundant Information SIEM/SOC

Management

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKISource: Network


Do not remove Intelligence
source or attribution from any graphic or portion of graphic 44
An Enterprise Platform for Compliance SIEM/SOC

and Security

Your Text here Your Text here


SIEM

Source: Network Intelligence


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
SIEM/SOC SIEM/SOC

- Israeli Market Positioning 1Q09


Vendors to Watch:
IBM -MSS
TriGeo
Local Support

ArcSight Player

Worldwide
Leader
EMC
Fast
Symantec
Movement

CA
IBM
Cisco
This analysis should be used with its
NetIQ supporting documents

Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
Next Generation SIEM/SOC: MSS
SIEM/SOC
-MSS

What does MSS offer?


-Comprehensive solution for security management:
• Firewall/EP Management Service
• Intrusion Detection & Prevention Management Service
• Vulnerability Management Service
Your Text here Your Text here
Why should we go there?
• Cost effective!
• Use of best-of-breed security
Why shouldn’t we?
• Who owns my data?
• No one else in Israel goes there…yet

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
SIEM/SOC
MSS Trends in Israel -MSS

STKI observation: MSS is well accepted in SMB


organizations, but Israeli CISOs in enterprises still
strongly oppose this trend

current
TheYour Text here economic downturn should
Yourencourage
Text here
some enterprises to reconsider MSS
MSS providers addresses the management (CFOs and
CEOs) in order to attract new clients

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
SIEM/SOC
MSS –World Leaders -MSS

Delivery

Opportunities in Israel for:


•Current world leaders (IBM, Symantec)
• local ISPs
•Network integrators
•Traditional OS players

Market Penetration

(Source: Frost and Sullivan)


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
Identity & Access Management (IDM/IAM)
IDM/IAM

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
IDM Global Mega Trends IDM/IAM

 Fraud and identity theft will increase strong


authentication use

 Strong authentication and SSO will strengthen their ties

 Context-based
Your Text hereauthorization will put risk analysis into
Your Text here
access control decisions

 Physical and logical security will continue to converge

 Federation will slowly grow

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
Trends in the Israeli Market IDM/IAM

 Nov 2008: CA acquired Eurekify to enhance its role-based


management suite
 ERP based SOD solutions start to be seen, mainly for GRC
reasons:
• 2006: SAP acquired Virsa, enterprise risk management software
Your Textto
provider, here Yourskills
bolster SAP’s software compliance Text here

• 2008: Oracle acquired Logical Apps, an automated GRC controls,


for enterprise applications
 Israeli new GRC enforcement Start-Ups:
• Xpandion -Risk management and behavioral analyzing software
solutions
• SPATIQ –provides an automated tool for Entitlement Management

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
IAM/IDM IDM/IAM

- Israeli Market Positioning 1Q09

Vendors to Watch:

SPATIQ
Local Support

IBM Player
Novell Sun (OS)
Worldwide
Leader
CA Prominent
WAM Player
BMC
Microsoft
Oracle
Velo (OS) This analysis should be used with its
supporting documents

Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
IDM/IAM
Key Success Factors for Future IDM Project

Consider IDM also as a business project, rather


than a pure IT project
Make sure the project bridges the gap between
business and IT
 StartYour
small for easier success (SingleYour
Text here
Sign On, a
Text here

vertical project)
 Choose a step-by-step approach, rather than a
mastodon implementation.
Focus on basic functionalities not on the
additional features
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
Information
Security Consultants Security
-Market
-Israeli Market Positioning 1Q09 (Leaders) Players

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
Information
Security Integrators Security
-Market
-Israeli Market Positioning 1Q09 (Leaders) Players

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
Information
Security Distributors Security
-Market
-Israeli Market Positioning 1Q09 (Leaders) Players

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
Agenda
Information
1 Information Security Security

2 Communication
Networking Networking

Your Text here Your Text here


3 Green IT Green IT

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
Networking Networking

Networking market size (Ms of $)


Your Text here Your Text here
2008 2009 2010
LAN
equipment 80.0 -25.00% 60.0 8.33% 65.0
WAN
equipment 50.0 -20.00% 40.0 12.50% 45.0
VoIP
equipment 40.0 -20.00% 32.0 25.00% 40.0
Totals 170.0 -22.35% 132.0 13.64% 150.0

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
Networking
Networking Future Trends Trends

Datacenter Networking virtualization


Next Generation Networking Internet Protocol (IP) Core
and High Speed Broadband
Green Networking
IPv6 Your Text here Your Text here

Network Operating systems


Network intelligence and policy control
Network Security
Communication billing

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
Technologies Categorization 2009 Networking
Trends

Business Value
Investment
to make money
SAAS/
Cut costs, Increase Cloud
IT Project
productivity Optimization
UC
Business
Project
Billing NGN
Your Text here Your Text here
Commodity IT VOIP Networking IPv6 Size of figure =
Infra. Vir. complexity/
Services Network cost of project

Security
Investment
for regulations

Using Implementing Looking


Market Maturity
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
Networking
Year of savings and productivity Trends

What networking technologies are you investing-in to enhance employee


productivity and collaboration in 2009? (Answer all that apply)
2009 2008

52% 55%
46%
36%
29% 31% 32%
Your Text here Your Text here 23%
19%
13%
9%11% 8%
1% NA NA

Shahar Maor’s work Copyright 2009Source: Goldman


@STKI Do not remove Sachs Research
source or attribution from any graphic or portion of graphic 62
Networking
STKI Madad 2008-9 Trends

Optimization
Market Players 2%
8% UC
8% VOIP and IPTel
20%
Nortel
10%
Network Infra
Your Text here Your
20%Text here

Trends Miscellaneous
Network Costs 10% 12%
Reduction
10%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
Local Area Network Trends
Networking
-LAN

 Security embedded features in the LAN infra are


imperative
 Network Virtualization is already here
 LAN vendors should support standard-based platforms
Your Text here Your Text here
 Israeli Trends:
• Corporate LAN to endpoints is stable: 100 MBIT Ethernet;
Backbone LAN: 2 X 1GBIT (10GBIT in some cases)
• Israeli enterprise tend to “count on” either Cisco or Nortel for their
backbone network. Other players appear on the network edges

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
LAN Networking
-LAN
- Israeli Market Positioning 1Q09

Vendors to Watch:

Foundry
Local Support

Cisco
Nortel Player

Worldwide
Leader

Enterasys 3COM
HP
Juniper

This analysis should be used with its


Alcatel supporting documents
Extreme
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
Networking
The Nortel Crisis -Nortel

From 90K to
Feb 08:
30K
Nortel says Nortel
employees
it will cut announces
2,100 jobs More and
1,300
more layoffs…
layoffs

Nortel says
several Nortel files
Your Text here
Nortel executives
Your Text here
for bankruptcy
Reports to leave in protection
Financial 2009
Results for
Q3 2008

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
The Nortel Crisis –What’s next?
Networking
-Nortel

Nortel files for Chapter 11 to “deal decisively” with its


historic debt burdens
Nov 10’th 2008: A Nortel spokesman said the company
had enough liquidity to sustain 12 to 18 months of
operation under the current conditions Your Text here
Your Text here
Survival still possible for Nortel, but Companies that exit
the bankruptcy process often emerge in smaller form and
are frequently acquired in part or whole by larger suitors
looking for a good deal
19.2.09: Radware has purchased Nortel’s Alteon…

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
The Nortel Crisis Networking

–Israeli Market ”What if” Analysis -Nortel

Acquiring parts of Nortel?


Cisco HP Alliance with Avaya
and Microsoft

Juniper Acquire Nortel’s


Telephony?
Your Text here Your Text here

•Enterasys (LAN and sec.)


Gores
•Siemens (Telephony)

Goes deeper into the


Alcatel
Israeli market?

Goes deeper into the


3COM Israeli market?
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
Networking

WAN Optimization -WAN

WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN:

VOIP Deployments

Data Center Consolidation


Your Text here Your Text here
2007
2008
Server Virtualization

BCP/DRP

0% 10% 20% 30% 40% 50% 60% 70% 80%

Source: Aberdeen Research


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
WAN Optimization Networking
-WAN
- Israeli Market Positioning 1Q09
Local Support

Expand Player
Riverbed
F5 Worldwide
Leader
Cisco

Blue Coat
Citrix
Radware Packeteer*
Juniper This analysis should be used with its
supporting documents

Market Presence *June 2008: A Blue Coat company


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
Networking
Voice Over IP (VOIP) -VOIP

STKI observation: Many enterprises are migrating, or


planning to migrate, their telephony infrastructure from
traditional circuit-switched technology to newer Internet
Protocol (IP)-based systems
Your Text here Your Text here

 Motivations to actually migrate:


• End of life/end of support for current telephony infrastructure
• Moving to a new office/office improvements
 Motivations to wait:
• “Phones are working”

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 71
VOIP (Enterprise & Call Centers) Networking
-VOIP
- Israeli Market Positioning 1Q09

Vendors to Watch:
Asterisk

Cisco
Local Support

Player
Nortel
Worldwide
Avaya* Leader

Tadiran

3COM
This analysis should be used with its
Alcatel-Lucent supporting documents

Market Presence *Most CC in the market are Avaya


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 72
Networking
Video Over IP –Video OIP

 By 2011, 60% of Internet traffic is expected to be video


traffic (Cisco)
 Global organizations use it as a vital working tool –
especially
Your Textin order to cut travelling costs Your Text here
here

 Video technology is considered by many local organizations as


mostly “nice to have”
 Local organizations use this technology mainly for
training/marketing purposes

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
Networking
Video Over IP Map –Video OIP

Your Text here Your Text here

Source: http://www.video-over-ip.com/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
Networking
Unified Communications (UC) –UC

Why do we need this?


Integration: Of any or all communications, collaborative,
and business applications
Presence: guides users to the most appropriate means of
communications
Mobility: extends
Your Text here applications and integration of
Your Text here
applications every way you go
Productivity: improves business processes
Why now?
Key drivers today are: Workforce virtualization,
Cost reduction, Increasingly available tools,
Business improvement opportunities

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
Networking
UC Challenges –UC

The problem:
business justification for collaboration technologies comes
down to “soft dollars”:
• Productivity
• Better teamwork
Your Text here Your Text here

• Better customer service

How do you define “better”?


What is its business value to the company?

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
Networking
UC Preferred Choice –UC

Cisco 56%
Microsoft 41%
Avaya 22%
Nortel 10%
Your Text here 5%
Alcatel-Lucent Your Text here

3Com 3%
Nokia-Siemens 2%
Newer Vendors 4%
Others 4%
Unsure 9%

0% 10% 20% 30% 40% 50% 60%

Source: Goldman Sachs Research


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
Networking Integrators Networking

- Israeli Market Positioning 1Q09 (Leaders)

Your Text here Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
Agenda
Information
1 Information Security Security

2 Communication
Networking Networking

Your Text here Your Text here


3 Green IT Green IT

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
Green IT

Small, incremental changes


compounded many times can
mean big savings for
large-scale organizations
Your Text here Your Text here

80
Green IT
So, How Can I Be More Green? Trends

Secure mobile
Virtualized server
access to networks,
PC management and storage
applications, and
environments
data

Your Text here State of the art Your Text here


Intelligent archiving power and cooling Teleconferencing
(all around)

Working
Go digital! &
environment (car
Printing Asset management
pool, working from
consolidation
home…)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
STKI Madad 2008-9 Green IT
Trends
(Not Including Printing)

PC Energy
Management
9% Miscellaneous
12% Trends
38%

Market Players
Your Text
15%here Your Text here

DC Facilities
20%

Asset
Management
6%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 82
Green Data
How Dense is Your Data Center? Center -
Trends

What is your average rack power demand (per rack)?


6% 10%
23%
30% 0 kW to 3 kW
4 kW to 6 kW
7 kW to 9 kW
Your Text here Your Text here10 kW to 11 kW
31%
12 kW or More

Data Center Environment –Israeli Market (Ms of $)

2008 2009 2010


30.0 33.33% 40.0 25.00% 50.0
Source: STKI, Information Week
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 83
Green Data
Electricity Use Trends Center -
Trends

Your Text here Your Text here

36

Source: ASHRAE
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 84
Green Data
Data Center Metrics Center -
Trends

Power Usage Effectiveness and its reciprocal, the DCiE is


(PUE): defined as:
PUE = Total Facility DCiE = 1÷ PUE = (IT
Power ÷ IT Equipment Equipment Power ÷ Total
Power Facility Power) x 100%
Your Text here Your Text here

Source: The Green Grid, EPA


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 85
Green Data

Virtualization Calculations Center -


Virtualization

Assumptions (partial list):


Average Server Utilization: %5
Number of peak hours:12
Cost per KwH: 11 cents
Yourservers
Average Text here growth rate per year: 15%
Your Text here
Virtualization:
• level of utilization of servers after virtualization: 50%-70%
• Calculations are based on a maximum of two virtual
machines per core
Cooling: 1 watt of power for the server to 1.25 watts of
power for cooling
86
Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
Green Data

Virtualization Calculations Center -


Virtualization

Infrastructure Prior to Year 1 Year 2 Year 3 Year 4 Year 5


Virtualization
Total Number of 540 641 714 821 944
Servers:
Power Used for Servers: 1,037,500 1,193,125 1,372,094 1,577,908 1,814,594
(Watts)
Your Text here Your Text here
Server Electric Cost ($) $1,000,420 $1,150,483 $1,323,055 $1,521,514 $1,749,740
Per Year:
Total Cooling Electric $1,250,525 $1,438,103 $1,653,819 $1,901,892 $2,187,176
Cost ($) Per Year:

Total Power & Cooling $2,250,944 $2,588,586 $2,976,875 $3,423,406 $3,936,916


Cost ($) Per Year:

87
Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
Green Data

Virtualization Calculations Center -


Virtualization

Infrastructure After Year 1 Year 2 Year 3 Year 4 Year 5


Virtualization
Total Workloads: 4,170 4,796 5,515 6,342 7,293
Physical Systems 136 156 179 206 237
Needed:
Power Used for Servers 68,000 78,200 89,700 102,925 118,450
(Peak Watts):
Power UsedYour
forText here 45,560
Servers 52,394 60,099 Your Text here
68,960 79,361
(Off-Peak watts):
Server Electric Cost ($) $65,570 $75,405 $86,716 $99,723 $114,682
Per Year (Peak):
Server Electric Cost ($) $43,932 $50,521 $58,100 $66,815 $76,837
Per Year (Off-Peak):
Total Cooling Electric $136,877 $157,408 $181,019 $208,172 $239,398
Cost ($) Per Year:
Total Power & Cooling $246,378 $283,335 $325,835 $374,710 $430,917
Cost ($) Per Year: 88
Green Data

Virtualization Calculations -ROI Center -


Virtualization

Year 1 Year 2 Year 3 Year 4 Year 5 Total ("-" means


Savings")
50%
Utilization
6,074,378$ -1,619,909$ -677,406$ 405,174$ 1,688,365$ 5,870,602$
60%
Utilization Your Text here Your Text here
1,911,717$ -2,367,498$ -2,129,390$ -1,822,708$ -1,524,026$ -5,931,905$
70%
Utilization
564,773$ -2,609,364$ -2,583,076$ -2,557,558$ -2,541,227$ -9,726,452$

89
Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
VDI (Virtual Desktop Infrastructure) –Energy, Green IT -
Virtualization
Management and Security Efficiency

Assumptions (Partial list):


• Number of desktop devices under consideration: 500
• Desired virtualization software engine: VMware ESX
• Average annual Sun VDS server administration costs per
thinYour
client: 846.10 NIS
Text here Your Text here
• FTEs desktop helpdesk support staff: 1.25
• FTEs desktop security management: 0.5
• Number of Desktop security incidents: 2
• Project Implementation Plan (months from kickoff to
deployment): 2

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 90
VDI (Virtual Desktop Infrastructure) –Energy, Green IT -
Virtualization
Management and Security Efficiency
TCO Comparison Solution A: Solution B: Sun Difference Difference
Cumulative 3 Year Traditional Virtual Desktop (A - B) (A - B)%
Desktop Devices Solution
IT Costs
Desktop Device Costs 3,259,204 NIS 670,834 NIS 2,588,370 NIS 79.4%
Desktop Software Costs 782,627 NIS 461,522 NIS 321,104 NIS 41.0%
Server Infrastructure Costs 296,448 NIS 1,248,949 NIS (952,501 NIS) -321.3%
Desktop Management Labor Costs 5,724,578 NIS 2,137,760 NIS 3,586,818 NIS 62.7%
Desktop PowerYourCosts
Text here 314,788 NIS 135,494 NIS 179,294
Your NIS 57.0%
Text here
Total IT Costs 10,377,645 NIS 4,654,559 NIS 5,723,085 NIS 55.1%

Business Operating Costs


Desktop User Productivity Impact 4,473,911 NIS 0 NIS 4,473,911 NIS 100.0%

Business Risks 538,416 NIS 26,919 NIS 511,496 NIS 95.0%


Total Business Operating Costs 5,012,327 NIS 26,919 NIS 4,985,408 NIS 99.5%

Total 15,389,972 NIS 4,681,479 NIS 10,708,493 NIS 69.6%

Source: www.alinean.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 91
VDI (Virtual Desktop Infrastructure) –Energy, Green IT -
Virtualization
Management and Security Efficiency

ROI Analysis Initial Year 1 Year 2 Year 3


(Solution B)
(Probable Case)
Benefits (to Solution B from 0 NIS 3,115,969 NIS 3,505,821 NIS 3,681,630 NIS
Current (AS IS))
Cumulative Benefits 3,115,969 NIS 6,621,790 NIS 10,303,420 NIS
Investment (Solution B) here
Your Text 1,604,296 NIS 312,617 NIS 170,099
Your NIS 237,175 NIS
Text here
Cumulative Investment 1,604,296 NIS 1,916,913 NIS 2,087,012 NIS 2,324,187 NIS
Cash Flow (1,604,296 NIS) 2,803,351 NIS 3,335,722 NIS 3,444,456 NIS
Cumulative Cash Flow (1,604,296 NIS) 1,199,055 NIS 4,534,777 NIS 7,979,233 NIS
ROI 343%
Risk Adjusted ROI 288%
NPV Savings 6,361,354 NIS
IRR 177%

Source: www.alinean.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
PC -Energy Efficiency and Power Green IT -
PC
Consumption
Why don’t you always shut down your PC when you have finished working for
the day? (multiple responses allowed):
1 ‫סידרה‬

It's IT policy or procedure to leave it on


My computer goes to hibernate, or to sleep mode
It takes too long
Your Text here Your Text here
It's a habit
I don't think it's important
It's a hassle
I forget

0% 10% 20% 30% 40% 50%


Source: E1, PC Energy Report
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 93
Green IT -
PC Costs Calculations PC

300*20 Senario 300*20 Senario & Vista 300*9 Senario

8
7
6
Annual Cost (Million ₪ )

5
4
Your Text here Your Text here
3
2
1
0

Number of Computers

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 94
PC -Energy Efficiency and Power Green IT -
PC
Consumption: An Example

Your Text here Your Text here

Source: www.g-patrol.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 95
PC -Energy Efficiency and Power Green IT -
PC
Consumption: Israeli Market
STKI observation: Some Israeli
organizations, which address the issue of
energy efficiency of PCs, use homemade
script based solutions

Players:
IsraeliYour Text here Your Text here

• Microsoft
• Symantec
• BigFix
• Gpatrol –Israeli SU
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 96
Green IT -
Printing Printing

STOP PRINTING
Your Text here Your Text here

P Please think of the environment before printing this presentation


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 97
Green IT -
Israeli Output Statistics Printing

Average A4s usage per year per employ:


2,000 4,607 10,000

Average color coverage per page:


1% 11% 71%
Your Text here Your Text here
Average cost per printed page:
0.045 NIS 0.24 NIS 1 NIS
Average percentage of jobs of more than one page:

47% 75% 91%

Source: Prime² (STKI’s modifications )


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 98
STKI Madad 2008-9 Green IT -
Printing

Miscellaneous
11% Distribution Tools
Printing
17%
Consolidation
20%
Monitoring and
Outsourcing Cost Reduction
9% 43%
Your Text here Your Text here

Printing Projects –Israeli Market Size (Ms of $)

2008 2009 2010

10.0 50.00% 15.0 66.67% 25.0

P Please think of the environment before printing this presentation


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 99
Green IT -
Printing Consolidation Printing

In today’s world, printing has become a significant


expenditure item for almost every organization
A typical large financial organization in Israel spend
dozens of millions of Shekels annually on office printing
Israeli Office Printing Market has changed great deal
since 2007:
Your Text here Your Text here

• Users start seeing the great potential in reorganizing their


printing environment
• The economic crisis pushes many to look for ways to cut
costs
• Printing consolidation projects usually have a fast,
measurable ROI

P Please think of the environment before printing this presentation


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 100
Green IT -
Printing Consolidation -Ratios Printing

One of the ways to check the maturity of an organization


printing environment is to check its printers/users ratio:
Organization “Heavy Followers Consolidated High-Tech
Type Printers”
Printers/Users 1:1 1:5 – 1:15 1:15 – 1:30 1:30+
Ratio
Your Text here Your Text here

“Heavy Printers” –Consist of financial organizations,


government agencies, law firms est.
“High-Tech” –Truly paperless entities (start ups, agile high
tech companies est.)

P Please think of the environment before printing this presentation


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 101
Green IT -
Addressing Printing Consolidation Projects Printing

Your Text here Your Text here

P Please think of the environment before printing this presentation


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 102
Green IT -
Printing Consolidation –Bottom Line Printing

Your Text here Your Text here

P Please think of the environment before printing this presentation


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 103
Green IT -
Printing Consolidation –Bottom Line Printing

Your Text here Your Text here

P Please think of the environment before printing this presentation


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 104
Green IT -
Printing Consolidation –Bottom Line Printing

Your Text here Your Text here

P Please think of the environment before printing this presentation


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 105
Green IT -
Printing Consolidation –Bottom Line Printing

Your Text here Your Text here

P Please think of the environment before printing this presentation


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 106
Green IT -
Printing Consolidation –Bottom Line Printing

Your Text here Your Text here

P Please think of the environment before printing this presentation


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 107
Green IT -
Printing Consolidation –Bottom Line Printing

Your Text here Your Text here

P Please think of the environment before printing this presentation


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 108
Your Text here Your Text here

Shahar Geiger Maor


VP & Senior Analyst
shahar@stki.info

109

Das könnte Ihnen auch gefallen