This document discusses various topics related to information security including network security, endpoint security, application security, data centric security, and data leak/loss prevention. It provides market analysis and positioning for security technologies and vendors. It also outlines threats, trends, and best practices within each area. The document contains graphics, charts, and tables to illustrate market sizes, solutions, and insights.
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
Infrastructure Services Market 2009
1. Your Text here Your Text here
Shahar Geiger Maor
VP & Senior Analyst
shahar@stki.info
Visit My Blog: http://shaharmaor.blogspot.com/
1
2. Agenda
Information
1 Information Security Security
Communication
2 Networking Networking
Your Text here Your Text here
Green IT
3 Green IT
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
3. Information Security
Information
Security
GRC and Security market size (Ms of $)
2008 2009 Your Text here 2010
Your Text here
Governance & Risk Management
35.0 42% 50.0 50% 75.0
(also BCP)
95.0 -10.53% 85.0 11.76% 95.0
Security (projects)
90.0 -5.56% 85.0 -5.88% 80.0
Security (Software)
220 0% 220 14% 250
Total
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
4. Information
Security/Privacy In the News Security
-Trends
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
5. Information
Security Trends Security
-Trends
Cloud
Outsourcing cyber crime Virtualization
computing
Sensitive or
Inability to properly
confidential
identify and
Your Text here Your Text here
information may
authenticate users
not be properly
to multiple systems
End-user’s protected
organization is
External threat of
unable to control
organized cyber
the data
criminal syndicates
management
Unauthorized
environment Third parties might
parties might be
be able to access
able to access
private files without
private files without
authorization
authorization
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
6. Information
Security Trends Security
-Trends
Data breaches
Peer-to-peer file Web 2.0 and
involving
Mobility
personal sharing mesh-ups
information
Unsupervised
Use of P2P monitoring of
Your Text here might result in Your Text here
Sensitive or
employees’ use
confidential the loss of
Inability to
of Web 2.0
information that sensitive or
properly
applications can
ends up in the confidential
identify and
result in the loss
hands of cyber business
authenticate
of critical
remote users criminals and information confidential
including trade
identity thieves
business data
secrets
on the Internet
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
7. Information
Technologies Categorization 2009 Security
-Trends
Business Value
Investment
to make money Remote
Access
Cut costs, Increase Manage Sec.
IAM/IDM Services IT Project
productivity
Business
SSO Cloud Project
App.
Anti
Your Text here Your Text here
Sec. DLP
Commodity IT X Size of figure =
Mobile
EPS SIEM/SOC complexity/
Sec.
Services cost of project
Vir.
DB
Network NAC Sec.
Sec.
Security
Investment
for regulations
GRC
Using Implementing Looking
Market Maturity
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
8. Information
STKI Madad 2008-2009
Security
-Trends
Network DLP Hardening
Market Players
5% 4% 3%
5%
Access
GRC 18%
5%
Miscellaneous EPS/Anti x
6% Your Text here Your Text here
14%
DB Protection
NAC WAF & Apps
7%
6% 11%
Management Trends
8% 8%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
9. Information
Sophisticated Threat Environment Security
-Trends
First-Stage Second-Stage
Writers Middle Men End Value
Abusers Abusers
Hacker or Fame
Tool Writers
Direct Attack
Compromised
Host and
Theft
Application
Malware Machine Extortionist
Writers Harvesting DDoS for Hire
Botnet Creation Espionage
Worms
Your Text Information
here Spammer Text here
Your
Harvesting Botnet Extortion
Management
Viruses Phisher
Internal Theft
Commercial
Abuse of
Sales
Personal
Privilege
Pharmer/DNS
Information
Trojans
Poisoning Fraudulent
Sales
Information
Identity Theft
Spyware Brokerage
Click Fraud
Electronic IP
Leakage Financial Fraud
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
Source: Cisco Israel
10. Information
Application Security Security
-App. Sec
STKI observation: Secure development should be an
integral part of any new project and therefore should be
calculated within the project’s budget. STKI survey shows
that spendings on secure development scale from 0% of
total project budget (Main-Frame based projects) up to
10% ( core web applications projects) of total project
budget. here
Your Text Your Text here
Average spending on secure development is 5% of total
project budget (including: training, code review and
penetration tests)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
11. Information
Web Applications - Vulnerabilities Security
-App. Sec
Probability to detect vulnerabilities of
different risk degree (results of 32,717 sites
and 69,476 vulnerabilities of different
degrees of severity)
Your Text here Your Text here
% Sites (Scanned) % Sites (Black & Whitebox)
% Sites (All)
Source: http://www.webappsec.org/projects/statistics/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
12. Information
Web Applications -Vulnerabilities Security
-App. Sec
Vulnerability frequency by types:
1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to
system design errors
2. Information Leakage and Predictable Resource Location are often connected with
improper system administration (for example, weak access control)
Your Text here Your Text here
Source: http://www.webappsec.org/projects/statistics/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
13. Information
Web Application Firewall Security
-App. Sec
–Israeli Market Players
Applicure - dotDefender (Apache and IIS) Cisco* - ACE XML Gateway
Barracuda - Web Application Firewall IBM* –Data Power
(fromerly NetContinuum)
Your Text here Your Text here
Breach Security - WebDefend Microsoft –IAG WAF
Citrix - Application Firewall (Formerly Protegrity - Defiance
Teros)
*Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
14. Information
Web Application Firewall Security
-App. Sec
–Leading Players -1Q09
Solution What Should I Know? Representatives/
Integrators
F5 - Application Security One of the best WAFs around. Features a good Trek-IT (Dis.),
Manager (ASM) policy toolset for adaptive learning. Offer strong Artnet,
integration to the TMOS family of products. Taldor, Spider,
Superb load balancing capabilities. One of two Bezeq Int., One
Your Text here leading solutions in Israel. Strong market Your Text here
NewAge, Netcom
presence
Imperva – SecureSphere The first in the Israeli market. Imperva has an Comsec (Dis.),
array of out-of-the-box policies and attack Netcom, Bynet,
signatures as well as superior learning mode . A Taldor, NewAge,
leading DB protection solution. Has a significant 012 Smile
market share
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
15. Application Security Information
Security
-App. Sec
–Israeli Players and Positioning -1Q09
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
16. Information
Network Access Control Security
-Network Sec
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
17. Information
NAC Insights Security
-Network Sec
NAC has not been “fully digested” by Israeli customers in
2008. There should be more activity in 2009
NAC can be deployed less expensively when it is an
embedded feature of an existing vendor and customers
take notice here it
of
Your Text Your Text here
Israeli customers first priority: implementing a guest
networking control
Network Security or Endpoint Security?
NAC is a Layer 2 vs. Layer 3 match
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
18. Information
STKI Israeli Positioning
Security
-Network Sec
• Not a technological positioning, refers only to Israeli market
• Focused on enterprise market (not SMB)
Vendor A
• Not an STKI recommendation
Vendor B
Market Presence (X)
Local Support
Market share - existing and new sales (more emphasis)
Mind share (how user organizations rate vendors)
Worldwide
Local Support (Y) – is influenced by (X)
Leader
Experience & technical knowledge, localization,
support, number and kind of integrators
Worldwide leaders marked, based on global positioning
Vendors to watch: Are only just entering israeli market
so can’t be positioned but should be watched
Vendors to Watch:
Vendor C
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
19. NAC Information
Security
-Network Sec
- Israeli Market Positioning 1Q09
Vendors to Watch:
HP Procurve
Check Point
Microsoft
Local Support
Cisco
Player
Symantec
Worldwide
XOR SWAT
Juniper Leader
Access Layers
Enterasys Leap
McAfee
ForeScout
Insightix
Nortel
This analysis should be used with its
supporting documents
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
20. Information
Endpoint Security Security
-EPS
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
21. Information
Endpoint Security -Threats Security
-EPS
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
22. Information
Endpoint Security -Protection Security
-EPS
Organization
Outside
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
23. Information
Endpoint Security -Protection Security
-EPS
Organization
Outside
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
24. Information
Endpoint Security -Protection Security
-EPS
Anti X
DLP
Organization
NAC
Outside
Your Text here Your Text here
Manageability
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
25. Anti -X Suites Information
Security
- Israeli Market Positioning 1Q09 (Enterprise Leaders Only) -EPS
Symantec
Local Support
McAfee
Player
Trend Micro
Worldwide
Leader
Microsoft
This analysis should be used with its
supporting documents
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
26. Data Centric Security Data Centric
Security
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
27. Data Centric
Data Centric Approach Security
Your Text here Your Text here
Build a wall – “perimeter “Business of Security” – Security
security” is built into the business process
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
28. Data Centric
Data Centric Security Arena Security
DLP ERM
Database
Encryption
Protection
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
29. Data Centric
Data Leak/Loss Prevention Security
-DLP
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
30. Data Centric
Data Leak /Loss Prevention Security
-DLP
DLP is an overall framework into which different elements fit
There are three types of data that may leak:
• Data at rest
• DataYourtransit
in Text here Your Text here
• Data on endpoints
No single DLP focus area is full proof, an optimal solution
should cover all three areas
DLP is a growing area, and vendors react accordingly
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
31. Data Centric
DLP –Market Status & Players Security
-DLP
World Leaders (consolidation in progress…):
Symantec (Acquired Vontu, 2007, 350$ M)
•
Websense (Acquired PortAuthority 2007, 90$ M)
•
Reconnex (Acquired by McAfee, July 2008, 46$ M)
•
Tablus Text here
Your (Acquired by RSA, 2007, 40$ M)
• Your Text here
Vericept ? Workshare?
•
Main drivers for DLP are:
• Regulations such as Payment Card Industry (PCI),
Accountability Act (HIPAA)
• e-mail security, instant messaging (IM) and
endpoint monitoring solutions
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
32. Data Centric
DLP –Market Status Security
-DLP
DLP Deployments Status -Israel 1Q09
Solution Deployed
20%
Your Text here
PlanYour Text here
to Deploy
“Not Therequot; Yet Soon
60% 20%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
33. Data Centric
DLP - Israeli Market Positioning 1Q09 Security
-DLP
Vendors to Watch:
ProofPoint
Workshare
IBM (ISS)
Local Support
Player
Worldwide
Leader
Websense
Fast
Movement
McAfee
Verdasys
Symantec
This analysis should be used with its
supporting documents
RSA
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
34. Data Centric
ERM
Security
(Enterprise Rights Management) -ERM
Enterprise Rights Management (ERM) technology—also
known as Enterprise DRM or Information Rights
Management (IRM)
What is it?
• ERMYour Text hereencrypting files that contain Your Text hereand only
entails content
allowing those users or devices that have proper
credentials to decrypt the files and access the content
Awareness of ERM has increased
ERM has been growing steadily since it became a
technology category unto itself about five years ago
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 34
35. Applications and File Formats Data Centric
Security
Used in ERM Implementations -ERM
Your Text here Your Text here
Source: Gilbane Group
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
36. Data Centric
ERM –How Does it Work?
Security
-DLP
SQL Server
1. New user is authorized to use RMS
Active Directory
2. The User defines set of rules and content
usage rights for the data he wants to
share – He is the data owner
3. User distributes data to relevant recipients
RMS Server
Your Text here Your Text here
4. When recipient tries to open a file –a
request is sent to the RMS Server in
4
1
order to authorize/deny access
5. RMS enforces rules made by the data
owner
2 5
3
Data owner Recipient
Source: Microsoft Israel
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
37. Data Centric
ERM -Israeli Market Players Security
-ERM
Microsoft -Rights Management Services
EMC- EMC Documentum IRM Product Suite
Oracle - Oracle Information Rights Management
Adobe –Adobe LifeCycle Rights Management
SU:
IsraeliYour Text here Your Text here
Secure Islands -A provider of an advanced information
protection and control (IPC) solution
Covertix –Develops innovative software technology to
track, monitor and control documents and files within
and outside the organization
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
38. Data Centric
Security
DB Protection –Market Status -DB
Protections
DB Protection Deployments Status -Israel 1Q09
Leading Israeli Players: “Not Therequot;
Yet
•Sentrigo
49%
•Imperva Plan to
•Oracle DB Vault Deploy Soon
30%
•Guardium Text here
Your Solution Your Text here
Deployed
20%
DB encryption: OtherDo Not
Ged-i (Israeli SU): offers Know
1%
high-level encryption to
Storage Data
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
39. Data Centric
Security
Masking of Production Data -Data
Masking
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
40. Data Centric
Security
Masking of Production Data -Data
Masking
What is it?
• The process of data masking is designed to “de-identify” data,
such that the data remains based on real information, but no
longer has any practical usage or application
What is the need?
• The drive to outsource and offshore application development
and Your Text here
testing work means that organizations will have little control
Your Text here
over who gets to see their data
• Test environments are not physically as secure as production
systems
What can go wrong?
• Sensitive data might be downloaded to laptops and stolen
• Employees might misuse sensitive information and engage in
fraudulent activity
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
41. Data Centric
Security
Masking of Production Data -Data
Masking
Your Text here Your Text here
Source: Securosis.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
42. SIEM/SOC SIEM/SOC
Your Text here Your Text here
42
43. SIEM/SOC SIEM/SOC
What is SIEM?
• Security Information & Event Management
What is SOC?
• Security Operation Center
How does it work?
• Collects and analyzes all log data and basic event management
Your Text here Your Text here
• monitors and manages all aspects of enterprise security in real
time, from a single, centralized location
• The NOC of security
Why do we need it?
• Need for real-time awareness of internal/ external threats
• Ensure business continuity and comply with regulations
• A toolset for improving business logic (Security BI)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 43
44. Silos of Redundant Information SIEM/SOC
Management
Your Text here Your Text here
Source: Network Intelligence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 44
45. An Enterprise Platform for Compliance SIEM/SOC
and Security
Your Text here Your Text here
SIEM
Source: Network Intelligence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
46. SIEM/SOC SIEM/SOC
- Israeli Market Positioning 1Q09
Vendors to Watch:
IBM -MSS
TriGeo
Local Support
Player
ArcSight
Worldwide
Leader
EMC
Fast
Symantec
Movement
CA
IBM
Cisco
This analysis should be used with its
NetIQ supporting documents
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
47. Next Generation SIEM/SOC: MSS
SIEM/SOC
-MSS
What does MSS offer?
-Comprehensive solution for security management:
• Firewall/EP Management Service
• Intrusion Detection & Prevention Management Service
• Vulnerability Management Service
Your Text here Your Text here
Why should we go there?
• Cost effective!
• Use of best-of-breed security
Why shouldn’t we?
• Who owns my data?
• No one else in Israel goes there…yet
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
48. SIEM/SOC
MSS Trends in Israel -MSS
STKI observation: MSS is well accepted in SMB
organizations, but Israeli CISOs in enterprises still
strongly oppose this trend
The current economic downturn should encourage
Your Text here Your Text here
some enterprises to reconsider MSS
MSS providers addresses the management (CFOs and
CEOs) in order to attract new clients
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
49. SIEM/SOC
MSS –World Leaders -MSS
Delivery
Opportunities in Israel for:
•Current world leaders (IBM, Symantec)
• local ISPs
•Network integrators
•Traditional OS players
Market Penetration
(Source: Frost and Sullivan)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
50. Identity & Access Management (IDM/IAM)
IDM/IAM
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
51. IDM Global Mega Trends IDM/IAM
Fraud and identity theft will increase strong
authentication use
Strong authentication and SSO will strengthen their ties
Context-based authorization will put risk analysis here
Your Text into
Your Text here
access control decisions
Physical and logical security will continue to converge
Federation will slowly grow
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
52. Trends in the Israeli Market IDM/IAM
Nov 2008: CA acquired Eurekify to enhance its role-based
management suite
ERP based SOD solutions start to be seen, mainly for GRC
reasons:
• 2006: SAP acquired Virsa, enterprise risk management software
Your Text here Your Text here
provider, to bolster SAP’s software compliance skills
• 2008: Oracle acquired Logical Apps, an automated GRC controls,
for enterprise applications
Israeli new GRC enforcement Start-Ups:
• Xpandion -Risk management and behavioral analyzing software
solutions
• SPATIQ –provides an automated tool for Entitlement Management
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
53. IAM/IDM IDM/IAM
- Israeli Market Positioning 1Q09
Vendors to Watch:
SPATIQ
Local Support
Player
IBM
Novell Sun (OS)
Worldwide
Leader
CA Prominent
WAM Player
BMC
Microsoft
Oracle
Velo (OS) This analysis should be used with its
supporting documents
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
54. IDM/IAM
Key Success Factors for Future IDM Project
Consider IDM also as a business project, rather
than a pure IT project
Make sure the project bridges the gap between
business and IT
StartYour Text here easier success (Single Signhere a
small for On,
Your Text
vertical project)
Choose a step-by-step approach, rather than a
mastodon implementation.
Focus on basic functionalities not on the
additional features
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
55. Information
Security Consultants Security
-Market
-Israeli Market Positioning 1Q09 (Leaders) Players
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
56. Information
Security Integrators Security
-Market
-Israeli Market Positioning 1Q09 (Leaders) Players
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
57. Information
Security Distributors Security
-Market
-Israeli Market Positioning 1Q09 (Leaders) Players
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
58. Agenda
Information
1 Information Security Security
Communication
2 Networking Networking
Your Text here Your Text here
Green IT
3 Green IT
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
59. Networking Networking
Networking market size (Ms of $)
Your Text here Your Text here
2008 2009 2010
LAN
80.0 -25.00% 60.0 8.33% 65.0
equipment
WAN
50.0 -20.00% 40.0 12.50% 45.0
equipment
VoIP
40.0 -20.00% 32.0 25.00% 40.0
equipment
Totals 170.0 -22.35% 132.0 13.64% 150.0
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
60. Networking
Networking Future Trends Trends
Datacenter Networking virtualization
Next Generation Networking Internet Protocol (IP) Core
and High Speed Broadband
Green Networking
IPv6 Your Text here Your Text here
Network Operating systems
Network intelligence and policy control
Network Security
Communication billing
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
61. Technologies Categorization 2009 Networking
Trends
Business Value
Investment
to make money
SAAS/
Cut costs, Increase Cloud
IT Project
UC
productivity Optimization
Business
Project
Billing NGN
Your Text here Your Text here
VOIP IPv6
Commodity IT Size of figure =
Networking
Infra. complexity/
Vir.
Services Network cost of project
Security
Investment
for regulations
Using Implementing Looking
Market Maturity
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
62. Networking
Year of savings and productivity Trends
What networking technologies are you investing-in to enhance employee
productivity and collaboration in 2009? (Answer all that apply)
2009 2008
55%
52%
46%
36%
32%
31%
29% 23%
Your Text here Your Text here
19%
13%
11%
9% 8%
NA
1% NA
Shahar Maor’s work Copyright 2009Source: Goldman Sachsor attribution from any graphic or portion of graphic
@STKI Do not remove source Research 62
63. Networking
STKI Madad 2008-9 Trends
Optimization
2%
Market Players
8% UC
VOIP and IPTel
8%
20%
Nortel
10%
Network Infra
Your Text here Your Text here
20%
Trends Miscellaneous
10%
Network Costs 12%
Reduction
10%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
64. Local Area Network Trends
Networking
-LAN
Security embedded features in the LAN infra are
imperative
Network Virtualization is already here
LAN vendors should support standard-based platforms
Your Text here Your Text here
Israeli Trends:
Corporate LAN to endpoints is stable: 100 MBIT Ethernet;
•
Backbone LAN: 2 X 1GBIT (10GBIT in some cases)
Israeli enterprise tend to “count on” either Cisco or Nortel for their
•
backbone network. Other players appear on the network edges
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
65. LAN Networking
-LAN
- Israeli Market Positioning 1Q09
Vendors to Watch:
Foundry
Local Support
Cisco
Player
Nortel
Worldwide
Leader
Enterasys 3COM
HP
Juniper
This analysis should be used with its
Alcatel supporting documents
Extreme
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
66. Networking
The Nortel Crisis -Nortel
From 90K to
Feb 08:
30K
Nortel says Nortel
employees
it will cut announces
More and
2,100 jobs 1,300
more layoffs…
layoffs
Nortel says
several
Your Text here files
Nortel
Your Text here
Nortel executives for bankruptcy
Reports to leave in protection
Financial 2009
Results for
Q3 2008
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
67. The Nortel Crisis –What’s next?
Networking
-Nortel
Nortel files for Chapter 11 to “deal decisively” with its
historic debt burdens
Nov 10’th 2008: A Nortel spokesman said the company
had enough liquidity to sustain 12 to 18 months of
operation under the current conditions Your Text here
Your Text here
Survival still possible for Nortel, but Companies that exit
the bankruptcy process often emerge in smaller form and
are frequently acquired in part or whole by larger suitors
looking for a good deal
19.2.09: Radware has purchased Nortel’s Alteon…
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
68. The Nortel Crisis Networking
–Israeli Market ”What if” Analysis -Nortel
Acquiring parts of Nortel?
HP Alliance with Avaya
Cisco and Microsoft
Acquire Nortel’s
Juniper
Telephony?
Your Text here Your Text here
•Enterasys (LAN and sec.)
Gores
•Siemens (Telephony)
Goes deeper into the
Alcatel
Israeli market?
Goes deeper into the
3COM Israeli market?
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
69. Networking
WAN Optimization -WAN
WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN:
VOIP Deployments
Data Center Consolidation
Your Text here Your Text here
2007
2008
Server Virtualization
BCP/DRP
0% 10% 20% 30% 40% 50% 60% 70% 80%
Source: Aberdeen Research
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
70. WAN Optimization Networking
-WAN
- Israeli Market Positioning 1Q09
Local Support
Expand Player
Riverbed
F5 Worldwide
Leader
Cisco
Blue Coat
Citrix
Radware Packeteer*
Juniper This analysis should be used with its
supporting documents
*June 2008: A Blue Coat company
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
71. Networking
Voice Over IP (VOIP) -VOIP
STKI observation: Many enterprises are migrating, or
planning to migrate, their telephony infrastructure from
traditional circuit-switched technology to newer Internet
Protocol (IP)-based systems
Your Text here Your Text here
Motivations to actually migrate:
End of life/end of support for current telephony infrastructure
•
Moving to a new office/office improvements
•
Motivations to wait:
“Phones are working”
•
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 71
72. VOIP (Enterprise & Call Centers) Networking
-VOIP
- Israeli Market Positioning 1Q09
Vendors to Watch:
Asterisk
Cisco
Local Support
Player
Nortel
Worldwide
Avaya* Leader
Tadiran
3COM
This analysis should be used with its
Alcatel-Lucent supporting documents
*Most CC in the market are Avaya
Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 72
73. Networking
Video Over IP –Video OIP
By 2011, 60% of Internet traffic is expected to be video
traffic (Cisco)
Global organizations use it as a vital working tool –
especially in order to cut travelling costs Your Text here
Your Text here
Video technology is considered by many local organizations as
mostly “nice to have”
Local organizations use this technology mainly for
training/marketing purposes
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
74. Networking
Video Over IP Map –Video OIP
Your Text here Your Text here
Source: http://www.video-over-ip.com/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
75. Networking
Unified Communications (UC) –UC
Why do we need this?
Integration: Of any or all communications, collaborative,
and business applications
Presence: guides users to the most appropriate means of
communications
Your extends applications and integration here
Your Text of
Mobility: Text here
applications every way you go
Productivity: improves business processes
Why now?
Key drivers today are: Workforce virtualization,
Cost reduction, Increasingly available tools,
Business improvement opportunities
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
76. Networking
UC Challenges –UC
The problem:
business justification for collaboration technologies comes
down to “soft dollars”:
• Productivity
• Better Text here
Your teamwork Your Text here
• Better customer service
How do you define “better”?
What is its business value to the company?
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
77. Networking
UC Preferred Choice –UC
56%
Cisco
41%
Microsoft
22%
Avaya
10%
Nortel
Alcatel-Lucent Text here 5%
Your Your Text here
3%
3Com
2%
Nokia-Siemens
4%
Newer Vendors
4%
Others
9%
Unsure
0% 10% 20% 30% 40% 50% 60%
Source: Goldman Sachs Research
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
78. Networking Integrators Networking
- Israeli Market Positioning 1Q09 (Leaders)
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
79. Agenda
Information
1 Information Security Security
Communication
2 Networking Networking
Your Text here Your Text here
Green IT
3 Green IT
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
80. Green IT
Small, incremental changes
compounded many times can
mean big savings for
large-scale Text here
organizations
Your Your Text here
80
81. Green IT
So, How Can I Be More Green? Trends
Secure mobile
Virtualized server
access to networks,
PC management and storage
applications, and
environments
data
State of the art
Your Text here Your Text here
Intelligent archiving Teleconferencing
power and cooling
(all around)
Working
Go digital! &
environment (car
Asset management
Printing
pool, working from
consolidation
home…)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
82. STKI Madad 2008-9 Green IT
Trends
(Not Including Printing)
PC Energy
Management
Miscellaneous
9%
Trends
12%
38%
Market Players
Your Text here Your Text here
15%
DC Facilities
20%
Asset
Management
6%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 82