SlideShare a Scribd company logo
1 of 198
STKI Summit 2010
Israeli Infrastructure Services Market




               Shahar Geiger Maor
               CISSP, Senior Analyst
               Infrastructure Services
               (Security, Networking and Green IT)
               www.shaharmaor.blogspot.com
Presentation’s Agenda


Networking



Printing and Output Management Your Text here
   Your Text here




Information Security


    Shahar Maor’s work Copyright 2010 @STKI   Do not remove source or attribution from any graphic or portion of graphic   2
We will present data on products and integrators:
                                   STKI Israeli Positioning
                • Not a technological positioning, refers only to Israeli market
                • Represents current Israeli market and not our recommendation
                •Focused on enterprise market (not SMB)                                                        Vendor A

                  Market Presence (X)                                                        Vendor B
Local Support




                        Market share - existing and new sales (more emphasis)
                        Mind share (how user organizations rate vendors)
                      Your Text here                                                                             Your Text here                 Worldwide
                  Local Support (Y) – is influenced by (X)
                                                                                                                                                Leader
                        Experience & technical knowledge, localization,
                         support, number and kind of integrators
                 Worldwide leaders marked, based on global positioning
                 Vendors to watch: Are only just entering Israeli market
 Vendors to Watch:
                                 so can’t be positioned but should be watched
                Vendor C
                                                      Market Presence
                           Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic       3
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

ApplicationText here
      Your Delivery                                                                             Your Text here


Voice (IP Telephony, Contact Centers and Unified Communications)

Network Monitoring

Staffing, Spending and Employee Ratios



          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   5
Enterprise Networking: Israeli Market Size
                                                        (M$)
                 2009           changes              2010            changes              2011            changes                 2012


     LAN
            60.0                8.33%                65.0           15.38%                75.0            20.00%                  90.0
  equipment

    WAN
              40.0 12.50%                            45.0           37.78%                62.0            12.90%                  70.0
  equipment Text here
        Your                                                                                       Your Text here

     VoIP
            32.0                9.38%                35.0           14.29%                40.0            12.50%                  45.0
  equipment

    VOIP
                 35.0          28.57%                45.0           22.22%                55.0            27.27%                  70.0
  Software

    totals     167.0           13.77%              190.0            22.11%               232.0            18.53%              275.0

             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic          6
Emerging Technology Roadmap Through
                2013




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   7
                                     Source: Infrastructure Executive Council
IP Traffic Growth




Your Text here                                                                            Your Text here




                                          Morgan Stanley, 2009
    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   8
Video related Traffic Growth




Your Text here                                                                            Your Text here




                                          Morgan Stanley, 2009
    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   9
Primary Technology Suitability




 Your Text here                                                                             Your Text here




       http://www.dbcde.gov.au/__data/assets/pdf_file/0003/54345/bro
     Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   10
Technologies Categorization 2009
Business Value
Investment
to make money
                                                                                                   SAAS/
Cut costs, Increase                                                                                Cloud
                                                                                                                                           IT Project
productivity                                       Optimization
                                                                                          UC
                                                                                                                                           Business
                                                                                                                                           Project
                                               Billing                                               NGN
            Your Text here                                                                             Your Text here
Commodity IT                                                                  VOIP             Networking              IPv6            Size of figure =
                             Infra.                                                               Vir.                                 complexity/
Services                                            Network                                                                            cost of project

                                                    Security
Investment
for regulations

                                     Using                     Implementing                              Looking
                                                             Market Maturity
                  Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic          11
Technologies Categorization 2010
Business Value
Investment
to make money
                                                                                                   SAAS/
Cut costs, Increase                                                                                Cloud
                                                                                                                                           IT Project
productivity                                  Application                       UC
                                               Delivery                                                                                    Major
                                                                                                                                           Changes
                                               Billing                                  Networking Text here
            Your Text here                                                                         Your
Commodity IT                                                                              Vir. (DC      IPv6                           Size of figure =
                             Infra.                                   VOIP                                                             complexity/
Services                                            Network                            convergence)                                    cost of project

                                                    Security
Investment
for regulations

                                     Using                     Implementing                              Looking
                                                             Market Maturity
                  Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic          12
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

ApplicationText here
      Your Delivery                                                                              Your Text here


Voice (IP Telephony, Contact Centers and Unified Communications)

Network Monitoring

Staffing, Spending and Employee Ratios



          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   13
Main Theme:
Your Text here
                     Cloud infrastructureYour Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   14
Interesting M&As in the Networking Market
Buyer (For how much?)                         Acquisition                        Comments
HP (2.7B$)                                    3Com                               •Strengthens HP's converged data center
                                                                                 product portfolio
                                                                                 •To open up opportunities in China, where
                                                                                 3Com has a large presence
Avaya (900M$)                                 Nortel (Enterprise                 Large client base. Will try to leverage this
                                              Solutions)                         acquisition by using the Aura platform.
                                                                                 What about Nortel’s data offerings???
                Your Text here                                                                             Your Text here
Cisco (3.4B$)                                 Tandberg                           To Push high-definition imaging systems
                                                                                 and videoconferencing
Logitech (405M$)                              LifeSize                           To offer HD video communications systems
                                                                                 for other settings besides the desktop
Riverbed (40M$)                               Expand                             Excessive demand for video compression
                                                                                 and to avoid Cisco from “stealing” Expand
Aman Computers (?)                            ArtNet Experts                     Small market –interesting changes: 2009’s
                                                                                 downturn had had its tolls

                    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   15
Networking “Breaking News”




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   16
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

ApplicationText here
      Your Delivery                                                                              Your Text here


Voice (IP Telephony, Contact Centers and Unified Communications)

Network Monitoring

Staffing, Spending and Employee Ratios



          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   17
Main Theme:
Your Text here
                                   Complexity!                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   18
What have we had in mind?




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   19
What actually happened? Complexity!




   Your Text here                                                                             Your Text here




       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   20
10th grade mathematics – reliability chain




99%   Your Text here          99%                                          99%                   Your Text here           97%




          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   21
The Converged Datacenter

                                                                                                                    Cisco UCS
HP BladeSystem Matrix

                             Data
        ERP       CRM      Warehouse



               Database
         Mail and Messaging
                File, Print,
              Infrastructure
         Your Text here                                                                                Your Text here

        Resource
          Pool


                                                      IBM CloudBurst




                Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   22
Future Datacenter Infrastructure




      Your Text here                                                                             Your Text here




          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   23
         http://www.sincerelysustainable.com/buildings/google-utilizes-cool-climate-to-cool-its-
Giants Face-Off




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   24
“Classic” Infrastructure Department: Before




    Your Text here                                                                             Your Text here




        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   25
“Classic” Infrastructure Department: After




     Your Text here                                                                             Your Text here




         Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   26
Infrastructure Department:
             After DC Convergence



                                    Infra. Manager

 Your Text here                                                                             Your Text here




PC                       System/Storage/Networking                                                                 DBA



     Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   27
Local Area Network Vendors
                              - Israeli Market Positioning 1Q10



                                                                                                Cisco
Local Support




                                                                                                                                                Player
                      Your Text here                                                                              Your Text here
                                                                                                                                                Worldwide
                                                                                                                                                Leader
                          Juniper
                        Enterasys                  HP
                               3COM
                Alcatel-Lucent
                                                         Avaya-Nortel
                                                                                      This analysis should be used with its
                 Foundry                                                              supporting documents
                 Extreme
                                                      Market Presence
                           Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      28
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

ApplicationText here
      Your Delivery                                                                              Your Text here


Voice (IP Telephony, Contact Centers and Unified Communications)

Network Monitoring

Staffing, Spending and Employee Ratios



          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   29
Main Theme:
The Business is conquering the infrastructure
     Your Text here              Your Text here




       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   30
Three Pillars of Application Delivery




                                                                                            Technology
                                                   Process
         People

    Your Text here                                                                             Your Text here




        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   31
An ADC Player is Like A Decathlon Athlete




     Your Text here                                                                             Your Text here




         Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   32
Application Delivery Controllers:
           What is the Pressure?
Globalization: Pushing business process to the
network’s edge
Centralization / Consolidation: Compliance, control,
Cost cutting, Security, Efficiencies / resource
utilization Text here
         Your                             Your Text here
Enterprise & WebMonster Application: Architectures,
Increased adoption of browser-based apps, Rich
clients (AJAX), Web 2.0 technologies, SOA
Service Provider Services Architectures: Next
Generation Networks, Video, Messaging
          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   33
Application Delivery Controllers:
     What is the Pressure?




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   34
Solutions???




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   35
Application Delivery Controllers (ADC)

  ADC are designed to improve the availability, efficiency,
   performance and security of web-based or IP-based
                      applications*


         Your Text here                                                                             Your Text here
     L4-L7                                   Server off-
  redirection,         TCP                    load (SSL
                                                                                                Caching,    Network-
     load-         connection               termination,                    NAT
                                                                                              compression level security
   balancing       multiplexing                  TCP
  and failover                              connection)




                                                                                                                           * Gartner
             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   36
Application Delivery Controllers (ADC)
                        - Israeli Market Positioning 1Q10
                Solutions to Watch:

                      Array
                    Barracuda
                     Brocade
                    Crescendo
Local Support




                                                                                                                                                  Player
                      Your Text here                                                                                Your Text here
                                                                                                                                                  Worldwide
                                                          F5                                                                                      Leader


                                   Radware
                                 Cisco

                    Citrix                                                              This analysis should be used with its
                                                                                        supporting documents


                                                        Market Presence                                 *Most CC in the market are Avaya
                             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      37
WAN Optimization
                           - Israeli Market Positioning 1Q10
Local Support




                                                                                                                                             Player
                    Your Text here                  Riverbed                                                   Your Text here
                                                                                                                                             Worldwide
                                                                                                                                             Leader

                                        Cisco
                       Blue Coat
                          Citrix
                   Radware
                    F5                                                             This analysis should be used with its
                                                                                   supporting documents
                Juniper

                                                   Market Presence
                        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      38
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

ApplicationText here
      Your Delivery                                                                              Your Text here


Voice (IP Telephony, Contact Centers and Unified Communications)

Network Monitoring

Staffing, Spending and Employee Ratios



          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   39
Corporate Telephony




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   40
Main Theme (…again):
The Business is conquering the infrastructure
     Your Text here              Your Text here




       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   41
Remember the “Classic” Infrastructure
          Department?




  Your Text here                                                                             Your Text here




      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   42
VOIP and UC -Technology Maturity


       VOIP




Your Text here                                                                         Your Text here




                                         UC




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source Economics from any graphic or portion of graphic
                                             Source: Computer or attribution                                        43
VOIP and UC -Technology Risk/Reward Analysis



                                  UC

     VOIP

      Your Text here                                                                           Your Text here




            Shahar Maor’s work Copyright 2010 @STKI Do not remove source Economics from any graphic or portion of graphic
                                                     Source: Computer or attribution                                        44
Why Move to IPTel?
  upgrading the LAN/ moving to a new
                 office

               high management costs


             ROI analysis justifies IPTel
         Your Text here                                                                               Your Text here

             inadequate local support

Current solution doesn't meet business
             requirements

                                                   other

                                                                0%        10%        20%        30%       40%        50%          60%    70%

             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic         45
What is the Importance of VOIP?




  Your Text here                                                                             Your Text here




      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   46
Changing the Way Your Business
        Communicates




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   47
Changing the Way Your Business
        Communicates




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   48
Moving-on to Unified Communications
    Which of the Following Justifies the Implementation of a UC
                             solution?


       Better Team Work
                                                                       62%
   Higher User Experience
      Your Text here
                                                                   54%                           Your Text here
           Unique Features
                                                                    54%
   Long-Term Cost Savings
                                                            38%
 Higher Employ Productivity                          23%




          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   49
Who Should Manage UC?
                                 Don't Know
                                    8%


            CombinedOther
                 15%
Your Text here                                                                        Networkinghere
                                                                                        Your Text Unit
                                                                                           54%
  Applications Unit
        23%




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   50
Future Telephony




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   51
Contact Centers: Trends

SIP (Session Initiation Protocol) age
The arrival of web/videoconferencing
Going home, literally –Contact center mobility
      Your Text here                Your Text here
The live agent –A true skill-based routing
Analyzed up the tailbone –More use of
 performance analytics and workforce
 optimization tools

         Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   52
New Contact Centers: Focus on IP
      Signaling Gateways                                                                                                   Application Services
  I
N
 A
 P
 /
IS
U
 P

                Your Text here
              H.248
                                                                                                             Your Text here
              MGCP                                                                                                             Speech Services
                                                         Open Voice System
                                     RTP                                                                     MRCP


T
D                                                                   SIP
M




       Media Gateways
                                                                    IP PBXes

                                                                  Source: Genesys
                      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   53
From Marketing-driven Architecture

                                                                                                                                                Telephony




                                                                                                                                                        IVR




                                                                                                               Prepaid IVR
                                        Email Reader




                                                          A1 Voice Service




                                                                                             Call Center
                                                                             City Guide
              A1 for You
Voice Mail




             Your Text here                                                                                             Your Text here          Application




                                                                                                                                                  Interface




                Billing, Customer Profile, CRM, Monitoring, Maintenance




                           Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      54
To Service-Driven Architecture

                                                                      Telephony




                                                                 VoiceXML Browser




                                                                     A1 Voice Service




                                                                                                     Call Center




                                                                                                                         Prepaid IVR
                        Ringback Tones




                                                                                        Mobile PBX
Voice Mail




                                          Mobile Campaigning


             Your Text here                                                                                        Your Text here




                                                               Standardised Interfaces




                            Billing, Customer Profile, CRM, Monitoring, Maintenance




                 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic    55
Contact Centers
   Preferred Communication Channels-Customers choice




Your Text here                                                                             Your Text here




                        Italy                                                                            United States
      http://www.genesyslab.com/system/files/Genesys_US_Survey09_screen.pdf
    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   56
VOIP (Enterprise IP Telephony)
                        - Israeli Market Positioning 1Q10



                                                                                           Cisco
Local Support




                                                                                                                                             Player
                    Your Text here                                                                             Your Text here
                                                                                                                                             Worldwide
                                           Avaya-Nortel                                                                                      Leader




                       Tadiran

                3COM
                                                                                   This analysis should be used with its
                Alcatel-Lucent                                                     supporting documents


                                                   Market Presence
                        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      57
Contact Center Infrastructure
                                  - Israeli Market Positioning 1Q10

                Solutions to Watch:
                Solutions to Watch:
                      Siemens
Local Support




                                                                                                                                                Player
                       Your Text here                     Avaya-Nortel                                            Your Text here
                                                                                                                                                Worldwide
                                                                                                                                                Leader
                                              Genesys

                                 Aspect

                     Cisco
                 Alcatel-Lucent
                                                                                      This analysis should be used with its
                Cosmocom                                                              supporting documents


                                                      Market Presence
                           Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      58
Unified Communications
                        - Israeli Market Positioning 1Q10
Local Support




                                                                                                                                         Player
                Your Text here                         Microsoft                                           Your Text here
                                                                                                                                         Worldwide
                                                                                                                                         Leader



                       Cisco
                Avaya-Nortel

                                                                               This analysis should be used with its
Alcatel-Lucent                                                                 supporting documents


                                               Market Presence
                    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      59
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

ApplicationText here
      Your Delivery                                                                              Your Text here


Voice (IP Telephony, Contact Centers and Unified Communications)

Network Monitoring

Staffing, Spending and Employee Ratios



          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   60
Main Theme:
Availability and reachable service
Your Text here             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   61
Network Operations and Monitoring:
       What are the Business Needs?
Network should be available all the time
Highest level of service possible
(down goes the “night timeslot”…)
Network failures should be located and responded-to ASAP!
(money talks) here
        Your Text                             Your Text here
Future network topology planning must be optimal and consistent
with business growth
Voice/video monitoring and SLAs by the candidate solution
provider must be checked-out, when opting for new solutions
Automatic discovery of all network devices: accounted and non-
accounted for (who said “NAC”?!)
            Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   62
Network Operations and Monitoring:
      What is the Pressure?




   Your Text here                                                                             Your Text here




       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   63
Network Operation Centers




Your Text here                                                                          Your Text here




    http://www.netscout.com/docs/thirdparty/NetScout_3pv_Metzler_Application_Delivery_Handbook.pdf
    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   64
Network Operations and Monitoring:
   What Kind of Solutions are Available?
           Basic network monitors (SNMP based)
• SNMP-Collectors Usually provide an on-line availability map

                                          Mission centric
• Usually provide one function: protocol analysis, VOIP monitoring,
  system Your Text here etc.
          monitoring                                 Your Text here

                                                 Combined
• systems that provide both basic network monitoring as well as
  specific functions (mission centric)

                                               Super Tools
• general purpose, high volume (ESM solutions)

            Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   65
Network Monitoring–Major Players

      Enterprise System                                                   Network
        Management                                                       Monitoring
                          BMC                                                 AvalonNet
                                                                               Centerity
                            CA
   Your Text here                                                                   EMC       Your Text here
                            HP
                                                                            Perform-Net
                          IBM
                                                                             SolarWinds
                      Others…                                                   Others…




       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   66
RSS Alert: Upcoming Round-Table




  Your Text here                                                                             Your Text here




      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   67
Networking Integrators
- Israeli Market Positioning 1Q10 (Leaders)




  Your Text here                                                                             Your Text here




      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   68
Networking’s Agenda

General trends

Mergers and acquisitions

Datacenter convergence and infrastructure complexity

ApplicationText here
      Your Delivery                                                                              Your Text here


Voice (IP Telephony, Contact Centers and Unified Communications)

Network Monitoring

Staffing, Spending and Employee Ratios



          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   69
Networking Staffing Ratios-Israel
                                                                                                          Average IT size:
                                                                                                              95 FTE




  Your Text here                                                                             Your Text here




        0-1 FTE                                       2-5 FTE                                      >5 FTE
      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   70
Networking Staffing Ratios


 Ratios of data/voice                                     Ratios of data/voice
networking Personnel                                     networking Personnel
            (Israel)                                            (Abroad)
       6% of IT unit
Your Text here                                               7.7% of ITText here
                                                                    Your unit




  Shahar Maor’s work Copyright Source for Do not remove source or attributionEconomics or portion of graphic
                               2010 @STKI abroad figure: Computer from any graphic                             71
Printing/Output Management’s Agenda



 Printing Consolidation

     Your Text here                                                                             Your Text here

 Output Management




         Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   73
Main Theme:
Your Text here
               Efficiency & technology Text here
                                     Your




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   74
Printing: Israeli Market Size (M$)
                 2009           changes                2010            changes                2011            changes               2012


Departmenta
  l Printers
                82.0             3.66%                85.0              7.06%                91.0              9.89%                100.0

Personal
               65.0      -7.69%                       60.0              3.33%                62.0              4.84%                65.0
 Printers Your Text here                                                                              Your Text here

  Output
Management
                38.0             5.26%                40.0             10.00%                44.0              9.09%                48.0


Printing VAS    30.0            16.67%                35.0             14.29%                40.0             12.50%                45.0


   totals      215.0             2.33%               220.0              7.73%               237.0              8.86%                258.0

               Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      75
STKI Index-2009/2010
                               Distribution Tools
                                       7%
Miscellaneous
    11%                                                                  Output
                                                                       Management
        Miscellaneous                                                     28%
            13%
   Your Text here                                                                             Your Text here


           Fax Services                                                     Prices & Cost
               18%                                                           Reduction
                                                                                 25%




       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   76
Printing Maturity: Progress Graph
  The Higher you “climb” –The More efficient You Are

Output efficiency
80%
                    Mainly High-tech sector
60%

 40%
                                                                                                                         Followers
              Your Text here                                                                                Your TextAverage
                                                                                                                      here
 20%
                                                                                                                         Leaders
   0%




                                                                                                               Mainly
                                                                                                        Financial/government
                                                                                                               sectors
                     Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   77
Optimize Infrastructure: The Beginning…




   Your Text here                                                                             Your Text here




                                                 Source: IPG, HP
       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   78
Optimize Infrastructure: Assessment




    Your Text here                                                                             Your Text here




                                                  Source: IPG, HP
        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   79
Optimize Infrastructure: Solution




  Your Text here                                                                             Your Text here




                                                Source: IPG, HP
      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   80
Manage Environment: The Beginning…




    Your Text here                                                                             Your Text here




                                                  Source: IPG, HP
        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   81
Manage Environment: Assessment




  Your Text here                                                                             Your Text here




                                                Source: IPG, HP
      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   82
Manage Environment: Find a Solution




      Your Text here                                                                             Your Text here




                                         Improve workflow!!
                                           Improve workflow
                                                 { Before HP }
  1



                                                    Source: IPG, HP
          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   83
Manage Environment –Recommendations
                                                 • Printer consumables are often ad hoc purchases made at
Centralize procurement                             the departmental level
                                                 • Money can be saved if procurement is coordinated

                                                 • “Regular” print jobs should use both sides of the
      “Duplexing”                                  paper


         Your Text here
                                                 • Don’t go beyond the printer specifications
                                                                            Your Text here
     Printer’s Specs

                                                 • Establish some process controls and assessments
In-house vs. Out-sourcing                          on when an outside vendor should be used


                                                 • First distribute, then print
      Think Digital!

             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   84
Manage Environment –Recommendations
                                                 • Printer consumables are often ad hoc purchases made at
Centralize procurement                             the departmental level
                                                 • Money can be saved if procurement is coordinated

                                                 • “Regular” print jobs should use both sides of the
      “Duplexing”                                  paper


         Your Text here
                                                 • Don’t go beyond the printer specifications
                                                                            Your Text here
     Printer’s Specs

                                                 • Establish some process controls and assessments
In-house vs. Out-sourcing                          on when an outside vendor should be used


                                                 • First distribute, then print
      Think Digital!

             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   85
Printing Consolidation in “Real-Life”




    Your Text here                                                                             Your Text here




                                            Source: MalamTeam, 2009
        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   86
Printing Consolidation in “Real-Life”

                           Employees/printers ratio by months
                         (target is 1 output device per 3 employees)




    Your Text here                                                                             Your Text here




    Total output cost:
                                                 37% savings                            Total output cost:
        2,634K₪
                                                                                            1,661K₪
                                            Source: MalamTeam, 2009
        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   87
Printing/Output Management’s Agenda



 Printing Consolidation

     Your Text here                                                                             Your Text here

 Output Management




         Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   88
The Need for Output Management
 Each application requires distinct business process definitions
    • Data Collection, Visual enhancement, Document distribution
 Duplicate effort - each separate output channels requires a new
  design…
 Requires significant IT staff involvement
 Document and Template design – complex, time consuming, requires
  expensive IT resources
         Your Text here                                                                             Your Text here
                                                    >20

                                                                             >10
              1-5



                                                                                                           Number of different
                                                                                                            output-generation
                                                                                                          Platforms in Enterprise
                                                                                                               organizations
                     >5




                                                        Source: Autofont
             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   89
Output Management Architecture -PrintBOS




     Your Text here                                                                             Your Text here




                                                     Source: Consist
         Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   90
Output Management Architecture -
                                                                    FreeForm
                App1                            App2                            App3                       FreeForm                         Data
                                                                                                          Interactive          Data structures generated by
                                                                                                                                       enterprise applications
                                                                                                                                          Interfaces
                  Data                            Data                             Data
                                                                                                                               Interfaces to any application
                                                                                                                               platform,    enables     gradual
                                                                                                                                                implementation
                                                                                                                                          Analyzers
                 Others          Watched Folder        LPR/LPD         Web Service        Printer Queue        Direct API      Modular       analyzers      for
                                                                                                                               treatment of any structured/
                                                                                                                               unstructured data, open to
                 Others           Application Name         XSF         Offset & Length        Column & Row           XML            proprietary data structures
                                                                                                                                             Design
                       Your Text here                                                                               Your Text here for dynamic output
Templates




                                                                                                                           Rich design
                                                                                                                               generation,     based         on
                                                                                                                               templates, data values and
                                                                  Channels                                                                quantity (+scripting)
                                                                                                                                          Distribution
                                                                                                                               Modular support for multiple
                                                                                                                               distribution channels (print,
                                                                                                                                                       view, etc)
                                                                                                                                     FreeForm Interactive
                                                                                                                               Interactive and mixed-mode
                         Email                                                                                                            data feed into forms
                                                          Print                              Display


                                                                              MMS                         Pint Press
            Internet                      Fax
                                                                  Other services
                             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic       91
Output Management Round-Table Insights


Output management is very “close                                        Output management requires
        to the business”                                              cross-unit thinking (IT and beyond)

         Your Text here                                                                             Your Text here




  Managing many different output                                           Some organizations in Israel are
platforms have become too complex                                            looking for holistic solutions




             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   92
Output Management
                              - Israeli Market Positioning 1Q10

                Solutions to Watch:

                       SAP
                      Oracle
                       EMC
Local Support




                                                                       Consist
                                                                      (PrintBos)                                                               Player
                      Your Text here                                                                             Your Text here
                                                  Autofont                                                                                     Worldwide
                                                 (FreeForm)                                                                                    Leader


                  InfoPrint                   Adobe
                       BMC                  (LifeCycle)
                Aman (FormIT)
                  ISIS-Papyrus
                                                                                     This analysis should be used with its
                    HP                                                               supporting documents
                        Bottomline
                       (FormScape)
                                                     Market Presence
                          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      93
Output Management –Digital Signature

               Wiki: a mathematical scheme for demonstrating the
                 authenticity of a digital message or document




   Your Text here                                                                             Your Text here




                                                                    Name:
                                                                      ID:



                                                  Source: Comsign
       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   94
Output Management –Digital Signature

                A comparison between digital signature
                     and hand-written signature:
                                                  Digital signature                          hand-written
                                                                                                signature
        Court admission?                                                 Yes                                   Yes
                    Ease of use                          “Single click”                    Signing every
   Your Text here                                                                          Your Text here
                                                                                      individual page in
                                                                                             some cases
                       Archiving                 Digital –relatively                Hard-copy. Storage
                                                    small storage.                         consuming.
        Document can be                            Changes to the                   No real protection.
               forged?                          original document                       Much easier to
                                                      “breaks” the                      forge than DS.
                                                          signature
         Non-repudiation                                                 Yes                                   No

       Shahar Maor’s work Copyright 2010 @STKI Do Source: Comsign
                                                  not remove source or attribution from any graphic or portion of graphic   95
Output Management –Digital Signature

Digital signature improve security, workflow and save
 money!
Growing demand for Authentication and integrity in Israel
 should push (…at last) the use of DS forward

        Your Text here                                                                             Your Text here




            Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   96
"The security business has no future...The security industry is dead“ (IBM
                  ISS general manager, Val Rahamani 2008)




         Your Text here                                                                             Your Text here


 “spam and other content security issues would be "solved" in a few
                    years” (Bill Gates, 2006)



             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   97
Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText here
    Your security                                                                              Your Text here

Anti-X protection
Data protection
Security Monitoring & Control
Best SU of 2009
Staffing and ratios
        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   98
Information Security:
                    Israeli Market Size (M$)
             2009           changes                2010            changes                2011            changes               2012


Security
             85.0           23.53%               105.0              4.76%               110.0              9.09%                120.0
Software

GRC & Your Text here
           50.0 50.00%                            75.0              9.33%                82.0 Your Text here
                                                                                                    9.76%                       90.0
 BCP

Security
             85.0           11.76%                95.0              8.42%               103.0              6.80%                110.0
  VAS


  totals   220.0            25.00%               275.0              7.27%               295.0              8.47%                320.0


           Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      99
What’s on the CISO’s Agenda?
                      (STKI Index 2009)

                                               Sec Tools
                            SIEM/SOC
                                                  5%
Miscellaneous                  5%
     5%                                                                       NAC
Encryption                                                                    18%
   9%
                                                                                              Access/Authenti
       Market/Trends                                                                              cation
     Your Text here                                                                            Your 15% here
                                                                                                    Text
           10%

                DB/DC SEC
                                                                                        EPS/mobile
                  10%
                                                     DLP                                   15%
                                                     10%




         Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   100
Some Interesting M&As in the Security Market
Buyer (For how much?)                       Acquisition                       Why?
IBM (225M$)                                 Guardium                          •expand its portfolio in this area
                                                                              •Added value ability to provide analytics
                                                                              about IT business processes
Trend Micro (?)                             Third Brigade                     Trend is making Third Brigade a strategic
                                                                              acquisition to assist in its data-center vision
CA (?)                                      Orchestria                        Adds Orchestria's data leak prevention
              Your Text here                                                                  Your Text here
                                                                              technology to CA's identity and access
                                                                              management product suites
Oracle (7.3B$)                              Sun                               Because of Sun’s IDM solutions 
                                            Microsystems




                  Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   101
Some Interesting M&As in the Security Market

 Active Acquirers: IT Security
 M&A Deals Since 2004




         Your Text here                                                                            Your Text here




             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   102
          http://updataadvisors.com/Advisors_Newsletters/Security/it_security_maupdat
Types of Incidents (2000-2010)




 Your Text here                                                                            Your Text here




                                       http://datalossdb.org/statistics
    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   103
Incidents by Vector (2000-2010)




 Your Text here                                                                            Your Text here




                                       http://datalossdb.org/statistics
    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   104
Incidents by Vector (2009)




Your Text here                                                                            Your Text here




                                      http://datalossdb.org/statistics
   Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   105
www.stki.info is in the Trend…




Your Text here                                                                           STKI.INFOhere
                                                                                          Your Text HAS
                                                                                         BEEN DEFACED
                                                                                           18.12.2009




   Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   106
“Our” Quick Response….
                                                                                                   MODERN WORLD
                                                                                                   STRIKES BACK!!!
                                                                                                      6.1.2010




Your Text here                                                                            Your Text here




   Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   107
RSS Alert: Upcoming Round-Table




  Your Text here                                                                            Your Text here




     Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   108
Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText here
    Your security                                                                             Your Text here

Anti-X protection
Data protection
Security Monitoring & Control
Best SU of 2009
Staffing and ratios
       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   109
Main Theme:
Your Text here
                                Cautiousness                                              Your Text here




   Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   110
Cloud Computing




Your Text here                                                                            Your Text here




   Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic
     http://www.powerpoint-search.com/what-is-cloud-computing-ppt.html                                                  111
Cloud Characteristics




Your Text here                                                                            Your Text here




  http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-
   Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   112
Cloud Security




Your Text here                                                                            Your Text here




                                 Source: http://csrc.nist.gov/groups/SNS/cloud-computing/
   Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   113
Cloud Security
                   Reasons not to adopt SaaS:




Your Text here                                                               Your Text here




   Shahar Maor’s work Copyright 2010 @STKI by IGT,remove source or attribution from any graphic 2010
              Source: SaaS survey – Do not Israel SaaS center & STKI, March or portion of graphic      114
How Does Cloud Computing Affect the
         “Security Triad”?

                                       Confidentiality



   Your Text here                                                                            Your Text here




      Availability                                                                   Integrity

      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   115
Cloud Risk Assessment
                              NETWORK
  INSECURE OR                MANAGEMENT
                                                             Probability
   INEFFECTIVE
DELETION OF DATA


  ISOLATION
    FAILURE


   CLOUD PROVIDER
  MALICIOUS INSIDER -
    ABUSE OF Your Text here
             HIGH                                                                                      Your Text here
   PRIVILEGE ROLES

  MANAGEMENT INTERFACE
COMPROMISE (MANIPULATION,
     AVAILABILITY OF
    INFRASTRUCTURE)


                               LOSS OF
                             GOVERNANCE                                                                COMPLIANCE
                                                                   RISK FROM
                                                                                                       CHALLENGES
                                                                  CHANGES OF
                                                                 JURISDICTION                                                        Impact
               http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-
                Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic     116
Cloud Regulations & Recommendations

No regulations so far….
Some sources of information and recommendations:
  •   Security Guidance for Critical Areas of Focus in Cloud Computing, V2.1
  •   ENISA Cloud Computing Risk Assessment
  •   OECD -Cloud Computing and Public Policy
  •   World Privacy Forum Privacy In The Clouds ReportYour Text here
          Your Text here
  •   NIST -Effectively and Securely Using the Cloud
  •   "Cloud Computing Security: Raining On The Trendy New Parade," BlackHat
  •   AWS Security Whitepaper




             Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   117
Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText here
    Your security                                                                             Your Text here

Anti-X protection
Data protection
Security Monitoring & Control
Best SU of 2009
Staffing and ratios
       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   118
Main Theme:
Your Text here
                             “Mind the gap”                                               Your Text here




   Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   119
Bridging the Gap




  Your Text here                                                                            Your Text here


       Virtualization is moving rapidly into production
                         environments
   Companies concerned about security issues and lack of
                       security products
Virtualization opens up gaps in traditional physical network
                     analysis and security
     Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   120
Virtualization attacks
         Root Partition                                               Guest Partitions
                                                                                                                          Provided by:
                                                         Ring 3: User Mode
Virtualization Stack                                                                                                            Windows


 WMI Provider                                                           Guest Applications                                      Virtualization
                           VM Worker
      VM                   Processes                                                                                            ISV
     Service
                                                                                                                                Attackers
         Your Text here                                                                               Your Text here
                                                                 Virtualization
                                                                    Service                        OS
Server Core           Virtualization                                                              Kernel
                                                                    Clients
                            Service                                 (VSCs)
 Windows
  Kernel         Device Providers
                 Drivers    (VSPs)                        VMBus
                                                          VMBus                         Enlightenments
                                                          Ring 0: Kernel Mode

                                             Windows hypervisor

                                            Server Hardware

               Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      121
How to Protect?




Your Text here                                                                            Your Text here




   Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   122
What to Protect?
Both Guests and Host are subjected to attacks
Full disk encryption?
Some challenges of VM architecture:
  •   separation of duties
  •   Where, exactly, are my VMs located?
         Your Text here                                                                           Your Text here
  •   How to manage old VM images?
  •   How to retire Virtual Machines?
  •   Hypervisor vulnerabilities
  •   Lack of solid auditing capabilities
  •   More and more…


           Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   123
Virtualization Security Solutions: Altor




     Your Text here                                                                            Your Text here




         http://altornetworks.com/news-events/rsa-10-most-interesting
        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   124
Virtualization Security Solutions: CatBird




    Your Text here                                                                            Your Text here




                   http://www2.catbird.com/our_services/vmware.php
       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   125
Virtualization Security Solutions: Reflex

            Change Control & Configuration Monitoring




                                                                                                                         Virtual Security (FW/IDS/IPS)




                                                                                                                                                                        CPU, Memory, Network & Storage Performance
Software Asset Management




                                Your Text here
                                       Virtual Infrastructure Discovery & Mapping                                                                Your Text here




                                                                                                                    Timeline & Alerts for Audit & Compliance

                                                                                       Virtual Infrastructure Alarms & Alerts



                                                     http://www.reflexsystems.com/Products/VMC
                                    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic            126
Virtualization Security Recommendations
 Follow best practices:
   • VMWare:
     http://www.vmware.com/pdf/vi3_301_201_server_config.pdf
   • Microsoft:
     http://www.microsoft.com/downloads/details.aspx?displaylang=
     en&FamilyID=2220624b-a562-4e79-aa69-a7b3dffdd090
          Your Text here                        Your Text here
   • Citrix:
     http://support.citrix.com/servlet/KbServlet/download/20639-
     102-532852/user_security-1.0-5.5.0-en_gb.pdf


   • Explore (cautiously!!) third party’s solutions


           Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   127
Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText here
    Your security                                                                             Your Text here

Anti-X protection
Data protection
Security Monitoring & Control
Best SU of 2009
Staffing and ratios
       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   128
Main Theme:
Your Text here
                                 Fast-growing                                             Your Text here




   Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   129
Remote Access -Customer Needs
Secure Access from Managed and Unmanaged Devices

Simplified and Granular Access Control

Application Interoperability Outside the Corporate
 Network Text here
       Your                               Your Text here


Full Enablement of Mobile Devices

2 factor authentication for all applications



           Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   130
Connectivity Approach
Each session is tailored according to its user and the device in use,
maximizing security and productivity for that session.

Internal & External                             Managed &                                                         Private
      Users                                  Unmanaged Devices                                                   Resources
       Financial                                                                                                         Legacy Apps
       Partner or                         Home PC                                    Limited Intranet
 Financial Agent
       Field                                            Home PC                                                     Custom Financials
Partner or
Field Agent
              Your Text here
       Logistics                                                                                         Your Text here
                                       Kiosk
                                    Kiosk                                                               Limited Webmail:
       Partner                                                                                          no attachments
                                                                                                                              Web Apps
     Logistics
      Partner                                                                                                              Client-Server Apps
                                          Corporate                                    Full Intranet                     Supply Chain
      Project Manager
                                          Laptop                                                                               Legacy Apps
      Employee                                                                         Payroll & HR                       File Access
  Project Manager                                                                                                           Third-Party Apps
     Employee                                    Corporate
     Remote                               Unmanaged Laptop                                                                 Homegrown Apps
     Technician                              Managed                                     Webmail                    Tech Support App
                                          Partner PC
     EmployeeRemote                                                      Unmanaged                                            File Access
            Technician                                                   Partner PC
             Employee


                Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic
                         download.microsoft.com/documents/uk/.../IGA2009_UAG_Bill_Orme.pptx                                                 131
Solution Architecture (UAG)
                                                                                                                          •Exchange
                                                                                                                          •CRM
                                                                                                                          •SharePoint
                       Mobile
                                                                                                                          •IIS based
                                                                                                                          •IBM, SAP,
 Home / Friend /                                                                                                           Oracle
 Kiosk

                        Internet
                                                 HTTPS (443)                                                              TS
                                                Direct Access
                   Your Text here                                                                            Your Text here
                                                                                                                          Non web


Business Partners /
                                                  Authentication
                                                                                                                    AD, ADFS,
Sub - Contractors                                 End-point health detection                                        RADIUS, LDAP….
                                                  Enterprise Readiness
                                                  Edge Ready                                              Corporate Network
Employees Managed Machines                        Information Leakage Prevention
Internet / home / hotel / other company           Non-Windows


                      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic
                               download.microsoft.com/documents/uk/.../IGA2009_UAG_Bill_Orme.pptx                                          132
Secure Remote Access
                        - Israeli Market Positioning 1Q10



                                                                                      Juniper
Local Support




                                                                                                                                             Player
                     Your Text here                           Checkpoint                                       Your Text here
                                                 Microsoft                                                                                   Worldwide
                                                                                                                                             Leader




                        Citrix
                           SonicWall
                Cisco
                                                                                   This analysis should be used with its
                F5                                                                 supporting documents
                     Array

                                                    Market Presence
                        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      133
“Strong” Authentication
                            - Israeli Market Positioning 1Q10

                Solutions to Watch:

                       ANB
Local Support




                                                                                                                                              Player
                     Your Text here                                RSA                                          Your Text here
                                            Safenet-Aladdin                                                                                   Worldwide
                                                                                                                                              Leader
                                               Cidway
                                         Vasco                                                                                                Fast
                                                                                                                                              Movement
                                             Atena


                   biometric
                   solutions*                                                         This analysis should be used with its
                                                                                      supporting documents

                                                                                                    * Biometric solutions are still
                                     Market Presence                                             considered “niche market” in Israel
                         Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic      134
Mobile Security: What worries CISOs?
Internal users:
Central management
Corporate data on device (encryption, DLP)
Devices welfare (AV) ?
        Your Text here                                                                            Your Text here
External users:
Sensitive traffic interception
Masquerading Identity theft




           Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   135
Mobile Security: What worries
         Customers?




Your Text here                                                                            Your Text here




                               Source: Data Innovation, Inc. 2010
   Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   136
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8
Stki Summit 2010  Infra Services  V8

More Related Content

What's hot

Japan Case Study: Mobile 2.0 and the Next Generation of Mobile Applications
Japan Case Study: Mobile 2.0 and the Next Generation of Mobile ApplicationsJapan Case Study: Mobile 2.0 and the Next Generation of Mobile Applications
Japan Case Study: Mobile 2.0 and the Next Generation of Mobile ApplicationsInfinita Inc.
 
Procurement Leaders and CombineNet 2012 Webcast: Featuring CEVA Logistics' CPO
Procurement Leaders and CombineNet 2012 Webcast: Featuring CEVA Logistics' CPOProcurement Leaders and CombineNet 2012 Webcast: Featuring CEVA Logistics' CPO
Procurement Leaders and CombineNet 2012 Webcast: Featuring CEVA Logistics' CPOCombineNet, Inc.
 
Cheng bearing point
Cheng bearing pointCheng bearing point
Cheng bearing pointsouthmos
 
Rise of the Business User: Enterprise IT and the effect of consumerization - ...
Rise of the Business User: Enterprise IT and the effect of consumerization - ...Rise of the Business User: Enterprise IT and the effect of consumerization - ...
Rise of the Business User: Enterprise IT and the effect of consumerization - ...MaRS Discovery District
 
The Politics Of Cloud Computing
The Politics Of Cloud ComputingThe Politics Of Cloud Computing
The Politics Of Cloud ComputingMartin Hingley
 
Le Media Computing selon Cisco
Le Media Computing selon CiscoLe Media Computing selon Cisco
Le Media Computing selon CiscoMarc Bourhis
 
Chambers cisco live keynote external june2012
Chambers cisco live keynote external june2012Chambers cisco live keynote external june2012
Chambers cisco live keynote external june2012Leslie Rubin
 
Brocent Profile V3.1 English Linkedin
Brocent  Profile V3.1   English   LinkedinBrocent  Profile V3.1   English   Linkedin
Brocent Profile V3.1 English Linkedinjackzhangs
 
Avaya%20data%20solutions%20 %20creating%20a%20fit%20for%20purpose%20network
Avaya%20data%20solutions%20 %20creating%20a%20fit%20for%20purpose%20networkAvaya%20data%20solutions%20 %20creating%20a%20fit%20for%20purpose%20network
Avaya%20data%20solutions%20 %20creating%20a%20fit%20for%20purpose%20networkSteven J. Bocker, MBA
 
Devise your strategy for success
Devise your strategy for successDevise your strategy for success
Devise your strategy for successB2B Marketing
 
Web platform to (build, manage and grow business on the web) compose and orch...
Web platform to (build, manage and grow business on the web) compose and orch...Web platform to (build, manage and grow business on the web) compose and orch...
Web platform to (build, manage and grow business on the web) compose and orch...Saibal Das Chowdhury
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Enterprise
 
Presentation of aviation
Presentation of aviationPresentation of aviation
Presentation of aviationcohtech
 
Omninet Technologies - Company Profile
Omninet  Technologies - Company ProfileOmninet  Technologies - Company Profile
Omninet Technologies - Company Profiletitusotpl
 
Omninet Technologies Pvt. Ltd. - Company Profile
Omninet Technologies Pvt. Ltd. - Company ProfileOmninet Technologies Pvt. Ltd. - Company Profile
Omninet Technologies Pvt. Ltd. - Company Profiletitusotpl
 
Succeeding in a World Gone Mobile (Part II) - Mobility
Succeeding in a World Gone Mobile (Part II) - MobilitySucceeding in a World Gone Mobile (Part II) - Mobility
Succeeding in a World Gone Mobile (Part II) - MobilitySimpleSignal
 
Financial Technology Market Analysis - March 2012
Financial Technology Market Analysis - March 2012Financial Technology Market Analysis - March 2012
Financial Technology Market Analysis - March 2012MMMTechLaw
 

What's hot (19)

Japan Case Study: Mobile 2.0 and the Next Generation of Mobile Applications
Japan Case Study: Mobile 2.0 and the Next Generation of Mobile ApplicationsJapan Case Study: Mobile 2.0 and the Next Generation of Mobile Applications
Japan Case Study: Mobile 2.0 and the Next Generation of Mobile Applications
 
Procurement Leaders and CombineNet 2012 Webcast: Featuring CEVA Logistics' CPO
Procurement Leaders and CombineNet 2012 Webcast: Featuring CEVA Logistics' CPOProcurement Leaders and CombineNet 2012 Webcast: Featuring CEVA Logistics' CPO
Procurement Leaders and CombineNet 2012 Webcast: Featuring CEVA Logistics' CPO
 
Cheng bearing point
Cheng bearing pointCheng bearing point
Cheng bearing point
 
Rise of the Business User: Enterprise IT and the effect of consumerization - ...
Rise of the Business User: Enterprise IT and the effect of consumerization - ...Rise of the Business User: Enterprise IT and the effect of consumerization - ...
Rise of the Business User: Enterprise IT and the effect of consumerization - ...
 
The Politics Of Cloud Computing
The Politics Of Cloud ComputingThe Politics Of Cloud Computing
The Politics Of Cloud Computing
 
Le Media Computing selon Cisco
Le Media Computing selon CiscoLe Media Computing selon Cisco
Le Media Computing selon Cisco
 
Chambers cisco live keynote external june2012
Chambers cisco live keynote external june2012Chambers cisco live keynote external june2012
Chambers cisco live keynote external june2012
 
Brocent Profile V3.1 English Linkedin
Brocent  Profile V3.1   English   LinkedinBrocent  Profile V3.1   English   Linkedin
Brocent Profile V3.1 English Linkedin
 
Avaya%20data%20solutions%20 %20creating%20a%20fit%20for%20purpose%20network
Avaya%20data%20solutions%20 %20creating%20a%20fit%20for%20purpose%20networkAvaya%20data%20solutions%20 %20creating%20a%20fit%20for%20purpose%20network
Avaya%20data%20solutions%20 %20creating%20a%20fit%20for%20purpose%20network
 
Devise your strategy for success
Devise your strategy for successDevise your strategy for success
Devise your strategy for success
 
Web platform to (build, manage and grow business on the web) compose and orch...
Web platform to (build, manage and grow business on the web) compose and orch...Web platform to (build, manage and grow business on the web) compose and orch...
Web platform to (build, manage and grow business on the web) compose and orch...
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for Business
 
Presentation of aviation
Presentation of aviationPresentation of aviation
Presentation of aviation
 
Omninet Technologies - Company Profile
Omninet  Technologies - Company ProfileOmninet  Technologies - Company Profile
Omninet Technologies - Company Profile
 
Gda Panel
Gda PanelGda Panel
Gda Panel
 
Omninet Technologies Pvt. Ltd. - Company Profile
Omninet Technologies Pvt. Ltd. - Company ProfileOmninet Technologies Pvt. Ltd. - Company Profile
Omninet Technologies Pvt. Ltd. - Company Profile
 
Succeeding in a World Gone Mobile (Part II) - Mobility
Succeeding in a World Gone Mobile (Part II) - MobilitySucceeding in a World Gone Mobile (Part II) - Mobility
Succeeding in a World Gone Mobile (Part II) - Mobility
 
Lam Chee Keong
Lam Chee KeongLam Chee Keong
Lam Chee Keong
 
Financial Technology Market Analysis - March 2012
Financial Technology Market Analysis - March 2012Financial Technology Market Analysis - March 2012
Financial Technology Market Analysis - March 2012
 

Similar to Stki Summit 2010 Infra Services V8

Summit 2011 trends in infrastructure services
Summit 2011  trends in infrastructure servicesSummit 2011  trends in infrastructure services
Summit 2011 trends in infrastructure servicesShahar Geiger Maor
 
Ai Investor Presentation July 2007
Ai Investor Presentation July 2007Ai Investor Presentation July 2007
Ai Investor Presentation July 2007Teguh Prasetya
 
Office of the CIO Trends 2010
Office of the CIO Trends 2010Office of the CIO Trends 2010
Office of the CIO Trends 2010Galit Fein
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Careers and Current Trends in the ICT Industry
Careers and Current Trends  in  the ICT IndustryCareers and Current Trends  in  the ICT Industry
Careers and Current Trends in the ICT IndustrySoftware Park Thailand
 
Fin Crisis & the impact on the software industry
Fin Crisis & the impact on the software industryFin Crisis & the impact on the software industry
Fin Crisis & the impact on the software industryMichael Fauscette
 
Make it happen full version
Make it happen   full versionMake it happen   full version
Make it happen full versionTeo Koloveros
 
How to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategyHow to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategyRedpath Consulting Group
 
Inspiring Tomorrow’s Innovations
Inspiring Tomorrow’s InnovationsInspiring Tomorrow’s Innovations
Inspiring Tomorrow’s InnovationsZinnov
 
Emerging trends in the Software Industry
Emerging trends in the Software IndustryEmerging trends in the Software Industry
Emerging trends in the Software IndustryMichael Fauscette
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsIBMGovernmentCA
 
클라우드 시대 AP 가속으로 승부하라(2)
클라우드 시대 AP 가속으로 승부하라(2)클라우드 시대 AP 가속으로 승부하라(2)
클라우드 시대 AP 가속으로 승부하라(2)mosaicnet
 
The Future of Enterprise SW and Social Media
The Future of Enterprise SW and Social MediaThe Future of Enterprise SW and Social Media
The Future of Enterprise SW and Social Mediaguestd63a
 
The Future of Enterprise SW & Social Media
The Future of Enterprise SW & Social MediaThe Future of Enterprise SW & Social Media
The Future of Enterprise SW & Social MediaMichael Fauscette
 
La convergence fixe/mobile au coeur des communications unifiees
La convergence fixe/mobile au coeur des communications unifieesLa convergence fixe/mobile au coeur des communications unifiees
La convergence fixe/mobile au coeur des communications unifieesJavier Sanz-Blasco
 
Communication Collaboration Mobility Presentation Stn 2 24 11
Communication Collaboration Mobility Presentation   Stn 2 24 11Communication Collaboration Mobility Presentation   Stn 2 24 11
Communication Collaboration Mobility Presentation Stn 2 24 11mcini
 
How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy Jason Baker
 

Similar to Stki Summit 2010 Infra Services V8 (20)

Summit 2011 trends in infrastructure services
Summit 2011  trends in infrastructure servicesSummit 2011  trends in infrastructure services
Summit 2011 trends in infrastructure services
 
Ai Investor Presentation July 2007
Ai Investor Presentation July 2007Ai Investor Presentation July 2007
Ai Investor Presentation July 2007
 
Office of the CIO Trends 2010
Office of the CIO Trends 2010Office of the CIO Trends 2010
Office of the CIO Trends 2010
 
Directions 2009 - The World at a Watershed: New Rules, Risks and Opportunities
Directions 2009 - The World at a Watershed: New Rules, Risks and OpportunitiesDirections 2009 - The World at a Watershed: New Rules, Risks and Opportunities
Directions 2009 - The World at a Watershed: New Rules, Risks and Opportunities
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Jordan Ict Sector June 2009
Jordan Ict Sector June 2009Jordan Ict Sector June 2009
Jordan Ict Sector June 2009
 
Careers and Current Trends in the ICT Industry
Careers and Current Trends  in  the ICT IndustryCareers and Current Trends  in  the ICT Industry
Careers and Current Trends in the ICT Industry
 
Fin Crisis & the impact on the software industry
Fin Crisis & the impact on the software industryFin Crisis & the impact on the software industry
Fin Crisis & the impact on the software industry
 
Make it happen full version
Make it happen   full versionMake it happen   full version
Make it happen full version
 
Cisco
CiscoCisco
Cisco
 
How to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategyHow to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategy
 
Inspiring Tomorrow’s Innovations
Inspiring Tomorrow’s InnovationsInspiring Tomorrow’s Innovations
Inspiring Tomorrow’s Innovations
 
Emerging trends in the Software Industry
Emerging trends in the Software IndustryEmerging trends in the Software Industry
Emerging trends in the Software Industry
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter Governments
 
클라우드 시대 AP 가속으로 승부하라(2)
클라우드 시대 AP 가속으로 승부하라(2)클라우드 시대 AP 가속으로 승부하라(2)
클라우드 시대 AP 가속으로 승부하라(2)
 
The Future of Enterprise SW and Social Media
The Future of Enterprise SW and Social MediaThe Future of Enterprise SW and Social Media
The Future of Enterprise SW and Social Media
 
The Future of Enterprise SW & Social Media
The Future of Enterprise SW & Social MediaThe Future of Enterprise SW & Social Media
The Future of Enterprise SW & Social Media
 
La convergence fixe/mobile au coeur des communications unifiees
La convergence fixe/mobile au coeur des communications unifieesLa convergence fixe/mobile au coeur des communications unifiees
La convergence fixe/mobile au coeur des communications unifiees
 
Communication Collaboration Mobility Presentation Stn 2 24 11
Communication Collaboration Mobility Presentation   Stn 2 24 11Communication Collaboration Mobility Presentation   Stn 2 24 11
Communication Collaboration Mobility Presentation Stn 2 24 11
 
How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy
 

More from Shahar Geiger Maor

Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeShahar Geiger Maor
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maorShahar Geiger Maor
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maorShahar Geiger Maor
 
Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maorShahar Geiger Maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protectionShahar Geiger Maor
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelShahar Geiger Maor
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Shahar Geiger Maor
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information securityShahar Geiger Maor
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2Shahar Geiger Maor
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Shahar Geiger Maor
 
Info Sec C T O Forum Nov 2009 V1
Info Sec   C T O Forum   Nov 2009   V1Info Sec   C T O Forum   Nov 2009   V1
Info Sec C T O Forum Nov 2009 V1Shahar Geiger Maor
 

More from Shahar Geiger Maor (20)

Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of Cybercrime
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 
Mobile payment v3
Mobile payment v3Mobile payment v3
Mobile payment v3
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maor
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
 
Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protection
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM Panel
 
Social Sec infosec -pptx
Social Sec  infosec -pptxSocial Sec  infosec -pptx
Social Sec infosec -pptx
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information security
 
DLP Trends -Dec 2010
DLP Trends -Dec 2010DLP Trends -Dec 2010
DLP Trends -Dec 2010
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2
 
Cloud security v2
Cloud security v2Cloud security v2
Cloud security v2
 
PCI Challenges
PCI ChallengesPCI Challenges
PCI Challenges
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010
 
Info Sec C T O Forum Nov 2009 V1
Info Sec   C T O Forum   Nov 2009   V1Info Sec   C T O Forum   Nov 2009   V1
Info Sec C T O Forum Nov 2009 V1
 
Security Summit July 2009
Security Summit  July 2009Security Summit  July 2009
Security Summit July 2009
 
Green Security
Green SecurityGreen Security
Green Security
 
IPv6
IPv6IPv6
IPv6
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Stki Summit 2010 Infra Services V8

  • 1. STKI Summit 2010 Israeli Infrastructure Services Market Shahar Geiger Maor CISSP, Senior Analyst Infrastructure Services (Security, Networking and Green IT) www.shaharmaor.blogspot.com
  • 2. Presentation’s Agenda Networking Printing and Output Management Your Text here Your Text here Information Security Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  • 3. We will present data on products and integrators: STKI Israeli Positioning • Not a technological positioning, refers only to Israeli market • Represents current Israeli market and not our recommendation •Focused on enterprise market (not SMB) Vendor A  Market Presence (X) Vendor B Local Support  Market share - existing and new sales (more emphasis)  Mind share (how user organizations rate vendors) Your Text here Your Text here Worldwide  Local Support (Y) – is influenced by (X) Leader  Experience & technical knowledge, localization, support, number and kind of integrators  Worldwide leaders marked, based on global positioning  Vendors to watch: Are only just entering Israeli market Vendors to Watch: so can’t be positioned but should be watched Vendor C Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
  • 4.
  • 5. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
  • 6. Enterprise Networking: Israeli Market Size (M$) 2009 changes 2010 changes 2011 changes 2012 LAN 60.0 8.33% 65.0 15.38% 75.0 20.00% 90.0 equipment WAN 40.0 12.50% 45.0 37.78% 62.0 12.90% 70.0 equipment Text here Your Your Text here VoIP 32.0 9.38% 35.0 14.29% 40.0 12.50% 45.0 equipment VOIP 35.0 28.57% 45.0 22.22% 55.0 27.27% 70.0 Software totals 167.0 13.77% 190.0 22.11% 232.0 18.53% 275.0 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  • 7. Emerging Technology Roadmap Through 2013 Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 7 Source: Infrastructure Executive Council
  • 8. IP Traffic Growth Your Text here Your Text here Morgan Stanley, 2009 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  • 9. Video related Traffic Growth Your Text here Your Text here Morgan Stanley, 2009 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
  • 10. Primary Technology Suitability Your Text here Your Text here http://www.dbcde.gov.au/__data/assets/pdf_file/0003/54345/bro Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  • 11. Technologies Categorization 2009 Business Value Investment to make money SAAS/ Cut costs, Increase Cloud IT Project productivity Optimization UC Business Project Billing NGN Your Text here Your Text here Commodity IT VOIP Networking IPv6 Size of figure = Infra. Vir. complexity/ Services Network cost of project Security Investment for regulations Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  • 12. Technologies Categorization 2010 Business Value Investment to make money SAAS/ Cut costs, Increase Cloud IT Project productivity Application UC Delivery Major Changes Billing Networking Text here Your Text here Your Commodity IT Vir. (DC IPv6 Size of figure = Infra. VOIP complexity/ Services Network convergence) cost of project Security Investment for regulations Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  • 13. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  • 14. Main Theme: Your Text here Cloud infrastructureYour Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
  • 15. Interesting M&As in the Networking Market Buyer (For how much?) Acquisition Comments HP (2.7B$) 3Com •Strengthens HP's converged data center product portfolio •To open up opportunities in China, where 3Com has a large presence Avaya (900M$) Nortel (Enterprise Large client base. Will try to leverage this Solutions) acquisition by using the Aura platform. What about Nortel’s data offerings??? Your Text here Your Text here Cisco (3.4B$) Tandberg To Push high-definition imaging systems and videoconferencing Logitech (405M$) LifeSize To offer HD video communications systems for other settings besides the desktop Riverbed (40M$) Expand Excessive demand for video compression and to avoid Cisco from “stealing” Expand Aman Computers (?) ArtNet Experts Small market –interesting changes: 2009’s downturn had had its tolls Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  • 16. Networking “Breaking News” Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  • 17. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  • 18. Main Theme: Your Text here Complexity! Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
  • 19. What have we had in mind? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  • 20. What actually happened? Complexity! Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
  • 21. 10th grade mathematics – reliability chain 99% Your Text here 99% 99% Your Text here 97% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
  • 22. The Converged Datacenter Cisco UCS HP BladeSystem Matrix Data ERP CRM Warehouse Database Mail and Messaging File, Print, Infrastructure Your Text here Your Text here Resource Pool IBM CloudBurst Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
  • 23. Future Datacenter Infrastructure Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 23 http://www.sincerelysustainable.com/buildings/google-utilizes-cool-climate-to-cool-its-
  • 24. Giants Face-Off Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
  • 25. “Classic” Infrastructure Department: Before Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
  • 26. “Classic” Infrastructure Department: After Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
  • 27. Infrastructure Department: After DC Convergence Infra. Manager Your Text here Your Text here PC System/Storage/Networking DBA Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  • 28. Local Area Network Vendors - Israeli Market Positioning 1Q10 Cisco Local Support Player Your Text here Your Text here Worldwide Leader Juniper Enterasys HP 3COM Alcatel-Lucent Avaya-Nortel This analysis should be used with its Foundry supporting documents Extreme Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
  • 29. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
  • 30. Main Theme: The Business is conquering the infrastructure Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
  • 31. Three Pillars of Application Delivery Technology Process People Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
  • 32. An ADC Player is Like A Decathlon Athlete Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
  • 33. Application Delivery Controllers: What is the Pressure? Globalization: Pushing business process to the network’s edge Centralization / Consolidation: Compliance, control, Cost cutting, Security, Efficiencies / resource utilization Text here Your Your Text here Enterprise & WebMonster Application: Architectures, Increased adoption of browser-based apps, Rich clients (AJAX), Web 2.0 technologies, SOA Service Provider Services Architectures: Next Generation Networks, Video, Messaging Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
  • 34. Application Delivery Controllers: What is the Pressure? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 34
  • 35. Solutions??? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
  • 36. Application Delivery Controllers (ADC) ADC are designed to improve the availability, efficiency, performance and security of web-based or IP-based applications* Your Text here Your Text here L4-L7 Server off- redirection, TCP load (SSL Caching, Network- load- connection termination, NAT compression level security balancing multiplexing TCP and failover connection) * Gartner Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
  • 37. Application Delivery Controllers (ADC) - Israeli Market Positioning 1Q10 Solutions to Watch: Array Barracuda Brocade Crescendo Local Support Player Your Text here Your Text here Worldwide F5 Leader Radware Cisco Citrix This analysis should be used with its supporting documents Market Presence *Most CC in the market are Avaya Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
  • 38. WAN Optimization - Israeli Market Positioning 1Q10 Local Support Player Your Text here Riverbed Your Text here Worldwide Leader Cisco Blue Coat Citrix Radware F5 This analysis should be used with its supporting documents Juniper Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
  • 39. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
  • 40. Corporate Telephony Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
  • 41. Main Theme (…again): The Business is conquering the infrastructure Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
  • 42. Remember the “Classic” Infrastructure Department? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 42
  • 43. VOIP and UC -Technology Maturity VOIP Your Text here Your Text here UC Shahar Maor’s work Copyright 2010 @STKI Do not remove source Economics from any graphic or portion of graphic Source: Computer or attribution 43
  • 44. VOIP and UC -Technology Risk/Reward Analysis UC VOIP Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source Economics from any graphic or portion of graphic Source: Computer or attribution 44
  • 45. Why Move to IPTel? upgrading the LAN/ moving to a new office high management costs ROI analysis justifies IPTel Your Text here Your Text here inadequate local support Current solution doesn't meet business requirements other 0% 10% 20% 30% 40% 50% 60% 70% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
  • 46. What is the Importance of VOIP? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
  • 47. Changing the Way Your Business Communicates Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
  • 48. Changing the Way Your Business Communicates Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
  • 49. Moving-on to Unified Communications Which of the Following Justifies the Implementation of a UC solution? Better Team Work 62% Higher User Experience Your Text here 54% Your Text here Unique Features 54% Long-Term Cost Savings 38% Higher Employ Productivity 23% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
  • 50. Who Should Manage UC? Don't Know 8% CombinedOther 15% Your Text here Networkinghere Your Text Unit 54% Applications Unit 23% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
  • 51. Future Telephony Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
  • 52. Contact Centers: Trends SIP (Session Initiation Protocol) age The arrival of web/videoconferencing Going home, literally –Contact center mobility Your Text here Your Text here The live agent –A true skill-based routing Analyzed up the tailbone –More use of performance analytics and workforce optimization tools Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
  • 53. New Contact Centers: Focus on IP Signaling Gateways Application Services I N A P / IS U P Your Text here H.248 Your Text here MGCP Speech Services Open Voice System RTP MRCP T D SIP M Media Gateways IP PBXes Source: Genesys Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
  • 54. From Marketing-driven Architecture Telephony IVR Prepaid IVR Email Reader A1 Voice Service Call Center City Guide A1 for You Voice Mail Your Text here Your Text here Application Interface Billing, Customer Profile, CRM, Monitoring, Maintenance Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
  • 55. To Service-Driven Architecture Telephony VoiceXML Browser A1 Voice Service Call Center Prepaid IVR Ringback Tones Mobile PBX Voice Mail Mobile Campaigning Your Text here Your Text here Standardised Interfaces Billing, Customer Profile, CRM, Monitoring, Maintenance Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
  • 56. Contact Centers Preferred Communication Channels-Customers choice Your Text here Your Text here Italy United States http://www.genesyslab.com/system/files/Genesys_US_Survey09_screen.pdf Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
  • 57. VOIP (Enterprise IP Telephony) - Israeli Market Positioning 1Q10 Cisco Local Support Player Your Text here Your Text here Worldwide Avaya-Nortel Leader Tadiran 3COM This analysis should be used with its Alcatel-Lucent supporting documents Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
  • 58. Contact Center Infrastructure - Israeli Market Positioning 1Q10 Solutions to Watch: Solutions to Watch: Siemens Local Support Player Your Text here Avaya-Nortel Your Text here Worldwide Leader Genesys Aspect Cisco Alcatel-Lucent This analysis should be used with its Cosmocom supporting documents Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
  • 59. Unified Communications - Israeli Market Positioning 1Q10 Local Support Player Your Text here Microsoft Your Text here Worldwide Leader Cisco Avaya-Nortel This analysis should be used with its Alcatel-Lucent supporting documents Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
  • 60. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
  • 61. Main Theme: Availability and reachable service Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
  • 62. Network Operations and Monitoring: What are the Business Needs? Network should be available all the time Highest level of service possible (down goes the “night timeslot”…) Network failures should be located and responded-to ASAP! (money talks) here Your Text Your Text here Future network topology planning must be optimal and consistent with business growth Voice/video monitoring and SLAs by the candidate solution provider must be checked-out, when opting for new solutions Automatic discovery of all network devices: accounted and non- accounted for (who said “NAC”?!) Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 62
  • 63. Network Operations and Monitoring: What is the Pressure? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
  • 64. Network Operation Centers Your Text here Your Text here http://www.netscout.com/docs/thirdparty/NetScout_3pv_Metzler_Application_Delivery_Handbook.pdf Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
  • 65. Network Operations and Monitoring: What Kind of Solutions are Available? Basic network monitors (SNMP based) • SNMP-Collectors Usually provide an on-line availability map Mission centric • Usually provide one function: protocol analysis, VOIP monitoring, system Your Text here etc. monitoring Your Text here Combined • systems that provide both basic network monitoring as well as specific functions (mission centric) Super Tools • general purpose, high volume (ESM solutions) Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
  • 66. Network Monitoring–Major Players Enterprise System Network Management Monitoring BMC AvalonNet Centerity CA Your Text here EMC Your Text here HP Perform-Net IBM SolarWinds Others… Others… Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
  • 67. RSS Alert: Upcoming Round-Table Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
  • 68. Networking Integrators - Israeli Market Positioning 1Q10 (Leaders) Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
  • 69. Networking’s Agenda General trends Mergers and acquisitions Datacenter convergence and infrastructure complexity ApplicationText here Your Delivery Your Text here Voice (IP Telephony, Contact Centers and Unified Communications) Network Monitoring Staffing, Spending and Employee Ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
  • 70. Networking Staffing Ratios-Israel Average IT size: 95 FTE Your Text here Your Text here 0-1 FTE 2-5 FTE >5 FTE Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
  • 71. Networking Staffing Ratios Ratios of data/voice Ratios of data/voice networking Personnel networking Personnel (Israel) (Abroad) 6% of IT unit Your Text here 7.7% of ITText here Your unit Shahar Maor’s work Copyright Source for Do not remove source or attributionEconomics or portion of graphic 2010 @STKI abroad figure: Computer from any graphic 71
  • 72.
  • 73. Printing/Output Management’s Agenda Printing Consolidation Your Text here Your Text here Output Management Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
  • 74. Main Theme: Your Text here Efficiency & technology Text here Your Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
  • 75. Printing: Israeli Market Size (M$) 2009 changes 2010 changes 2011 changes 2012 Departmenta l Printers 82.0 3.66% 85.0 7.06% 91.0 9.89% 100.0 Personal 65.0 -7.69% 60.0 3.33% 62.0 4.84% 65.0 Printers Your Text here Your Text here Output Management 38.0 5.26% 40.0 10.00% 44.0 9.09% 48.0 Printing VAS 30.0 16.67% 35.0 14.29% 40.0 12.50% 45.0 totals 215.0 2.33% 220.0 7.73% 237.0 8.86% 258.0 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
  • 76. STKI Index-2009/2010 Distribution Tools 7% Miscellaneous 11% Output Management Miscellaneous 28% 13% Your Text here Your Text here Fax Services Prices & Cost 18% Reduction 25% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
  • 77. Printing Maturity: Progress Graph The Higher you “climb” –The More efficient You Are Output efficiency 80% Mainly High-tech sector 60% 40% Followers Your Text here Your TextAverage here 20% Leaders 0% Mainly Financial/government sectors Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
  • 78. Optimize Infrastructure: The Beginning… Your Text here Your Text here Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
  • 79. Optimize Infrastructure: Assessment Your Text here Your Text here Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
  • 80. Optimize Infrastructure: Solution Your Text here Your Text here Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 80
  • 81. Manage Environment: The Beginning… Your Text here Your Text here Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
  • 82. Manage Environment: Assessment Your Text here Your Text here Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 82
  • 83. Manage Environment: Find a Solution Your Text here Your Text here Improve workflow!! Improve workflow { Before HP } 1 Source: IPG, HP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 83
  • 84. Manage Environment –Recommendations • Printer consumables are often ad hoc purchases made at Centralize procurement the departmental level • Money can be saved if procurement is coordinated • “Regular” print jobs should use both sides of the “Duplexing” paper Your Text here • Don’t go beyond the printer specifications Your Text here Printer’s Specs • Establish some process controls and assessments In-house vs. Out-sourcing on when an outside vendor should be used • First distribute, then print Think Digital! Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 84
  • 85. Manage Environment –Recommendations • Printer consumables are often ad hoc purchases made at Centralize procurement the departmental level • Money can be saved if procurement is coordinated • “Regular” print jobs should use both sides of the “Duplexing” paper Your Text here • Don’t go beyond the printer specifications Your Text here Printer’s Specs • Establish some process controls and assessments In-house vs. Out-sourcing on when an outside vendor should be used • First distribute, then print Think Digital! Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 85
  • 86. Printing Consolidation in “Real-Life” Your Text here Your Text here Source: MalamTeam, 2009 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 86
  • 87. Printing Consolidation in “Real-Life” Employees/printers ratio by months (target is 1 output device per 3 employees) Your Text here Your Text here Total output cost: 37% savings Total output cost: 2,634K₪ 1,661K₪ Source: MalamTeam, 2009 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 87
  • 88. Printing/Output Management’s Agenda Printing Consolidation Your Text here Your Text here Output Management Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 88
  • 89. The Need for Output Management  Each application requires distinct business process definitions • Data Collection, Visual enhancement, Document distribution  Duplicate effort - each separate output channels requires a new design…  Requires significant IT staff involvement  Document and Template design – complex, time consuming, requires expensive IT resources Your Text here Your Text here >20 >10 1-5 Number of different output-generation Platforms in Enterprise organizations >5 Source: Autofont Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 89
  • 90. Output Management Architecture -PrintBOS Your Text here Your Text here Source: Consist Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 90
  • 91. Output Management Architecture - FreeForm App1 App2 App3 FreeForm Data Interactive Data structures generated by enterprise applications Interfaces Data Data Data Interfaces to any application platform, enables gradual implementation Analyzers Others Watched Folder LPR/LPD Web Service Printer Queue Direct API Modular analyzers for treatment of any structured/ unstructured data, open to Others Application Name XSF Offset & Length Column & Row XML proprietary data structures Design Your Text here Your Text here for dynamic output Templates Rich design generation, based on templates, data values and Channels quantity (+scripting) Distribution Modular support for multiple distribution channels (print, view, etc) FreeForm Interactive Interactive and mixed-mode Email data feed into forms Print Display MMS Pint Press Internet Fax Other services Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 91
  • 92. Output Management Round-Table Insights Output management is very “close Output management requires to the business” cross-unit thinking (IT and beyond) Your Text here Your Text here Managing many different output Some organizations in Israel are platforms have become too complex looking for holistic solutions Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
  • 93. Output Management - Israeli Market Positioning 1Q10 Solutions to Watch: SAP Oracle EMC Local Support Consist (PrintBos) Player Your Text here Your Text here Autofont Worldwide (FreeForm) Leader InfoPrint Adobe BMC (LifeCycle) Aman (FormIT) ISIS-Papyrus This analysis should be used with its HP supporting documents Bottomline (FormScape) Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 93
  • 94. Output Management –Digital Signature Wiki: a mathematical scheme for demonstrating the authenticity of a digital message or document Your Text here Your Text here Name: ID: Source: Comsign Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 94
  • 95. Output Management –Digital Signature A comparison between digital signature and hand-written signature: Digital signature hand-written signature Court admission? Yes Yes Ease of use “Single click” Signing every Your Text here Your Text here individual page in some cases Archiving Digital –relatively Hard-copy. Storage small storage. consuming. Document can be Changes to the No real protection. forged? original document Much easier to “breaks” the forge than DS. signature Non-repudiation Yes No Shahar Maor’s work Copyright 2010 @STKI Do Source: Comsign not remove source or attribution from any graphic or portion of graphic 95
  • 96. Output Management –Digital Signature Digital signature improve security, workflow and save money! Growing demand for Authentication and integrity in Israel should push (…at last) the use of DS forward Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 96
  • 97. "The security business has no future...The security industry is dead“ (IBM ISS general manager, Val Rahamani 2008) Your Text here Your Text here “spam and other content security issues would be "solved" in a few years” (Bill Gates, 2006) Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 97
  • 98. Security’s Agenda General trends Security Issues for Cloud Computing Virtualization security Mobile security NetworkText here Your security Your Text here Anti-X protection Data protection Security Monitoring & Control Best SU of 2009 Staffing and ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 98
  • 99. Information Security: Israeli Market Size (M$) 2009 changes 2010 changes 2011 changes 2012 Security 85.0 23.53% 105.0 4.76% 110.0 9.09% 120.0 Software GRC & Your Text here 50.0 50.00% 75.0 9.33% 82.0 Your Text here 9.76% 90.0 BCP Security 85.0 11.76% 95.0 8.42% 103.0 6.80% 110.0 VAS totals 220.0 25.00% 275.0 7.27% 295.0 8.47% 320.0 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 99
  • 100. What’s on the CISO’s Agenda? (STKI Index 2009) Sec Tools SIEM/SOC 5% Miscellaneous 5% 5% NAC Encryption 18% 9% Access/Authenti Market/Trends cation Your Text here Your 15% here Text 10% DB/DC SEC EPS/mobile 10% DLP 15% 10% Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 100
  • 101. Some Interesting M&As in the Security Market Buyer (For how much?) Acquisition Why? IBM (225M$) Guardium •expand its portfolio in this area •Added value ability to provide analytics about IT business processes Trend Micro (?) Third Brigade Trend is making Third Brigade a strategic acquisition to assist in its data-center vision CA (?) Orchestria Adds Orchestria's data leak prevention Your Text here Your Text here technology to CA's identity and access management product suites Oracle (7.3B$) Sun Because of Sun’s IDM solutions  Microsystems Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 101
  • 102. Some Interesting M&As in the Security Market Active Acquirers: IT Security M&A Deals Since 2004 Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 102 http://updataadvisors.com/Advisors_Newsletters/Security/it_security_maupdat
  • 103. Types of Incidents (2000-2010) Your Text here Your Text here http://datalossdb.org/statistics Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 103
  • 104. Incidents by Vector (2000-2010) Your Text here Your Text here http://datalossdb.org/statistics Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 104
  • 105. Incidents by Vector (2009) Your Text here Your Text here http://datalossdb.org/statistics Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 105
  • 106. www.stki.info is in the Trend… Your Text here STKI.INFOhere Your Text HAS BEEN DEFACED 18.12.2009 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 106
  • 107. “Our” Quick Response…. MODERN WORLD STRIKES BACK!!! 6.1.2010 Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 107
  • 108. RSS Alert: Upcoming Round-Table Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 108
  • 109. Security’s Agenda General trends Security Issues for Cloud Computing Virtualization security Mobile security NetworkText here Your security Your Text here Anti-X protection Data protection Security Monitoring & Control Best SU of 2009 Staffing and ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 109
  • 110. Main Theme: Your Text here Cautiousness Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 110
  • 111. Cloud Computing Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic http://www.powerpoint-search.com/what-is-cloud-computing-ppt.html 111
  • 112. Cloud Characteristics Your Text here Your Text here http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk- Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 112
  • 113. Cloud Security Your Text here Your Text here Source: http://csrc.nist.gov/groups/SNS/cloud-computing/ Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 113
  • 114. Cloud Security Reasons not to adopt SaaS: Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI by IGT,remove source or attribution from any graphic 2010 Source: SaaS survey – Do not Israel SaaS center & STKI, March or portion of graphic 114
  • 115. How Does Cloud Computing Affect the “Security Triad”? Confidentiality Your Text here Your Text here Availability Integrity Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 115
  • 116. Cloud Risk Assessment NETWORK INSECURE OR MANAGEMENT Probability INEFFECTIVE DELETION OF DATA ISOLATION FAILURE CLOUD PROVIDER MALICIOUS INSIDER - ABUSE OF Your Text here HIGH Your Text here PRIVILEGE ROLES MANAGEMENT INTERFACE COMPROMISE (MANIPULATION, AVAILABILITY OF INFRASTRUCTURE) LOSS OF GOVERNANCE COMPLIANCE RISK FROM CHALLENGES CHANGES OF JURISDICTION Impact http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk- Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 116
  • 117. Cloud Regulations & Recommendations No regulations so far…. Some sources of information and recommendations: • Security Guidance for Critical Areas of Focus in Cloud Computing, V2.1 • ENISA Cloud Computing Risk Assessment • OECD -Cloud Computing and Public Policy • World Privacy Forum Privacy In The Clouds ReportYour Text here Your Text here • NIST -Effectively and Securely Using the Cloud • "Cloud Computing Security: Raining On The Trendy New Parade," BlackHat • AWS Security Whitepaper Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 117
  • 118. Security’s Agenda General trends Security Issues for Cloud Computing Virtualization security Mobile security NetworkText here Your security Your Text here Anti-X protection Data protection Security Monitoring & Control Best SU of 2009 Staffing and ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 118
  • 119. Main Theme: Your Text here “Mind the gap” Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 119
  • 120. Bridging the Gap Your Text here Your Text here Virtualization is moving rapidly into production environments Companies concerned about security issues and lack of security products Virtualization opens up gaps in traditional physical network analysis and security Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 120
  • 121. Virtualization attacks Root Partition Guest Partitions Provided by: Ring 3: User Mode Virtualization Stack Windows WMI Provider Guest Applications Virtualization VM Worker VM Processes ISV Service Attackers Your Text here Your Text here Virtualization Service OS Server Core Virtualization Kernel Clients Service (VSCs) Windows Kernel Device Providers Drivers (VSPs) VMBus VMBus Enlightenments Ring 0: Kernel Mode Windows hypervisor Server Hardware Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 121
  • 122. How to Protect? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 122
  • 123. What to Protect? Both Guests and Host are subjected to attacks Full disk encryption? Some challenges of VM architecture: • separation of duties • Where, exactly, are my VMs located? Your Text here Your Text here • How to manage old VM images? • How to retire Virtual Machines? • Hypervisor vulnerabilities • Lack of solid auditing capabilities • More and more… Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 123
  • 124. Virtualization Security Solutions: Altor Your Text here Your Text here http://altornetworks.com/news-events/rsa-10-most-interesting Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 124
  • 125. Virtualization Security Solutions: CatBird Your Text here Your Text here http://www2.catbird.com/our_services/vmware.php Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 125
  • 126. Virtualization Security Solutions: Reflex Change Control & Configuration Monitoring Virtual Security (FW/IDS/IPS) CPU, Memory, Network & Storage Performance Software Asset Management Your Text here Virtual Infrastructure Discovery & Mapping Your Text here Timeline & Alerts for Audit & Compliance Virtual Infrastructure Alarms & Alerts http://www.reflexsystems.com/Products/VMC Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 126
  • 127. Virtualization Security Recommendations  Follow best practices: • VMWare: http://www.vmware.com/pdf/vi3_301_201_server_config.pdf • Microsoft: http://www.microsoft.com/downloads/details.aspx?displaylang= en&FamilyID=2220624b-a562-4e79-aa69-a7b3dffdd090 Your Text here Your Text here • Citrix: http://support.citrix.com/servlet/KbServlet/download/20639- 102-532852/user_security-1.0-5.5.0-en_gb.pdf • Explore (cautiously!!) third party’s solutions Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 127
  • 128. Security’s Agenda General trends Security Issues for Cloud Computing Virtualization security Mobile security NetworkText here Your security Your Text here Anti-X protection Data protection Security Monitoring & Control Best SU of 2009 Staffing and ratios Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 128
  • 129. Main Theme: Your Text here Fast-growing Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 129
  • 130. Remote Access -Customer Needs Secure Access from Managed and Unmanaged Devices Simplified and Granular Access Control Application Interoperability Outside the Corporate Network Text here Your Your Text here Full Enablement of Mobile Devices 2 factor authentication for all applications Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 130
  • 131. Connectivity Approach Each session is tailored according to its user and the device in use, maximizing security and productivity for that session. Internal & External Managed & Private Users Unmanaged Devices Resources Financial Legacy Apps Partner or Home PC Limited Intranet Financial Agent Field Home PC Custom Financials Partner or Field Agent Your Text here Logistics Your Text here Kiosk Kiosk Limited Webmail: Partner no attachments Web Apps Logistics Partner Client-Server Apps Corporate Full Intranet Supply Chain Project Manager Laptop Legacy Apps Employee Payroll & HR File Access Project Manager Third-Party Apps Employee Corporate Remote Unmanaged Laptop Homegrown Apps Technician Managed Webmail Tech Support App Partner PC EmployeeRemote Unmanaged File Access Technician Partner PC Employee Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic download.microsoft.com/documents/uk/.../IGA2009_UAG_Bill_Orme.pptx 131
  • 132. Solution Architecture (UAG) •Exchange •CRM •SharePoint Mobile •IIS based •IBM, SAP, Home / Friend / Oracle Kiosk Internet HTTPS (443) TS Direct Access Your Text here Your Text here Non web Business Partners / Authentication AD, ADFS, Sub - Contractors End-point health detection RADIUS, LDAP…. Enterprise Readiness Edge Ready Corporate Network Employees Managed Machines Information Leakage Prevention Internet / home / hotel / other company Non-Windows Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic download.microsoft.com/documents/uk/.../IGA2009_UAG_Bill_Orme.pptx 132
  • 133. Secure Remote Access - Israeli Market Positioning 1Q10 Juniper Local Support Player Your Text here Checkpoint Your Text here Microsoft Worldwide Leader Citrix SonicWall Cisco This analysis should be used with its F5 supporting documents Array Market Presence Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 133
  • 134. “Strong” Authentication - Israeli Market Positioning 1Q10 Solutions to Watch: ANB Local Support Player Your Text here RSA Your Text here Safenet-Aladdin Worldwide Leader Cidway Vasco Fast Movement Atena biometric solutions* This analysis should be used with its supporting documents * Biometric solutions are still Market Presence considered “niche market” in Israel Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 134
  • 135. Mobile Security: What worries CISOs? Internal users: Central management Corporate data on device (encryption, DLP) Devices welfare (AV) ? Your Text here Your Text here External users: Sensitive traffic interception Masquerading Identity theft Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 135
  • 136. Mobile Security: What worries Customers? Your Text here Your Text here Source: Data Innovation, Inc. 2010 Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 136