Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Stki Summit 2010 Infra Services V8
1. STKI Summit 2010
Israeli Infrastructure Services Market
Shahar Geiger Maor
CISSP, Senior Analyst
Infrastructure Services
(Security, Networking and Green IT)
www.shaharmaor.blogspot.com
2. Presentation’s Agenda
Networking
Printing and Output Management Your Text here
Your Text here
Information Security
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
3. We will present data on products and integrators:
STKI Israeli Positioning
• Not a technological positioning, refers only to Israeli market
• Represents current Israeli market and not our recommendation
•Focused on enterprise market (not SMB) Vendor A
Market Presence (X) Vendor B
Local Support
Market share - existing and new sales (more emphasis)
Mind share (how user organizations rate vendors)
Your Text here Your Text here Worldwide
Local Support (Y) – is influenced by (X)
Leader
Experience & technical knowledge, localization,
support, number and kind of integrators
Worldwide leaders marked, based on global positioning
Vendors to watch: Are only just entering Israeli market
Vendors to Watch:
so can’t be positioned but should be watched
Vendor C
Market Presence
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
4.
5. Networking’s Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
ApplicationText here
Your Delivery Your Text here
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
6. Enterprise Networking: Israeli Market Size
(M$)
2009 changes 2010 changes 2011 changes 2012
LAN
60.0 8.33% 65.0 15.38% 75.0 20.00% 90.0
equipment
WAN
40.0 12.50% 45.0 37.78% 62.0 12.90% 70.0
equipment Text here
Your Your Text here
VoIP
32.0 9.38% 35.0 14.29% 40.0 12.50% 45.0
equipment
VOIP
35.0 28.57% 45.0 22.22% 55.0 27.27% 70.0
Software
totals 167.0 13.77% 190.0 22.11% 232.0 18.53% 275.0
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
7. Emerging Technology Roadmap Through
2013
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
Source: Infrastructure Executive Council
8. IP Traffic Growth
Your Text here Your Text here
Morgan Stanley, 2009
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
9. Video related Traffic Growth
Your Text here Your Text here
Morgan Stanley, 2009
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
10. Primary Technology Suitability
Your Text here Your Text here
http://www.dbcde.gov.au/__data/assets/pdf_file/0003/54345/bro
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
11. Technologies Categorization 2009
Business Value
Investment
to make money
SAAS/
Cut costs, Increase Cloud
IT Project
productivity Optimization
UC
Business
Project
Billing NGN
Your Text here Your Text here
Commodity IT VOIP Networking IPv6 Size of figure =
Infra. Vir. complexity/
Services Network cost of project
Security
Investment
for regulations
Using Implementing Looking
Market Maturity
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
12. Technologies Categorization 2010
Business Value
Investment
to make money
SAAS/
Cut costs, Increase Cloud
IT Project
productivity Application UC
Delivery Major
Changes
Billing Networking Text here
Your Text here Your
Commodity IT Vir. (DC IPv6 Size of figure =
Infra. VOIP complexity/
Services Network convergence) cost of project
Security
Investment
for regulations
Using Implementing Looking
Market Maturity
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
13. Networking’s Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
ApplicationText here
Your Delivery Your Text here
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
14. Main Theme:
Your Text here
Cloud infrastructureYour Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
15. Interesting M&As in the Networking Market
Buyer (For how much?) Acquisition Comments
HP (2.7B$) 3Com •Strengthens HP's converged data center
product portfolio
•To open up opportunities in China, where
3Com has a large presence
Avaya (900M$) Nortel (Enterprise Large client base. Will try to leverage this
Solutions) acquisition by using the Aura platform.
What about Nortel’s data offerings???
Your Text here Your Text here
Cisco (3.4B$) Tandberg To Push high-definition imaging systems
and videoconferencing
Logitech (405M$) LifeSize To offer HD video communications systems
for other settings besides the desktop
Riverbed (40M$) Expand Excessive demand for video compression
and to avoid Cisco from “stealing” Expand
Aman Computers (?) ArtNet Experts Small market –interesting changes: 2009’s
downturn had had its tolls
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
16. Networking “Breaking News”
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
17. Networking’s Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
ApplicationText here
Your Delivery Your Text here
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
18. Main Theme:
Your Text here
Complexity! Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
19. What have we had in mind?
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
20. What actually happened? Complexity!
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
21. 10th grade mathematics – reliability chain
99% Your Text here 99% 99% Your Text here 97%
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
22. The Converged Datacenter
Cisco UCS
HP BladeSystem Matrix
Data
ERP CRM Warehouse
Database
Mail and Messaging
File, Print,
Infrastructure
Your Text here Your Text here
Resource
Pool
IBM CloudBurst
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
23. Future Datacenter Infrastructure
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
http://www.sincerelysustainable.com/buildings/google-utilizes-cool-climate-to-cool-its-
24. Giants Face-Off
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
25. “Classic” Infrastructure Department: Before
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
26. “Classic” Infrastructure Department: After
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
27. Infrastructure Department:
After DC Convergence
Infra. Manager
Your Text here Your Text here
PC System/Storage/Networking DBA
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
28. Local Area Network Vendors
- Israeli Market Positioning 1Q10
Cisco
Local Support
Player
Your Text here Your Text here
Worldwide
Leader
Juniper
Enterasys HP
3COM
Alcatel-Lucent
Avaya-Nortel
This analysis should be used with its
Foundry supporting documents
Extreme
Market Presence
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
29. Networking’s Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
ApplicationText here
Your Delivery Your Text here
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
30. Main Theme:
The Business is conquering the infrastructure
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
31. Three Pillars of Application Delivery
Technology
Process
People
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
32. An ADC Player is Like A Decathlon Athlete
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
33. Application Delivery Controllers:
What is the Pressure?
Globalization: Pushing business process to the
network’s edge
Centralization / Consolidation: Compliance, control,
Cost cutting, Security, Efficiencies / resource
utilization Text here
Your Your Text here
Enterprise & WebMonster Application: Architectures,
Increased adoption of browser-based apps, Rich
clients (AJAX), Web 2.0 technologies, SOA
Service Provider Services Architectures: Next
Generation Networks, Video, Messaging
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
34. Application Delivery Controllers:
What is the Pressure?
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 34
35. Solutions???
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
36. Application Delivery Controllers (ADC)
ADC are designed to improve the availability, efficiency,
performance and security of web-based or IP-based
applications*
Your Text here Your Text here
L4-L7 Server off-
redirection, TCP load (SSL
Caching, Network-
load- connection termination, NAT
compression level security
balancing multiplexing TCP
and failover connection)
* Gartner
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
37. Application Delivery Controllers (ADC)
- Israeli Market Positioning 1Q10
Solutions to Watch:
Array
Barracuda
Brocade
Crescendo
Local Support
Player
Your Text here Your Text here
Worldwide
F5 Leader
Radware
Cisco
Citrix This analysis should be used with its
supporting documents
Market Presence *Most CC in the market are Avaya
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
38. WAN Optimization
- Israeli Market Positioning 1Q10
Local Support
Player
Your Text here Riverbed Your Text here
Worldwide
Leader
Cisco
Blue Coat
Citrix
Radware
F5 This analysis should be used with its
supporting documents
Juniper
Market Presence
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
39. Networking’s Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
ApplicationText here
Your Delivery Your Text here
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
40. Corporate Telephony
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
41. Main Theme (…again):
The Business is conquering the infrastructure
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
42. Remember the “Classic” Infrastructure
Department?
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 42
43. VOIP and UC -Technology Maturity
VOIP
Your Text here Your Text here
UC
Shahar Maor’s work Copyright 2010 @STKI Do not remove source Economics from any graphic or portion of graphic
Source: Computer or attribution 43
44. VOIP and UC -Technology Risk/Reward Analysis
UC
VOIP
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source Economics from any graphic or portion of graphic
Source: Computer or attribution 44
45. Why Move to IPTel?
upgrading the LAN/ moving to a new
office
high management costs
ROI analysis justifies IPTel
Your Text here Your Text here
inadequate local support
Current solution doesn't meet business
requirements
other
0% 10% 20% 30% 40% 50% 60% 70%
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
46. What is the Importance of VOIP?
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
47. Changing the Way Your Business
Communicates
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
48. Changing the Way Your Business
Communicates
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
49. Moving-on to Unified Communications
Which of the Following Justifies the Implementation of a UC
solution?
Better Team Work
62%
Higher User Experience
Your Text here
54% Your Text here
Unique Features
54%
Long-Term Cost Savings
38%
Higher Employ Productivity 23%
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
50. Who Should Manage UC?
Don't Know
8%
CombinedOther
15%
Your Text here Networkinghere
Your Text Unit
54%
Applications Unit
23%
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
51. Future Telephony
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
52. Contact Centers: Trends
SIP (Session Initiation Protocol) age
The arrival of web/videoconferencing
Going home, literally –Contact center mobility
Your Text here Your Text here
The live agent –A true skill-based routing
Analyzed up the tailbone –More use of
performance analytics and workforce
optimization tools
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
53. New Contact Centers: Focus on IP
Signaling Gateways Application Services
I
N
A
P
/
IS
U
P
Your Text here
H.248
Your Text here
MGCP Speech Services
Open Voice System
RTP MRCP
T
D SIP
M
Media Gateways
IP PBXes
Source: Genesys
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
54. From Marketing-driven Architecture
Telephony
IVR
Prepaid IVR
Email Reader
A1 Voice Service
Call Center
City Guide
A1 for You
Voice Mail
Your Text here Your Text here Application
Interface
Billing, Customer Profile, CRM, Monitoring, Maintenance
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
55. To Service-Driven Architecture
Telephony
VoiceXML Browser
A1 Voice Service
Call Center
Prepaid IVR
Ringback Tones
Mobile PBX
Voice Mail
Mobile Campaigning
Your Text here Your Text here
Standardised Interfaces
Billing, Customer Profile, CRM, Monitoring, Maintenance
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
56. Contact Centers
Preferred Communication Channels-Customers choice
Your Text here Your Text here
Italy United States
http://www.genesyslab.com/system/files/Genesys_US_Survey09_screen.pdf
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
57. VOIP (Enterprise IP Telephony)
- Israeli Market Positioning 1Q10
Cisco
Local Support
Player
Your Text here Your Text here
Worldwide
Avaya-Nortel Leader
Tadiran
3COM
This analysis should be used with its
Alcatel-Lucent supporting documents
Market Presence
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
58. Contact Center Infrastructure
- Israeli Market Positioning 1Q10
Solutions to Watch:
Solutions to Watch:
Siemens
Local Support
Player
Your Text here Avaya-Nortel Your Text here
Worldwide
Leader
Genesys
Aspect
Cisco
Alcatel-Lucent
This analysis should be used with its
Cosmocom supporting documents
Market Presence
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
59. Unified Communications
- Israeli Market Positioning 1Q10
Local Support
Player
Your Text here Microsoft Your Text here
Worldwide
Leader
Cisco
Avaya-Nortel
This analysis should be used with its
Alcatel-Lucent supporting documents
Market Presence
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
60. Networking’s Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
ApplicationText here
Your Delivery Your Text here
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
61. Main Theme:
Availability and reachable service
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
62. Network Operations and Monitoring:
What are the Business Needs?
Network should be available all the time
Highest level of service possible
(down goes the “night timeslot”…)
Network failures should be located and responded-to ASAP!
(money talks) here
Your Text Your Text here
Future network topology planning must be optimal and consistent
with business growth
Voice/video monitoring and SLAs by the candidate solution
provider must be checked-out, when opting for new solutions
Automatic discovery of all network devices: accounted and non-
accounted for (who said “NAC”?!)
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 62
63. Network Operations and Monitoring:
What is the Pressure?
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
64. Network Operation Centers
Your Text here Your Text here
http://www.netscout.com/docs/thirdparty/NetScout_3pv_Metzler_Application_Delivery_Handbook.pdf
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
65. Network Operations and Monitoring:
What Kind of Solutions are Available?
Basic network monitors (SNMP based)
• SNMP-Collectors Usually provide an on-line availability map
Mission centric
• Usually provide one function: protocol analysis, VOIP monitoring,
system Your Text here etc.
monitoring Your Text here
Combined
• systems that provide both basic network monitoring as well as
specific functions (mission centric)
Super Tools
• general purpose, high volume (ESM solutions)
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
66. Network Monitoring–Major Players
Enterprise System Network
Management Monitoring
BMC AvalonNet
Centerity
CA
Your Text here EMC Your Text here
HP
Perform-Net
IBM
SolarWinds
Others… Others…
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
67. RSS Alert: Upcoming Round-Table
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
68. Networking Integrators
- Israeli Market Positioning 1Q10 (Leaders)
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
69. Networking’s Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
ApplicationText here
Your Delivery Your Text here
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
70. Networking Staffing Ratios-Israel
Average IT size:
95 FTE
Your Text here Your Text here
0-1 FTE 2-5 FTE >5 FTE
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
71. Networking Staffing Ratios
Ratios of data/voice Ratios of data/voice
networking Personnel networking Personnel
(Israel) (Abroad)
6% of IT unit
Your Text here 7.7% of ITText here
Your unit
Shahar Maor’s work Copyright Source for Do not remove source or attributionEconomics or portion of graphic
2010 @STKI abroad figure: Computer from any graphic 71
72.
73. Printing/Output Management’s Agenda
Printing Consolidation
Your Text here Your Text here
Output Management
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
74. Main Theme:
Your Text here
Efficiency & technology Text here
Your
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
75. Printing: Israeli Market Size (M$)
2009 changes 2010 changes 2011 changes 2012
Departmenta
l Printers
82.0 3.66% 85.0 7.06% 91.0 9.89% 100.0
Personal
65.0 -7.69% 60.0 3.33% 62.0 4.84% 65.0
Printers Your Text here Your Text here
Output
Management
38.0 5.26% 40.0 10.00% 44.0 9.09% 48.0
Printing VAS 30.0 16.67% 35.0 14.29% 40.0 12.50% 45.0
totals 215.0 2.33% 220.0 7.73% 237.0 8.86% 258.0
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
76. STKI Index-2009/2010
Distribution Tools
7%
Miscellaneous
11% Output
Management
Miscellaneous 28%
13%
Your Text here Your Text here
Fax Services Prices & Cost
18% Reduction
25%
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
77. Printing Maturity: Progress Graph
The Higher you “climb” –The More efficient You Are
Output efficiency
80%
Mainly High-tech sector
60%
40%
Followers
Your Text here Your TextAverage
here
20%
Leaders
0%
Mainly
Financial/government
sectors
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
78. Optimize Infrastructure: The Beginning…
Your Text here Your Text here
Source: IPG, HP
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
79. Optimize Infrastructure: Assessment
Your Text here Your Text here
Source: IPG, HP
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
80. Optimize Infrastructure: Solution
Your Text here Your Text here
Source: IPG, HP
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 80
81. Manage Environment: The Beginning…
Your Text here Your Text here
Source: IPG, HP
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
82. Manage Environment: Assessment
Your Text here Your Text here
Source: IPG, HP
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 82
83. Manage Environment: Find a Solution
Your Text here Your Text here
Improve workflow!!
Improve workflow
{ Before HP }
1
Source: IPG, HP
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 83
84. Manage Environment –Recommendations
• Printer consumables are often ad hoc purchases made at
Centralize procurement the departmental level
• Money can be saved if procurement is coordinated
• “Regular” print jobs should use both sides of the
“Duplexing” paper
Your Text here
• Don’t go beyond the printer specifications
Your Text here
Printer’s Specs
• Establish some process controls and assessments
In-house vs. Out-sourcing on when an outside vendor should be used
• First distribute, then print
Think Digital!
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 84
85. Manage Environment –Recommendations
• Printer consumables are often ad hoc purchases made at
Centralize procurement the departmental level
• Money can be saved if procurement is coordinated
• “Regular” print jobs should use both sides of the
“Duplexing” paper
Your Text here
• Don’t go beyond the printer specifications
Your Text here
Printer’s Specs
• Establish some process controls and assessments
In-house vs. Out-sourcing on when an outside vendor should be used
• First distribute, then print
Think Digital!
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 85
86. Printing Consolidation in “Real-Life”
Your Text here Your Text here
Source: MalamTeam, 2009
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 86
87. Printing Consolidation in “Real-Life”
Employees/printers ratio by months
(target is 1 output device per 3 employees)
Your Text here Your Text here
Total output cost:
37% savings Total output cost:
2,634K₪
1,661K₪
Source: MalamTeam, 2009
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 87
88. Printing/Output Management’s Agenda
Printing Consolidation
Your Text here Your Text here
Output Management
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 88
89. The Need for Output Management
Each application requires distinct business process definitions
• Data Collection, Visual enhancement, Document distribution
Duplicate effort - each separate output channels requires a new
design…
Requires significant IT staff involvement
Document and Template design – complex, time consuming, requires
expensive IT resources
Your Text here Your Text here
>20
>10
1-5
Number of different
output-generation
Platforms in Enterprise
organizations
>5
Source: Autofont
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 89
90. Output Management Architecture -PrintBOS
Your Text here Your Text here
Source: Consist
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 90
91. Output Management Architecture -
FreeForm
App1 App2 App3 FreeForm Data
Interactive Data structures generated by
enterprise applications
Interfaces
Data Data Data
Interfaces to any application
platform, enables gradual
implementation
Analyzers
Others Watched Folder LPR/LPD Web Service Printer Queue Direct API Modular analyzers for
treatment of any structured/
unstructured data, open to
Others Application Name XSF Offset & Length Column & Row XML proprietary data structures
Design
Your Text here Your Text here for dynamic output
Templates
Rich design
generation, based on
templates, data values and
Channels quantity (+scripting)
Distribution
Modular support for multiple
distribution channels (print,
view, etc)
FreeForm Interactive
Interactive and mixed-mode
Email data feed into forms
Print Display
MMS Pint Press
Internet Fax
Other services
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 91
92. Output Management Round-Table Insights
Output management is very “close Output management requires
to the business” cross-unit thinking (IT and beyond)
Your Text here Your Text here
Managing many different output Some organizations in Israel are
platforms have become too complex looking for holistic solutions
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
93. Output Management
- Israeli Market Positioning 1Q10
Solutions to Watch:
SAP
Oracle
EMC
Local Support
Consist
(PrintBos) Player
Your Text here Your Text here
Autofont Worldwide
(FreeForm) Leader
InfoPrint Adobe
BMC (LifeCycle)
Aman (FormIT)
ISIS-Papyrus
This analysis should be used with its
HP supporting documents
Bottomline
(FormScape)
Market Presence
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 93
94. Output Management –Digital Signature
Wiki: a mathematical scheme for demonstrating the
authenticity of a digital message or document
Your Text here Your Text here
Name:
ID:
Source: Comsign
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 94
95. Output Management –Digital Signature
A comparison between digital signature
and hand-written signature:
Digital signature hand-written
signature
Court admission? Yes Yes
Ease of use “Single click” Signing every
Your Text here Your Text here
individual page in
some cases
Archiving Digital –relatively Hard-copy. Storage
small storage. consuming.
Document can be Changes to the No real protection.
forged? original document Much easier to
“breaks” the forge than DS.
signature
Non-repudiation Yes No
Shahar Maor’s work Copyright 2010 @STKI Do Source: Comsign
not remove source or attribution from any graphic or portion of graphic 95
96. Output Management –Digital Signature
Digital signature improve security, workflow and save
money!
Growing demand for Authentication and integrity in Israel
should push (…at last) the use of DS forward
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 96
97. "The security business has no future...The security industry is dead“ (IBM
ISS general manager, Val Rahamani 2008)
Your Text here Your Text here
“spam and other content security issues would be "solved" in a few
years” (Bill Gates, 2006)
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 97
98. Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText here
Your security Your Text here
Anti-X protection
Data protection
Security Monitoring & Control
Best SU of 2009
Staffing and ratios
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 98
99. Information Security:
Israeli Market Size (M$)
2009 changes 2010 changes 2011 changes 2012
Security
85.0 23.53% 105.0 4.76% 110.0 9.09% 120.0
Software
GRC & Your Text here
50.0 50.00% 75.0 9.33% 82.0 Your Text here
9.76% 90.0
BCP
Security
85.0 11.76% 95.0 8.42% 103.0 6.80% 110.0
VAS
totals 220.0 25.00% 275.0 7.27% 295.0 8.47% 320.0
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 99
100. What’s on the CISO’s Agenda?
(STKI Index 2009)
Sec Tools
SIEM/SOC
5%
Miscellaneous 5%
5% NAC
Encryption 18%
9%
Access/Authenti
Market/Trends cation
Your Text here Your 15% here
Text
10%
DB/DC SEC
EPS/mobile
10%
DLP 15%
10%
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 100
101. Some Interesting M&As in the Security Market
Buyer (For how much?) Acquisition Why?
IBM (225M$) Guardium •expand its portfolio in this area
•Added value ability to provide analytics
about IT business processes
Trend Micro (?) Third Brigade Trend is making Third Brigade a strategic
acquisition to assist in its data-center vision
CA (?) Orchestria Adds Orchestria's data leak prevention
Your Text here Your Text here
technology to CA's identity and access
management product suites
Oracle (7.3B$) Sun Because of Sun’s IDM solutions
Microsystems
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 101
102. Some Interesting M&As in the Security Market
Active Acquirers: IT Security
M&A Deals Since 2004
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 102
http://updataadvisors.com/Advisors_Newsletters/Security/it_security_maupdat
103. Types of Incidents (2000-2010)
Your Text here Your Text here
http://datalossdb.org/statistics
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 103
104. Incidents by Vector (2000-2010)
Your Text here Your Text here
http://datalossdb.org/statistics
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 104
105. Incidents by Vector (2009)
Your Text here Your Text here
http://datalossdb.org/statistics
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 105
106. www.stki.info is in the Trend…
Your Text here STKI.INFOhere
Your Text HAS
BEEN DEFACED
18.12.2009
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 106
107. “Our” Quick Response….
MODERN WORLD
STRIKES BACK!!!
6.1.2010
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 107
108. RSS Alert: Upcoming Round-Table
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 108
109. Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText here
Your security Your Text here
Anti-X protection
Data protection
Security Monitoring & Control
Best SU of 2009
Staffing and ratios
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 109
110. Main Theme:
Your Text here
Cautiousness Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 110
111. Cloud Computing
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic
http://www.powerpoint-search.com/what-is-cloud-computing-ppt.html 111
112. Cloud Characteristics
Your Text here Your Text here
http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 112
113. Cloud Security
Your Text here Your Text here
Source: http://csrc.nist.gov/groups/SNS/cloud-computing/
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 113
114. Cloud Security
Reasons not to adopt SaaS:
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI by IGT,remove source or attribution from any graphic 2010
Source: SaaS survey – Do not Israel SaaS center & STKI, March or portion of graphic 114
115. How Does Cloud Computing Affect the
“Security Triad”?
Confidentiality
Your Text here Your Text here
Availability Integrity
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 115
116. Cloud Risk Assessment
NETWORK
INSECURE OR MANAGEMENT
Probability
INEFFECTIVE
DELETION OF DATA
ISOLATION
FAILURE
CLOUD PROVIDER
MALICIOUS INSIDER -
ABUSE OF Your Text here
HIGH Your Text here
PRIVILEGE ROLES
MANAGEMENT INTERFACE
COMPROMISE (MANIPULATION,
AVAILABILITY OF
INFRASTRUCTURE)
LOSS OF
GOVERNANCE COMPLIANCE
RISK FROM
CHALLENGES
CHANGES OF
JURISDICTION Impact
http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 116
117. Cloud Regulations & Recommendations
No regulations so far….
Some sources of information and recommendations:
• Security Guidance for Critical Areas of Focus in Cloud Computing, V2.1
• ENISA Cloud Computing Risk Assessment
• OECD -Cloud Computing and Public Policy
• World Privacy Forum Privacy In The Clouds ReportYour Text here
Your Text here
• NIST -Effectively and Securely Using the Cloud
• "Cloud Computing Security: Raining On The Trendy New Parade," BlackHat
• AWS Security Whitepaper
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 117
118. Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText here
Your security Your Text here
Anti-X protection
Data protection
Security Monitoring & Control
Best SU of 2009
Staffing and ratios
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 118
119. Main Theme:
Your Text here
“Mind the gap” Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 119
120. Bridging the Gap
Your Text here Your Text here
Virtualization is moving rapidly into production
environments
Companies concerned about security issues and lack of
security products
Virtualization opens up gaps in traditional physical network
analysis and security
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 120
121. Virtualization attacks
Root Partition Guest Partitions
Provided by:
Ring 3: User Mode
Virtualization Stack Windows
WMI Provider Guest Applications Virtualization
VM Worker
VM Processes ISV
Service
Attackers
Your Text here Your Text here
Virtualization
Service OS
Server Core Virtualization Kernel
Clients
Service (VSCs)
Windows
Kernel Device Providers
Drivers (VSPs) VMBus
VMBus Enlightenments
Ring 0: Kernel Mode
Windows hypervisor
Server Hardware
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 121
122. How to Protect?
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 122
123. What to Protect?
Both Guests and Host are subjected to attacks
Full disk encryption?
Some challenges of VM architecture:
• separation of duties
• Where, exactly, are my VMs located?
Your Text here Your Text here
• How to manage old VM images?
• How to retire Virtual Machines?
• Hypervisor vulnerabilities
• Lack of solid auditing capabilities
• More and more…
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 123
124. Virtualization Security Solutions: Altor
Your Text here Your Text here
http://altornetworks.com/news-events/rsa-10-most-interesting
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 124
125. Virtualization Security Solutions: CatBird
Your Text here Your Text here
http://www2.catbird.com/our_services/vmware.php
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 125
126. Virtualization Security Solutions: Reflex
Change Control & Configuration Monitoring
Virtual Security (FW/IDS/IPS)
CPU, Memory, Network & Storage Performance
Software Asset Management
Your Text here
Virtual Infrastructure Discovery & Mapping Your Text here
Timeline & Alerts for Audit & Compliance
Virtual Infrastructure Alarms & Alerts
http://www.reflexsystems.com/Products/VMC
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 126
127. Virtualization Security Recommendations
Follow best practices:
• VMWare:
http://www.vmware.com/pdf/vi3_301_201_server_config.pdf
• Microsoft:
http://www.microsoft.com/downloads/details.aspx?displaylang=
en&FamilyID=2220624b-a562-4e79-aa69-a7b3dffdd090
Your Text here Your Text here
• Citrix:
http://support.citrix.com/servlet/KbServlet/download/20639-
102-532852/user_security-1.0-5.5.0-en_gb.pdf
• Explore (cautiously!!) third party’s solutions
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 127
128. Security’s Agenda
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
NetworkText here
Your security Your Text here
Anti-X protection
Data protection
Security Monitoring & Control
Best SU of 2009
Staffing and ratios
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 128
129. Main Theme:
Your Text here
Fast-growing Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 129
130. Remote Access -Customer Needs
Secure Access from Managed and Unmanaged Devices
Simplified and Granular Access Control
Application Interoperability Outside the Corporate
Network Text here
Your Your Text here
Full Enablement of Mobile Devices
2 factor authentication for all applications
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 130
131. Connectivity Approach
Each session is tailored according to its user and the device in use,
maximizing security and productivity for that session.
Internal & External Managed & Private
Users Unmanaged Devices Resources
Financial Legacy Apps
Partner or Home PC Limited Intranet
Financial Agent
Field Home PC Custom Financials
Partner or
Field Agent
Your Text here
Logistics Your Text here
Kiosk
Kiosk Limited Webmail:
Partner no attachments
Web Apps
Logistics
Partner Client-Server Apps
Corporate Full Intranet Supply Chain
Project Manager
Laptop Legacy Apps
Employee Payroll & HR File Access
Project Manager Third-Party Apps
Employee Corporate
Remote Unmanaged Laptop Homegrown Apps
Technician Managed Webmail Tech Support App
Partner PC
EmployeeRemote Unmanaged File Access
Technician Partner PC
Employee
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic
download.microsoft.com/documents/uk/.../IGA2009_UAG_Bill_Orme.pptx 131
132. Solution Architecture (UAG)
•Exchange
•CRM
•SharePoint
Mobile
•IIS based
•IBM, SAP,
Home / Friend / Oracle
Kiosk
Internet
HTTPS (443) TS
Direct Access
Your Text here Your Text here
Non web
Business Partners /
Authentication
AD, ADFS,
Sub - Contractors End-point health detection RADIUS, LDAP….
Enterprise Readiness
Edge Ready Corporate Network
Employees Managed Machines Information Leakage Prevention
Internet / home / hotel / other company Non-Windows
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic
download.microsoft.com/documents/uk/.../IGA2009_UAG_Bill_Orme.pptx 132
133. Secure Remote Access
- Israeli Market Positioning 1Q10
Juniper
Local Support
Player
Your Text here Checkpoint Your Text here
Microsoft Worldwide
Leader
Citrix
SonicWall
Cisco
This analysis should be used with its
F5 supporting documents
Array
Market Presence
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 133
134. “Strong” Authentication
- Israeli Market Positioning 1Q10
Solutions to Watch:
ANB
Local Support
Player
Your Text here RSA Your Text here
Safenet-Aladdin Worldwide
Leader
Cidway
Vasco Fast
Movement
Atena
biometric
solutions* This analysis should be used with its
supporting documents
* Biometric solutions are still
Market Presence considered “niche market” in Israel
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 134
135. Mobile Security: What worries CISOs?
Internal users:
Central management
Corporate data on device (encryption, DLP)
Devices welfare (AV) ?
Your Text here Your Text here
External users:
Sensitive traffic interception
Masquerading Identity theft
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 135
136. Mobile Security: What worries
Customers?
Your Text here Your Text here
Source: Data Innovation, Inc. 2010
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 136