Your Text here

Your Text here

Shahar Geiger Maor
VP & Senior Analyst shahar@stki.info

Visit My Blog: http://shaharmaor.blogspot.com/
1

Agenda
1 2 3

Information Security Communication Networking Green IT
Your Text here

Information Security

Networking Your Text here Green IT

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

2

Information Security
GRC and Security market size (Ms of $)
2008 2009 Your Text here

Information Security

Your Text here Governance & Risk Management (also BCP)

2010

Security (projects) Security (Software)
Total

35.0 42% 95.0 -10.53% 90.0 -5.56%
220 0%

50.0 85.0 85.0
220

50% 75.0 11.76% 95.0 -5.88% 80.0
14% 250

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

3

Security/Privacy In the News

Information Security -Trends

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

4

Security Trends
Cloud computing Outsourcing
Sensitive or confidential information may not be properly protected

Information Security -Trends

cyber crime

Virtualization

Your Text here
End-user’s organization is unable to control the data management environment

Inability to properly identify and Your Text here authenticate users to multiple systems External threat of organized cyber criminal syndicates

Unauthorized parties might be able to access private files without authorization

Third parties might be able to access private files without authorization

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

5

Security Trends
Mobility Data breaches involving personal information Peer-to-peer file sharing

Information Security -Trends

Web 2.0 and mesh-ups

Your Text here

Inability to properly identify and authenticate remote users

Sensitive or confidential information that ends up in the hands of cyber criminals and identity thieves

Unsupervised Use of P2P monitoring of might result in Your Text here employees’ use the loss of of Web 2.0 sensitive or applications can confidential result in the loss business of critical information confidential including trade business data secrets on the Internet

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

6

Technologies Categorization 2009
Business Value
Investment to make money Cut costs, Increase productivity
App. Your Text here Sec.
Remote Access

Information Security -Trends

IAM/IDM SSO Anti X EPS SIEM/SOC NAC DLP
DB Sec.

Manage Sec. Services
Cloud

IT Project
Business Project
Size of figure = complexity/ cost of project

Commodity IT Services

Your Text here
Mobile Sec.

Investment for regulations

Network Security

Vir. Sec.

GRC
Using Implementing Looking
7

Market Maturity
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

STKI Madad 2008-2009
Market Players 5% Network DLP 5% 4% Access 18% EPS/Anti x Your Text here 14% Hardening 3%

Information Security -Trends

GRC 5% Miscellaneous 6% Your Text here

NAC 6%

DB Protection 7%

Management 8%

Trends 8%

WAF & Apps 11%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

8

Sophisticated Threat Environment
Writers Tool Writers First-Stage Abusers Hacker or Direct Attack Middle Men Second-Stage Abusers

Information Security -Trends

End Value Fame

Malware Writers Worms

Machine Harvesting

Compromised Host and Application Botnet Creation

Theft Extortionist DDoS for Hire Espionage Spammer Text here Your Extortion Phisher Pharmer/DNS Poisoning Identity Theft Click Fraud Commercial Sales Fraudulent Sales

Your Text Information here
Harvesting Botnet Management Personal Information Information Brokerage Electronic IP Leakage Internal Theft Abuse of Privilege

Viruses

Trojans

Spyware

Financial Fraud
9

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: Cisco Israel

Application Security

Information Security -App. Sec

STKI observation: Secure development should be an integral part of any new project and therefore should be calculated within the project’s budget. STKI survey shows that spendings on secure development scale from 0% of total project budget (Main-Frame based projects) up to 10% ( core web applications projects) of total project budget. here Your Text Your Text here Average spending on secure development is 5% of total project budget (including: training, code review and penetration tests)

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

10

Web Applications - Vulnerabilities
Probability to detect vulnerabilities of different risk degree (results of 32,717 sites and 69,476 vulnerabilities of different degrees of severity)
Your Text here Your Text here

Information Security -App. Sec

% Sites (All)

% Sites (Scanned)

% Sites (Black & Whitebox)
11

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: http://www.webappsec.org/projects/statistics/

Web Applications -Vulnerabilities

Information Security -App. Sec

Vulnerability frequency by types: 1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to system design errors 2. Information Leakage and Predictable Resource Location are often connected with improper system administration (for example, weak access control)

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: http://www.webappsec.org/projects/statistics/

12

Web Application Firewall –Israeli Market Players
Applicure - dotDefender (Apache and IIS)

Information Security -App. Sec

Cisco* - ACE XML Gateway

Barracuda - Web Application Firewall (fromerly NetContinuum) Breach Security - WebDefend
Your Text here

IBM* –Data Power
Your Text here

Microsoft –IAG WAF

Citrix - Application Firewall (Formerly Teros)

Protegrity - Defiance

*Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13

Web Application Firewall –Leading Players -1Q09
Solution F5 - Application Security Manager (ASM) What Should I Know?

Information Security -App. Sec

Representatives/ Integrators

One of the best WAFs around. Features a good Trek-IT (Dis.), policy toolset for adaptive learning. Offer strong Artnet, integration to the TMOS family of products. Taldor, Spider, Superb load balancing capabilities. One of two Bezeq Int., One Your Text here leading solutions in Israel. Strong market Your Text here NewAge, Netcom presence The first in the Israeli market. Imperva has an array of out-of-the-box policies and attack signatures as well as superior learning mode . A leading DB protection solution. Has a significant market share Comsec (Dis.), Netcom, Bynet, Taldor, NewAge, 012 Smile

Imperva – SecureSphere

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

14

Application Security –Israeli Players and Positioning -1Q09

Information Security -App. Sec

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

15

Network Access Control

Information Security -Network Sec

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

16

NAC Insights

Information Security -Network Sec

NAC has not been “fully digested” by Israeli customers in 2008. There should be more activity in 2009 NAC can be deployed less expensively when it is an embedded feature of an existing vendor and customers take notice here it of Your Text Your Text here Israeli customers first priority: implementing a guest networking control Network Security or Endpoint Security?

NAC is a Layer 2 vs. Layer 3 match
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17

STKI Israeli Positioning
• Not a technological positioning, refers only to Israeli market • Focused on enterprise market (not SMB) • Not an STKI recommendation  Market Presence (X) Local Support
Vendor A Vendor B

Information Security -Network Sec

 Market share - existing and new sales (more emphasis)  Mind share (how user organizations rate vendors)  Local Support (Y) – is influenced by (X)  Experience & technical knowledge, localization, support, number and kind of integrators  Worldwide leaders marked, based on global positioning  Vendors to watch: Are only just entering israeli market so can’t be positioned but should be watched Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 18

Worldwide Leader

Vendors to Watch:

Vendor C

- Israeli Market Positioning 1Q09
Vendors to Watch:

NAC

Information Security -Network Sec

HP Procurve Check Point

Local Support

Microsoft Cisco
Player

Symantec Juniper Enterasys McAfee ForeScout Insightix Nortel

Access Layers

XOR SWAT

Worldwide Leader Leap

This analysis should be used with its supporting documents

Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19

Endpoint Security

Information Security -EPS

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

20

Endpoint Security -Threats

Information Security -EPS

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

21

Endpoint Security -Protection

Information Security -EPS

Organization

Outside

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

22

Endpoint Security -Protection

Information Security -EPS

Organization

Outside

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

23

Endpoint Security -Protection
Anti X DLP

Information Security -EPS

Organization

NAC

Outside

Your Text here

Your Text here

Manageability

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

24

Anti -X Suites - Israeli Market Positioning 1Q09 (Enterprise Leaders Only)

Information Security -EPS

Local Support

Symantec McAfee Trend Micro
Player Worldwide Leader

Microsoft

This analysis should be used with its supporting documents

Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25

Data Centric Security

Data Centric Security

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

26

Data Centric Approach

Data Centric Security

Your Text here

Your Text here

Build a wall – “perimeter security”

“Business of Security” – Security is built into the business process

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

27

Data Centric Security Arena

Data Centric Security

DLP Encryption

ERM Database Protection

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

28

Data Leak/Loss Prevention

Data Centric Security -DLP

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

29

Data Leak /Loss Prevention

Data Centric Security -DLP

 DLP is an overall framework into which different elements fit  There are three types of data that may leak:
• Data at rest • DataYourtransit in Text here • Data on endpoints
Your Text here

 No single DLP focus area is full proof, an optimal solution should cover all three areas  DLP is a growing area, and vendors react accordingly
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 30

DLP –Market Status & Players
World Leaders (consolidation in progress…):
• • • • • Symantec (Acquired Vontu, 2007, 350$ M) Websense (Acquired PortAuthority 2007, 90$ M) Reconnex (Acquired by McAfee, July 2008, 46$ M) Tablus Text here Your (Acquired by RSA, 2007, 40$ M) Your Text here Vericept ? Workshare?

Data Centric Security -DLP

Main drivers for DLP are:
• Regulations such as Payment Card Industry (PCI), Accountability Act (HIPAA) • e-mail security, instant messaging (IM) and endpoint monitoring solutions
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 31

DLP –Market Status
DLP Deployments Status -Israel 1Q09

Data Centric Security -DLP

Solution Deployed 20%
Your Text here

“Not There" Yet 60%

PlanYour Text here to Deploy Soon 20%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

32

DLP - Israeli Market Positioning 1Q09
Vendors to Watch:

Data Centric Security -DLP

ProofPoint Workshare IBM (ISS)

Local Support

Player Worldwide Leader Fast Movement

Websense McAfee Verdasys Symantec RSA
This analysis should be used with its supporting documents

Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 33

ERM

(Enterprise Rights Management)

Data Centric Security -ERM

Enterprise Rights Management (ERM) technology—also known as Enterprise DRM or Information Rights Management (IRM) What is it?
• ERMYour Text hereencrypting files that contain Your Text hereand only entails content allowing those users or devices that have proper credentials to decrypt the files and access the content

Awareness of ERM has increased ERM has been growing steadily since it became a technology category unto itself about five years ago
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 34

Applications and File Formats
Used in ERM Implementations

Data Centric Security -ERM

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: Gilbane Group

35

ERM –How Does it Work?
SQL Server

Data Centric Security -DLP

Active Directory

1. New user is authorized to use RMS 2. The User defines set of rules and content usage rights for the data he wants to share – He is the data owner

RMS Server

Your Text here
1 4

3. User distributes data to relevant recipients Your Text here 4. When recipient tries to open a file –a request is sent to the RMS Server in order to authorize/deny access 5. RMS enforces rules made by the data owner

2

3

5

Data owner

Recipient

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: Microsoft Israel

36

ERM -Israeli Market Players

Data Centric Security -ERM

Microsoft -Rights Management Services EMC- EMC Documentum IRM Product Suite Oracle - Oracle Information Rights Management Adobe –Adobe LifeCycle Rights Management Your Text here IsraeliYour Text here SU: Secure Islands -A provider of an advanced information protection and control (IPC) solution Covertix –Develops innovative software technology to track, monitor and control documents and files within and outside the organization
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 37

DB Protection –Market Status
Leading Israeli Players: •Sentrigo •Imperva •Oracle DB Vault Your •Guardium Text here DB encryption: Ged-i (Israeli SU): offers high-level encryption to Storage Data
“Not There" Yet 49% Solution Your Text here Deployed 20%

Data Centric Security -DB Protections

DB Protection Deployments Status -Israel 1Q09

Plan to Deploy Soon 30%

Other\Do Not Know 1%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

38

Masking of Production Data

Data Centric Security -Data Masking

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

39

Masking of Production Data
 What is it?

Data Centric Security -Data Masking

 What is the need?

• The process of data masking is designed to “de-identify” data, such that the data remains based on real information, but no longer has any practical usage or application • The drive to outsource and offshore application development and Your Text here testing work means that organizations will have little control Your Text here over who gets to see their data • Test environments are not physically as secure as production systems • Sensitive data might be downloaded to laptops and stolen • Employees might misuse sensitive information and engage in fraudulent activity
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 40

 What can go wrong?

Masking of Production Data

Data Centric Security -Data Masking

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: Securosis.com

41

SIEM/SOC

SIEM/SOC

Your Text here

Your Text here

42

SIEM/SOC
 What is SIEM?  What is SOC?
• Security Information & Event Management • Security Operation Center

SIEM/SOC

 How does it work?

 Why do we need it?

• Collects and analyzes all log data and basic event management Your Text here Your Text here • monitors and manages all aspects of enterprise security in real time, from a single, centralized location • The NOC of security • Need for real-time awareness of internal/ external threats • Ensure business continuity and comply with regulations • A toolset for improving business logic (Security BI)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 43

Silos of Redundant Information Management

SIEM/SOC

Your Text here

Your Text here

Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

44

An Enterprise Platform for Compliance and Security

SIEM/SOC

Your Text here

Your Text here

SIEM

Source: Network Intelligence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 45

SIEM/SOC

- Israeli Market Positioning 1Q09
Vendors to Watch:

SIEM/SOC

IBM -MSS TriGeo

Local Support

ArcSight EMC Symantec CA IBM Cisco NetIQ
This analysis should be used with its supporting documents

Player Worldwide Leader Fast Movement

Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 46

Next Generation SIEM/SOC: MSS

SIEM/SOC -MSS

What does MSS offer? -Comprehensive solution for security management:
• Firewall/EP Management Service • Intrusion Detection & Prevention Management Service • Vulnerability Management Service

Why should we go there?
• Cost effective! • Use of best-of-breed security

Your Text here

Your Text here

Why shouldn’t we?
• Who owns my data? • No one else in Israel goes there…yet
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 47

MSS Trends in Israel

SIEM/SOC -MSS

STKI observation: MSS is well accepted in SMB
organizations, but Israeli CISOs in enterprises still strongly oppose this trend

The current economic downturn should encourage Your Text here Your Text here some enterprises to reconsider MSS MSS providers addresses the management (CFOs and CEOs) in order to attract new clients

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

48

MSS –World Leaders

SIEM/SOC -MSS

Delivery

Opportunities in Israel for: •Current world leaders (IBM, Symantec) • local ISPs •Network integrators •Traditional OS players

Market Penetration

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

(Source: Frost and Sullivan)

49

Identity & Access Management (IDM/IAM)

IDM/IAM

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

50

IDM Global Mega Trends
 Fraud and identity theft will increase strong

IDM/IAM

authentication use

 Strong authentication and SSO will strengthen their ties  Context-based authorization will put risk analysis here Your Text here Your Text into

access control decisions

 Physical and logical security will continue to converge  Federation will slowly grow

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

51

Trends in the Israeli Market

IDM/IAM

 Nov 2008: CA acquired Eurekify to enhance its role-based management suite  ERP based SOD solutions start to be seen, mainly for GRC reasons:
• 2006: SAP acquired Virsa, enterprise risk management software Your Text here Your Text here provider, to bolster SAP’s software compliance skills • 2008: Oracle acquired Logical Apps, an automated GRC controls, for enterprise applications

 Israeli new GRC enforcement Start-Ups:
• Xpandion -Risk management and behavioral analyzing software solutions • SPATIQ –provides an automated tool for Entitlement Management
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 52

IAM/IDM - Israeli Market Positioning 1Q09
Vendors to Watch:

IDM/IAM

SPATIQ

Local Support

IBM Novell CA BMC Microsoft Oracle Velo (OS)
This analysis should be used with its supporting documents

Player

Sun (OS)

Worldwide Leader Prominent WAM Player

Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 53

Key Success Factors for Future IDM Project

IDM/IAM

Consider IDM also as a business project, rather than a pure IT project Make sure the project bridges the gap between business and IT Your Text  StartYour Text here easier success (Single Signhere a small for On, vertical project)  Choose a step-by-step approach, rather than a mastodon implementation. Focus on basic functionalities not on the additional features
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 54

Security Consultants -Israeli Market Positioning 1Q09 (Leaders)

Information Security -Market Players

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

55

Security Integrators -Israeli Market Positioning 1Q09 (Leaders)

Information Security -Market Players

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

56

Security Distributors -Israeli Market Positioning 1Q09 (Leaders)

Information Security -Market Players

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

57

Agenda
1 2 3

Information Security Communication Networking Green IT
Your Text here

Information Security

Networking Your Text here Green IT

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

58

Networking

Networking

Networking market size (Ms of $)
Your Text here Your Text here

LAN equipment WAN equipment VoIP equipment Totals

2008
80.0 50.0 40.0 170.0 -25.00% -20.00% -20.00% -22.35%

2009
60.0 40.0 32.0 132.0 8.33% 12.50% 25.00% 13.64%

2010
65.0 45.0 40.0 150.0
59

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Networking Future Trends

Networking Trends

Datacenter Networking virtualization Next Generation Networking Internet Protocol (IP) Core and High Speed Broadband Green Networking Your Text here IPv6 Your Text here Network Operating systems Network intelligence and policy control Network Security Communication billing

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

60

Technologies Categorization 2009
Business Value
Investment to make money Cut costs, Increase productivity
Your Text here
SAAS/ Cloud Optimization

Networking Trends

UC
NGN Your Text here
Networking Vir.

IT Project
Business Project
Size of figure = complexity/ cost of project

Billing VOIP Network Security

Commodity IT Services

Infra.

IPv6

Investment for regulations Using Implementing Looking
61

Market Maturity
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Year of savings and productivity
2009 2008 52% 46%
Your Text here

Networking Trends

What networking technologies are you investing-in to enhance employee productivity and collaboration in 2009? (Answer all that apply)

55%

29% 19% 13% NA

36% 31%

32%
Your Text here

23%

1% NA

11% 9%

8%

Shahar Maor’s work Copyright 2009Source: Goldman Sachsor attribution from any graphic or portion of graphic @STKI Do not remove source Research

62

STKI Madad 2008-9
Market Players 8% Nortel 10%
Your Text here

Networking Trends

Optimization 2% UC 8% VOIP and IPTel 20% Network Infra Your Text here 20% Trends 10% Miscellaneous 12%

Network Costs Reduction 10%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

63

Local Area Network Trends
 Security embedded features in the LAN infra are imperative  Network Virtualization is already here  LAN vendors should support standard-based platforms
 Israeli Trends: • •
Your Text here Your Text here

Networking -LAN

Corporate LAN to endpoints is stable: 100 MBIT Ethernet; Backbone LAN: 2 X 1GBIT (10GBIT in some cases) Israeli enterprise tend to “count on” either Cisco or Nortel for their backbone network. Other players appear on the network edges

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

64

- Israeli Market Positioning 1Q09
Vendors to Watch:

LAN

Networking -LAN

Foundry

Local Support

Cisco Nortel
Player Worldwide Leader

Enterasys HP Juniper Alcatel Extreme

3COM

This analysis should be used with its supporting documents

Market Presence
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 65

The Nortel Crisis
From 90K to 30K employees Feb 08: Nortel says it will cut 2,100 jobs Nortel announces 1,300 layoffs

Networking -Nortel

More and more layoffs…

Your Text here Nortel Reports Financial Results for Q3 2008

Nortel says several executives to leave in 2009

Nortel Your Text here files

for bankruptcy protection

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

66

The Nortel Crisis –What’s next?

Networking -Nortel

Nortel files for Chapter 11 to “deal decisively” with its historic debt burdens Nov 10’th 2008: A Nortel spokesman said the company had enough liquidity to sustain 12 to 18 months of operation under the current conditions Your Text here Your Text here Survival still possible for Nortel, but Companies that exit the bankruptcy process often emerge in smaller form and are frequently acquired in part or whole by larger suitors looking for a good deal 19.2.09: Radware has purchased Nortel’s Alteon…
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 67

The Nortel Crisis –Israeli Market ”What if” Analysis

Networking -Nortel

Cisco

Acquiring parts of Nortel?

HP
Juniper

Alliance with Avaya and Microsoft

Acquire Nortel’s Telephony?

Your Text here Gores

Your Text here

•Enterasys (LAN and sec.) •Siemens (Telephony)

Alcatel

Goes deeper into the Israeli market?

3COM

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Goes deeper into the Israeli market?

68

WAN Optimization
VOIP Deployments

Networking -WAN

WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN:

Data Center Consolidation
Your Text here Your Text here

2007 2008

Server Virtualization

BCP/DRP

0%

10% 20% 30% 40% 50% 60% 70% 80% Source: Aberdeen Research
69

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

WAN Optimization - Israeli Market Positioning 1Q09

Networking -WAN

Local Support

Expand Riverbed F5 Cisco Blue Coat Radware Juniper Citrix Packeteer*
This analysis should be used with its supporting documents

Player Worldwide Leader

Market Presence

*June 2008: A Blue Coat company
70

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Voice Over IP (VOIP)

Networking -VOIP

STKI observation: Many enterprises are migrating, or
planning to migrate, their telephony infrastructure from traditional circuit-switched technology to newer Internet Protocol (IP)-based systems
Your Text here Your Text here

 Motivations to actually migrate:
• • End of life/end of support for current telephony infrastructure Moving to a new office/office improvements “Phones are working”

 Motivations to wait:

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

71

VOIP (Enterprise & Call Centers) - Israeli Market Positioning 1Q09
Vendors to Watch:

Networking -VOIP

Asterisk Cisco

Local Support

Player

Nortel Avaya*
Worldwide Leader

Tadiran 3COM Alcatel-Lucent
This analysis should be used with its supporting documents

Market Presence

*Most CC in the market are Avaya
72

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Video Over IP

Networking –Video OIP

 By 2011, 60% of Internet traffic is expected to be video traffic (Cisco)  Global organizations use it as a vital working tool – especially in order to cut travelling costs Your Text here Your Text here  Video technology is considered by many local organizations as mostly “nice to have”  Local organizations use this technology mainly for training/marketing purposes
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 73

Video Over IP Map

Networking –Video OIP

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: http://www.video-over-ip.com/

74

Unified Communications (UC)

Networking –UC

Why do we need this? Integration: Of any or all communications, collaborative, and business applications Presence: guides users to the most appropriate means of communications Mobility: Text here Your extends applications and integration here Your Text of applications every way you go Productivity: improves business processes Why now?

Key drivers today are: Workforce virtualization, Cost reduction, Increasingly available tools, Business improvement opportunities
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

75

UC Challenges

Networking –UC

The problem: business justification for collaboration technologies comes down to “soft dollars”:
• Productivity Your teamwork • Better Text here • Better customer service
Your Text here

How do you define “better”? What is its business value to the company?

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

76

UC Preferred Choice
Cisco Microsoft Avaya Nortel
Your Alcatel-Lucent Text here 5% 3% 3Com

Networking –UC

56% 41% 22% 10%
Your Text here

Nokia-Siemens Newer Vendors Others Unsure 0%

2% 4% 4% 9% 10% 20% 30% 40% 50% 60%
77

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: Goldman Sachs Research

Networking Integrators - Israeli Market Positioning 1Q09 (Leaders)

Networking

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

78

Agenda
1 2 3

Information Security Communication Networking Green IT
Your Text here

Information Security

Networking Your Text here Green IT

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

79

Green IT

Small, incremental changes compounded many times can mean big savings for Your large-scale Text here organizations

Your Text here

80

So, How Can I Be More Green?
PC management Virtualized server and storage environments

Green IT Trends

Secure mobile access to networks, applications, and data
Your Text here

Your Text here

Intelligent archiving

State of the art power and cooling (all around)

Teleconferencing

Go digital! & Printing consolidation

Asset management

Working environment (car pool, working from home…)
81

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

STKI Madad 2008-9 (Not Including Printing)
PC Energy Management 9%

Green IT Trends

Miscellaneous 12%

Trends 38%
Your Text here

Market Players Your Text here 15%

DC Facilities 20% Asset Management 6%
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 82

How Dense is Your Data Center?
What is your average rack power demand (per rack)?
6% 23% 30% 10%

Green Data Center Trends

0 kW to 3 kW 4 kW to 6 kW 7 kW to 9 kW

Your Text here

31%

Your Text here10 kW to 11 kW

12 kW or More

Data Center Environment –Israeli Market (Ms of $)

2008
30.0 33.33%

2009
40.0 25.00% Source: STKI, Information Week

2010
50.0
83

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Electricity Use Trends

Green Data Center Trends

Your Text here

Your Text here

36

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: ASHRAE

84

Data Center Metrics
Power Usage Effectiveness (PUE): PUE = Total Facility Power ÷ IT Equipment Power
Your Text here

Green Data Center Trends

and its reciprocal, the DCiE is defined as: DCiE = 1÷ PUE = (IT Equipment Power ÷ Total Facility Power) x 100%
Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: The Green Grid, EPA

85

Virtualization Calculations
Assumptions (partial list): Average Server Utilization: %5 Number of peak hours:12 Cost per KwH: 11 cents Average servers growth rate per year: 15% Text here Your Text here Your Virtualization:

Green Data Center Virtualization

• level of utilization of servers after virtualization: 50%-70% • Calculations are based on a maximum of two virtual machines per core

Cooling: 1 watt of power for the server to 1.25 watts of power for cooling
Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
86

Virtualization Calculations
Infrastructure Prior to Virtualization Total Number of Servers: Year 1 540 Year 2 641 Year 3 714 Year 4 821 944

Green Data Center Virtualization

Year 5

Power Used for Servers: 1,037,500 1,193,125 (Watts) Server Electric Cost ($) Per Year: Total Cooling Electric Cost ($) Per Year: Total Power & Cooling Cost ($) Per Year:
Your Text here

1,372,094 1,577,908

1,814,594

$1,000,420 $1,150,483 $1,323,055 $1,521,514 $1,749,740 $1,250,525 $1,438,103 $1,653,819 $1,901,892 $2,187,176

Your Text here

$2,250,944 $2,588,586 $2,976,875 $3,423,406 $3,936,916

Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=

87

Virtualization Calculations
Infrastructure After Virtualization Total Workloads: Physical Systems Needed: Year 1 4,170 136 Year 2 4,796 156 78,200 52,394 $75,405 $50,521 $157,408 $283,335 Year 3 5,515 179 89,700 60,099 $86,716 $58,100 $181,019 $325,835 Year 4 6,342 206 102,925 Year 5 7,293 237

Green Data Center Virtualization

Power Used for Servers 68,000 (Peak Watts): Your Servers Power Used forText here 45,560 (Off-Peak watts): Server Electric Cost ($) $65,570 Per Year (Peak): Server Electric Cost ($) $43,932 Per Year (Off-Peak): Total Cooling Electric Cost ($) Per Year: Total Power & Cooling Cost ($) Per Year: $136,877 $246,378

118,450

Your 68,960 Text here 79,361 $99,723 $66,815 $208,172 $374,710 $114,682 $76,837 $239,398 $430,917
88

Virtualization Calculations -ROI
Year 1 50% Utilization 60% Utilization 70% Utilization Year 2 Year 3 Year 4 Year 5

Green Data Center Virtualization

Total ("-" means Savings")

6,074,378$ -1,619,909$
Your Text here

-677,406$

405,174$ 1,688,365$
Your Text here

5,870,602$ -5,931,905$ -9,726,452$

1,911,717$ -2,367,498$ 564,773$ -2,609,364$

-2,129,390$ -1,822,708$ -1,524,026$

-2,583,076$ -2,557,558$ -2,541,227$

Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=

89

VDI (Virtual Desktop Infrastructure) –Energy, Management and Security Efficiency
Assumptions (Partial list):

Green IT Virtualization

• Number of desktop devices under consideration: 500 • Desired virtualization software engine: VMware ESX • Average annual Sun VDS server administration costs per thinYour Text here client: 846.10 NIS Your Text here • FTEs desktop helpdesk support staff: 1.25 • FTEs desktop security management: 0.5 • Number of Desktop security incidents: 2 • Project Implementation Plan (months from kickoff to deployment): 2

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

90

VDI (Virtual Desktop Infrastructure) –Energy, Management and Security Efficiency
TCO Comparison Cumulative 3 Year
IT Costs Desktop Device Costs Desktop Software Costs Server Infrastructure Costs 3,259,204 NIS 782,627 NIS 296,448 NIS 670,834 NIS 461,522 NIS 1,248,949 NIS 2,588,370 NIS 321,104 NIS (952,501 NIS)

Green IT Virtualization

Solution A: Traditional Desktop Devices

Solution B: Sun Virtual Desktop Solution

Difference (A - B)

Difference (A - B)%

79.4% 41.0% -321.3%

Desktop Management Labor Costs

5,724,578 NIS

2,137,760 NIS

3,586,818 NIS

62.7%

Desktop Power Costs here Your Text Total IT Costs
Business Operating Costs Desktop User Productivity Impact

314,788 NIS 10,377,645 NIS

135,494 NIS 4,654,559 NIS

179,294 NIS Your Text here 57.0% 5,723,085 NIS 55.1%

4,473,911 NIS

0 NIS

4,473,911 NIS

100.0%

Business Risks

538,416 NIS

26,919 NIS 26,919 NIS 4,681,479 NIS

511,496 NIS

95.0%

Total Business Operating Costs 5,012,327 NIS Total 15,389,972 NIS

4,985,408 NIS 99.5% 10,708,493 NIS 69.6%
91

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: www.alinean.com

VDI (Virtual Desktop Infrastructure) –Energy, Management and Security Efficiency
ROI Analysis (Solution B) (Probable Case)
Benefits (to Solution B from Current (AS IS)) Cumulative Benefits Investment (Solution B) here Your Text Cumulative Investment Cash Flow Cumulative Cash Flow ROI Risk Adjusted ROI NPV Savings IRR

Green IT Virtualization

Initial

Year 1

Year 2

Year 3

0 NIS

3,115,969 NIS 3,115,969 NIS 312,617 NIS 1,916,913 NIS 2,803,351 NIS 1,199,055 NIS

3,505,821 NIS 3,681,630 NIS 6,621,790 NIS 10,303,420 NIS 170,099 NIS here Your Text 237,175 NIS 2,087,012 NIS 2,324,187 NIS 3,335,722 NIS 3,444,456 NIS 4,534,777 NIS 7,979,233 NIS

1,604,296 NIS 1,604,296 NIS (1,604,296 NIS) (1,604,296 NIS) 343% 288% 6,361,354 NIS 177%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: www.alinean.com

92

PC -Energy Efficiency and Power Consumption
1 ‫סידרה‬

Green IT PC

Why don’t you always shut down your PC when you have finished working for the day? (multiple responses allowed):

It's IT policy or procedure to leave it on My computer goes to hibernate, or to sleep mode It takes too long
Your Text here Your Text here

It's a habit It's a hassle I forget 0% 10%

I don't think it's important

20%

30%

40%

50%
93

Source: E1, PC Energy Report
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

PC Costs Calculations
300*20 Senario 8 7
Annual Cost (Million ₪ )

Green IT PC

300*20 Senario & Vista

300*9 Senario

6 5 4 3 2 1 0
Your Text here Your Text here

Number of Computers
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 94

PC -Energy Efficiency and Power Consumption: An Example

Green IT PC

Your Text here

Your Text here

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Source: www.g-patrol.com

95

PC -Energy Efficiency and Power Consumption: Israeli Market

Green IT PC

STKI observation: Some Israeli organizations, which address the issue of energy efficiency of PCs, use homemade script based solutions
IsraeliYour Text here Players:
Your Text here

• • • •

Microsoft Symantec BigFix Gpatrol –Israeli SU
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 96

Printing

Green IT Printing

STOP PRINTING
Your Text here Your Text here

P Please think of the environment before printing this presentation
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

97

Israeli Output Statistics
Average A4s usage per year per employ:
2,000 4,607 10,000

Green IT Printing

Average color coverage per page:
1%
Your Text here

11%

71%
Your Text here

Average cost per printed page:
0.045 NIS 0.24 NIS

1 NIS

Average percentage of jobs of more than one page: 47% 75%
Source: Prime² (STKI’s modifications )

91%

Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

98

STKI Madad 2008-9
Miscellaneous Distribution Tools 11% Printing 17% Consolidation 20% Outsourcing 9% Monitoring and Cost Reduction 43% Your Text here

Green IT Printing

Your Text here

Printing Projects –Israeli Market Size (Ms of $)

2008

2009

2010

10.0

50.00%

15.0

66.67%

25.0
99

P Please think of the environment before printing this presentation
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

Printing Consolidation

Green IT Printing

In today’s world, printing has become a significant expenditure item for almost every organization A typical large financial organization in Israel spend dozens of millions of Shekels annually on office printing Israeli Office Printing Market has changed great deal Your Text Your Text here since 2007: here
• Users start seeing the great potential in reorganizing their printing environment • The economic crisis pushes many to look for ways to cut costs • Printing consolidation projects usually have a fast, measurable ROI

P Please think of the environment before printing this presentation
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

100

Printing Consolidation -Ratios

Green IT Printing

One of the ways to check the maturity of an organization printing environment is to check its printers/users ratio:
Organization Type Printers/Users Ratio “Heavy Printers” 1:1 Followers 1:5 – 1:15 Consolidated 1:15 – 1:30 High-Tech 1:30+

Your Text here

Your Text here

“Heavy Printers” –Consist of financial organizations, government agencies, law firms est. “High-Tech” –Truly paperless entities (start ups, agile high tech companies est.)

P Please think of the environment before printing this presentation
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

101

Addressing Printing Consolidation Projects

Green IT Printing

Your Text here

Your Text here

P Please think of the environment before printing this presentation
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

102

Printing Consolidation –Bottom Line

Green IT Printing

Your Text here

Your Text here

P Please think of the environment before printing this presentation
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

103

Printing Consolidation –Bottom Line

Green IT Printing

Your Text here

Your Text here

P Please think of the environment before printing this presentation
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

104

Printing Consolidation –Bottom Line

Green IT Printing

Your Text here

Your Text here

P Please think of the environment before printing this presentation
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

105

Printing Consolidation –Bottom Line

Green IT Printing

Your Text here

Your Text here

P Please think of the environment before printing this presentation
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

106

Printing Consolidation –Bottom Line

Green IT Printing

Your Text here

Your Text here

P Please think of the environment before printing this presentation
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

107

Printing Consolidation –Bottom Line

Green IT Printing

Your Text here

Your Text here

P Please think of the environment before printing this presentation
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic

108

Your Text here

Your Text here

Shahar Geiger Maor
VP & Senior Analyst shahar@stki.info

109