summit 2010 infra services shahar
TRANSCRIPT
-
8/9/2019 Summit 2010 Infra Services Shahar
1/199
STKI Summit 2010
Israeli Infrastructure Services Market
Shahar Geiger Maor
CISSP, Senior AnalystInfrastructure Services(Security, Networking and Green IT)
www.shaharmaor.blogspot.com
-
8/9/2019 Summit 2010 Infra Services Shahar
2/199
-
8/9/2019 Summit 2010 Infra Services Shahar
3/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
Presentations Agenda
Networking
Printing and Output Management
Information Security
-
8/9/2019 Summit 2010 Infra Services Shahar
4/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
LocalSupp
ort
Market Presence
Not a technological positioning, refers only to Israeli market
Represents current Israeli market and not our recommendation
Focused on enterprise market (not SMB)
Market Presence (X)
Market share - existing and new sales (more emphasis)
Mind share (how user organizations rate vendors)
Local Support (Y) is influenced by (X)
Experience & technical knowledge, localization,support, number and kind of integrators
Worldwide leaders marked, based on global positioning
Vendors to watch: Are only just entering Israeli market
so cant be positioned but should be watched
We will present data on products and integrators:
STKI Israeli Positioning
Vendor A
Vendor B
Worldwide
Leader
Vendors to Watch:
Vendor C
-
8/9/2019 Summit 2010 Infra Services Shahar
5/199
-
8/9/2019 Summit 2010 Infra Services Shahar
6/199
-
8/9/2019 Summit 2010 Infra Services Shahar
7/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
Networkings Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
Application Delivery
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
-
8/9/2019 Summit 2010 Infra Services Shahar
8/199
k l k
-
8/9/2019 Summit 2010 Infra Services Shahar
9/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
Enterprise Networking: Israeli Market Size(M$)
2009 changes 2010 changes 2011 changes 2012
LAN
equipment60.0 8.33% 65.0 15.38% 75.0 20.00% 90.0
WANequipment
40.0 12.50% 45.0 37.78% 62.0 12.90% 70.0VoIP
equipment32.0 9.38% 35.0 14.29% 40.0 12.50% 45.0
VOIP
Software35.0 28.57% 45.0 22.22% 55.0 27.27% 70.0
totals 167.0 13.77% 190.0 22.11% 232.0 18.53% 275.0
-
8/9/2019 Summit 2010 Infra Services Shahar
10/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
Emerg ng Tec no ogy Roa map T roug2013
Source: Infrastructure Executive Council
-
8/9/2019 Summit 2010 Infra Services Shahar
11/199
-
8/9/2019 Summit 2010 Infra Services Shahar
12/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
IP Traffic Growth
Morgan Stanley, 2009
-
8/9/2019 Summit 2010 Infra Services Shahar
13/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
Video related Traffic Growth
Morgan Stanley, 2009
-
8/9/2019 Summit 2010 Infra Services Shahar
14/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
Primary Technology Suitability
http://www.dbcde.gov.au/__data/assets/pdf_file/0003/54345/bro
-
8/9/2019 Summit 2010 Infra Services Shahar
15/199
-
8/9/2019 Summit 2010 Infra Services Shahar
16/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
Technologies Categorization 2009
Investmentto make money
Cut costs, Increase
productivity
Investmentfor regulations
Commodity IT
Services
Using Implementing Looking
Business Value
Market Maturity
Networking
Vir.
Business
Project
IT Project
Size of figure =complexity/cost of project
IPv6
Network
Security
UC
VOIPInfra.
Optimization
SAAS/
Cloud
Billing NGN
-
8/9/2019 Summit 2010 Infra Services Shahar
17/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
Technologies Categorization 2010
Investmentto make money
Cut costs, Increase
productivity
Investmentfor regulations
Commodity IT
Services
Using Implementing Looking
Business Value
Market Maturity
Networking
Vir. (DC
convergence)
Major
Changes
IT Project
Size of figure =complexity/cost of project
IPv6
Network
Security
UC
VOIPInfra.
Application
Delivery
SAAS/
Cloud
Billing
-
8/9/2019 Summit 2010 Infra Services Shahar
18/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
Networkings Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
Application Delivery
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
-
8/9/2019 Summit 2010 Infra Services Shahar
19/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
Main Theme:Cloud infrastructure
-
8/9/2019 Summit 2010 Infra Services Shahar
20/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
Interesting M&As in the Networking Market
Buyer (For how much?) Acquisition Comments
HP (2.7B$) 3Com Strengthens HP's converged data centerproduct portfolio
To open up opportunities in China, where
3Com has a large presence
Avaya (900M$) Nortel (Enterprise
Solutions)
Large client base. Will try to leverage this
acquisition by using the Aura platform.What about Nortels data offerings???
Cisco (3.4B$) Tandberg To Push high-definition imaging systems
and videoconferencing
Logitech (405M$) LifeSize To offer HD video communications systems
for other settings besides the desktop
Riverbed (40M$) Expand Excessive demand for video compression
and to avoid Cisco from stealing Expand
Aman Computers (?) ArtNet Experts Small marketinteresting changes: 2009s
downturn had had its tolls
-
8/9/2019 Summit 2010 Infra Services Shahar
21/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
Networking Breaking News
-
8/9/2019 Summit 2010 Infra Services Shahar
22/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
Networkings Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
Application Delivery
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
-
8/9/2019 Summit 2010 Infra Services Shahar
23/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
Main Theme:Complexity!
-
8/9/2019 Summit 2010 Infra Services Shahar
24/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
What have we had in mind?
-
8/9/2019 Summit 2010 Infra Services Shahar
25/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
What actually happened? Complexity!
-
8/9/2019 Summit 2010 Infra Services Shahar
26/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
10th grade mathematics reliability chain
99% %99 %99 %97
-
8/9/2019 Summit 2010 Infra Services Shahar
27/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
ERP CRM DataWarehouse
Database
Mail and Messaging
File, Print,Infrastructure
The Converged Datacenter
Cisco UCS
ResourcePool
HP BladeSystem Matrix
IBM CloudBurst
-
8/9/2019 Summit 2010 Infra Services Shahar
28/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
Future Datacenter Infrastructure
http://www.sincerelysustainable.com/buildings/google-utilizes-cool-climate-to-cool-its-
-
8/9/2019 Summit 2010 Infra Services Shahar
29/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
Giants Face-Off
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
-
8/9/2019 Summit 2010 Infra Services Shahar
30/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
Classic Infrastructure Department: Before
-
8/9/2019 Summit 2010 Infra Services Shahar
31/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
Classic Infrastructure Department: After
Infrastructure Department:
-
8/9/2019 Summit 2010 Infra Services Shahar
32/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
Infrastructure Department:After DC Convergence
Infra. Manager
PC System/Storage/Networking DBA
Local Area Network Vendors
-
8/9/2019 Summit 2010 Infra Services Shahar
33/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
Local Area Network Vendors- Israeli Market Positioning 1Q10
LocalSupport
Market Presence
Player
This analysis should be used with its
supporting documents
Alcatel-Lucent
Enterasys
WorldwideLeader
Avaya-Nortel
Juniper
3COM
Extreme
Cisco
Foundry
HP
-
8/9/2019 Summit 2010 Infra Services Shahar
34/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 34
Networkings Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
Application Delivery
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
-
8/9/2019 Summit 2010 Infra Services Shahar
35/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
Main Theme:The Business is conquering the infrastructure
h ill f li i li
-
8/9/2019 Summit 2010 Infra Services Shahar
36/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
Three Pillars of Application Delivery
P
eople
P
rocess
Technology
li i li C ll ( C)
-
8/9/2019 Summit 2010 Infra Services Shahar
37/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
Application Delivery Controllers (ADC)
ADC are designed to improve the availability, efficiency,performance and security of web-based or IP-based
applications*
L4-L7redirection,
load-balancing
and failover
TCPconnection
multiplexing
Server off-load (SSL
termination,TCP
connection)
NATCaching,
compressionNetwork-
level security
* Gartner
l i ik hl hl
-
8/9/2019 Summit 2010 Infra Services Shahar
38/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
An ADC Player is Like ADecathlon Athlete
App cat on De very ontro ers:
-
8/9/2019 Summit 2010 Infra Services Shahar
39/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
App cat on De very ontro ers:What is the Pressure?
Globalization: Pushing business process to thenetworks edge
Centralization / Consolidation: Compliance, control,
Cost cutting, Security, Efficiencies / resource
utilization
Enterprise & WebMonster Application: Architectures,
Increased adoption of browser-based apps, Rich
clients (AJAX), Web 2.0 technologies, SOAService Provider Services Architectures: Next
Generation Networks, Video, Messaging
App cat on De very ontro ers:
-
8/9/2019 Summit 2010 Infra Services Shahar
40/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
App cat on De very ontro ers:What is the Pressure?
Application Delivery Controllers (ADC)
-
8/9/2019 Summit 2010 Infra Services Shahar
41/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
Application Delivery Controllers (ADC)- Israeli Market Positioning 1Q10
LocalSupp
ort
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
*Most CC in the market are Avaya
Radware
Citrix
F5
Cisco
Watch:Solutions to
Crescendo
Array
Brocade
Barracuda
WAN Optimization
-
8/9/2019 Summit 2010 Infra Services Shahar
42/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 42
WAN Optimization- Israeli Market Positioning 1Q10
LocalSupp
ort
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Cisco
Citrix
Radware
Riverbed
Blue Coat
Juniper
F5
N t ki A d
-
8/9/2019 Summit 2010 Infra Services Shahar
43/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 43
Networkings Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
Application Delivery
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
-
8/9/2019 Summit 2010 Infra Services Shahar
44/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 44
Corporate Telephony
-
8/9/2019 Summit 2010 Infra Services Shahar
45/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
Main Theme (again):The Business is conquering the infrastructure
Remember the Classic Infrastructure
-
8/9/2019 Summit 2010 Infra Services Shahar
46/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
Remember the Classic InfrastructureDepartment?
VOIP d UC T h l M t it
-
8/9/2019 Summit 2010 Infra Services Shahar
47/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
VOIP and UC -Technology Maturity
Source: Computer Economics
VOIP
UC
VOIP d UC T h l Ri k/R d A l i
-
8/9/2019 Summit 2010 Infra Services Shahar
48/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
VOIP and UC -Technology Risk/Reward Analysis
Source: Computer Economics
VOIP
UC
Why Move to IPTel?
-
8/9/2019 Summit 2010 Infra Services Shahar
49/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
Why Move to IPTel?
0% 10% 20% 30% 40% 50% 60% 70%
other
Current solution doesn't meet businessrequirements
inadequate local support
ROI analysis justifies IPTel
high management costs
upgrading the LAN/ moving to a newoffice
What is the Importance of VOIP?
-
8/9/2019 Summit 2010 Infra Services Shahar
50/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
What is the Importance of VOIP?
Contact Centers: Trends
-
8/9/2019 Summit 2010 Infra Services Shahar
51/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
Contact Centers: Trends
SIP (Session Initiation Protocol) age
The arrival of web/videoconferencing
Going home, literally Contact center mobilityThe live agent A true skill-based routing
Analyzed up the tailbone More use of
performance analytics and workforceoptimization tools
New Contact Centers: Focus on IP
-
8/9/2019 Summit 2010 Infra Services Shahar
52/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
New Contact Centers: Focus on IP
SIP
IP PBXes
MRCP
Speech Services
Application Services
Open Voice System
H.248
MGCP
Signaling GatewaysI
N
A
P
/
IS
U
P
RTP
Media Gateways
T
D
M
Source: Genesys
From Marketing driven Architecture
http://www.vecommerce.com.au/corporate.htmhttp://www.avaya.com/http://www.nortel.com/ -
8/9/2019 Summit 2010 Infra Services Shahar
53/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
From Marketing-driven Architecture
VoiceM
ail
A1forY
ou
EmailR
eader
A1VoiceService
CityGu
ide
CallCen
ter
PrepaidIVR
Telephony
IVR
Application
Interface
Billing, Customer Profile, CRM, Monitoring, Maintenance
To Service Driven Architecture
-
8/9/2019 Summit 2010 Infra Services Shahar
54/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
To Service-Driven Architecture
Telephony
VoiceXML Browser
Standardised Interfaces
VoiceMa
il
RingbackTone
s
MobileCampaignin
g
A1VoiceServic
e
MobilePB
X
CallCente
r
PrepaidIV
R
Billing, Customer Profile, CRM, Monitoring, Maintenance
Contact Centers
-
8/9/2019 Summit 2010 Infra Services Shahar
55/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
Contact Centers
http://www.genesyslab.com/system/files/Genesys_US_Survey09_screen.pdf
Preferred Communication Channels-Customers choice
United StatesItaly
ang ng t e Way Your Bus ness
-
8/9/2019 Summit 2010 Infra Services Shahar
56/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
ang ng t e Way Your Bus nessCommunicates
Moving on to Unified Communications
-
8/9/2019 Summit 2010 Infra Services Shahar
57/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
Moving-on to Unified Communications
Higher Employ Productivity
Long-Term Cost Savings
Unique Features
Higher User Experience
Better Team Work
23%
38%
54%
54%
62%
Which of the Following Justifies the Implementation of a UC
solution?
Who Should Manage UC?
-
8/9/2019 Summit 2010 Infra Services Shahar
58/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
Who Should Manage UC?
Networking Unit
54%Applications Unit
23%
Combined\Other
15%
Don't Know8%
F t T l h
-
8/9/2019 Summit 2010 Infra Services Shahar
59/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
Future Telephony
VOIP (Enterprise IP Telephony)
-
8/9/2019 Summit 2010 Infra Services Shahar
60/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
( p p y)- Israeli Market Positioning 1Q10
LocalSupp
ort
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Alcatel-Lucent
Tadiran
3COM
Avaya-Nortel
Cisco
Contact Center Infrastructure
-
8/9/2019 Summit 2010 Infra Services Shahar
61/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
- Israeli Market Positioning 1Q10
LocalSupp
ort
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Alcatel-LucentCosmocom
Avaya-Nortel
Aspect
Watch:Solutions toWatch:Solutions to
Siemens
Cisco
Genesys
Unified Communications
-
8/9/2019 Summit 2010 Infra Services Shahar
62/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 62
f- Israeli Market Positioning 1Q10
LocalSupp
ort
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Alcatel-Lucent
Cisco
Avaya-Nortel
Microsoft
Networkings Agenda
-
8/9/2019 Summit 2010 Infra Services Shahar
63/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
Networking s Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
Application Delivery
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
-
8/9/2019 Summit 2010 Infra Services Shahar
64/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
Main Theme:Availability and reachable service
Networ perat ons an Mon tor ng:
-
8/9/2019 Summit 2010 Infra Services Shahar
65/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
p gWhat are the Business Needs?
Network should be availableall the time
Highest level of service possible
(down goes the night timeslot)
Network failures should be located and responded-to ASAP!(money talks)
Future network topology planning must be optimal and consistentwith business growth
Voice/video monitoring and SLAs by the candidate solutionprovider must be checked-out, when opting for new solutions
Automatic discovery of all network devices: accounted and non-accounted for (who said NAC?!)
Networ perat ons an Mon tor ng:
-
8/9/2019 Summit 2010 Infra Services Shahar
66/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
p gWhat is the Pressure?
Network Operation Centers
-
8/9/2019 Summit 2010 Infra Services Shahar
67/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
Network Operation Centers
http://www.netscout.com/docs/thirdparty/NetScout_3pv_Metzler_Application_Delivery_Handbook.pdf
Networ perat ons an Mon tor ng:
-
8/9/2019 Summit 2010 Infra Services Shahar
68/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
p gWhat Kind of Solutions are Available?
Basic network monitors (SNMP based) SNMP-CollectorsUsually provide an on-line availability map
Mission centric
Usually provide one function: protocol analysis, VOIP monitoring,system monitoring etc.
Combined
systems that provide both basic network monitoring as well as
specific functions (mission centric)
Super Tools
general purpose, high volume (ESM solutions)
Network MonitoringMajor Players
-
8/9/2019 Summit 2010 Infra Services Shahar
69/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
Network Monitoring Major Players
Enterprise SystemManagement
BMC
CA
HP
IBM
Others
NetworkMonitoring
AvalonNet
CenterityEMC
Perform-Net
SolarWinds
Others
RSS Alert: Upcoming Round-Table
-
8/9/2019 Summit 2010 Infra Services Shahar
70/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
RSS Alert: Upcoming Round Table
-
8/9/2019 Summit 2010 Infra Services Shahar
71/199
Networkings Agenda
-
8/9/2019 Summit 2010 Infra Services Shahar
72/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 72
Networking s Agenda
General trends
Mergers and acquisitions
Datacenter convergence and infrastructure complexity
Application Delivery
Voice (IP Telephony, Contact Centers and Unified Communications)
Network Monitoring
Staffing, Spending and Employee Ratios
Networking Staffing Ratios-Israel
-
8/9/2019 Summit 2010 Infra Services Shahar
73/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
Networking Staffing Ratios Israel
2-5 FTE >5 FTE0-1 FTE
Average IT size:
95 FTE
Networking Staffing Ratios
-
8/9/2019 Summit 2010 Infra Services Shahar
74/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
Networking Staffing Ratios
Ratios of data/voice
networking Personnel
(Israel)
Ratios of data/voice
networking Personnel
(Abroad)
6% of IT unit 7.7% of IT unit
Source for abroad figure: Computer Economics
-
8/9/2019 Summit 2010 Infra Services Shahar
75/199
Printing/Output Managements Agenda
-
8/9/2019 Summit 2010 Infra Services Shahar
76/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
Printing/Output Management s Agenda
Printing Consolidation
Output Management
-
8/9/2019 Summit 2010 Infra Services Shahar
77/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
Main Theme:Efficiency & technology
Printing: Israeli Market Size (M$)
-
8/9/2019 Summit 2010 Infra Services Shahar
78/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
Printing: Israeli Market Size (M$)
2009 changes 2010 changes 2011 changes 2012
Departmenta
l Printers82.0 3.66% 85.0 7.06% 91.0 9.89% 100.0
PersonalPrinters
65.0 -7.69% 60.0 3.33% 62.0 4.84% 65.0
Output
Management38.0 5.26% 40.0 10.00% 44.0 9.09% 48.0
Printing VAS 30.0 16.67% 35.0 14.29% 40.0 12.50% 45.0
totals 215.0 2.33% 220.0 7.73% 237.0 8.86% 258.0
STKI Index-2009/2010
-
8/9/2019 Summit 2010 Infra Services Shahar
79/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
/
Output
Management
28%
Prices & Cost
Reduction
25%
Fax Services
18%
Miscellaneous
13%
Miscellaneous
11%
Distribution Tools
7%
Printing Maturity: Progress GraphTh Hi h li b Th M ffi i Y A
-
8/9/2019 Summit 2010 Infra Services Shahar
80/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 80
TheHigher you climb The More efficient You Are
0%
20%
40%
60%
80%
FollowersAverage
Leaders
Mainly
Financial/government
sectors
Mainly High-tech sector
Output efficiency
Optimize Infrastructure: The Beginning
-
8/9/2019 Summit 2010 Infra Services Shahar
81/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
p g g
Source: IPG, HP
Optimize Infrastructure: Assessment
-
8/9/2019 Summit 2010 Infra Services Shahar
82/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 82
p
Source: IPG, HP
Optimize Infrastructure: Solution
-
8/9/2019 Summit 2010 Infra Services Shahar
83/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 83
p
Source: IPG, HP
Manage Environment: The Beginning
-
8/9/2019 Summit 2010 Infra Services Shahar
84/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 84
g g g
Source: IPG, HP
Manage Environment: Assessment
-
8/9/2019 Summit 2010 Infra Services Shahar
85/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 85
g
Source: IPG, HP
Manage Environment: Find a Solution
-
8/9/2019 Summit 2010 Infra Services Shahar
86/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 86
g
Improve workflow!!
Source: IPG, HP
Manage EnvironmentRecommendations
-
8/9/2019 Summit 2010 Infra Services Shahar
87/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 87
Printer consumables are often ad hoc purchases made at
the departmental level Money can be saved if procurement is coordinatedCentralize procurement
Regular print jobs should use both sides of the
paperDuplexing
Dont go beyond the printer specificationsPrinters Specs
Establish some process controls and assessmentson when an outside vendor should be usedIn-house vs. Out-sourcing
First distribute, then printThink Digital!
Manage EnvironmentRecommendations
-
8/9/2019 Summit 2010 Infra Services Shahar
88/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 88
Printing Consolidation in Real-Life
-
8/9/2019 Summit 2010 Infra Services Shahar
89/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 89
g
Source: MalamTeam, 2009
Printing Consolidation in Real-Life
-
8/9/2019 Summit 2010 Infra Services Shahar
90/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 90Source: MalamTeam, 2009
Employees/printers ratio by months(target is 1 output device per 3 employees)
Total output cost:
2,634K Total output cost:
1,661K 37% savings
Printing/Output Managements Agenda
-
8/9/2019 Summit 2010 Infra Services Shahar
91/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 91
Printing Consolidation
Output Management
The Need for Output Management
-
8/9/2019 Summit 2010 Infra Services Shahar
92/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
Each application requires distinct business process definitions
Data Collection, Visual enhancement, Document distribution Duplicate effort - each separate output channels requires a new
design
Requires significant IT staff involvement
Document and Template design complex, time consuming, requires
expensive IT resources
1-5
>5
>10
>20
Source: Autofont
Number of different
output-generation
Platforms in Enterprise
organizations
Output Management Architecture -PrintBOS
-
8/9/2019 Summit 2010 Infra Services Shahar
93/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 93Source: Consist
Output Management Architecture -FreeForm
-
8/9/2019 Summit 2010 Infra Services Shahar
94/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 94
FreeForm
App3App2App1
Direct APIPrinter QueueWatched Folder Web ServiceLPR/LPDOthers
InterfacesInterfaces to any applicationplatform, enables gradual
implementation
DataDataData
XMLColumn & RowOffset & LengthXSFApplication NameOthers
DataData structures generated by
enterprise applications
AnalyzersModular analyzers fortreatment of any structured/unstructured data, open to
proprietary data structures
Templates
Channels
DistributionModular support for multipledistribution channels (print,
view, etc)
DesignRich design for dynamic outputgeneration, based ontemplates, data values and
quantity (+scripting)
DisplayEmail
Internet Fax MMS Pint Press
Other services
Print
FreeForm
Interactive
FreeForm InteractiveInteractive and mixed-mode
data feed into forms
Output Management Round-Table Insights
-
8/9/2019 Summit 2010 Infra Services Shahar
95/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 95
Output management is very closeto the business
Output management requirescross-unit thinking (IT and beyond)
Managing many different output
platforms have become too complex
Some organizations in Israel are
looking for holistic solutions
Output Management- Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
96/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 96
Israeli Market Positioning 1Q10
LocalSupport
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Consist(PrintBos)
Adobe(LifeCycle)
Autofont(FreeForm)
ISIS-Papyrus
Aman (FormIT)
HP
BMC
Bottomline(FormScape)
InfoPrint
Watch:Solutions to
SAP
OracleEMC
Output ManagementDigital Signature
-
8/9/2019 Summit 2010 Infra Services Shahar
97/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 97
Name:
ID:
Wiki: a mathematical scheme for demonstrating the
authenticity of a digital message or document
Source: Comsign
Output ManagementDigital Signature
-
8/9/2019 Summit 2010 Infra Services Shahar
98/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 98
Digital signature hand-written
signature
Court admission? Yes Yes
Ease of use Single click Signing everyindividual page in
some cases
Archiving Digitalrelativelysmall storage.
Hard-copy. Storage
consuming.
Document can beforged?
Changes to theoriginal document
breaks the
signature
No real protection.Much easier to
forge than DS.
Non-repudiation Yes No
A comparison between digital signature
and hand-written signature:
Source: Comsign
Output ManagementDigital Signature
-
8/9/2019 Summit 2010 Infra Services Shahar
99/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 99
Digital signature improve security, workflow and save
money!
Growing demand for Authentication and integrity in Israel
should push (at last) the use of DS forward
-
8/9/2019 Summit 2010 Infra Services Shahar
100/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 100
spam and other content security issues would be "solved" in a few
years (Bill Gates,2006)
"The security business has no future...The security industry is dead (IBMISS general manager, Val Rahamani 2008)
Securitys Agenda
-
8/9/2019 Summit 2010 Infra Services Shahar
101/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 101
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
Network security
Anti-X protection
Data protection
Security Monitoring & Control
Best SU of 2009
Staffing and ratios
In ormat on ecur ty:Israeli Market Size (M$)
-
8/9/2019 Summit 2010 Infra Services Shahar
102/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 102
Israeli Market Size (M$)
2009 changes 2010 changes 2011 changes 2012
Security
Software85.0 23.53% 105.0 4.76% 110.0 9.09% 120.0
GRC &BCP
50.0 50.00% 75.0 9.33% 82.0 9.76% 90.0
Security
VAS
85.0 11.76% 95.0 8.42% 103.0 6.80% 110.0
totals 220.0 25.00% 275.0 7.27% 295.0 8.47% 320.0
Whats on the CISOs Agenda?(STKI Index 2009)
-
8/9/2019 Summit 2010 Infra Services Shahar
103/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 103
( )
NAC
18%
Access/Authenti
cation15%
EPS/mobile
15%DLP
10%
DB/DC SEC
10%
Market/Trends10%
Encryption
9%
Miscellaneous
5%
SIEM/SOC5%
Sec Tools
5%
Some Interesting M&As in the Security Market
-
8/9/2019 Summit 2010 Infra Services Shahar
104/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 104
g y
Buyer (For how much?) Acquisition Why?
IBM (225M$) Guardium expand its portfolio in this areaAdded value ability to provide analytics
about IT business processes
Trend Micro (?) Third Brigade Trend is making Third Brigade a strategic
acquisition to assist in its data-center vision
CA (?) Orchestria Adds Orchestria's data leak preventiontechnology to CA's identity and access
management product suites
Oracle (7.3B$) Sun
Microsystems
Because of Suns IDM solutions
Some Interesting M&As in the Security Market
-
8/9/2019 Summit 2010 Infra Services Shahar
105/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 105
Active Acquirers: IT Security
M&A Deals Since 2004
http://updataadvisors.com/Advisors_Newsletters/Security/it_security_maupdat
Types of Incidents (2000-2010)
-
8/9/2019 Summit 2010 Infra Services Shahar
106/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 106http://datalossdb.org/statistics
Incidents by Vector (2000-2010)
-
8/9/2019 Summit 2010 Infra Services Shahar
107/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 107http://datalossdb.org/statistics
Incidents by Vector (2009)
-
8/9/2019 Summit 2010 Infra Services Shahar
108/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 108http://datalossdb.org/statistics
www.stki.infois in the Trend
-
8/9/2019 Summit 2010 Infra Services Shahar
109/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 109
STKI.INFO HAS
BEEN DEFACED
18.12.2009
Our Quick Response.
-
8/9/2019 Summit 2010 Infra Services Shahar
110/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 110
MODERN WORLD
STRIKES BACK!!!6.1.2010
RSS Alert: Upcoming Round-Table
-
8/9/2019 Summit 2010 Infra Services Shahar
111/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 111
Securitys Agenda
-
8/9/2019 Summit 2010 Infra Services Shahar
112/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 112
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
Network security
Anti-X protection
Data protection
Security Monitoring & Control
Best SU of 2009
Staffing and ratios
-
8/9/2019 Summit 2010 Infra Services Shahar
113/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 113
Main Theme:Cautiousness
Cloud Computing
-
8/9/2019 Summit 2010 Infra Services Shahar
114/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 114http://www.powerpoint-search.com/what-is-cloud-computing-ppt.html
Cloud Characteristics
-
8/9/2019 Summit 2010 Infra Services Shahar
115/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 115http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-
Cloud Security
-
8/9/2019 Summit 2010 Infra Services Shahar
116/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 116
Source: http://csrc.nist.gov/groups/SNS/cloud-computing/
How Does C ou Comput ng A ect t eSecurity Triad?
-
8/9/2019 Summit 2010 Infra Services Shahar
117/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 117
y
Confidentiality
IntegrityAvailability
Cloud Risk Assessment
-
8/9/2019 Summit 2010 Infra Services Shahar
118/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 118
Probability
Impact
LOSS OF
GOVERNANCE COMPLIANCE
CHALLENGESRISK FROM
CHANGES OF
JURISDICTION
ISOLATION
FAILURE
CLOUD PROVIDER
MALICIOUS INSIDER -ABUSE OF HIGH
PRIVILEGE ROLES
MANAGEMENT INTERFACE
COMPROMISE (MANIPULATION,
AVAILABILITY OF
INFRASTRUCTURE)
INSECURE OR
INEFFECTIVE
DELETION OF DATA
NETWORK
MANAGEMENT
http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-
Cloud Regulations & Recommendations
-
8/9/2019 Summit 2010 Infra Services Shahar
119/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 119
No regulations so far.
Some sources of information and recommendations: Security Guidance for Critical Areas of Focus in Cloud Computing, V2.1
ENISA Cloud Computing Risk Assessment
OECD -Cloud Computing and Public Policy
World Privacy Forum Privacy In The Clouds Report
NIST -Effectively and Securely Using the Cloud
"Cloud Computing Security: Raining On The Trendy New Parade," BlackHat
AWS Security Whitepaper
-
8/9/2019 Summit 2010 Infra Services Shahar
120/199
-
8/9/2019 Summit 2010 Infra Services Shahar
121/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 121
Main Theme:Mind the gap
Bridging the Gap
-
8/9/2019 Summit 2010 Infra Services Shahar
122/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 122
Virtualization is moving rapidly into production
environments
Companies concerned about security issues and lack ofsecurity products
Virtualization opens up gaps in traditional physical network
analysis and security
Virtualization attacks
-
8/9/2019 Summit 2010 Infra Services Shahar
123/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 123
Root Partition
VirtualizationService
Providers(VSPs)
WindowsKernel
Server Core
Device
Drivers
Virtualization Stack
VM WorkerProcessesVM
Service
WMI Provider
Guest Partitions
Ring 0: Kernel Mode
VirtualizationServiceClients(VSCs)
EnlightenmentsVMBus
Server Hardware
Provided by:
Windows
ISV
VirtualizationGuest Applications
Attackers
OSKernel
VirtualizationServiceClients(VSCs)
Enlightenments
Ring 3: User Mode
Windows hypervisor
VMBus
What to Protect?
-
8/9/2019 Summit 2010 Infra Services Shahar
124/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 124
Both Guests and Host are subjected to attacks
Full disk encryption?
Some challenges of VM architecture:
separation of duties
Where, exactly, are my VMs located? How to manage old VM images?
How to retire Virtual Machines?
Hypervisor vulnerabilities
Lack of solid auditing capabilities
More and more
Virtualization Security Solutions: Altor
-
8/9/2019 Summit 2010 Infra Services Shahar
125/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 125http://altornetworks.com/news-events/rsa-10-most-interesting
Virtualization Security Solutions: CatBird
-
8/9/2019 Summit 2010 Infra Services Shahar
126/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 126http://www2.catbird.com/our_services/vmware.php
Virtualization Security Solutions: Reflex
-
8/9/2019 Summit 2010 Infra Services Shahar
127/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 127
Change Control & Configuration Monitoring
Virtual Infrastructure Discovery & Mapping
SoftwareAsset
Management
VirtualSecurity(FW
/IDS/IPS)
CPU,Memory,Ne
twork&StoragePerformance
Timeline & Alerts for Audit & Compliance
Virtual Infrastructure Alarms & Alerts
http://www.reflexsystems.com/Products/VMC
Virtualization Security Recommendations
-
8/9/2019 Summit 2010 Infra Services Shahar
128/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 128
Follow best practices:
VMWare:http://www.vmware.com/pdf/vi3_301_201_server_config.pdf
Microsoft:
http://www.microsoft.com/downloads/details.aspx?displaylang=
en&FamilyID=2220624b-a562-4e79-aa69-a7b3dffdd090 Citrix:
http://support.citrix.com/servlet/KbServlet/download/20639-
102-532852/user_security-1.0-5.5.0-en_gb.pdf
Explore (cautiously!!) third partys solutions
Securitys Agenda
-
8/9/2019 Summit 2010 Infra Services Shahar
129/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 129
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
Network security
Anti-X protection
Data protection
Security Monitoring & ControlBest SU of 2009
Staffing and ratios
-
8/9/2019 Summit 2010 Infra Services Shahar
130/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 130
Main Theme:Fast-growing
Remote Access -Customer Needs
-
8/9/2019 Summit 2010 Infra Services Shahar
131/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 131
Secure Access from Managed and Unmanaged Devices
Simplified and Granular Access Control
Application Interoperability Outside the Corporate
Network
Full Enablement of Mobile Devices
2 factor authentication for all applications
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 131
Connectivity Approach
E h i i t il d di t it d th d i i
-
8/9/2019 Summit 2010 Infra Services Shahar
132/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 132
Managed &Unmanaged Devices
Internal & ExternalUsers
PrivateResources
FinancialPartner or
Field Agent
Project ManagerEmployee
LogisticsPartner
RemoteTechnicianEmployee
CorporateManaged Laptop
Home PC
UnmanagedPartner PC
KioskWeb Apps
Client-Server Apps
Legacy Apps
Third-Party Apps
Homegrown Apps
File Access
Each session is tailored according to its user and the device in use,maximizing security and productivity for that session.
download.microsoft.com/documents/uk/.../IGA2009_UAG_Bill_Orme.pptx
Connectivity Approach
E h i i t il d di t it d th d i i
-
8/9/2019 Summit 2010 Infra Services Shahar
133/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 133
FinancialPartner orField Agent
Project ManagerEmployee
LogisticsPartner
CorporateLaptop
Home PC
Kiosk
Full Intranet
Payroll & HR
Legacy Apps
Custom Financials
Supply Chain
File Access
RemoteTechnicianEmployee
UnmanagedPartner PC Webmail Tech Support App
Limited Webmail:
no attachments
Limited Intranet
Each session is tailored according to its user and the device in use,maximizing security and productivity for that session.
download.microsoft.com/documents/uk/.../IGA2009_UAG_Bill_Orme.pptx
Solution Architecture (UAG)
E change
-
8/9/2019 Summit 2010 Infra Services Shahar
134/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 134
Direct Access
Corporate Network
Business Partners /
Sub - Contractors
Internet
AD, ADFS,
RADIUS, LDAP.
HTTPS (443)
Home / Friend /
Kiosk
Employees Managed Machines
Internet / home / hotel / other company
Mobile
Exchange
CRM
SharePoint
IIS based
IBM, SAP,
Oracle
TS
Non web
Authentication
End-point health detection
Enterprise ReadinessEdge Ready
Information Leakage Prevention
Non-Windows
download.microsoft.com/documents/uk/.../IGA2009_UAG_Bill_Orme.pptx
Secure Remote Access- Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
135/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 135
LocalSup
port
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Cisco
Microsoft
Checkpoint
F5
Juniper
Citrix
Array
SonicWall
Strong Authent cat on- Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
136/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 136
LocalSupport
Market Presence
Player
This analysis should be used with its
supporting documents
RSA
WorldwideLeader
Vasco
Safenet-Aladdin
CidwayFastMovement
ANB
Watch:Solutions to
ANB
biometricsolutions*
* Biometric solutions are still
considered niche market in Israel
Atena
Mobile Security: What worries CISOs?
-
8/9/2019 Summit 2010 Infra Services Shahar
137/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 137
Internal users:
Central management
Corporate data on device (encryption, DLP)
Devices welfare (AV) ?
External users:
Sensitive traffic interception
Masquerading\ Identity theft
Mo e ecur ty: W at worr esCustomers?
-
8/9/2019 Summit 2010 Infra Services Shahar
138/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 138Source: Data Innovation, Inc. 2010
Secure Mobile-Device Control- Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
139/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 139
LocalSu
pport
Market Presence
Player
This analysis should be used with its
supporting documents
Sybase
WorldwideLeader
Checkpoint
McAfee
FastMovement
Microsoft
Symantec
Sophos (Utimaco)
Trend Micro
RSS Alert: Upcoming Round-Table
-
8/9/2019 Summit 2010 Infra Services Shahar
140/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 140
Securitys Agenda
-
8/9/2019 Summit 2010 Infra Services Shahar
141/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 141
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
Network security
Anti-X protection
Data protection
Security Monitoring & ControlBest SU of 2009
Staffing and ratios
App cat ons Have C ange F rewa sHave Not
-
8/9/2019 Summit 2010 Infra Services Shahar
142/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 142
The gateway at the trustborder is the right place to
enforce policy control- Sees all traffic
- Defines trust boundary
Need to Restore Visibility and Control in the Firewall
BUTApplications Have Changed
- PortsApplications
- IP AddressesUsers
- PacketsContent
www.stallion.ee/.../Palo Alto Networks Stallion Autumn Seminar.pptx
Sprawl Is Not The Answer
-
8/9/2019 Summit 2010 Infra Services Shahar
143/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 143
Internet
More stuff doesnt solve the problem
Firewall helpers have limited view of traffic
Complex and costly to buy and maintain Putting all of this in the same box is just slow
www.stallion.ee/.../Palo Alto Networks Stallion Autumn Seminar.pptx
Paloalto Architecture
-
8/9/2019 Summit 2010 Infra Services Shahar
144/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 144
L2/L3 Networking, HA, Config Management, Reporting
App-ID
Content-ID
Policy Engine
Application ProtocolDetection andDecryption
Application Protocol Decoding
Heuristics
Application Signatures
URL Filtering
Threat Prevention
Data Filtering
User-ID
Content-ID
www.stallion.ee/.../Palo Alto Networks Stallion Autumn Seminar.pptx
Enterprise Network Firewall- Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
145/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 145
LocalSup
port
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Microsoft
Cisco
Checkpoint
Fortinet
Juniper
Watch:Solutions to
Palo-Alto
Intrusion Prevention/Detection Systems -Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
146/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 146
LocalSup
port
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
McAfee
Cisco
Checkpoint
FortinetJuniper
IBM-ISS
Radware Sourcefire(Snort)
3Com (TippingPoint)
Application Firewall- Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
147/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 147
LocalSup
port
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Imperva
IBM*
Microsoft
F5
Breach
Barracuda
Citrix
* More of An XML FW
Radware
Applicure
ProtegrityCisco*
Network Access Control (NAC) Challenges
-
8/9/2019 Summit 2010 Infra Services Shahar
148/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 148
Vendor lock-in -Proprietary solutions require hardware
rip-and-replaceComplexity -Too many moving parts, both in your
network and in the solution
Project scope -Need to secure thousands of endpoints,
hundreds of remote offices, a variety of usercommunities
Disruption of business practices -Confusion, frustration,potential downtime
Support costs -User impact = helpdesk impactUncertain future -Relatively new technology - where is it
going?
NAC Insights
-
8/9/2019 Summit 2010 Infra Services Shahar
149/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 149
NAC has not been fully digested by Israeli
customers in 2008. 2009 was much better.
NAC may be deployed less expensively when it
is an embedded feature of an existing vendor
Israeli NAC Start-ups offer a cost effective
simple solutions Israeli SUs gain Israeli
clients trust
Israeli customers first priority: network
visibility and guest network control
W at s Your rgan zat on s tatusRegarding NAC?
-
8/9/2019 Summit 2010 Infra Services Shahar
150/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 150
Adequate solution
in place
7%
Inadequate
solution in place
21%
Evlauating
options/POCs
36%
No solution in
place
36%
Network Access Control- Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
151/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 151
LocalSu
pport
Market Presence
Player
This analysis should be used with its
supporting documentsHP
Access Layers
Enterasys
ForeScout
Insightix
WorldwideLeader
McAfee
Microsoft
CiscoSymantec
Juniper
Check Point
Whats
cooking???
Securitys Agenda
-
8/9/2019 Summit 2010 Infra Services Shahar
152/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 152
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
Network security
Anti-X protection
Data protection
Security Monitoring & ControlBest SU of 2009
Staffing and ratios
Internet Security
-
8/9/2019 Summit 2010 Infra Services Shahar
153/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 153
87% E-mail Traffic in 2009 Detected as Spam (Symantec)
rank of the overall 2009 threat landscape (CA):
Infections of W32.Downadup/Conficker
-
8/9/2019 Summit 2010 Infra Services Shahar
154/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 154http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_downadup_codex_ed1.pdf
Top ten W32.Downadup/Conficker countries
-
8/9/2019 Summit 2010 Infra Services Shahar
155/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 155http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_downadup_codex_ed1.
Security Protection Suites- Israeli Market Positioning 1Q10 (Enterprise Leaders Only)
Endpoint SecurityS S it
-
8/9/2019 Summit 2010 Infra Services Shahar
156/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 156
LocalSupport
Market Presence
Local
Support
This analysis should be used with its supporting documents
Microsoft
McAfee
Symantec
Player
WorldwideLeader
Market Presence
Endpoint SecurityServer Security
Trend Micro
Safend
ControlGuard
Checkpoint
SymantecMcAfee
Trend Micro
MicrosoftPromisec
CA*
Calcom*
*Mostly server hardening
Spam: Regions of Origin
-
8/9/2019 Summit 2010 Infra Services Shahar
157/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 157http://eval.symantec.com/mktginfo/enterprise/other_resources/b-state_of_spam_report_01-2010.en-us.pdf
Region oforigin represents the percentage of spam messages reported coming from
certain regions and countries
Spam: Global Categories
-
8/9/2019 Summit 2010 Infra Services Shahar
158/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 158http://eval.symantec.com/mktginfo/enterprise/other_resources/b-state_of_spam_report_01-2010.en-us.pdf
specifically offering or
advertising Internet or
computer-related goods
and services
named after the
section of the
Nigerian penal code:email that alerts an
end user that they are
entitled to a sum of
money
Email Security- Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
159/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 159
LocalSu
pport
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Websense
FastMovement
Microsoft
Hosted/Cloud Solutions:
McAfee
Symantec
Cisco
PineApp
Google (Postini)
Symantec (MessageLabs)
Cisco (Ironport)
McAfee (MX Logic)
Microsoft (Forefront)
Mirapoint SafeNet
Secure Web-Gateway (SAAS) -Zscaler
-
8/9/2019 Summit 2010 Infra Services Shahar
160/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 160
http://www zscaler com/how-it-works html#
Secure Web-Gateway- Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
161/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 161
LocalSu
pport
Market Presence
Player
This analysis should be used with its
supporting documents
BlueCoat
WorldwideLeader
Cisco
Websense
FortinetFastMovement
SafeNet
Watch:Solutions to
Zscaler
McAfee
Symantec
-
8/9/2019 Summit 2010 Infra Services Shahar
162/199
Data Loss Database - 2009 yearly report
-
8/9/2019 Summit 2010 Infra Services Shahar
163/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 163
http://datalossdb org/yearly reports/dataloss-2009 pdf
NAANames/Addresses, SSNSocial Security Numbers, CCNCredit Card Numbers, EMAEmail Addresses,
DOBDate of Birth, MEDMedical, MISCMiscellaneous, ACCAccount Info (Financial), FINFinancial Info
-
8/9/2019 Summit 2010 Infra Services Shahar
164/199
DLP Scenario in Israel
-
8/9/2019 Summit 2010 Infra Services Shahar
165/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 165
No DataClassification
Problem #1
PoorSecurityPolicy
Problem #2
Project Fails Outcome
W at ou e Done n r er toSucceed?
-
8/9/2019 Summit 2010 Infra Services Shahar
166/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 166
Look for yourassets!
Classify andlabel!
Discover andprotectconfidential datawherever it isstored or used
Monitor all datausage
Automate policyenforcement
Safeguardemployeeprivacy
Data Leak/Loss Prevention- Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
167/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 167
LocalSupport
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
FastMovement
Symantec
Verdasys
Websense
RSA
SafendCheckpoint
CAMcAfee
Watch:Solutions to
Microsoft (RMS)
Secure Islands
Covertix
ANB
Open Source DB Protection
G SQL Di
-
8/9/2019 Summit 2010 Infra Services Shahar
168/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 168
GreenSQL Diagram
http://www greensql net/community/docs
Database Protection-Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
169/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 169
LocalSupport
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Sentrigo
IBM(Guardium)
Imperva
Watch:Vendors to
Fortinet
Secerno
FastMovement
Securitys Agenda
G l d
-
8/9/2019 Summit 2010 Infra Services Shahar
170/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 170
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
Network securityAnti-X protection
Data protection
Security Monitoring & ControlBest SU of 2009
Staffing and ratios
SIEM\SOC Round Table Insights
-
8/9/2019 Summit 2010 Infra Services Shahar
171/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 171
One should know how to sell SIEM project to management
Knowing when NOT to start a project
Reporting Systems, Logging and parsing
Tracing the events (real-time?)
Who defines what is risk? How to translate it to HD?
Maintenance and operations: What does it take?
Outsourced SOC (must be taken under consideration)
Security Information & Event Management(SIEM/SOC)- Israeli Market Positioning 1Q10
-
8/9/2019 Summit 2010 Infra Services Shahar
172/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 172
LocalSupport
Market Presence
Player
This analysis should be used with its
supporting documents
Watch:Solutions to
NetIQ
WorldwideLeader
RSA
Symantec
IBM
CA
ArcSight
Cisco
IBM -MSS
TriGeo
Novell
Identity & Access Management (IAM)
-
8/9/2019 Summit 2010 Infra Services Shahar
173/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 173
Identity is a philosophical issuehttp://www.ynet.co.il/articles/0,7340,L-3850908,00.html
The Dubai Gang
Identity & Access Management (IAM)
Th l f IAM i till g i d d IAM i h t
-
8/9/2019 Summit 2010 Infra Services Shahar
174/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 174
The value of IAM is still recognized and IAM is here to
stayGovernance, Risk and Compliance is the main driver of
IAM
There are still significant gaps between the expected and
realized benefits of IAM
A lack of business buy-in is the main cause of IAM project
failure
Israeli organizations tend to prefer SSO and gap analysisrather than a whole IAM project
Causes of IAM projects failure
-
8/9/2019 Summit 2010 Infra Services Shahar
175/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 175
http://www kpmg com sg/publications/Advisory EuropeanIdenty AccessMgtSurvey09 pdf
Identity & Access Management- Israeli Market Positioning 1Q09
-
8/9/2019 Summit 2010 Infra Services Shahar
176/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 176
LocalSupport
Market Presence
IDM Player
This analysis should be used with its
supporting documents
WorldwideLeader
ProminentWAM Player
CANovell
BMC
Microsoft Velo (OS)
IBM
Oracle-Sun
SSO PlayerS
Passlogix S
Imprivata SQuest
RSS Alert: Upcoming Round-Table
-
8/9/2019 Summit 2010 Infra Services Shahar
177/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 177
Securitys Agenda
General trends
-
8/9/2019 Summit 2010 Infra Services Shahar
178/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 178
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
Network securityAnti-X protection
Data protection
Security Monitoring & ControlBest SU of 2009
Staffing and ratios
Local Security Vendors and CISOs DecisionMaking
-
8/9/2019 Summit 2010 Infra Services Shahar
179/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 179
CISO is always
consideringtechnology, localsupport and price
Is a local solutionavailable?
80% chance it willbe among lastthree bidders
Why Israeli CISOs Choose Israeli Info Sec SUs?
-
8/9/2019 Summit 2010 Infra Services Shahar
180/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 180
Best Security Start-Up of 2009(Customers Choice)
-
8/9/2019 Summit 2010 Infra Services Shahar
181/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 181
Security Consultants-Israeli Market Positioning 1Q10 (Leaders)
-
8/9/2019 Summit 2010 Infra Services Shahar
182/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 182
Security System Integrators-Israeli Market Positioning 1Q10 (Leaders)
-
8/9/2019 Summit 2010 Infra Services Shahar
183/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 183
Securitys Agenda
General trends
-
8/9/2019 Summit 2010 Infra Services Shahar
184/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 184
General trends
Security Issues for Cloud Computing
Virtualization security
Mobile security
Network securityAnti-X protection
Data protection
Security Monitoring & Control
Best SU of 2009
Staffing and ratios
Security Echo-System: Key Roles
-
8/9/2019 Summit 2010 Infra Services Shahar
185/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 185
Senior
Management
Custodian
Dataowners
CISO
ecur ty Ec o- ystem:Senior Management Roles
-
8/9/2019 Summit 2010 Infra Services Shahar
186/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 186
1. Define the scope, objectives, priorities and
strategies of the companys Security Program
2. Without managements support efforts mightbe doomed.
3.Ultimate liability
..Ultimate liability
-
8/9/2019 Summit 2010 Infra Services Shahar
187/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 187
CAGEY FELLOWS (from left) Countrywides Angelo Mozilo, Bear Stearns Jimmy Cayne, Lehman Brothers Dick Fuld, and
Merrill Lynchs John Thain
Common Organizational Structures:Financial Sector
-
8/9/2019 Summit 2010 Infra Services Shahar
188/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 188
VPTechnologies
CIO
Dev. Mng.
Security
Infra. Mng.
Security
VP
Operations
CISO
Regulations AccessNew
technologiesSec. Dev.
Common Organizational Structures:ISPs
-
8/9/2019 Summit 2010 Infra Services Shahar
189/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 189
VP of Integration
Security
CIO/VP
CISO
Staff
Infra. Mng.
Security
ommon rgan zat ona tructures:Telecom
-
8/9/2019 Summit 2010 Infra Services Shahar
190/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 190
VP
Operations
Physical
Security
Fraud, DLP
VP
Technologies
CIO
Infra. Mng.
Securitytechnologies
ommon rgan zat ona tructures:Defense
-
8/9/2019 Summit 2010 Infra Services Shahar
191/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 191
CEO
Kabbat
(CSO)
Fraud, DLP
CIO
Infra. Mng.
Securitytechnologies
ommon rgan zat ona tructures:Industrial Companies
-
8/9/2019 Summit 2010 Infra Services Shahar
192/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 192
Kabbat
(CSO)
VP
CIO
Infra. Mng.
CISO/SecuritySystem Network Storage
ommon rgan zat ona tructures:Services #1
-
8/9/2019 Summit 2010 Infra Services Shahar
193/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 193
CISO QACIO
Operations Production ERP, CRM Infrastructure
Security
ommon rgan zat ona tructures:Services #2
-
8/9/2019 Summit 2010 Infra Services Shahar
194/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 194
CISO
CIO
Projects DEV ERP, CRM Infrastructure
Security Security
Budget?
1. Usually very dynamic
-
8/9/2019 Summit 2010 Infra Services Shahar
195/199
Your Text hereYour Text here
Shahar Maors work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 195
y y y
2. In most cases: event/regulation driven instead of policydriven
3. Part of budget may be embedded within other IT units\
projects
4. Approximately 2%-7% of IT budget
Security Budgeting Ratios
-
8/9/2019 Summit 2010 In