1. Your Text here Your Text here
Shahar Geiger Maor
shahar@stki.info
Visit My Blog: http://shaharmaor.blogspot.com/
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 1
2. On the one hand: Security….
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
3. Information Security
GRC and Security market size (Ms of $)
Your Text here 2008 2009 Your Text here 2010
Governance & Risk Management
(also BCP) 35.0 42% 50.0 50% 75.0
Security (projects) 95.0 -10.53% 85.0 11.76% 95.0
Security (Software) 90.0 -5.56% 85.0 -5.88% 80.0
Total 220 0% 220 14% 250
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
4. Security/Privacy In the News
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
5. Security Trends
Cloud
Outsourcing cyber crime Virtualization
computing
Sensitive or
Inability to properly
confidential
identify and
Your Text here information may Your Text here
authenticate users
not be properly
End-user’s to multiple systems
protected
organization is
External threat of
unable to control
organized cyber
the data
criminal syndicates
management
environment Unauthorized
Third parties might
parties might be
be able to access
able to access
private files without
private files without
authorization
authorization
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
6. Security Trends
Data breaches
involving Peer-to-peer file Web 2.0 and
Mobility
personal sharing mesh-ups
information
Unsupervised
Use of P2P monitoring of
Your Text here Sensitive or might result in Your Text here
confidential the loss of employees’ use
Inability to
information that sensitive or of Web 2.0
properly
ends up in the confidential applications can
identify and
hands of cyber business result in the loss
authenticate
of critical
remote users criminals and information confidential
identity thieves including trade
secrets business data
on the Internet
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
7. On the other hand:
Green IT….
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
8. Green IT
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
9. Green IT –Sample Statistics
Total CO2 emissions across countries (Million Ton):
200
150
Your Text here Your Text here
100
50
0
Source: Israel CBS , McKinsey analysis
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
10. Being Green
Secure mobile access to
Virtualized server, PC and
PC management networks, applications, and
storage environments
data
Your Text here Your Text here
State of the art power and
Intelligent archiving Teleconferencing
cooling (all around)
Working environment (car
Printing consolidation Asset management
pool, working from home…)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
11. Does Green IT and Security combine?
Economics in
Reducing costs =
recession: “Show
Green
me the money”
Your Text here Your Text here
Security Its all about PR:
considerations Almost anything
are conceived as can be sold
a burden under any given
(“nudnik”) Green tag
Security
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
12. How does Green IT and Security
combine?
Secure mobile access to
Virtualized server, PC and
PC management networks, applications, and
storage environments
data
Your Text here Your Text here
State of the art power and
Intelligent archiving Teleconferencing
cooling (all around)
Working environment (car
Printing consolidation Asset management
pool, working from home…)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
13. Servers Virtualization: UTM, Virtual
FW est.…
•Easier to manage = more
Less space, less security
power •What happens if the host has
been penetrated?
Your Text here More
Your Text here
Green?
Secure?
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
14. VDI (Virtual Desktop Infrastructure) –Energy,
Management and Security Efficiency
TCO Comparison Solution A: Solution B: Sun Difference Difference
Cumulative 3 Year Traditional Virtual Desktop (A - B) (A - B)%
Desktop Devices Solution
IT Costs
Desktop Device Costs 3,259,204 NIS 670,834 NIS 2,588,370 NIS 79.4%
Desktop Software Costs 782,627 NIS 461,522 NIS 321,104 NIS 41.0%
Server Infrastructure Costs 296,448 NIS 1,248,949 NIS (952,501 NIS) -321.3%
Desktop Management Labor Costs
Your Text here 5,724,578 NIS 2,137,760 NIS 3,586,818 NIS
Your Text here 62.7%
Desktop Power Costs 314,788 NIS 135,494 NIS 179,294 NIS 57.0%
Total IT Costs 10,377,645 NIS 4,654,559 NIS 5,723,085 NIS 55.1%
Business Operating Costs
Desktop User Productivity Impact 4,473,911 NIS 0 NIS 4,473,911 NIS 100.0%
Business Risks 538,416 NIS 26,919 NIS 511,496 NIS 95.0%
Total Business Operating Costs 5,012,327 NIS 26,919 NIS 4,985,408 NIS 99.5%
Total 15,389,972 NIS 4,681,479 NIS 10,708,493 NIS 69.6%
Source: www.alinean.com
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
15. How does Green IT and Security
combine?
Secure mobile access to
Virtualized server, PC and
PC management networks, applications, and
storage environments
data
Your Text here Your Text here
State of the art power and
Intelligent archiving Teleconferencing
cooling (all around)
Working environment (car
Printing consolidation Asset management
pool, working from home…)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
16. PC -Energy Efficiency and Power Consumption
Why don’t you always shut down your PC when you have finished working for
the day (multiple responses allowed):
It's IT policy or procedure to leave it on
My computer goes to hibernate, or to sleep mode
It takes too long
Your Text here Your Text here
It's a habit
I don't think it's important
It's a hassle
I forget
0% 10% 20% 30% 40% 50%
Source: E1, PC Energy Report
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
17. PC -Energy Efficiency and Power Consumption
Power Usage for Desktop PCs (watts) Idle Sleep Savings
Mean of LBNL-measured Pentium- 4 67.3 3.3 64.0
machines
Mean of 17-inch CRT monitors 61.2 1.8 59.4
Mean of 17-inch LCD monitors 35.3 2.3 33.0
Your Text here
Energy Savings for Desktop Power draw Power draw here
Your Text
Savings per
PCs (kWh) per per year year
year (idle) (Sleep) (Sleep vs. idle)
Typical P4 machine with 17- 791.56 31.42 760.14
inch CRT
Typical P4 machine with 17- 632.02 34.50 597.52
inch LCD
Source: Windows Hardware Developer Central
Source: Windows Hardware Developer Central
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
18. Energy Calculations
Power Cost
Total Watts Power Cost
PC (W) Monitor (W) per Hour
Used per Year
(0.45 ₪/kWh)
Basic PC with
Flat-Screen 60 40 100 0.045 ₪ 394.2 ₪
Monitor
Basic PC with
60 80 140 ₪ 551.88 ₪
CRT Monitor
Your Text here Your Text here
Office PC with
Flat-Screen 0.067 ₪ 587 ₪
110 (3.1) 40 (3.3) 150 (6.4)
Monitor (0.003 ₪) (26.28 ₪)
(sleep mode)
Office PC with
110 80 190 0.08 ₪ 700 ₪
CRT Monitor
High-End PC
with Large 300 50 350 0.15 ₪ 1314 ₪
18
Flat Screen
19. Endpoint Management
Your Text here Your Text here
http://www.symantec.com/business/solutions/enterprise.jsp
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
20. How does Green IT and Security
combine?
Virtualized Secure mobile
server, PC and access to
PC management
storage networks, applicati
environments ons, and data
Your Text here State of the art Your Text here
Intelligent archiving power and cooling Teleconferencing
(all around)
Working
Printing environment (car
Asset management
consolidation pool, working from
home…)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
21. Israeli Output Statistics
Average A4s usage per year per employ:
2,000 4,607 10,000
Average color coverage per page:
1% 11% 71%
Your Text here Your Text here
Average cost per printed page:
0.045 NIS 0.24 NIS 1 NIS
Average percentage of jobs of more than one page:
47% 75% 91%
Source: Prime² (STKI’s modifications )
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
22. Secure Printing
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
23. How does Green IT and Security
combine?
Secure mobile access
Virtualized server, PC
to
PC management and storage
networks, applications,
environments
and data
Your Text here State of the art power Your Text here
Intelligent archiving and cooling (all Teleconferencing
around)
Working environment
Printing consolidation Asset management (car pool, working
from home…)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
24. Green & Secure Billing
Your Text here Your Text here
Source: Comda
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
25. Interactive PDF Form Creation Process
Copy
Files
PrintBOS
Designer
Tool
Archive
Database
Designed
Template with
Static Data Interactive
PDFs View
PrintBOS Server
Compose Your Text here Your Text here
Add Distribute
Static & Output Email
Interactive Interactive
Variable PDF File Att./URL
Elements PDF
Data
Print
Variable Data
from Backend
System (CRM,
Billing, …) Fax
Source: NessPro Israel
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
26. How does Green IT and Security
combine?
Secure mobile
Virtualized server,
access to networks,
PC management PC and storage
applications, and
environments
data
Your Text here State of the art Your Text here
Intelligent archiving power and cooling Teleconferencing
(all around)
Working
Printing environment (car
Asset management
consolidation pool, working from
home…)
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
27. Remote Access via SSLIPSec VPN
Your Text here Your Text here
Source: SonicWall
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
28. One last thing:
Data scrambling + Cloud Computing = Green Security
Your Text here Your Text here
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
29. Your Text here Your Text here
Shahar Geiger Maor
VP & Senior Analyst
shahar@stki.info
Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29