SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Your Text here                                                                            Your Text here




Shahar Geiger Maor
shahar@stki.info
Visit My Blog: http://shaharmaor.blogspot.com/

               Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   1
On the one hand: Security….



      Your Text here                                                                            Your Text here




           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   2
Information Security


                     GRC and Security market size (Ms of $)



        Your Text here                       2008                                    2009 Your Text here                      2010
Governance & Risk Management
          (also BCP)                         35.0   42%                              50.0               50%   75.0
     Security (projects)                     95.0 -10.53%                            85.0              11.76% 95.0
    Security (Software)                      90.0 -5.56%                             85.0              -5.88% 80.0
            Total                             220                0%                   220                   14%                   250




             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         3
Security/Privacy In the News




   Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   4
Security Trends

  Cloud
                                 Outsourcing                                cyber crime                              Virtualization
computing

                                         Sensitive or
                                                                                                                   Inability to properly
                                         confidential
                                                                                                                       identify and
           Your Text here             information may                                                    Your Text here
                                                                                                                    authenticate users
                                       not be properly
   End-user’s                                                                                                      to multiple systems
                                          protected
 organization is
                                                                               External threat of
unable to control
                                                                                organized cyber
    the data
                                                                              criminal syndicates
  management
  environment                         Unauthorized
                                                                                                                        Third parties might
                                     parties might be
                                                                                                                         be able to access
                                      able to access
                                                                                                                        private files without
                                   private files without
                                                                                                                            authorization
                                       authorization



                    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          5
Security Trends
                               Data breaches
                                  involving                            Peer-to-peer file                              Web 2.0 and
 Mobility
                                  personal                                 sharing                                     mesh-ups
                                information
                                                                                                        Unsupervised
                                                                               Use of P2P               monitoring of
         Your Text here            Sensitive or                             might result in Your Text here
                                   confidential                                the loss of             employees’ use
  Inability to
                                information that                              sensitive or               of Web 2.0
   properly
                                 ends up in the                               confidential            applications can
 identify and
                                 hands of cyber                                 business              result in the loss
authenticate
                                                                                                          of critical
remote users                      criminals and                               information                confidential
                                 identity thieves                           including trade
                                                                                 secrets                business data
                                                                                                       on the Internet



                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   6
On the other hand:
Green IT….

      Your Text here                                                                            Your Text here




           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   7
Green IT




Your Text here                                                                            Your Text here




     Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   8
Green IT –Sample Statistics

Total CO2 emissions across countries (Million Ton):


         200

         150
        Your Text here                                                                            Your Text here

         100

          50

            0




                                    Source: Israel CBS , McKinsey analysis
             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   9
Being Green

                                                                                          Secure mobile access to
                                          Virtualized server, PC and
  PC management                                                                          networks, applications, and
                                            storage environments
                                                                                                    data




    Your Text here                                                                             Your Text here
                                         State of the art power and
 Intelligent archiving                                                                           Teleconferencing
                                             cooling (all around)




                                                                                          Working environment (car
Printing consolidation                        Asset management
                                                                                         pool, working from home…)



         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   10
Does Green IT and Security combine?

                     Economics in
                                                                   Reducing costs =
                   recession: “Show
                                                                       Green
                    me the money”

      Your Text here                                                                            Your Text here
     Security                                                                                     Its all about PR:
  considerations                                                                                  Almost anything
 are conceived as                                                                                    can be sold
     a burden                                                                                     under any given
    (“nudnik”)                                  Green                                                     tag
                                               Security

          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   11
How does Green IT and Security
           combine?

                                                                                          Secure mobile access to
                                          Virtualized server, PC and
  PC management                                                                          networks, applications, and
                                            storage environments
                                                                                                    data




    Your Text here                                                                             Your Text here
                                         State of the art power and
 Intelligent archiving                                                                           Teleconferencing
                                             cooling (all around)




                                                                                          Working environment (car
Printing consolidation                        Asset management
                                                                                         pool, working from home…)



         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   12
Servers Virtualization: UTM, Virtual
             FW est.…
                                                                    •Easier to manage = more
Less space, less                                                              security
     power                                                        •What happens if the host has
                                                                        been penetrated?


      Your Text here                                                                          More
                                                                                                Your Text here

  Green?
                                                                                             Secure?


          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   13
VDI (Virtual Desktop Infrastructure) –Energy,
            Management and Security Efficiency

TCO Comparison                                 Solution A:                       Solution B: Sun                 Difference             Difference
Cumulative 3 Year                              Traditional                       Virtual Desktop                 (A - B)                (A - B)%
                                               Desktop Devices                   Solution
IT Costs
Desktop Device Costs                           3,259,204 NIS                     670,834 NIS                     2,588,370 NIS          79.4%
Desktop Software Costs                         782,627 NIS                       461,522 NIS                     321,104 NIS            41.0%
Server Infrastructure Costs                    296,448 NIS                       1,248,949 NIS                   (952,501 NIS)          -321.3%
Desktop Management Labor Costs
           Your Text here                      5,724,578 NIS                     2,137,760 NIS                 3,586,818 NIS
                                                                                                             Your Text here             62.7%
Desktop Power Costs                            314,788 NIS                       135,494 NIS                   179,294 NIS              57.0%
Total IT Costs                                 10,377,645 NIS                    4,654,559 NIS                   5,723,085 NIS          55.1%



Business Operating Costs
Desktop User Productivity Impact               4,473,911 NIS                     0 NIS                           4,473,911 NIS          100.0%

Business Risks                                 538,416 NIS                       26,919 NIS                      511,496 NIS            95.0%
Total Business Operating Costs                 5,012,327 NIS                     26,919 NIS                      4,985,408 NIS          99.5%



Total                                          15,389,972 NIS                    4,681,479 NIS                   10,708,493 NIS         69.6%


                                                            Source: www.alinean.com
                       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         14
How does Green IT and Security
           combine?

                                                                                          Secure mobile access to
                                          Virtualized server, PC and
  PC management                                                                          networks, applications, and
                                            storage environments
                                                                                                    data




    Your Text here                                                                             Your Text here
                                         State of the art power and
 Intelligent archiving                                                                           Teleconferencing
                                             cooling (all around)




                                                                                          Working environment (car
Printing consolidation                        Asset management
                                                                                         pool, working from home…)



         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   15
PC -Energy Efficiency and Power Consumption
        Why don’t you always shut down your PC when you have finished working for
                          the day (multiple responses allowed):


          It's IT policy or procedure to leave it on
My computer goes to hibernate, or to sleep mode
                                            It takes too long
             Your Text here                                                                            Your Text here
                                                      It's a habit
                           I don't think it's important
                                                    It's a hassle
                                                            I forget

                                                                          0%         10%           20%          30%            40%    50%
                                                 Source: E1, PC Energy Report
                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic    16
PC -Energy Efficiency and Power Consumption
Power Usage for Desktop PCs (watts)                                                   Idle Sleep Savings
Mean of LBNL-measured Pentium- 4                                                      67.3 3.3    64.0
machines
Mean of 17-inch CRT monitors                                                          61.2                 1.8                   59.4
Mean of 17-inch LCD monitors                                                          35.3                 2.3                   33.0
         Your Text here
Energy Savings for Desktop                        Power draw Power draw here
                                                                     Your Text
                                                                                 Savings per
PCs (kWh)                                             per      per year             year
                                                   year (idle)  (Sleep)        (Sleep vs. idle)
Typical P4 machine with 17-                         791.56       31.42             760.14
inch CRT
Typical P4 machine with 17-                             632.02                            34.50                           597.52
inch LCD
                             Source: Windows Hardware Developer Central
                        Source: Windows Hardware Developer Central
            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          17
Energy Calculations
                                                          Power Cost
                                           Total Watts                Power Cost
                   PC (W)      Monitor (W)                 per Hour
                                              Used                     per Year
                                                         (0.45 ₪/kWh)
Basic PC with
 Flat-Screen            60         40         100         0.045 ₪          394.2 ₪
   Monitor
Basic PC with
                        60         80         140                  ₪       551.88 ₪
CRT Monitor
         Your Text here                                   Your Text here
Office PC with
 Flat-Screen                                              0.067 ₪ 587 ₪
                   110 (3.1)   40 (3.3) 150 (6.4)
   Monitor                                               (0.003 ₪) (26.28 ₪)
(sleep mode)
Office PC with
                    110            80         190          0.08 ₪           700 ₪
CRT Monitor
High-End PC
 with Large         300            50         350          0.15 ₪          1314 ₪
                                                                              18
Flat Screen
Endpoint Management




Your Text here                                                                            Your Text here




       http://www.symantec.com/business/solutions/enterprise.jsp
    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   19
How does Green IT and Security
             combine?
                                                Virtualized                                 Secure mobile
                                              server, PC and                                  access to
 PC management
                                                 storage                                  networks, applicati
                                              environments                                  ons, and data


     Your Text here                        State of the art                                    Your Text here
Intelligent archiving                     power and cooling                                 Teleconferencing
                                             (all around)


                                                                                               Working
     Printing                                                                              environment (car
                                         Asset management
   consolidation                                                                          pool, working from
                                                                                                home…)
         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   20
Israeli Output Statistics
Average A4s usage per year per employ:
    2,000                                           4,607                                              10,000

Average color coverage per page:
      1%                                             11%                                                  71%
   Your Text here                                                                            Your Text here
Average cost per printed page:
   0.045 NIS                                      0.24 NIS                                                1 NIS
Average percentage of jobs of more than one page:

     47%                                             75%                                                  91%


                                   Source: Prime² (STKI’s modifications )
       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   21
Secure Printing




Your Text here                                                                            Your Text here




    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   22
How does Green IT and Security
             combine?

                                                                                          Secure mobile access
                                          Virtualized server, PC
                                                                                                   to
  PC management                                and storage
                                                                                         networks, applications,
                                              environments
                                                                                                and data



     Your Text here                      State of the art power                                Your Text here
 Intelligent archiving                      and cooling (all                                   Teleconferencing
                                                around)



                                                                                          Working environment
Printing consolidation                      Asset management                               (car pool, working
                                                                                             from home…)

         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   23
Green & Secure Billing




  Your Text here                                                                            Your Text here




                                                 Source: Comda
      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   24
Interactive PDF Form Creation Process
                                                                                                                                          Copy
                                                                                                                                          Files

 PrintBOS
 Designer
   Tool
                                                                                                                                         Archive
                                                                                                                                         Database
         Designed
       Template with
        Static Data                                                                                      Interactive
                                                                                                            PDFs                           View
                                 PrintBOS Server

 Compose        Your Text here                                                                            Your Text here
                                                       Add                      Distribute
 Static &                 Output                                                                                                           Email
                                                   Interactive                 Interactive
 Variable                 PDF File                                                                                                        Att./URL
                                                    Elements                       PDF
   Data



                                                                                                                                            Print
Variable Data
from Backend
System (CRM,
  Billing, …)                                                                                                                               Fax




                                                          Source: NessPro Israel
                    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic              25
How does Green IT and Security
             combine?
                                                                                           Secure mobile
                                          Virtualized server,
                                                                                         access to networks,
 PC management                             PC and storage
                                                                                          applications, and
                                            environments
                                                                                                 data


     Your Text here                        State of the art                                    Your Text here
Intelligent archiving                     power and cooling                                 Teleconferencing
                                             (all around)


                                                                                               Working
     Printing                                                                              environment (car
                                         Asset management
   consolidation                                                                          pool, working from
                                                                                                home…)
         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   26
Remote Access via SSLIPSec VPN




   Your Text here                                                                            Your Text here




                                                Source: SonicWall
       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   27
One last thing:
Data scrambling + Cloud Computing = Green Security




   Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   28
Your Text here                                                                            Your Text here




Shahar Geiger Maor
 VP & Senior Analyst
  shahar@stki.info


           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   29

Weitere ähnliche Inhalte

Was ist angesagt?

Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudIJSRD
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
 
WLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca BudiWLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca BudiUniversitas Pembangunan Panca Budi
 
FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010Andris Soroka
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemEditor IJMTER
 
Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)IOSR Journals
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkSalam Shah
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSIAEME Publication
 
Analytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’sAnalytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’sijtsrd
 
International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)CSCJournals
 
Mc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidMc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidrackAID Support
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
Axial What We Do
Axial What We DoAxial What We Do
Axial What We Dodmcleodglas
 

Was ist angesagt? (18)

Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
WLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca BudiWLAN Penetration Examination of The University of Pembangunan Panca Budi
WLAN Penetration Examination of The University of Pembangunan Panca Budi
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud network
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
 
Analytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’sAnalytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’s
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
Intranets and Extranets
 
International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)
 
C02
C02C02
C02
 
Mc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidMc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaid
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
Axial What We Do
Axial What We DoAxial What We Do
Axial What We Do
 

Andere mochten auch

Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Shahar Geiger Maor
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Shahar Geiger Maor
 
Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeShahar Geiger Maor
 
Summit 2011 trends in infrastructure services
Summit 2011  trends in infrastructure servicesSummit 2011  trends in infrastructure services
Summit 2011 trends in infrastructure servicesShahar Geiger Maor
 

Andere mochten auch (9)

Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008
 
PCI Challenges
PCI ChallengesPCI Challenges
PCI Challenges
 
DLP Trends -Dec 2010
DLP Trends -Dec 2010DLP Trends -Dec 2010
DLP Trends -Dec 2010
 
Social Sec infosec -pptx
Social Sec  infosec -pptxSocial Sec  infosec -pptx
Social Sec infosec -pptx
 
Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010Infrastructure Trends -Jan 2010
Infrastructure Trends -Jan 2010
 
Cyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of CybercrimeCyber economics v2 -Measuring the true cost of Cybercrime
Cyber economics v2 -Measuring the true cost of Cybercrime
 
Summit 2011 trends in infrastructure services
Summit 2011  trends in infrastructure servicesSummit 2011  trends in infrastructure services
Summit 2011 trends in infrastructure services
 
Cloud security v2
Cloud security v2Cloud security v2
Cloud security v2
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 

Ähnlich wie Green Security

STKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsSTKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsShahar Geiger Maor
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Creating Secure Social Applications
Creating Secure Social ApplicationsCreating Secure Social Applications
Creating Secure Social ApplicationsTyler Browning
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMUndgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMIBM Danmark
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxtoltonkendal
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaNew Horizons Bulgaria
 
The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration Protected Harbor
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...Microsoft Private Cloud
 
Cybersecurity Goes Mainstream
Cybersecurity Goes MainstreamCybersecurity Goes Mainstream
Cybersecurity Goes MainstreamRob Marson
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 
Isl awareness training
Isl awareness trainingIsl awareness training
Isl awareness trainingshibichery
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsASBIS SK
 

Ähnlich wie Green Security (20)

STKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsSTKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services Trends
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Creating Secure Social Applications
Creating Secure Social ApplicationsCreating Secure Social Applications
Creating Secure Social Applications
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMUndgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
 
Cybersecurity Goes Mainstream
Cybersecurity Goes MainstreamCybersecurity Goes Mainstream
Cybersecurity Goes Mainstream
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
Isl awareness training
Isl awareness trainingIsl awareness training
Isl awareness training
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
 
P3 m2
P3 m2P3 m2
P3 m2
 

Mehr von Shahar Geiger Maor

Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maorShahar Geiger Maor
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maorShahar Geiger Maor
 
Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maorShahar Geiger Maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protectionShahar Geiger Maor
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelShahar Geiger Maor
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Shahar Geiger Maor
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information securityShahar Geiger Maor
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2Shahar Geiger Maor
 
Stki Summit 2010 Infra Services V8
Stki Summit 2010  Infra Services  V8Stki Summit 2010  Infra Services  V8
Stki Summit 2010 Infra Services V8Shahar Geiger Maor
 
Info Sec C T O Forum Nov 2009 V1
Info Sec   C T O Forum   Nov 2009   V1Info Sec   C T O Forum   Nov 2009   V1
Info Sec C T O Forum Nov 2009 V1Shahar Geiger Maor
 
Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)Shahar Geiger Maor
 
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008Shahar Geiger Maor
 
Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008Shahar Geiger Maor
 

Mehr von Shahar Geiger Maor (19)

Mobile payment v3
Mobile payment v3Mobile payment v3
Mobile payment v3
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maor
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
 
Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protection
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM Panel
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information security
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2
 
Stki Summit 2010 Infra Services V8
Stki Summit 2010  Infra Services  V8Stki Summit 2010  Infra Services  V8
Stki Summit 2010 Infra Services V8
 
Info Sec C T O Forum Nov 2009 V1
Info Sec   C T O Forum   Nov 2009   V1Info Sec   C T O Forum   Nov 2009   V1
Info Sec C T O Forum Nov 2009 V1
 
Security Summit July 2009
Security Summit  July 2009Security Summit  July 2009
Security Summit July 2009
 
IPv6
IPv6IPv6
IPv6
 
Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)
 
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
 
Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008
 
Round Tables Summary
Round Tables SummaryRound Tables Summary
Round Tables Summary
 
Green IT Trends in Israel
Green IT Trends in IsraelGreen IT Trends in Israel
Green IT Trends in Israel
 
Round Tables: Summary
Round Tables: SummaryRound Tables: Summary
Round Tables: Summary
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Green Security

  • 1. Your Text here Your Text here Shahar Geiger Maor shahar@stki.info Visit My Blog: http://shaharmaor.blogspot.com/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 1
  • 2. On the one hand: Security…. Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  • 3. Information Security GRC and Security market size (Ms of $) Your Text here 2008 2009 Your Text here 2010 Governance & Risk Management (also BCP) 35.0 42% 50.0 50% 75.0 Security (projects) 95.0 -10.53% 85.0 11.76% 95.0 Security (Software) 90.0 -5.56% 85.0 -5.88% 80.0 Total 220 0% 220 14% 250 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
  • 4. Security/Privacy In the News Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
  • 5. Security Trends Cloud Outsourcing cyber crime Virtualization computing Sensitive or Inability to properly confidential identify and Your Text here information may Your Text here authenticate users not be properly End-user’s to multiple systems protected organization is External threat of unable to control organized cyber the data criminal syndicates management environment Unauthorized Third parties might parties might be be able to access able to access private files without private files without authorization authorization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
  • 6. Security Trends Data breaches involving Peer-to-peer file Web 2.0 and Mobility personal sharing mesh-ups information Unsupervised Use of P2P monitoring of Your Text here Sensitive or might result in Your Text here confidential the loss of employees’ use Inability to information that sensitive or of Web 2.0 properly ends up in the confidential applications can identify and hands of cyber business result in the loss authenticate of critical remote users criminals and information confidential identity thieves including trade secrets business data on the Internet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  • 7. On the other hand: Green IT…. Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
  • 8. Green IT Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  • 9. Green IT –Sample Statistics Total CO2 emissions across countries (Million Ton): 200 150 Your Text here Your Text here 100 50 0 Source: Israel CBS , McKinsey analysis Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
  • 10. Being Green Secure mobile access to Virtualized server, PC and PC management networks, applications, and storage environments data Your Text here Your Text here State of the art power and Intelligent archiving Teleconferencing cooling (all around) Working environment (car Printing consolidation Asset management pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  • 11. Does Green IT and Security combine? Economics in Reducing costs = recession: “Show Green me the money” Your Text here Your Text here Security Its all about PR: considerations Almost anything are conceived as can be sold a burden under any given (“nudnik”) Green tag Security Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  • 12. How does Green IT and Security combine? Secure mobile access to Virtualized server, PC and PC management networks, applications, and storage environments data Your Text here Your Text here State of the art power and Intelligent archiving Teleconferencing cooling (all around) Working environment (car Printing consolidation Asset management pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  • 13. Servers Virtualization: UTM, Virtual FW est.… •Easier to manage = more Less space, less security power •What happens if the host has been penetrated? Your Text here More Your Text here Green? Secure? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  • 14. VDI (Virtual Desktop Infrastructure) –Energy, Management and Security Efficiency TCO Comparison Solution A: Solution B: Sun Difference Difference Cumulative 3 Year Traditional Virtual Desktop (A - B) (A - B)% Desktop Devices Solution IT Costs Desktop Device Costs 3,259,204 NIS 670,834 NIS 2,588,370 NIS 79.4% Desktop Software Costs 782,627 NIS 461,522 NIS 321,104 NIS 41.0% Server Infrastructure Costs 296,448 NIS 1,248,949 NIS (952,501 NIS) -321.3% Desktop Management Labor Costs Your Text here 5,724,578 NIS 2,137,760 NIS 3,586,818 NIS Your Text here 62.7% Desktop Power Costs 314,788 NIS 135,494 NIS 179,294 NIS 57.0% Total IT Costs 10,377,645 NIS 4,654,559 NIS 5,723,085 NIS 55.1% Business Operating Costs Desktop User Productivity Impact 4,473,911 NIS 0 NIS 4,473,911 NIS 100.0% Business Risks 538,416 NIS 26,919 NIS 511,496 NIS 95.0% Total Business Operating Costs 5,012,327 NIS 26,919 NIS 4,985,408 NIS 99.5% Total 15,389,972 NIS 4,681,479 NIS 10,708,493 NIS 69.6% Source: www.alinean.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
  • 15. How does Green IT and Security combine? Secure mobile access to Virtualized server, PC and PC management networks, applications, and storage environments data Your Text here Your Text here State of the art power and Intelligent archiving Teleconferencing cooling (all around) Working environment (car Printing consolidation Asset management pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  • 16. PC -Energy Efficiency and Power Consumption Why don’t you always shut down your PC when you have finished working for the day (multiple responses allowed): It's IT policy or procedure to leave it on My computer goes to hibernate, or to sleep mode It takes too long Your Text here Your Text here It's a habit I don't think it's important It's a hassle I forget 0% 10% 20% 30% 40% 50% Source: E1, PC Energy Report Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  • 17. PC -Energy Efficiency and Power Consumption Power Usage for Desktop PCs (watts) Idle Sleep Savings Mean of LBNL-measured Pentium- 4 67.3 3.3 64.0 machines Mean of 17-inch CRT monitors 61.2 1.8 59.4 Mean of 17-inch LCD monitors 35.3 2.3 33.0 Your Text here Energy Savings for Desktop Power draw Power draw here Your Text Savings per PCs (kWh) per per year year year (idle) (Sleep) (Sleep vs. idle) Typical P4 machine with 17- 791.56 31.42 760.14 inch CRT Typical P4 machine with 17- 632.02 34.50 597.52 inch LCD Source: Windows Hardware Developer Central Source: Windows Hardware Developer Central Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  • 18. Energy Calculations Power Cost Total Watts Power Cost PC (W) Monitor (W) per Hour Used per Year (0.45 ₪/kWh) Basic PC with Flat-Screen 60 40 100 0.045 ₪ 394.2 ₪ Monitor Basic PC with 60 80 140 ₪ 551.88 ₪ CRT Monitor Your Text here Your Text here Office PC with Flat-Screen 0.067 ₪ 587 ₪ 110 (3.1) 40 (3.3) 150 (6.4) Monitor (0.003 ₪) (26.28 ₪) (sleep mode) Office PC with 110 80 190 0.08 ₪ 700 ₪ CRT Monitor High-End PC with Large 300 50 350 0.15 ₪ 1314 ₪ 18 Flat Screen
  • 19. Endpoint Management Your Text here Your Text here http://www.symantec.com/business/solutions/enterprise.jsp Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  • 20. How does Green IT and Security combine? Virtualized Secure mobile server, PC and access to PC management storage networks, applicati environments ons, and data Your Text here State of the art Your Text here Intelligent archiving power and cooling Teleconferencing (all around) Working Printing environment (car Asset management consolidation pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
  • 21. Israeli Output Statistics Average A4s usage per year per employ: 2,000 4,607 10,000 Average color coverage per page: 1% 11% 71% Your Text here Your Text here Average cost per printed page: 0.045 NIS 0.24 NIS 1 NIS Average percentage of jobs of more than one page: 47% 75% 91% Source: Prime² (STKI’s modifications ) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
  • 22. Secure Printing Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
  • 23. How does Green IT and Security combine? Secure mobile access Virtualized server, PC to PC management and storage networks, applications, environments and data Your Text here State of the art power Your Text here Intelligent archiving and cooling (all Teleconferencing around) Working environment Printing consolidation Asset management (car pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
  • 24. Green & Secure Billing Your Text here Your Text here Source: Comda Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
  • 25. Interactive PDF Form Creation Process Copy Files PrintBOS Designer Tool Archive Database Designed Template with Static Data Interactive PDFs View PrintBOS Server Compose Your Text here Your Text here Add Distribute Static & Output Email Interactive Interactive Variable PDF File Att./URL Elements PDF Data Print Variable Data from Backend System (CRM, Billing, …) Fax Source: NessPro Israel Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
  • 26. How does Green IT and Security combine? Secure mobile Virtualized server, access to networks, PC management PC and storage applications, and environments data Your Text here State of the art Your Text here Intelligent archiving power and cooling Teleconferencing (all around) Working Printing environment (car Asset management consolidation pool, working from home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
  • 27. Remote Access via SSLIPSec VPN Your Text here Your Text here Source: SonicWall Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  • 28. One last thing: Data scrambling + Cloud Computing = Green Security Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
  • 29. Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29

Hinweis der Redaktion

  1. מקור:http://www.complang.tuwien.ac.at/anton/computer-power-consumption.html0.067 0.003 10009 ,15 365 220.095 16.425 203.67 3285 5475 203670