SlideShare ist ein Scribd-Unternehmen logo
1 von 109
Your Text here                         Your Text here



Shahar Geiger Maor
  VP & Senior Analyst
     shahar@stki.info

Visit My Blog: http://shaharmaor.blogspot.com/

                                                                  1
Agenda
                                                                                                  Information
1   Information Security                                                                            Security




    Communication
2   Networking                                                                                   Networking


    Your Text here                                                                            Your Text here
    Green IT
3                                                                                                   Green IT




         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   2
Information Security
                                                                                                                                  Information
                                                                                                                                    Security




                     GRC and Security market size (Ms of $)


                                             2008                                    2009 Your Text here                      2010
        Your Text here
Governance & Risk Management
                                             35.0   42%                             50.0                50%   75.0
          (also BCP)

                                             95.0 -10.53%                           85.0               11.76% 95.0
     Security (projects)
                                             90.0 -5.56%                            85.0               -5.88% 80.0
    Security (Software)
                                              220                0%                   220                   14%                   250
            Total




             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            3
Information

Security/Privacy In the News                                                                                                   Security
                                                                                                                                -Trends




   Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            4
Information

                               Security Trends                                                                                             Security
                                                                                                                                            -Trends




  Cloud
                                 Outsourcing                                cyber crime                              Virtualization
computing

                                         Sensitive or
                                                                                                                   Inability to properly
                                         confidential
                                                                                                                       identify and
           Your Text here                                                                                Your Text here
                                      information may
                                                                                                                    authenticate users
                                       not be properly
                                                                                                                   to multiple systems
   End-user’s                             protected
 organization is
                                                                               External threat of
unable to control
                                                                                organized cyber
    the data
                                                                              criminal syndicates
  management
                                      Unauthorized
  environment                                                                                                           Third parties might
                                     parties might be
                                                                                                                         be able to access
                                      able to access
                                                                                                                        private files without
                                   private files without
                                                                                                                            authorization
                                       authorization



                    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            5
Information

                            Security Trends                                                                                             Security
                                                                                                                                         -Trends




                               Data breaches
                                                                       Peer-to-peer file                              Web 2.0 and
                                  involving
 Mobility
                                  personal                                 sharing                                     mesh-ups
                                information
                                                                                                        Unsupervised
                                                                               Use of P2P               monitoring of
         Your Text here                                                     might result in Your Text here
                                   Sensitive or
                                                                                                       employees’ use
                                   confidential                                the loss of
  Inability to
                                                                                                         of Web 2.0
                                information that                              sensitive or
   properly
                                                                                                      applications can
                                 ends up in the                               confidential
 identify and
                                                                                                      result in the loss
                                 hands of cyber                                 business
authenticate
                                                                                                          of critical
remote users                      criminals and                               information                confidential
                                                                            including trade
                                 identity thieves
                                                                                                        business data
                                                                                 secrets
                                                                                                       on the Internet



                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            6
Information
     Technologies Categorization 2009                                                                                                    Security
                                                                                                                                          -Trends

Business Value
Investment
to make money                       Remote
                                    Access
Cut costs, Increase                                                                                   Manage Sec.
                                                   IAM/IDM                                             Services                          IT Project
productivity
                                                                                                                                         Business
                                                    SSO                                                               Cloud              Project
                   App.
                                  Anti
            Your Text here                                                                             Your Text here
                    Sec.                                                                 DLP
Commodity IT                       X                                                                                              Size of figure =
                                                                                                          Mobile
                                EPS SIEM/SOC                                                                                      complexity/
                                                                                                           Sec.
Services                                                                                                                          cost of project
                                                                                                           Vir.
                                                                                       DB
                            Network                                     NAC                                Sec.
                                                                                       Sec.
                            Security
Investment
for regulations
                                                     GRC
                                    Using                    Implementing                               Looking
                                                           Market Maturity
                  Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             7
Information

                    STKI Madad 2008-2009
                                                                                                                                           Security
                                                                                                                                            -Trends




                         Network DLP                                                           Hardening
   Market Players
                           5% 4%                                                                  3%
        5%
                                                                                   Access
    GRC                                                                             18%
     5%
Miscellaneous                                                                                                EPS/Anti x
     6%      Your Text here                                                                              Your Text here
                                                                                                                 14%


                DB Protection
     NAC                                                                                               WAF & Apps
                     7%
     6%                                                                                                   11%
                                       Management                          Trends
                                           8%                                8%




                    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            8
Information

Sophisticated Threat Environment                                                                                                         Security
                                                                                                                                          -Trends


                          First-Stage                                                       Second-Stage
    Writers                                                 Middle Men                                                         End Value
                           Abusers                                                            Abusers

                        Hacker or                                                                                                  Fame
 Tool Writers
                       Direct Attack
                                                        Compromised
                                                          Host and
                                                                                                                                   Theft
                                                         Application
  Malware                Machine                                                           Extortionist
  Writers               Harvesting                                                        DDoS for Hire
                                                      Botnet Creation                                                          Espionage
   Worms
             Your Text Information
                       here                                                                   Spammer Text here
                                                                                                  Your
                        Harvesting                         Botnet                                                               Extortion
                                                         Management
   Viruses                                                                                     Phisher
                       Internal Theft
                                                                                                                              Commercial
                         Abuse of
                                                                                                                                Sales
                                                            Personal
                          Privilege
                                                                                          Pharmer/DNS
                                                          Information
   Trojans
                                                                                           Poisoning                           Fraudulent
                                                                                                                                 Sales
                                                          Information
                                                                                           Identity Theft
  Spyware                                                  Brokerage
                                                                                                                              Click Fraud
                                                         Electronic IP
                                                           Leakage                                                         Financial Fraud
                  Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            9
                                                         Source: Cisco Israel
Information

               Application Security                                                                                             Security
                                                                                                                               -App. Sec




STKI observation: Secure development should be an
  integral part of any new project and therefore should be
  calculated within the project’s budget. STKI survey shows
  that spendings on secure development scale from 0% of
  total project budget (Main-Frame based projects) up to
  10% ( core web applications projects) of total project
  budget. here
     Your Text                              Your Text here
  Average spending on secure development is 5% of total
  project budget (including: training, code review and
  penetration tests)




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           10
Information

Web Applications - Vulnerabilities                                                                                              Security
                                                                                                                               -App. Sec




    Probability to detect vulnerabilities of
    different risk degree (results of 32,717 sites
    and 69,476 vulnerabilities of different
    degrees of severity)
    Your Text here                                                                            Your Text here




                                                 % Sites (Scanned)                      % Sites (Black & Whitebox)
      % Sites (All)

                Source: http://www.webappsec.org/projects/statistics/
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           11
Information

   Web Applications -Vulnerabilities                                                                                                   Security
                                                                                                                                      -App. Sec


Vulnerability frequency by types:
1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to
    system design errors
2. Information Leakage and Predictable Resource Location are often connected with
    improper system administration (for example, weak access control)



           Your Text here                                                                            Your Text here




                       Source: http://www.webappsec.org/projects/statistics/
               Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           12
Information
                           Web Application Firewall                                                                                    Security
                                                                                                                                      -App. Sec
                            –Israeli Market Players

Applicure - dotDefender (Apache and IIS)                                           Cisco* - ACE XML Gateway



 Barracuda - Web Application Firewall                                                     IBM* –Data Power
      (fromerly NetContinuum)
          Your Text here                                                                             Your Text here
     Breach Security - WebDefend                                                         Microsoft –IAG WAF


 Citrix - Application Firewall (Formerly                                                Protegrity - Defiance
                   Teros)




           *Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list
               Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           13
Information
                           Web Application Firewall                                                                                       Security
                                                                                                                                         -App. Sec
                           –Leading Players -1Q09

Solution                          What Should I Know?                                                                     Representatives/
                                                                                                                          Integrators
F5 - Application Security   One of the best WAFs around. Features a good          Trek-IT (Dis.),
Manager (ASM)               policy toolset for adaptive learning. Offer strong    Artnet,
                            integration to the TMOS family of products.           Taldor, Spider,
                            Superb load balancing capabilities. One of two        Bezeq Int., One
             Your Text here leading solutions in Israel. Strong market Your Text here
                                                                                  NewAge, Netcom
                            presence
Imperva – SecureSphere            The first in the Israeli market. Imperva has an                                         Comsec (Dis.),
                                  array of out-of-the-box policies and attack                                             Netcom, Bynet,
                                  signatures as well as superior learning mode . A                                        Taldor, NewAge,
                                  leading DB protection solution. Has a significant                                       012 Smile
                                  market share




                  Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           14
Application Security                                                                                                Information
                                                                                                                                 Security
                                                                                                                                -App. Sec
–Israeli Players and Positioning -1Q09




     Your Text here                                                                            Your Text here




         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           15
Information

     Network Access Control                                                                                                 Security
                                                                                                                         -Network Sec




Your Text here                                                                            Your Text here




    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            16
Information

                          NAC Insights                                                                                            Security
                                                                                                                               -Network Sec




NAC has not been “fully digested” by Israeli customers in
 2008. There should be more activity in 2009
NAC can be deployed less expensively when it is an
 embedded feature of an existing vendor and customers
 take notice here it
                  of
        Your Text                          Your Text here
Israeli customers first priority: implementing a guest
 networking control
Network Security or Endpoint Security?


        NAC is a Layer 2 vs. Layer 3 match
          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            17
Information

                           STKI Israeli Positioning
                                                                                                                                                   Security
                                                                                                                                                -Network Sec



                • Not a technological positioning, refers only to Israeli market
                • Focused on enterprise market (not SMB)
                                                                                                               Vendor A
                • Not an STKI recommendation
                                                                                              Vendor B
                  Market Presence (X)
Local Support




                        Market share - existing and new sales (more emphasis)
                        Mind share (how user organizations rate vendors)
                                                                                                                                                Worldwide
                  Local Support (Y) – is influenced by (X)
                                                                                                                                                Leader
                        Experience & technical knowledge, localization,
                         support, number and kind of integrators
                 Worldwide leaders marked, based on global positioning
                 Vendors to watch: Are only just entering israeli market
                                 so can’t be positioned but should be watched
 Vendors to Watch:
                Vendor C
                                                      Market Presence
                           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            18
NAC                                                                       Information
                                                                                                                                                   Security
                                                                                                                                                -Network Sec
                             - Israeli Market Positioning 1Q09

                Vendors to Watch:
                   HP Procurve
                   Check Point

                                 Microsoft
Local Support




                    Cisco
                                                                                                                                                 Player
                    Symantec
                                                                                                                                                 Worldwide
                                                                                                         XOR SWAT
                  Juniper                                                                                                                        Leader
                                                                    Access Layers
                                              Enterasys                                                                                          Leap
                           McAfee
                              ForeScout
                               Insightix
                  Nortel
                                                                                      This analysis should be used with its
                                                                                      supporting documents


                                                      Market Presence
                           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             19
Information

Endpoint Security                                                                                                              Security
                                                                                                                                 -EPS




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           20
Information

Endpoint Security -Threats                                                                                                   Security
                                                                                                                               -EPS




  Your Text here                                                                            Your Text here




      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           21
Information

          Endpoint Security -Protection                                                                                                   Security
                                                                                                                                            -EPS
Organization




                                                                                                                                              Outside
               Your Text here                                                                            Your Text here




                   Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           22
Information

          Endpoint Security -Protection                                                                                                   Security
                                                                                                                                            -EPS
Organization




                                                                                                                                              Outside
               Your Text here                                                                            Your Text here




                   Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           23
Information

          Endpoint Security -Protection                                                                                                   Security
                                                                                                                                            -EPS




                                                                 Anti X
                  DLP
Organization




                                                                                                         NAC




                                                                                                                                              Outside
               Your Text here                                                                            Your Text here

               Manageability




                   Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           24
Anti -X Suites                                                                                                      Information
                                                                                                                                        Security
- Israeli Market Positioning 1Q09 (Enterprise Leaders Only)                                                                               -EPS




                                                              Symantec
 Local Support




                                                                         McAfee
                                                                                                                                      Player
                                                        Trend Micro
                                                                                                                                       Worldwide
                                                                                                                                       Leader


                 Microsoft



                                                                            This analysis should be used with its
                                                                            supporting documents


                                            Market Presence
                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            25
Data Centric Security                                                                                                       Data Centric
                                                                                                                              Security




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            26
Data Centric
         Data Centric Approach                                                                                                Security




   Your Text here                                                                            Your Text here




Build a wall – “perimeter                                        “Business of Security” – Security
        security”                                                is built into the business process



       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            27
Data Centric

Data Centric Security Arena                                                                                            Security




              DLP                                                      ERM


                                                           Database
Encryption
                                                           Protection


Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            28
Data Centric

Data Leak/Loss Prevention                                                                                                      Security
                                                                                                                                 -DLP




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            29
Data Centric

    Data Leak /Loss Prevention                                                                                                       Security
                                                                                                                                       -DLP




 DLP is an overall framework into which different elements fit

 There are three types of data that may leak:
   • Data at rest

   • DataYourtransit
          in Text here                                                                              Your Text here

   • Data on endpoints

 No single DLP focus area is full proof, an optimal solution
  should cover all three areas

 DLP is a growing area, and vendors react accordingly

              Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            30
Data Centric

      DLP –Market Status & Players                                                                                                  Security
                                                                                                                                      -DLP




World Leaders (consolidation in progress…):
      Symantec (Acquired Vontu, 2007, 350$ M)
  •
      Websense (Acquired PortAuthority 2007, 90$ M)
  •
      Reconnex (Acquired by McAfee, July 2008, 46$ M)
  •
      Tablus Text here
          Your (Acquired by RSA, 2007, 40$ M)
  •                                           Your Text here
      Vericept ? Workshare?
  •
Main drivers for DLP are:
  • Regulations such as Payment Card Industry (PCI),
    Accountability Act (HIPAA)
  • e-mail security, instant messaging (IM) and
    endpoint monitoring solutions
             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            31
Data Centric

    DLP –Market Status                                                                                                     Security
                                                                                                                             -DLP




                 DLP Deployments Status -Israel 1Q09



                                                          Solution Deployed
                                                                 20%
Your Text here
                                                                                   PlanYour Text here
                                                                                        to Deploy
    “Not Therequot; Yet                                                                     Soon
         60%                                                                            20%




    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            32
Data Centric
                DLP - Israeli Market Positioning 1Q09                                                                                           Security
                                                                                                                                                  -DLP




                Vendors to Watch:
                    ProofPoint
                    Workshare
                    IBM (ISS)
Local Support




                                                                                                                                               Player

                                                                                                                                               Worldwide
                                                                                                                                               Leader
                                                Websense
                                                                                                                                               Fast
                                                                                                                                               Movement

                           McAfee
                      Verdasys
                   Symantec
                                                                                    This analysis should be used with its
                                                                                    supporting documents
                  RSA

                                                    Market Presence
                         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             33
Data Centric

  ERM
                                                                                                                                    Security
            (Enterprise Rights Management)                                                                                           -ERM




Enterprise Rights Management (ERM) technology—also
 known as Enterprise DRM or Information Rights
 Management (IRM)
What is it?
   • ERMYour Text hereencrypting files that contain Your Text hereand only
          entails                                   content
     allowing those users or devices that have proper
     credentials to decrypt the files and access the content

Awareness of ERM has increased
ERM has been growing steadily since it became a
 technology category unto itself about five years ago
             Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            34
Applications and File Formats                                                                                   Data Centric
                                                                                                                           Security

          Used in ERM Implementations                                                                                       -ERM




Your Text here                                                                            Your Text here




                                         Source: Gilbane Group
    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            35
Data Centric

ERM –How Does it Work?
                                                                                                                                           Security
                                                                                                                                             -DLP




   SQL Server
                                                                                  1. New user is authorized to use RMS
                                                          Active Directory


                                                                                   2. The User defines set of rules and content
                                                                                      usage rights for the data he wants to
                                                                                      share – He is the data owner
                                                                                   3. User distributes data to relevant recipients
                            RMS Server
                Your Text here                                                                    Your Text here
                                                                                   4. When recipient tries to open a file –a
                                                                                      request is sent to the RMS Server in
                                             4
                        1
                                                                                      order to authorize/deny access

                                                                                   5. RMS enforces rules made by the data
                                                                                      owner
                2                                             5
                                 3


   Data owner                                           Recipient




                                                       Source: Microsoft Israel
                    Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            36
Data Centric

    ERM -Israeli Market Players                                                                                                  Security
                                                                                                                                  -ERM




Microsoft -Rights Management Services
EMC- EMC Documentum IRM Product Suite
Oracle - Oracle Information Rights Management
Adobe –Adobe LifeCycle Rights Management
         SU:
IsraeliYour Text here                   Your Text here

Secure Islands -A provider of an advanced information
 protection and control (IPC) solution
Covertix –Develops innovative software technology to
 track, monitor and control documents and files within
 and outside the organization

          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            37
Data Centric
                                                                                                                                     Security
    DB Protection –Market Status                                                                                                       -DB
                                                                                                                                   Protections


                                    DB Protection Deployments Status -Israel 1Q09

Leading Israeli Players:                                                        “Not Therequot;
                                                                                    Yet
•Sentrigo
                                                                                   49%
•Imperva                                   Plan to
•Oracle DB Vault                         Deploy Soon
                                            30%
•Guardium Text here
          Your                                                                      Solution Your Text here
                                                                                    Deployed
                                                                                      20%
DB encryption:                                                                                                               OtherDo Not
Ged-i (Israeli SU): offers                                                                                                      Know
                                                                                                                                  1%
high-level encryption to
Storage Data


              Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            38
Data Centric
                                                                                                                               Security
Masking of Production Data                                                                                                      -Data
                                                                                                                              Masking




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            39
Data Centric
                                                                                                                                   Security
      Masking of Production Data                                                                                                    -Data
                                                                                                                                  Masking



 What is it?
   • The process of data masking is designed to “de-identify” data,
     such that the data remains based on real information, but no
     longer has any practical usage or application
 What is the need?
   • The drive to outsource and offshore application development
     and Your Text here
         testing work means that organizations will have little control
                                                  Your Text here
     over who gets to see their data
   • Test environments are not physically as secure as production
     systems
 What can go wrong?
   • Sensitive data might be downloaded to laptops and stolen
   • Employees might misuse sensitive information and engage in
     fraudulent activity


            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            40
Data Centric
                                                                                                                               Security
Masking of Production Data                                                                                                      -Data
                                                                                                                              Masking




    Your Text here                                                                            Your Text here




                                        Source: Securosis.com
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            41
SIEM/SOC                              SIEM/SOC




    Your Text here   Your Text here




                                         42
SIEM/SOC                                                                              SIEM/SOC




 What is SIEM?
   • Security Information & Event Management
 What is SOC?
   • Security Operation Center
 How does it work?
   • Collects and analyzes all log data and basic event management
         Your Text here                            Your Text here
   • monitors and manages all aspects of enterprise security in real
     time, from a single, centralized location
   • The NOC of security
 Why do we need it?
   • Need for real-time awareness of internal/ external threats
   • Ensure business continuity and comply with regulations
   • A toolset for improving business logic (Security BI)


            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         43
Silos of Redundant Information                                                                                             SIEM/SOC

          Management




  Your Text here                                                                            Your Text here




                                            Source: Network Intelligence
      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         44
An Enterprise Platform for Compliance                                                                                         SIEM/SOC

             and Security




     Your Text here                                                                            Your Text here
                                                          SIEM




                                                                                                        Source: Network Intelligence
         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         45
SIEM/SOC                                                                        SIEM/SOC

                        - Israeli Market Positioning 1Q09
                Vendors to Watch:
                   IBM -MSS
                     TriGeo
Local Support




                                                                                                                                             Player
                                                                 ArcSight
                                                                                                                                             Worldwide
                                                                                                                                             Leader
                                       EMC
                                                                                                                                             Fast
                                  Symantec
                                                                                                                                             Movement

                                                                               CA
                  IBM
                         Cisco
                                                                                   This analysis should be used with its
                     NetIQ                                                         supporting documents


                                                   Market Presence
                        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            46
Next Generation SIEM/SOC: MSS
                                                                                                                                SIEM/SOC
                                                                                                                                   -MSS




What does MSS offer?
  -Comprehensive solution for security management:
  • Firewall/EP Management Service
  • Intrusion Detection & Prevention Management Service
  • Vulnerability Management Service
       Your Text here                                                                            Your Text here
Why should we go there?
  • Cost effective!
  • Use of best-of-breed security
Why shouldn’t we?
  • Who owns my data?
  • No one else in Israel goes there…yet

           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         47
SIEM/SOC
               MSS Trends in Israel                                                                                            -MSS




STKI observation: MSS is well accepted in SMB
  organizations, but Israeli CISOs in enterprises still
  strongly oppose this trend

The current economic downturn should encourage
   Your Text here                      Your Text here
 some enterprises to reconsider MSS
MSS providers addresses the management (CFOs and
 CEOs) in order to attract new clients




       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         48
SIEM/SOC
                       MSS –World Leaders                                                                                          -MSS

Delivery




                                                    Opportunities in Israel for:
                                                    •Current world leaders (IBM, Symantec)
                                                    • local ISPs
                                                    •Network integrators
                                                    •Traditional OS players


                                             Market Penetration



                                                      (Source: Frost and Sullivan)
           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         49
Identity & Access Management (IDM/IAM)
                                                                                                                               IDM/IAM




      Your Text here                                                                            Your Text here




          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         50
IDM Global Mega Trends                                                                                                IDM/IAM




 Fraud and identity theft will increase strong
  authentication use

 Strong authentication and SSO will strengthen their ties

 Context-based authorization will put risk analysis here
                                              Your Text into
        Your Text here
  access control decisions

 Physical and logical security will continue to converge

 Federation will slowly grow



            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         51
Trends in the Israeli Market                                                                                             IDM/IAM




 Nov 2008: CA acquired Eurekify to enhance its role-based
  management suite
 ERP based SOD solutions start to be seen, mainly for GRC
  reasons:
   • 2006: SAP acquired Virsa, enterprise risk management software
         Your Text here                           Your Text here
     provider, to bolster SAP’s software compliance skills
   • 2008: Oracle acquired Logical Apps, an automated GRC controls,
     for enterprise applications
 Israeli new GRC enforcement Start-Ups:
   • Xpandion -Risk management and behavioral analyzing software
     solutions
   • SPATIQ –provides an automated tool for Entitlement Management

           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         52
IAM/IDM                                                                                               IDM/IAM

                          - Israeli Market Positioning 1Q09

                Vendors to Watch:


                     SPATIQ
Local Support




                                                                                                                                             Player
                                                                 IBM
                                                  Novell                  Sun (OS)
                                                                                                                                             Worldwide
                                                                                                                                             Leader
                                                   CA                                                                                        Prominent
                                                                                                                                             WAM Player
                                       BMC
                   Microsoft
                           Oracle
                         Velo (OS)                                                 This analysis should be used with its
                                                                                   supporting documents


                                                   Market Presence
                        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            53
IDM/IAM
 Key Success Factors for Future IDM Project


Consider IDM also as a business project, rather
 than a pure IT project
Make sure the project bridges the gap between
 business and IT
 StartYour Text here easier success (Single Signhere a
        small for                                     On,
                                            Your Text

 vertical project)
 Choose a step-by-step approach, rather than a
 mastodon implementation.
Focus on basic functionalities not on the
 additional features
           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         54
Information
          Security Consultants                                                                                                 Security
                                                                                                                               -Market
-Israeli Market Positioning 1Q09 (Leaders)                                                                                      Players




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           55
Information
          Security Integrators                                                                                                 Security
                                                                                                                               -Market
-Israeli Market Positioning 1Q09 (Leaders)                                                                                      Players




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           56
Information
          Security Distributors                                                                                                Security
                                                                                                                               -Market
-Israeli Market Positioning 1Q09 (Leaders)                                                                                      Players




    Your Text here                                                                            Your Text here




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic           57
Agenda
                                                                                                  Information
1   Information Security                                                                            Security




    Communication
2   Networking                                                                                   Networking


    Your Text here                                                                            Your Text here
    Green IT
3                                                                                                   Green IT




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   58
Networking                                                                                                                 Networking




                            Networking market size (Ms of $)
  Your Text here                                                                            Your Text here
                              2008                                   2009                                    2010
        LAN
                               80.0            -25.00%                 60.0               8.33%               65.0
     equipment
       WAN
                               50.0            -20.00%                 40.0              12.50%               45.0
     equipment
        VoIP
                               40.0            -20.00%                 32.0              25.00%               40.0
     equipment
         Totals               170.0            -22.35%                132.0              13.64%              150.0

      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          59
Networking
        Networking Future Trends                                                                                                 Trends




Datacenter Networking virtualization
Next Generation Networking Internet Protocol (IP) Core
 and High Speed Broadband
Green Networking
IPv6 Your Text here                     Your Text here

Network Operating systems
Network intelligence and policy control
Network Security
Communication billing


          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          60
Technologies Categorization 2009                                                                                                  Networking
                                                                                                                                         Trends

Business Value
Investment
to make money
                                                                                                   SAAS/
Cut costs, Increase                                                                                Cloud
                                                                                                                                         IT Project
                                                                                          UC
productivity                                      Optimization
                                                                                                                                         Business
                                                                                                                                         Project
                                               Billing                                              NGN
            Your Text here                                                                            Your Text here
                                                                              VOIP                                    IPv6
Commodity IT                                                                                                                       Size of figure =
                                                                                               Networking
                             Infra.                                                                                                complexity/
                                                                                                  Vir.
Services                                            Network                                                                        cost of project

                                                    Security
Investment
for regulations

                                     Using                     Implementing                              Looking
                                                            Market Maturity
                  Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            61
Networking
Year of savings and productivity                                                                                         Trends



   What networking technologies are you investing-in to enhance employee
       productivity and collaboration in 2009? (Answer all that apply)
                                                 2009          2008
                                                                                                              55%
                                                                                               52%
                                                                                             46%
                                                             36%
                                                                            32%
                                                           31%
                                          29%                                                                          23%
     Your Text here                                                                       Your Text here
                         19%
                           13%
            11%
          9%                                                                        8%
                                                  NA
 1% NA




         Shahar Maor’s work Copyright 2009Source: Goldman Sachsor attribution from any graphic or portion of graphic
                                           @STKI Do not remove source Research                                                62
Networking
                     STKI Madad 2008-9                                                                                                 Trends



                                                  Optimization
                                                      2%
        Market Players
             8%                                       UC
                                                                          VOIP and IPTel
                                                      8%
                                                                              20%
                Nortel
                 10%
                                                                                                  Network Infra
          Your Text here                                                                            Your Text here
                                                                                                      20%

                                          Trends                  Miscellaneous
                                           10%
Network Costs                                                         12%
 Reduction
    10%




                Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          63
Local Area Network Trends
                                                                                                                                   Networking
                                                                                                                                      -LAN




 Security embedded features in the LAN infra are
   imperative
 Network Virtualization is already here
 LAN vendors should support standard-based platforms
          Your Text here                                                                            Your Text here
 Israeli Trends:
       Corporate LAN to endpoints is stable: 100 MBIT Ethernet;
   •
       Backbone LAN: 2 X 1GBIT (10GBIT in some cases)
       Israeli enterprise tend to “count on” either Cisco or Nortel for their
   •
       backbone network. Other players appear on the network edges



              Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          64
LAN                                                                      Networking
                                                                                                                                                    -LAN
                              - Israeli Market Positioning 1Q09

                Vendors to Watch:


                     Foundry
Local Support




                                                                  Cisco
                                                                                                                                                  Player
                                                                                 Nortel
                                                                                                                                                  Worldwide
                                                                                                                                                  Leader


                              Enterasys                          3COM
                                       HP
                               Juniper

                                                                                       This analysis should be used with its
                  Alcatel                                                              supporting documents
                 Extreme
                                                       Market Presence
                            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             65
Networking
The Nortel Crisis                                                                                                                 -Nortel

        From 90K to
                                   Feb 08:
           30K
                                 Nortel says                         Nortel
         employees
                                  it will cut                      announces
                                                                                                                    More and
                                 2,100 jobs                           1,300
                                                                                                                   more layoffs…
                                                                     layoffs




                                                                           Nortel says
                                                                             several
                                                                                                 Your Text here files
                                                                                                             Nortel
        Your Text here
   Nortel                                                                  executives                            for bankruptcy
  Reports                                                                  to leave in                             protection
  Financial                                                                   2009
 Results for
  Q3 2008




           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          66
The Nortel Crisis –What’s next?
                                                                                                                               Networking
                                                                                                                                 -Nortel




Nortel files for Chapter 11 to “deal decisively” with its
 historic debt burdens
Nov 10’th 2008: A Nortel spokesman said the company
 had enough liquidity to sustain 12 to 18 months of
 operation under the current conditions Your Text here
        Your Text here
Survival still possible for Nortel, but Companies that exit
 the bankruptcy process often emerge in smaller form and
 are frequently acquired in part or whole by larger suitors
 looking for a good deal
19.2.09: Radware has purchased Nortel’s Alteon…


          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          67
The Nortel Crisis                                                                                                            Networking

–Israeli Market ”What if” Analysis                                                                                             -Nortel



                      Acquiring parts of Nortel?
                                                                                         HP                Alliance with Avaya
  Cisco                                                                                                    and Microsoft



                                                                                                     Acquire Nortel’s
                                                                              Juniper
                                                                                                     Telephony?
    Your Text here                                                                            Your Text here

                                                                                       •Enterasys (LAN and sec.)
                                                                         Gores
                                                                                       •Siemens (Telephony)



                                                                          Goes deeper into the
                                                             Alcatel
                                                                          Israeli market?

                                                                  Goes deeper into the
                                                3COM              Israeli market?
        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          68
Networking

                             WAN Optimization                                                                                           -WAN



WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN:


       VOIP Deployments



Data Center Consolidation
            Your Text here                                                                             Your Text here
                                                                                                                                           2007
                                                                                                                                           2008
      Server Virtualization



                 BCP/DRP


                                  0%        10% 20% 30% 40% 50% 60% 70% 80%

                                                  Source: Aberdeen Research
                 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          69
WAN Optimization                                                                                          Networking
                                                                                                                                             -WAN
                          - Israeli Market Positioning 1Q09
Local Support




                                                                    Expand                                                                  Player
                                                  Riverbed
                                                      F5                                                                                    Worldwide
                                                                                                                                            Leader
                             Cisco

                          Blue Coat
                                   Citrix
                Radware           Packeteer*
                Juniper                                                          This analysis should be used with its
                                                                                 supporting documents


                                                                                                *June 2008: A Blue Coat company
                                                 Market Presence
                      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             70
Networking
                       Voice Over IP (VOIP)                                                                                           -VOIP




       STKI observation: Many enterprises are migrating, or
   planning to migrate, their telephony infrastructure from
   traditional circuit-switched technology to newer Internet
   Protocol (IP)-based systems
           Your Text here                                                                            Your Text here

 Motivations to actually migrate:
        End of life/end of support for current telephony infrastructure
   •
        Moving to a new office/office improvements
   •
 Motivations to wait:
        “Phones are working”
   •


               Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          71
VOIP (Enterprise & Call Centers)                                                                                        Networking
                                                                                                                                                -VOIP
                        - Israeli Market Positioning 1Q09

                Vendors to Watch:
                     Asterisk

                                                                                             Cisco
Local Support




                                                                                                                                               Player
                                                       Nortel
                                                                                                                                               Worldwide
                                                        Avaya*                                                                                 Leader




                         Tadiran

                  3COM
                                                                                    This analysis should be used with its
                 Alcatel-Lucent                                                     supporting documents


                                                                                                   *Most CC in the market are Avaya
                                                    Market Presence
                         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic             72
Networking
                                  Video Over IP                                                                                  –Video OIP




 By 2011, 60% of Internet traffic is expected to be video
   traffic (Cisco)
 Global organizations use it as a vital working tool –
   especially in order to cut travelling costs Your Text here
        Your Text here

 Video technology is considered by many local organizations as
   mostly “nice to have”
 Local organizations use this technology mainly for
   training/marketing purposes

            Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          73
Networking
Video Over IP Map                                                                                                          –Video OIP




  Your Text here                                                                            Your Text here




                            Source: http://www.video-over-ip.com/
      Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          74
Networking
   Unified Communications (UC)                                                                                                    –UC




Why do we need this?
Integration: Of any or all communications, collaborative,
 and business applications
Presence: guides users to the most appropriate means of
 communications
       Your extends applications and integration here
                                           Your Text of
Mobility: Text here
 applications every way you go
Productivity: improves business processes
Why now?
Key drivers today are: Workforce virtualization,
 Cost reduction, Increasingly available tools,
 Business improvement opportunities

          Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          75
Networking
                                UC Challenges                                                                                      –UC




The problem:
business justification for collaboration technologies comes
down to “soft dollars”:
   • Productivity
   • Better Text here
        Your teamwork                                                                            Your Text here

   • Better customer service


How do you define “better”?
What is its business value to the company?


           Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          76
Networking
                       UC Preferred Choice                                                                                              –UC




                                                                                                                                       56%
        Cisco
                                                                                                           41%
    Microsoft
                                                                    22%
        Avaya
                                           10%
       Nortel
Alcatel-Lucent Text here 5%
           Your                                                                                       Your Text here
                       3%
         3Com
                           2%
Nokia-Siemens
                               4%
Newer Vendors
                              4%
       Others
                                        9%
      Unsure

                0%                 10%                 20%                  30%                 40%                 50%                 60%

                                                  Source: Goldman Sachs Research
                Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic            77
Networking Integrators                                                                                              Networking

- Israeli Market Positioning 1Q09 (Leaders)




     Your Text here                                                                            Your Text here




         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic          78
Agenda
                                                                                                  Information
1   Information Security                                                                            Security




    Communication
2   Networking                                                                                   Networking


    Your Text here                                                                            Your Text here
    Green IT
3                                                                                                   Green IT




        Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic   79
Green IT




Small, incremental changes
compounded many times can
mean big savings for
large-scale Text here
             organizations
        Your                 Your Text here




                                                 80
Green IT
So, How Can I Be More Green?                                                                                                   Trends



                                                                                           Secure mobile
                                           Virtualized server
                                                                                         access to networks,
 PC management                                and storage
                                                                                          applications, and
                                             environments
                                                                                                 data


                                           State of the art
     Your Text here                                                                            Your Text here
Intelligent archiving                                                                       Teleconferencing
                                          power and cooling
                                             (all around)


                                                                                               Working
   Go digital! &
                                                                                           environment (car
                                         Asset management
     Printing
                                                                                          pool, working from
   consolidation
                                                                                                home…)
         Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         81
STKI Madad 2008-9                                                                                           Green IT
                                                                                                                             Trends
              (Not Including Printing)

 PC Energy
Management
                                 Miscellaneous
    9%
                                                                                         Trends
                                     12%
                                                                                          38%

     Market Players
    Your Text here                                                                           Your Text here
           15%



                                                      DC Facilities
                                                         20%

   Asset
Management
    6%

       Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic         82
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009
Infrastructure Services  Market 2009

Weitere ähnliche Inhalte

Was ist angesagt?

Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
Buyers Guide To Messaging Security Dec 2009
Buyers Guide To Messaging Security Dec 2009Buyers Guide To Messaging Security Dec 2009
Buyers Guide To Messaging Security Dec 2009Kim Jensen
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 
SOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire ResearchSOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire ResearchAccelOps
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...owaspindia
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 
Securing Mobile - A Business Centric Approach
Securing Mobile - A Business Centric ApproachSecuring Mobile - A Business Centric Approach
Securing Mobile - A Business Centric ApproachSalahuddin Khawaja
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeKrisValerio
 
Is Information Security Worth It?
Is Information Security Worth It?Is Information Security Worth It?
Is Information Security Worth It?martin_lee1969
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene RodriguezReenergize
 

Was ist angesagt? (20)

Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
Buyers Guide To Messaging Security Dec 2009
Buyers Guide To Messaging Security Dec 2009Buyers Guide To Messaging Security Dec 2009
Buyers Guide To Messaging Security Dec 2009
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
SOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire ResearchSOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire Research
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Communication security
Communication securityCommunication security
Communication security
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
Securing Mobile - A Business Centric Approach
Securing Mobile - A Business Centric ApproachSecuring Mobile - A Business Centric Approach
Securing Mobile - A Business Centric Approach
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
319 325
319 325319 325
319 325
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
 
Is Information Security Worth It?
Is Information Security Worth It?Is Information Security Worth It?
Is Information Security Worth It?
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez2012 ReEnergize the Americas 3B: Gene Rodriguez
2012 ReEnergize the Americas 3B: Gene Rodriguez
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 

Ähnlich wie Infrastructure Services Market 2009

Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
Isl awareness training
Isl awareness trainingIsl awareness training
Isl awareness trainingshibichery
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maorShahar Geiger Maor
 
Creating Secure Social Applications
Creating Secure Social ApplicationsCreating Secure Social Applications
Creating Secure Social ApplicationsTyler Browning
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
 
Trend Micro - is your cloud secure
Trend Micro - is your cloud secureTrend Micro - is your cloud secure
Trend Micro - is your cloud secureKappa Data
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Team Sistemi
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information securityShahar Geiger Maor
 

Ähnlich wie Infrastructure Services Market 2009 (20)

Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Isl awareness training
Isl awareness trainingIsl awareness training
Isl awareness training
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Creating Secure Social Applications
Creating Secure Social ApplicationsCreating Secure Social Applications
Creating Secure Social Applications
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Trend Micro - is your cloud secure
Trend Micro - is your cloud secureTrend Micro - is your cloud secure
Trend Micro - is your cloud secure
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information security
 

Mehr von Dr. Jimmy Schwarzkopf

STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdfDr. Jimmy Schwarzkopf
 
STKI Israeli Market Study 2023 version 2
STKI Israeli Market Study 2023 version 2 STKI Israeli Market Study 2023 version 2
STKI Israeli Market Study 2023 version 2 Dr. Jimmy Schwarzkopf
 
Collaboration and The Human Factor - Reut 2022.pdf
Collaboration and The Human Factor - Reut 2022.pdfCollaboration and The Human Factor - Reut 2022.pdf
Collaboration and The Human Factor - Reut 2022.pdfDr. Jimmy Schwarzkopf
 
STKI Summit 2022 presentation Jimmy
STKI Summit 2022  presentation Jimmy STKI Summit 2022  presentation Jimmy
STKI Summit 2022 presentation Jimmy Dr. Jimmy Schwarzkopf
 
STKI Israeli IT market study 2022 version 2
STKI Israeli IT market study 2022 version 2 STKI Israeli IT market study 2022 version 2
STKI Israeli IT market study 2022 version 2 Dr. Jimmy Schwarzkopf
 
presentations for the STKI Summit 2022 part a 30_5_22.pdf
presentations for the STKI Summit 2022 part a 30_5_22.pdfpresentations for the STKI Summit 2022 part a 30_5_22.pdf
presentations for the STKI Summit 2022 part a 30_5_22.pdfDr. Jimmy Schwarzkopf
 
STKI Israeli IT market study 2022__2 pages
STKI Israeli IT market study 2022__2 pagesSTKI Israeli IT market study 2022__2 pages
STKI Israeli IT market study 2022__2 pagesDr. Jimmy Schwarzkopf
 
NEXT generation enterprise applications
NEXT generation enterprise applicationsNEXT generation enterprise applications
NEXT generation enterprise applicationsDr. Jimmy Schwarzkopf
 
Journey for a data driven organization
Journey for a data driven organizationJourney for a data driven organization
Journey for a data driven organizationDr. Jimmy Schwarzkopf
 
STKI Israeli it market study 2021 revised V2 2 2 slides per page
STKI Israeli it market study 2021 revised  V2  2    2 slides per page STKI Israeli it market study 2021 revised  V2  2    2 slides per page
STKI Israeli it market study 2021 revised V2 2 2 slides per page Dr. Jimmy Schwarzkopf
 
STKI Israeli it market study 2021 revised V2 2
STKI Israeli it market study 2021 revised  V2  2STKI Israeli it market study 2021 revised  V2  2
STKI Israeli it market study 2021 revised V2 2Dr. Jimmy Schwarzkopf
 

Mehr von Dr. Jimmy Schwarzkopf (20)

STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
 
STKI Israeli Market Study 2023 version 2
STKI Israeli Market Study 2023 version 2 STKI Israeli Market Study 2023 version 2
STKI Israeli Market Study 2023 version 2
 
STKI Israeli Market Study 2023
STKI Israeli Market Study 2023 STKI Israeli Market Study 2023
STKI Israeli Market Study 2023
 
Collaboration and The Human Factor - Reut 2022.pdf
Collaboration and The Human Factor - Reut 2022.pdfCollaboration and The Human Factor - Reut 2022.pdf
Collaboration and The Human Factor - Reut 2022.pdf
 
OCIO SUMMIT Galit Summit 2022
OCIO SUMMIT  Galit Summit 2022OCIO SUMMIT  Galit Summit 2022
OCIO SUMMIT Galit Summit 2022
 
CTO Summit 2022
CTO Summit 2022 CTO Summit 2022
CTO Summit 2022
 
Product management Summit 2022
Product management Summit 2022Product management Summit 2022
Product management Summit 2022
 
Data Products and teams
Data Products and teamsData Products and teams
Data Products and teams
 
Discovery in product management
Discovery in product management Discovery in product management
Discovery in product management
 
STKI Summit 2022 presentation Jimmy
STKI Summit 2022  presentation Jimmy STKI Summit 2022  presentation Jimmy
STKI Summit 2022 presentation Jimmy
 
STKI Israeli IT market study 2022 version 2
STKI Israeli IT market study 2022 version 2 STKI Israeli IT market study 2022 version 2
STKI Israeli IT market study 2022 version 2
 
presentations for the STKI Summit 2022 part a 30_5_22.pdf
presentations for the STKI Summit 2022 part a 30_5_22.pdfpresentations for the STKI Summit 2022 part a 30_5_22.pdf
presentations for the STKI Summit 2022 part a 30_5_22.pdf
 
STKI Israeli IT market study 2022
STKI Israeli IT market study 2022STKI Israeli IT market study 2022
STKI Israeli IT market study 2022
 
STKI Israeli IT market study 2022__2 pages
STKI Israeli IT market study 2022__2 pagesSTKI Israeli IT market study 2022__2 pages
STKI Israeli IT market study 2022__2 pages
 
NEXT generation enterprise applications
NEXT generation enterprise applicationsNEXT generation enterprise applications
NEXT generation enterprise applications
 
Journey for a data driven organization
Journey for a data driven organizationJourney for a data driven organization
Journey for a data driven organization
 
CTO presentation
CTO presentation  CTO presentation
CTO presentation
 
Big iIT stagnation
Big iIT stagnationBig iIT stagnation
Big iIT stagnation
 
STKI Israeli it market study 2021 revised V2 2 2 slides per page
STKI Israeli it market study 2021 revised  V2  2    2 slides per page STKI Israeli it market study 2021 revised  V2  2    2 slides per page
STKI Israeli it market study 2021 revised V2 2 2 slides per page
 
STKI Israeli it market study 2021 revised V2 2
STKI Israeli it market study 2021 revised  V2  2STKI Israeli it market study 2021 revised  V2  2
STKI Israeli it market study 2021 revised V2 2
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Infrastructure Services Market 2009

  • 1. Your Text here Your Text here Shahar Geiger Maor VP & Senior Analyst shahar@stki.info Visit My Blog: http://shaharmaor.blogspot.com/ 1
  • 2. Agenda Information 1 Information Security Security Communication 2 Networking Networking Your Text here Your Text here Green IT 3 Green IT Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  • 3. Information Security Information Security GRC and Security market size (Ms of $) 2008 2009 Your Text here 2010 Your Text here Governance & Risk Management 35.0 42% 50.0 50% 75.0 (also BCP) 95.0 -10.53% 85.0 11.76% 95.0 Security (projects) 90.0 -5.56% 85.0 -5.88% 80.0 Security (Software) 220 0% 220 14% 250 Total Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
  • 4. Information Security/Privacy In the News Security -Trends Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
  • 5. Information Security Trends Security -Trends Cloud Outsourcing cyber crime Virtualization computing Sensitive or Inability to properly confidential identify and Your Text here Your Text here information may authenticate users not be properly to multiple systems End-user’s protected organization is External threat of unable to control organized cyber the data criminal syndicates management Unauthorized environment Third parties might parties might be be able to access able to access private files without private files without authorization authorization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
  • 6. Information Security Trends Security -Trends Data breaches Peer-to-peer file Web 2.0 and involving Mobility personal sharing mesh-ups information Unsupervised Use of P2P monitoring of Your Text here might result in Your Text here Sensitive or employees’ use confidential the loss of Inability to of Web 2.0 information that sensitive or properly applications can ends up in the confidential identify and result in the loss hands of cyber business authenticate of critical remote users criminals and information confidential including trade identity thieves business data secrets on the Internet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  • 7. Information Technologies Categorization 2009 Security -Trends Business Value Investment to make money Remote Access Cut costs, Increase Manage Sec. IAM/IDM Services IT Project productivity Business SSO Cloud Project App. Anti Your Text here Your Text here Sec. DLP Commodity IT X Size of figure = Mobile EPS SIEM/SOC complexity/ Sec. Services cost of project Vir. DB Network NAC Sec. Sec. Security Investment for regulations GRC Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
  • 8. Information STKI Madad 2008-2009 Security -Trends Network DLP Hardening Market Players 5% 4% 3% 5% Access GRC 18% 5% Miscellaneous EPS/Anti x 6% Your Text here Your Text here 14% DB Protection NAC WAF & Apps 7% 6% 11% Management Trends 8% 8% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  • 9. Information Sophisticated Threat Environment Security -Trends First-Stage Second-Stage Writers Middle Men End Value Abusers Abusers Hacker or Fame Tool Writers Direct Attack Compromised Host and Theft Application Malware Machine Extortionist Writers Harvesting DDoS for Hire Botnet Creation Espionage Worms Your Text Information here Spammer Text here Your Harvesting Botnet Extortion Management Viruses Phisher Internal Theft Commercial Abuse of Sales Personal Privilege Pharmer/DNS Information Trojans Poisoning Fraudulent Sales Information Identity Theft Spyware Brokerage Click Fraud Electronic IP Leakage Financial Fraud Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9 Source: Cisco Israel
  • 10. Information Application Security Security -App. Sec STKI observation: Secure development should be an integral part of any new project and therefore should be calculated within the project’s budget. STKI survey shows that spendings on secure development scale from 0% of total project budget (Main-Frame based projects) up to 10% ( core web applications projects) of total project budget. here Your Text Your Text here Average spending on secure development is 5% of total project budget (including: training, code review and penetration tests) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  • 11. Information Web Applications - Vulnerabilities Security -App. Sec Probability to detect vulnerabilities of different risk degree (results of 32,717 sites and 69,476 vulnerabilities of different degrees of severity) Your Text here Your Text here % Sites (Scanned) % Sites (Black & Whitebox) % Sites (All) Source: http://www.webappsec.org/projects/statistics/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  • 12. Information Web Applications -Vulnerabilities Security -App. Sec Vulnerability frequency by types: 1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due to system design errors 2. Information Leakage and Predictable Resource Location are often connected with improper system administration (for example, weak access control) Your Text here Your Text here Source: http://www.webappsec.org/projects/statistics/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  • 13. Information Web Application Firewall Security -App. Sec –Israeli Market Players Applicure - dotDefender (Apache and IIS) Cisco* - ACE XML Gateway Barracuda - Web Application Firewall IBM* –Data Power (fromerly NetContinuum) Your Text here Your Text here Breach Security - WebDefend Microsoft –IAG WAF Citrix - Application Firewall (Formerly Protegrity - Defiance Teros) *Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  • 14. Information Web Application Firewall Security -App. Sec –Leading Players -1Q09 Solution What Should I Know? Representatives/ Integrators F5 - Application Security One of the best WAFs around. Features a good Trek-IT (Dis.), Manager (ASM) policy toolset for adaptive learning. Offer strong Artnet, integration to the TMOS family of products. Taldor, Spider, Superb load balancing capabilities. One of two Bezeq Int., One Your Text here leading solutions in Israel. Strong market Your Text here NewAge, Netcom presence Imperva – SecureSphere The first in the Israeli market. Imperva has an Comsec (Dis.), array of out-of-the-box policies and attack Netcom, Bynet, signatures as well as superior learning mode . A Taldor, NewAge, leading DB protection solution. Has a significant 012 Smile market share Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
  • 15. Application Security Information Security -App. Sec –Israeli Players and Positioning -1Q09 Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  • 16. Information Network Access Control Security -Network Sec Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  • 17. Information NAC Insights Security -Network Sec NAC has not been “fully digested” by Israeli customers in 2008. There should be more activity in 2009 NAC can be deployed less expensively when it is an embedded feature of an existing vendor and customers take notice here it of Your Text Your Text here Israeli customers first priority: implementing a guest networking control Network Security or Endpoint Security? NAC is a Layer 2 vs. Layer 3 match Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  • 18. Information STKI Israeli Positioning Security -Network Sec • Not a technological positioning, refers only to Israeli market • Focused on enterprise market (not SMB) Vendor A • Not an STKI recommendation Vendor B  Market Presence (X) Local Support  Market share - existing and new sales (more emphasis)  Mind share (how user organizations rate vendors) Worldwide  Local Support (Y) – is influenced by (X) Leader  Experience & technical knowledge, localization, support, number and kind of integrators  Worldwide leaders marked, based on global positioning  Vendors to watch: Are only just entering israeli market so can’t be positioned but should be watched Vendors to Watch: Vendor C Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
  • 19. NAC Information Security -Network Sec - Israeli Market Positioning 1Q09 Vendors to Watch: HP Procurve Check Point Microsoft Local Support Cisco Player Symantec Worldwide XOR SWAT Juniper Leader Access Layers Enterasys Leap McAfee ForeScout Insightix Nortel This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  • 20. Information Endpoint Security Security -EPS Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
  • 21. Information Endpoint Security -Threats Security -EPS Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
  • 22. Information Endpoint Security -Protection Security -EPS Organization Outside Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
  • 23. Information Endpoint Security -Protection Security -EPS Organization Outside Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
  • 24. Information Endpoint Security -Protection Security -EPS Anti X DLP Organization NAC Outside Your Text here Your Text here Manageability Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
  • 25. Anti -X Suites Information Security - Israeli Market Positioning 1Q09 (Enterprise Leaders Only) -EPS Symantec Local Support McAfee Player Trend Micro Worldwide Leader Microsoft This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
  • 26. Data Centric Security Data Centric Security Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
  • 27. Data Centric Data Centric Approach Security Your Text here Your Text here Build a wall – “perimeter “Business of Security” – Security security” is built into the business process Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  • 28. Data Centric Data Centric Security Arena Security DLP ERM Database Encryption Protection Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
  • 29. Data Centric Data Leak/Loss Prevention Security -DLP Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
  • 30. Data Centric Data Leak /Loss Prevention Security -DLP  DLP is an overall framework into which different elements fit  There are three types of data that may leak: • Data at rest • DataYourtransit in Text here Your Text here • Data on endpoints  No single DLP focus area is full proof, an optimal solution should cover all three areas  DLP is a growing area, and vendors react accordingly Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
  • 31. Data Centric DLP –Market Status & Players Security -DLP World Leaders (consolidation in progress…): Symantec (Acquired Vontu, 2007, 350$ M) • Websense (Acquired PortAuthority 2007, 90$ M) • Reconnex (Acquired by McAfee, July 2008, 46$ M) • Tablus Text here Your (Acquired by RSA, 2007, 40$ M) • Your Text here Vericept ? Workshare? • Main drivers for DLP are: • Regulations such as Payment Card Industry (PCI), Accountability Act (HIPAA) • e-mail security, instant messaging (IM) and endpoint monitoring solutions Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
  • 32. Data Centric DLP –Market Status Security -DLP DLP Deployments Status -Israel 1Q09 Solution Deployed 20% Your Text here PlanYour Text here to Deploy “Not Therequot; Yet Soon 60% 20% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
  • 33. Data Centric DLP - Israeli Market Positioning 1Q09 Security -DLP Vendors to Watch: ProofPoint Workshare IBM (ISS) Local Support Player Worldwide Leader Websense Fast Movement McAfee Verdasys Symantec This analysis should be used with its supporting documents RSA Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
  • 34. Data Centric ERM Security (Enterprise Rights Management) -ERM Enterprise Rights Management (ERM) technology—also known as Enterprise DRM or Information Rights Management (IRM) What is it? • ERMYour Text hereencrypting files that contain Your Text hereand only entails content allowing those users or devices that have proper credentials to decrypt the files and access the content Awareness of ERM has increased ERM has been growing steadily since it became a technology category unto itself about five years ago Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 34
  • 35. Applications and File Formats Data Centric Security Used in ERM Implementations -ERM Your Text here Your Text here Source: Gilbane Group Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
  • 36. Data Centric ERM –How Does it Work? Security -DLP SQL Server 1. New user is authorized to use RMS Active Directory 2. The User defines set of rules and content usage rights for the data he wants to share – He is the data owner 3. User distributes data to relevant recipients RMS Server Your Text here Your Text here 4. When recipient tries to open a file –a request is sent to the RMS Server in 4 1 order to authorize/deny access 5. RMS enforces rules made by the data owner 2 5 3 Data owner Recipient Source: Microsoft Israel Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
  • 37. Data Centric ERM -Israeli Market Players Security -ERM Microsoft -Rights Management Services EMC- EMC Documentum IRM Product Suite Oracle - Oracle Information Rights Management Adobe –Adobe LifeCycle Rights Management SU: IsraeliYour Text here Your Text here Secure Islands -A provider of an advanced information protection and control (IPC) solution Covertix –Develops innovative software technology to track, monitor and control documents and files within and outside the organization Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
  • 38. Data Centric Security DB Protection –Market Status -DB Protections DB Protection Deployments Status -Israel 1Q09 Leading Israeli Players: “Not Therequot; Yet •Sentrigo 49% •Imperva Plan to •Oracle DB Vault Deploy Soon 30% •Guardium Text here Your Solution Your Text here Deployed 20% DB encryption: OtherDo Not Ged-i (Israeli SU): offers Know 1% high-level encryption to Storage Data Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
  • 39. Data Centric Security Masking of Production Data -Data Masking Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
  • 40. Data Centric Security Masking of Production Data -Data Masking  What is it? • The process of data masking is designed to “de-identify” data, such that the data remains based on real information, but no longer has any practical usage or application  What is the need? • The drive to outsource and offshore application development and Your Text here testing work means that organizations will have little control Your Text here over who gets to see their data • Test environments are not physically as secure as production systems  What can go wrong? • Sensitive data might be downloaded to laptops and stolen • Employees might misuse sensitive information and engage in fraudulent activity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
  • 41. Data Centric Security Masking of Production Data -Data Masking Your Text here Your Text here Source: Securosis.com Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
  • 42. SIEM/SOC SIEM/SOC Your Text here Your Text here 42
  • 43. SIEM/SOC SIEM/SOC  What is SIEM? • Security Information & Event Management  What is SOC? • Security Operation Center  How does it work? • Collects and analyzes all log data and basic event management Your Text here Your Text here • monitors and manages all aspects of enterprise security in real time, from a single, centralized location • The NOC of security  Why do we need it? • Need for real-time awareness of internal/ external threats • Ensure business continuity and comply with regulations • A toolset for improving business logic (Security BI) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 43
  • 44. Silos of Redundant Information SIEM/SOC Management Your Text here Your Text here Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 44
  • 45. An Enterprise Platform for Compliance SIEM/SOC and Security Your Text here Your Text here SIEM Source: Network Intelligence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
  • 46. SIEM/SOC SIEM/SOC - Israeli Market Positioning 1Q09 Vendors to Watch: IBM -MSS TriGeo Local Support Player ArcSight Worldwide Leader EMC Fast Symantec Movement CA IBM Cisco This analysis should be used with its NetIQ supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
  • 47. Next Generation SIEM/SOC: MSS SIEM/SOC -MSS What does MSS offer? -Comprehensive solution for security management: • Firewall/EP Management Service • Intrusion Detection & Prevention Management Service • Vulnerability Management Service Your Text here Your Text here Why should we go there? • Cost effective! • Use of best-of-breed security Why shouldn’t we? • Who owns my data? • No one else in Israel goes there…yet Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
  • 48. SIEM/SOC MSS Trends in Israel -MSS STKI observation: MSS is well accepted in SMB organizations, but Israeli CISOs in enterprises still strongly oppose this trend The current economic downturn should encourage Your Text here Your Text here some enterprises to reconsider MSS MSS providers addresses the management (CFOs and CEOs) in order to attract new clients Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
  • 49. SIEM/SOC MSS –World Leaders -MSS Delivery Opportunities in Israel for: •Current world leaders (IBM, Symantec) • local ISPs •Network integrators •Traditional OS players Market Penetration (Source: Frost and Sullivan) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
  • 50. Identity & Access Management (IDM/IAM) IDM/IAM Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
  • 51. IDM Global Mega Trends IDM/IAM  Fraud and identity theft will increase strong authentication use  Strong authentication and SSO will strengthen their ties  Context-based authorization will put risk analysis here Your Text into Your Text here access control decisions  Physical and logical security will continue to converge  Federation will slowly grow Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
  • 52. Trends in the Israeli Market IDM/IAM  Nov 2008: CA acquired Eurekify to enhance its role-based management suite  ERP based SOD solutions start to be seen, mainly for GRC reasons: • 2006: SAP acquired Virsa, enterprise risk management software Your Text here Your Text here provider, to bolster SAP’s software compliance skills • 2008: Oracle acquired Logical Apps, an automated GRC controls, for enterprise applications  Israeli new GRC enforcement Start-Ups: • Xpandion -Risk management and behavioral analyzing software solutions • SPATIQ –provides an automated tool for Entitlement Management Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
  • 53. IAM/IDM IDM/IAM - Israeli Market Positioning 1Q09 Vendors to Watch: SPATIQ Local Support Player IBM Novell Sun (OS) Worldwide Leader CA Prominent WAM Player BMC Microsoft Oracle Velo (OS) This analysis should be used with its supporting documents Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
  • 54. IDM/IAM Key Success Factors for Future IDM Project Consider IDM also as a business project, rather than a pure IT project Make sure the project bridges the gap between business and IT  StartYour Text here easier success (Single Signhere a small for On, Your Text vertical project)  Choose a step-by-step approach, rather than a mastodon implementation. Focus on basic functionalities not on the additional features Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
  • 55. Information Security Consultants Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
  • 56. Information Security Integrators Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
  • 57. Information Security Distributors Security -Market -Israeli Market Positioning 1Q09 (Leaders) Players Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
  • 58. Agenda Information 1 Information Security Security Communication 2 Networking Networking Your Text here Your Text here Green IT 3 Green IT Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
  • 59. Networking Networking Networking market size (Ms of $) Your Text here Your Text here 2008 2009 2010 LAN 80.0 -25.00% 60.0 8.33% 65.0 equipment WAN 50.0 -20.00% 40.0 12.50% 45.0 equipment VoIP 40.0 -20.00% 32.0 25.00% 40.0 equipment Totals 170.0 -22.35% 132.0 13.64% 150.0 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
  • 60. Networking Networking Future Trends Trends Datacenter Networking virtualization Next Generation Networking Internet Protocol (IP) Core and High Speed Broadband Green Networking IPv6 Your Text here Your Text here Network Operating systems Network intelligence and policy control Network Security Communication billing Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
  • 61. Technologies Categorization 2009 Networking Trends Business Value Investment to make money SAAS/ Cut costs, Increase Cloud IT Project UC productivity Optimization Business Project Billing NGN Your Text here Your Text here VOIP IPv6 Commodity IT Size of figure = Networking Infra. complexity/ Vir. Services Network cost of project Security Investment for regulations Using Implementing Looking Market Maturity Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
  • 62. Networking Year of savings and productivity Trends What networking technologies are you investing-in to enhance employee productivity and collaboration in 2009? (Answer all that apply) 2009 2008 55% 52% 46% 36% 32% 31% 29% 23% Your Text here Your Text here 19% 13% 11% 9% 8% NA 1% NA Shahar Maor’s work Copyright 2009Source: Goldman Sachsor attribution from any graphic or portion of graphic @STKI Do not remove source Research 62
  • 63. Networking STKI Madad 2008-9 Trends Optimization 2% Market Players 8% UC VOIP and IPTel 8% 20% Nortel 10% Network Infra Your Text here Your Text here 20% Trends Miscellaneous 10% Network Costs 12% Reduction 10% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
  • 64. Local Area Network Trends Networking -LAN  Security embedded features in the LAN infra are imperative  Network Virtualization is already here  LAN vendors should support standard-based platforms Your Text here Your Text here  Israeli Trends: Corporate LAN to endpoints is stable: 100 MBIT Ethernet; • Backbone LAN: 2 X 1GBIT (10GBIT in some cases) Israeli enterprise tend to “count on” either Cisco or Nortel for their • backbone network. Other players appear on the network edges Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
  • 65. LAN Networking -LAN - Israeli Market Positioning 1Q09 Vendors to Watch: Foundry Local Support Cisco Player Nortel Worldwide Leader Enterasys 3COM HP Juniper This analysis should be used with its Alcatel supporting documents Extreme Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
  • 66. Networking The Nortel Crisis -Nortel From 90K to Feb 08: 30K Nortel says Nortel employees it will cut announces More and 2,100 jobs 1,300 more layoffs… layoffs Nortel says several Your Text here files Nortel Your Text here Nortel executives for bankruptcy Reports to leave in protection Financial 2009 Results for Q3 2008 Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
  • 67. The Nortel Crisis –What’s next? Networking -Nortel Nortel files for Chapter 11 to “deal decisively” with its historic debt burdens Nov 10’th 2008: A Nortel spokesman said the company had enough liquidity to sustain 12 to 18 months of operation under the current conditions Your Text here Your Text here Survival still possible for Nortel, but Companies that exit the bankruptcy process often emerge in smaller form and are frequently acquired in part or whole by larger suitors looking for a good deal 19.2.09: Radware has purchased Nortel’s Alteon… Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
  • 68. The Nortel Crisis Networking –Israeli Market ”What if” Analysis -Nortel Acquiring parts of Nortel? HP Alliance with Avaya Cisco and Microsoft Acquire Nortel’s Juniper Telephony? Your Text here Your Text here •Enterasys (LAN and sec.) Gores •Siemens (Telephony) Goes deeper into the Alcatel Israeli market? Goes deeper into the 3COM Israeli market? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
  • 69. Networking WAN Optimization -WAN WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN: VOIP Deployments Data Center Consolidation Your Text here Your Text here 2007 2008 Server Virtualization BCP/DRP 0% 10% 20% 30% 40% 50% 60% 70% 80% Source: Aberdeen Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
  • 70. WAN Optimization Networking -WAN - Israeli Market Positioning 1Q09 Local Support Expand Player Riverbed F5 Worldwide Leader Cisco Blue Coat Citrix Radware Packeteer* Juniper This analysis should be used with its supporting documents *June 2008: A Blue Coat company Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
  • 71. Networking Voice Over IP (VOIP) -VOIP STKI observation: Many enterprises are migrating, or planning to migrate, their telephony infrastructure from traditional circuit-switched technology to newer Internet Protocol (IP)-based systems Your Text here Your Text here  Motivations to actually migrate: End of life/end of support for current telephony infrastructure • Moving to a new office/office improvements •  Motivations to wait: “Phones are working” • Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 71
  • 72. VOIP (Enterprise & Call Centers) Networking -VOIP - Israeli Market Positioning 1Q09 Vendors to Watch: Asterisk Cisco Local Support Player Nortel Worldwide Avaya* Leader Tadiran 3COM This analysis should be used with its Alcatel-Lucent supporting documents *Most CC in the market are Avaya Market Presence Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 72
  • 73. Networking Video Over IP –Video OIP  By 2011, 60% of Internet traffic is expected to be video traffic (Cisco)  Global organizations use it as a vital working tool – especially in order to cut travelling costs Your Text here Your Text here  Video technology is considered by many local organizations as mostly “nice to have”  Local organizations use this technology mainly for training/marketing purposes Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
  • 74. Networking Video Over IP Map –Video OIP Your Text here Your Text here Source: http://www.video-over-ip.com/ Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
  • 75. Networking Unified Communications (UC) –UC Why do we need this? Integration: Of any or all communications, collaborative, and business applications Presence: guides users to the most appropriate means of communications Your extends applications and integration here Your Text of Mobility: Text here applications every way you go Productivity: improves business processes Why now? Key drivers today are: Workforce virtualization, Cost reduction, Increasingly available tools, Business improvement opportunities Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
  • 76. Networking UC Challenges –UC The problem: business justification for collaboration technologies comes down to “soft dollars”: • Productivity • Better Text here Your teamwork Your Text here • Better customer service How do you define “better”? What is its business value to the company? Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
  • 77. Networking UC Preferred Choice –UC 56% Cisco 41% Microsoft 22% Avaya 10% Nortel Alcatel-Lucent Text here 5% Your Your Text here 3% 3Com 2% Nokia-Siemens 4% Newer Vendors 4% Others 9% Unsure 0% 10% 20% 30% 40% 50% 60% Source: Goldman Sachs Research Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
  • 78. Networking Integrators Networking - Israeli Market Positioning 1Q09 (Leaders) Your Text here Your Text here Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
  • 79. Agenda Information 1 Information Security Security Communication 2 Networking Networking Your Text here Your Text here Green IT 3 Green IT Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
  • 80. Green IT Small, incremental changes compounded many times can mean big savings for large-scale Text here organizations Your Your Text here 80
  • 81. Green IT So, How Can I Be More Green? Trends Secure mobile Virtualized server access to networks, PC management and storage applications, and environments data State of the art Your Text here Your Text here Intelligent archiving Teleconferencing power and cooling (all around) Working Go digital! & environment (car Asset management Printing pool, working from consolidation home…) Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
  • 82. STKI Madad 2008-9 Green IT Trends (Not Including Printing) PC Energy Management Miscellaneous 9% Trends 12% 38% Market Players Your Text here Your Text here 15% DC Facilities 20% Asset Management 6% Shahar Maor’s work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 82