View
220
Download
2
Category
Preview:
Citation preview
© 2011 IBM Corporation
IBM Global Services, Turkey Integrated Communication Services Engin Özbay ICS Manager
© 2011 IBM Corporation 2
IBM
§ IBM Turkey is the first “Cisco GOLD Partner” in Turkey, largest partner of Cisco in FY 2011 § IBM is Cisco’s largest partner globally. § Global Alliances with leading network and communication companies like Cisco, Juniper, Motorola, F5,
Riverbed, Aruba etc. § Team of experienced Network Consultants, Architects and Specialists
– 5 CCIE’s in IBM Turkey (1 triple CCIE, 1 double CCIE, 1 CCIE Voice) – Global support from Center of Excellences, IBM Referance Network Architectures Specializations in following areas: Advanced Datacenter Networking, Advanced Security, Advanced
Unified Communications, Advanced Routing&Switching, Advanced Wireless, Global Telepresence ATP
§ IBM is the largest Telepresence ATP partner of Cisco, 1 of 2 global ATP partners § Some of our customers :
– İşbank (Network Infrastructure Transformation project including HQs and 1200 branches) – Akbank (Datacenter networking, LAN, Telepresence etc.) – Vodafone – Brisa, Coca Cola, GE, Fiat, – BIM
§ IBM can provide multi-vendor maintenance/support services all over Turkey
© 2011 IBM Corporation 3
IPTV
IBM Converged Communications Services
IBM Networking Strategy and Optimization Services
IBM Mobility and Wireless Services
IBM Network Integration Services
Assess Plan
Design
Implement Operate
Maintain
Refresh
Finance
network application optimization
networking strategy
network infrastructure optimization
network management optimization
RFID solutions
digital communities enterprise mobility
data center networks campus and LAN wide area networks
network convergence
IP Telephony
unified messaging
real time collaboration
IPTV infrastructure
IP contact center
IBM Integrated Communications Services portfolio service products
IBM Telecom Expense Management Services
video communications
IBM RFID Services
© 2011 IBM Corporation 4
Network Strategy, Optimization and Integration Services deliver networking solutions for dynamic infrastructures
Strategy Assessment
Enterprise Network and
Communications Strategy and
Planning
Network Application
Optimization
Network Infrastructure Optimization
Networking Strategy & Optimization Services Network Integration Services
§ Understand business drivers, goals, and requirements.
§ Understand IT goals and requirements
§ Develop strategy to address the goals and requirements
§ Assess how the strategy compares to client's current environment
§ Understand how to optimize the applications and infrastructure to enable business objectives
§ Make recommendations for transition to new solution
§ Develop the solution concept and structure
§ Add technical specifications for the major solution components
§ Select vendor and product specifications required to implement the design.
§ Deliver a bill of materials and a plan for implementation
§ Prepare environment, procure equipment and review implementation plans
§ Develop installation procedures, solution testing and certification plans
§ Perform a controlled production deployment, if desired
§ Implement and test the solution
Integration and Deployment
Architecture and Design
Data Center Networks
Campus and LAN Networks
Wide Area Networks
Cloud Computing Networks
Application &
N
etwork
Performance
Optim
ization Net
wor
k Se
curit
y
Maintenance and Management
© 2011 IBM Corporation 5
Data center networking services
Strategy Architecture Design Integration Deployment Maintenance
Data Center Networking Services include: § Understanding the strategy that is driving changes
to the data center
§ Determining the networking requirements
§ Comparing the current networking environment and support structure to the new requirements
§ Developing a data center network architecture and design to meet business and functional requirements
§ Selecting vendors and components and prepare a detailed design
§ Creating a roadmap for migration
§ Carrying out procurement, logistics and site preparation
§ Configuring, installing and testing the network
§ Providing on-going maintenance support
Energy Saving Benefits
Top of Rack Configu ration 10 racks/row
24 servers/rack 5 rows
1200 servers
Configuration #1 Example Capex
Savings with Juniper
End of Rack ration
10 racks/row 24 servers/rack
5 rows 1200 servers
48GbE Ports
Configuration Examples Power
Savings
48GbE Ports with 4 10GbE (aggregation) 74%
28%
© 2011 IBM Corporation 6
IBM Converged Communications and Mobility Services design, build and implement environments so clients can work smarter
Unified Messaging
More competitive business models Leveraging all forms of information for anytime, anywhere decisions
Powerful collaboration capabilities can be added with integrated voice, data and video applications delivering improvements in employee effectiveness and productivity
Innovation
Converged communications enabled network and IP telephony switching provides: Lower TCO, increased flexibility and resiliency
Collaboration solutions
IP Contact Center
Advanced contact centers help to deliver improved customer service
Communication Enabled Business Processes
IP telephony solutions
Network convergence
Video communications
IBM Managed Maintenance Services
Enterprise Mobility
© 2011 IBM Corporation 7
Video Communications has a significant positive impact on both productivity and sustainability.
Telepresence "Work-related travel is a significant contributor to the carbon dioxide (CO2) emissions, and often accounts for 25% to 75% of an organization’s total emissions. The good news is that reducing the CO2 emissions created by travel brings cost savings, increased productivity, and improved employee health and satisfaction.
Desktop Video
§ Integrated desktop video delivers an immediate face-to-face experience when regular travel is not possible
§ Widespread benefit realized within 60 days of usage – 64% indicate increased effectiveness of two-way interactions – 84% cite “positive” or “very positive” impact on relationship management – 77% cite “positive” or “very positive” impact on employee morale
§ Additional benefits emerge with prolonged video use
§ Enables travel reduction of upwards of 30%
§ Significant productivity improvements by reducing travel
© 2011 IBM Corporation 8
IBM Security Services
© 2011 IBM Corporation 9
We offer a variety of services across all domains of the IBM Security Framework.
We help you assess, plan and implement security solutions
Examples:
§ Security assessment services
§ PenTest, PCI Assessments etc.
§ Architecture, design and implementation services
We manage it for you from
the cloud
Examples:
§ Managed and monitored firewall services
§ Managed IDS/IPS
We provide service from
the cloud
Examples:
§ Web Uniform Resource Locator (URL) filtering
§ Security event log management
Professional security services
Managed Security services
Cloud security services
1 2 3
Our portfolio of services – summary view
© 2011 IBM Corporation 10
For customers who need a better understanding to achieve or maintain PCI DSS Compliance , IBM provides a cost-effective and efficient assessment service which delivers a high quality plan in a short time frame
Payment Card Industry Security Assessment
Key Components
- Enables assessment service to be combined with other IBM PCI solutions, including internal network and application vulnerability scanning, penetration testing, payment application assessments for PA-DSS Report on Validation and incident response
- Helps all types of organizations meet PCI compliance requirements with proven experience across vertical industries
Solution Overview
§ On-site analysis of current strengths and weaknesses based on PCI DSS, combined with offsite work
§ Definition and prioritization of remediation requirements
§ Specific, vendor neutral recommendations for improving capabilities
Benefits
© 2011 IBM Corporation 11
For organizations that need to enhance identity assurance, IBM provides an enterprise-wide and cost-effective strong authentication solution that will help organizations establish a an easy to maintain authentication infrastructure applications and systems.
Total Authentication Solution Solution Overview
- Helps boost identity assurance by enabling strong authentication for a variety of access scenarios
- Enables maximum flexibility with support for a wide range of hardware or software based authentication methods
- Designed to protect investments while accommodating changing security challenges and regulatory requirements
- Creates additional value through integration with other identity and access management solutions
Key Components • Requirement assessment and
planning for centralized access management
• Design and implementation of DS3 technology
• Solution validation
• Customer training
• Production deployment
Benefits
© 2011 IBM Corporation 12
Services include attack simulations and a comprehensive vulnerability assessment of an application and the network infrastructure directly supporting it to provide a “hacker’s eye” view of an application’s security posture.
Application Security Assessment
Key Components
- Helps reduce application downtime and improve productivity
- Supports efforts to achieve and maintain compliance with government and industry regulations
- Provides valuable insight into hacker techniques and motivations and the business impact of identified weaknesses
Solution Overview
§ Thorough assessment of application vulnerabilities that may jeopardize critical or sensitive data
§ Functional review of the application from both a client and server perspective
§ Comprehensive vulnerability assessment of the application and network infrastructure directly supporting the application
§ Detailed reporting provides recommendations for mitigating discovered risk
Benefits
© 2011 IBM Corporation 13
Services to help clients reduce cost, reduce risk and improve regulatory compliance by assessing the source code of applications to identify security vulnerabilities and provide recommendations for prioritization and resolution.
Application Source Code Security Assessment
Key Components
Solution Overview
§ Provided in a Testing-as-a-Service model to reduce upfront investment
§ In-depth assessment of application vulnerabilities that can only be found through source code analysis that may jeopardize critical or sensitive data
§ Detailed reporting provides recommendations for mitigating discovered risks
§ Map compliance with internal policies and industry regulations
Benefits
- Helps reduce costs and risks by proactively identifying vulnerabilities earlier in the software development lifecycle
- Maximizes resources by prioritizing the most critical vulnerabilities for remediation
- Eliminates the need to maintain expensive application security resources on staff
- Supports efforts to achieve and maintain compliance with government and industry regulations
© 2011 IBM Corporation 14
Managed Mobile Device Security Service provides security features relevant to different devices and operating system platforms.
§ Remote access VPN client § Loss and theft protection § Application blacklisting § Device security settings
enforcement § Restrictions (for example,
disable camera, USB)
Apple iOS (iPhone, iPad, iPod Touch) BlackBerry § Loss and theft protection
§ Near-real-time spyware and virus detection
§ Application blacklisting
§ User tracking and monitoring
Windows Mobile and Symbian OS § Remote access VPN client § Loss and theft protection § Near-real-time spyware and virus
detection § Application blacklisting § Voice and SMS1 spam blocking § User tracking and monitoring § Firewall
Android § Remote access virtual
private network (VPN) client § Loss and theft protection § Near-real-time spyware and virus
detection § Application blacklisting § User tracking and monitoring
1SMS – short message system
© 2011 IBM Corporation 15
IBM has unmatched global and local expertise to help deliver complete security solutions.
9 security operations
centers
9 security research centers
133 monitored countries
20,000+ devices under
contract
3,700+ MSS clients worldwide
7 billion+ events per day
© 2011 IBM Corporation 16
IBM’s Professional Security Services leverage our proprietary approach and the industry’s best consultants
§ Exclusive security focus - Consultants 100% focused on security projects - Focus on deep technical security combined with solid, proven
methodologies based on industry recognized standards - Perform hundreds of assessments per year
§ Security expertise - Assessment tools - Analyzing and validating vulnerability data - Proven methodology
§ Specialized skills - Leading assessment, penetration testing and emergency
response services - Experienced with security process development and
management
§ Benchmarking - Benchmark clients against industry best practices
© 2011 IBM Corporation 17
Teşekkürler
enginoz@tr.ibm.com
Recommended