Shahar MAOR Infrastructure Services Market 2009

Embed Size (px)

Citation preview

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    1/109

    Your Text hereYour Text here

    1

    Shahar Geiger MaorVP & Senior Analyst

    [email protected]

    Visit My Blog: http://shaharmaor.blogspot.com/

    mailto:[email protected]:[email protected]:[email protected]://shaharmaor.blogspot.com/http://shaharmaor.blogspot.com/mailto:[email protected]:[email protected]:[email protected]
  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    2/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2

    Agenda

    1 Information Security

    Communicat ion

    Information

    Security

    Networking

    2 Networking

    Green IT3 Green IT

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    3/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3

    Inf ormat ion Secur i t y

    Information

    Security

    2008 2009 2010

    Governance & Risk Management

    (also BCP) 35.0 42% 50.0 50% 75.0

    Security (projects) 95.0 -10.53% 85.0 11.76% 95.0

    Security (Software) 90.0 -5.56% 85.0 -5.88% 80.0Total 220 0% 220 14% 250

    GRC and Sec urity m arke t size (Ms of $)

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    4/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4

    Secur i t y/Pr ivacy In t he News

    Information

    Security

    -Trends

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    5/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5

    Secur i t y Trends

    Cloudcomputing

    End-usersorganization is

    unable to controlthe data

    managementenvironment

    Outsourcing

    Sensitive orconfidential

    information maynot be properly

    protected

    Unauthorizedparties might be

    able to accessprivate files without

    authorization

    cyber crime

    External threat oforganized cyber

    criminal syndicates

    Virtualization

    Inability to properlyidentify and

    authenticate usersto multiple systems

    Third parties mightbe able to access

    private files withoutauthorization

    Information

    Security

    -Trends

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    6/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6

    Secur i t y Trends

    Mobility

    Inability toproperly

    identify and

    authenticateremote users

    Data breachesinvolvingpersonal

    information

    Sensitive orconfidential

    information thatends up in thehands of cyber

    criminals andidentity thieves

    Peer-to-peer filesharing

    Use of P2Pmight result in

    the loss ofsensitive orconfidential

    business

    informationincluding trade

    secrets

    Web 2.0 andmesh-ups

    Unsupervisedmonitoring of

    employees useof Web 2.0

    applications canresult in the loss

    of criticalconfidential

    business dataon the Internet

    Information

    Security

    -Trends

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    7/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7

    Technologies Categorization 2009

    Investment

    to make money

    Cut costs, Increase

    productivity

    Investment

    for regulations

    Commodity IT

    Services

    Using Implementing Looking

    Business Value

    Market Maturity

    IAM/IDMBusiness

    Project

    IT Project

    Size of figure =complexity/cost of project

    SSO

    Network

    Security

    DLP

    NAC

    Information

    Security

    -Trends

    DB

    Sec.

    Manage Sec.

    Services

    Cloud

    SIEM/SOCEPSMobile

    Sec.

    Anti

    X

    Vir.

    Sec.

    GRC

    Remote

    Access

    App.

    Sec.

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    8/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8

    STKI Madad 2008-2009

    Access

    18%

    EPS/Anti x

    14%

    WAF & Apps

    11%Trends

    8%

    Management

    8%

    DB Protection

    7%

    NAC

    6%

    Miscellaneous6%

    GRC

    5%

    Market Players

    5%

    Network

    5%

    DLP

    4%

    Hardening

    3%

    Information

    Security

    -Trends

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    9/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9

    Sophist icat ed Threat Envi ronment

    Writers Middle Men

    Second-Stage

    Abusers

    First-Stage

    Abusers End Value

    Spyware

    Viruses

    Trojans

    Worms

    MalwareWriters

    Internal TheftAbuse ofPrivilege

    InformationHarvesting

    MachineHarvesting

    ExtortionistDDoS for Hire

    Spammer

    Phisher

    Pharmer/DNSPoisoning

    Identity Theft

    CompromisedHost and

    Application

    Botnet Creation

    BotnetManagement

    Personal

    Information

    InformationBrokerage

    Electronic IPLeakage

    Theft

    Espionage

    Extortion

    CommercialSales

    FraudulentSales

    Click Fraud

    Financial Fraud

    Tool WritersHacker or

    Direct AttackFame

    Source: Cisco Israel

    Information

    Security

    -Trends

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    10/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10

    Appl icat ion Secur i t y

    STK I obser vat ion: Secure development should be anintegral part of any new project and therefore should becalculated within the projects budget. STKI survey showsthat spendings on secure development scale from 0% oftotal project budget (Main-Frame based projects) up to10% ( core web applications projects) of total projectbudget.Average spending on secure development is 5% of totalproject budget (including: training, code review andpenetration tests)

    Information

    Security

    -App. Sec

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    11/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11

    Web Appli cat ions - Vulnerabi l i t ies

    Source: http://www.webappsec.org/projects/statistics/

    % Sites (All) % Sites (Scanned) % Sites (Black & Whitebox)

    Probability to detect vulnerabilities of

    different risk degree (results of 32,717 sites

    and 69,476 vulnerabilities of different

    degrees of severity)

    Information

    Security

    -App. Sec

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    12/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12

    Web Appl icat ions -Vulnerabil i t ies

    Source: http://www.webappsec.org/projects/statistics/

    Vulnerability frequency by types:

    1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due tosystem design errors

    2. Information Leakage and Predictable Resource Location are often connected with

    improper system administration (for example, weak access control)

    Information

    Security

    -App. Sec

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    13/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13

    Web Appl icat ion Firewal lIsrael i Market Players

    Information

    Security

    -App. Sec

    Applicure - dotDefender (Apache and IIS) Cisco* - ACE XML Gateway

    Barracuda - Web Application Firewall

    (fromerly NetContinuum)

    IBM* Data Power

    Breach Security - WebDefend Microsoft IAG WAF

    Citrix - Application Firewall (FormerlyTeros) Protegrity - Defiance

    *Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list

    http://www.microsoft.com/forefront/edgesecurity/iag/en/us/default.aspxhttp://www.applicure.com/About_dotDefenderhttp://www.cisco.com/en/US/prod/collateral/contnetw/ps5719/ps7314/product_data_sheet0900aecd8060acd2.htmlhttp://www.barracudanetworks.com/ns/products/web-site-firewall-overview.phphttp://www-01.ibm.com/software/integration/datapower/http://www.breach.com/products/webdefend.htmlhttp://www.microsoft.com/forefront/edgesecurity/iag/en/us/default.aspxhttp://www.citrix.com/English/ps2/products/product.asp?contentID=25636http://www.protegrity.com/WebApplicationFirewallhttp://www.protegrity.com/WebApplicationFirewallhttp://www.citrix.com/English/ps2/products/product.asp?contentID=25636http://www.microsoft.com/forefront/edgesecurity/iag/en/us/default.aspxhttp://www.barracudanetworks.com/ns/products/web-site-firewall-overview.phphttp://www.barracudanetworks.com/ns/products/web-site-firewall-overview.phphttp://www.breach.com/products/webdefend.htmlhttp://www.barracudanetworks.com/ns/products/web-site-firewall-overview.phphttp://www-01.ibm.com/software/integration/datapower/http://www.barracudanetworks.com/ns/products/web-site-firewall-overview.phphttp://www.cisco.com/en/US/prod/collateral/contnetw/ps5719/ps7314/product_data_sheet0900aecd8060acd2.htmlhttp://www.applicure.com/About_dotDefenderhttp://www.applicure.com/About_dotDefender
  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    14/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14

    Web Appl icat ion Firewal lLeading Players -1Q09

    Solution What Should I Know? Representatives/

    Integrators

    F5 - Application Security

    Manager (ASM)

    One of the best WAFs around. Features a good

    policy toolset for adaptive learning. Offer strong

    integration to the TMOS family of products.Superb load balancing capabilities. One of two

    leading solutions in Israel. Strong market

    presence

    Trek-IT (Dis.),

    Artnet,

    Taldor, Spider,Bezeq Int., One

    NewAge, Netcom

    Imperva SecureSphere The first in the Israeli market. Imperva has an

    array of out-of-the-box policies and attack

    signatures as well as superior learning mode . Aleading DB protection solution. Has a significant

    market share

    Comsec (Dis.),

    Netcom, Bynet,

    Taldor, NewAge,012 Smile

    Information

    Security

    -App. Sec

    http://www.f5.com/products/big-ip/product-modules/application-security-manager.htmlhttp://www.f5.com/products/big-ip/product-modules/application-security-manager.htmlhttp://www.imperva.com/products/securesphere.htmlhttp://www.imperva.com/products/securesphere.htmlhttp://www.f5.com/products/big-ip/product-modules/application-security-manager.htmlhttp://www.f5.com/products/big-ip/product-modules/application-security-manager.html
  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    15/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15

    Appl icat ion Secur i t yIsraeli Players and Posi t ioning -1Q09

    Information

    Security

    -App. Sec

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    16/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16

    Network Access Cont rolInformation

    Security

    -Network Sec

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    17/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17

    NAC Insight s

    NAC has not been fully digested by Israeli customers in2008. There should be more activity in 2009

    NAC can be deployed less expensively when it is anembedded feature of an existing vendor and customerstake notice of it

    Israeli customers first priority: implementing a guestnetworking control

    Network Security or Endpoint Security?

    NAC is a Layer 2 vs. Layer 3 match

    Information

    Security

    -Network Sec

    I f ti

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    18/109

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 18

    LocalSupport

    Market Presence

    Not a technological positioning, refers only to Israeli market

    Focused on enterprise market (not SMB)

    Not an STKI recommendation

    Market Presence (X)

    Market share - existing and new sales (more emphasis)

    Mind share (how user organizations rate vendors)

    Local Support (Y) is influenced by (X)

    Experience & technical knowledge, localization,support, number and kind of integrators

    Worldwide leaders marked, based on global positioning

    Vendors to watch: Are only just entering israeli market

    so cant be positioned but should be watched

    STKI Israeli Positioning

    Vendor A

    Vendor B

    Worldwide

    Leader

    Vendors to Watch:

    Vendor C

    Information

    Security

    -Network Sec

    NAC I f ti

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    19/109

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19

    NAC- Israeli Market Positioning 1Q09

    LocalSupport

    Market Presence

    XOR SWAT

    Player

    This analysis should be used with its

    supporting documents

    Vendors to Watch:

    HP Procurve

    Access Layers

    Check Point

    Enterasys

    ForeScoutInsightix

    WorldwideLeader

    Nortel

    McAfeeLeap

    Microsoft

    Cisco

    Symantec

    Juniper

    Information

    Security

    -Network Sec

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    20/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20

    Endpoint Secur i t yInformation

    Security

    -EPS

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    21/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21

    Endpoint Secur i t y -Threat sInformation

    Security

    -EPS

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    22/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22

    Endpoint Secur i t y -Prot ect ion

    O

    rganization

    Outside

    Information

    Security

    -EPS

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    23/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23

    Endpoint Secur i t y -Prot ect ion

    O

    rganization

    Outside

    Information

    Security

    -EPS

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    24/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24

    Endpoint Secur i t y -Prot ect ion

    O

    rganization

    Outside

    NAC

    Anti X

    DLP

    Manageability

    Information

    Security

    -EPS

    nt u tes

    Information

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    25/109

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25

    nt - u tes- Israeli Market Positioning 1Q09 (Enterprise Leaders Only)

    LocalSupport

    Market Presence

    Player

    This analysis should be used with its

    supporting documents

    WorldwideLeader

    Microsoft

    McAfee

    Symantec

    Trend Micro

    Information

    Security

    -EPS

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    26/109

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26

    Data Centric Security

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26

    Data Centric

    Security

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    27/109

    i

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    28/109

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28

    Data Centric Security Arena

    DLP ERM

    EncryptionDatabase

    Protection

    Data Centric

    Security

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    29/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29

    Dat a Leak/Loss Prevent ionData Centric

    Security

    -DLP

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    30/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 30

    Dat a Leak /Loss Prevent ion

    DLP is an overall framework into which different elements fit

    There are three types of data that may leak:

    Data at rest

    Data in transit

    Data on endpoints

    No single DLP focus area is full proof, an optimal solution

    should cover all three areas

    DLP is a growing area, and vendors react accordingly

    Data Centric

    Security

    -DLP

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    31/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 31

    DLP Market St at us & Players

    World Leaders (consolidation in progress): Symantec (Acquired Vontu, 2007, 350$ M)

    Websense (Acquired PortAuthority 2007, 90$ M)

    Reconnex (Acquired by McAfee, July 2008, 46$ M) Tablus (Acquired by RSA, 2007, 40$ M)

    Vericept ? Workshare?

    Main drivers for DLP are:

    Regulations such as Payment Card Industry (PCI),Accountability Act (HIPAA)

    e-mail security, instant messaging (IM) and

    endpoint monitoring solutions

    Data Centric

    Security

    -DLP

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    32/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 32

    DLP Market St at us

    Solution Deployed

    20%

    Plan to Deploy

    Soon

    20%

    Not There" Yet

    60%

    DLP Deployments Status -Israel 1Q09

    Data Centric

    Security

    -DLP

    DLP I li M k t P iti i 1Q09

    Data Centric

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    33/109

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 33

    DLP - Israeli Market Positioning 1Q09

    LocalSupport

    Market Presence

    Player

    This analysis should be used with its

    supporting documents

    Vendors to Watch:

    WorldwideLeader

    FastMovement

    Symantec

    McAfeeVerdasys

    Websense

    ProofPoint

    RSA

    Workshare

    IBM (ISS)

    Security

    -DLP

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    34/109

    A l i i d Fi l F

    D t C t i

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    35/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 35

    Appl icat ions and Fi le Format sUsed in ERM Implementat ions

    Source: Gilbane Group

    Data Centric

    Security

    -ERM

    D t C t i

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    36/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 36

    ERM How Does i t Work?

    Data owner Recipient

    RMS Server

    SQL ServerActive Directory

    2 3

    4

    5

    2. The User defines set of rules and content

    usage rights for the data he wants to

    share He is the data owner

    3. User distributes data to relevant recipients

    4. When recipient tries to open a file a

    request is sent to the RMS Server in

    order to authorize/deny access

    5. RMS enforces rules made by the data

    owner

    1. New user is authorized to use RMS

    1

    Source: Microsoft Israel

    Data Centric

    Security

    -DLP

    Data Centric

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    37/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 37

    ERM -Israel i Market Players

    Microsoft -Rights Management Services

    EMC - EMC Documentum IRM Product Suite

    Oracle - Oracle Information Rights Management

    Adobe Adobe LifeCycle Rights ManagementIsraeli SU:

    Secure Islands -A provider of an advanced informationprotection and control (IPC) solution

    Covertix Develops innovative software technology totrack, monitor and control documents and files withinand outside the organization

    Data Centric

    Security

    -ERM

    Data Centric

    http://www.secureislands.com/default.asphttp://www.covertix.com/index.htmlhttp://www.covertix.com/index.htmlhttp://www.secureislands.com/default.asp
  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    38/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 38

    DB Prot ect ion Market St at us

    Solution

    Deployed

    20%

    Plan to

    Deploy Soon30%

    Not There"

    Yet

    49%

    Other\Do Not

    Know1%

    DB Protection Deployments Status -Israel 1Q09

    Leading Israeli Players:

    SentrigoImperva

    Oracle DB VaultGuardium

    DB encryption:

    Ged-i (Israeli SU): offershigh-level encryption to

    Storage Data

    Security

    -DB

    Protections

    Data Centric

    http://www.ged-i.com/http://www.ged-i.com/
  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    39/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 39

    Masking of Product ion Dat aSecurity

    -Data

    Masking

    Data Centric

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    40/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 40

    Masking of Product ion Dat a

    What is it? The process of data masking is designed to de-identify data,

    such that the data remains based on real information, but nolonger has any practical usage or application

    What is the need?

    The drive to outsource and offshore application developmentand testing work means that organizations will have little controlover who gets to see their data

    Test environments are not physically as secure as productionsystems

    What can go wrong? Sensitive data might be downloaded to laptops and stolen Employees might misuse sensitive information and engage in

    fraudulent activity

    Security

    -Data

    Masking

    Data Centric

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    41/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 41

    Masking of Product ion Dat a

    Source: Securosis.com

    Security

    -Data

    Masking

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    42/109

    Your Text hereYour Text here

    42

    SIEM/SOCSIEM/SOC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    43/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 43

    SIEM/SOC

    What is SIEM? Security Information & Event Management

    What is SOC? Security Operation Center

    How does it work? Collects and analyzes all log data and basic event management monitors and manages all aspects of enterprise security in real

    time, from a single, centralized location The NOC of security

    Why do we need it? Need for real-time awareness of internal/ external threats Ensure business continuity and comply with regulations A toolset for improving business logic (Security BI)

    SIEM/SOC

    Si los of Redundant Informat ion

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    44/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 44

    Si los of Redundant Informat ionManagement

    Source: Network Intelligence

    SIEM/SOC

    An Ent erpr ise Plat form for Compl iance

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    45/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 45

    An Ent erpr ise Plat form for Compl ianceand Securi t y

    SIEM

    Source: Network Intelligence

    SIEM/SOC

    SIEM/SOC

    SIEM/SOC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    46/109

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 46

    SIEM/SOC

    - Israeli Market Positioning 1Q09

    LocalSupp

    ort

    Market Presence

    Player

    This analysis should be used with its

    supporting documents

    Vendors to Watch:

    NetIQ

    WorldwideLeader

    FastMovement

    EMCSymantec

    IBM CA

    ArcSight

    Cisco

    IBM -MSS

    TriGeo

    SIEM/SOC

    SIEM/SOC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    47/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 47

    Next Generat ion SIEM/SOC: MSS

    What does MSS offer?-Comprehensive solution for security management: Firewall/EP Management Service

    Intrusion Detection & Prevention Management Service

    Vulnerability Management Service

    Why should we go there? Cost effective!

    Use of best-of-breed security

    Why shouldnt we? Who owns my data?

    No one else in Israel goes thereyet

    SIEM/SOC

    -MSS

    SIEM/SOC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    48/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 48

    MSS Trends in Israel

    STK I obser vat ion: MSS is well accepted in SMBorganizations, but Israeli CISOs in enterprises stillstrongly oppose this trend

    The current economic downturn should encouragesome enterprises to reconsider MSS

    MSS providers addresses the management (CFOs and

    CEOs) in order to attract new clients

    SIEM/SOC

    -MSS

    MSS W ld L dSIEM/SOC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    49/109

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 49

    MSS World Leaders

    Deliver

    y

    Market Penetration

    (Source: Frost and Sullivan)

    Opportunities in Israel for:

    Current world leaders (IBM, Symantec) local ISPsNetwork integratorsTraditional OS players

    -MSS

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    50/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 50

    Ident i t y & Access Management (IDM/ IAM)IDM/IAM

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    51/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 51

    IDM Global Mega Trends

    Fraud and identity theft will increase strongauthentication use

    Strong authentication and SSO will strengthen their ties

    Context-based authorization will put risk analysis intoaccess control decisions

    Physical and logical security will continue to converge

    Federation will slowly grow

    IDM/IAM

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    52/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 52

    Trends in t he Israel i Market

    Nov 2008: CA acquired Eurekify to enhance its role-basedmanagement suite

    ERP based SOD solutions start to be seen, mainly for GRCreasons:

    2006: SAP acquired Virsa, enterprise risk management softwareprovider, to bolster SAPs software compliance skills

    2008: Oracle acquired Logical Apps, an automated GRC controls,for enterprise applications

    Israeli new GRC enforcement Start-Ups: Xpandion -Risk management and behavioral analyzing software

    solutions

    SPATIQprovides an automated tool for Entitlement Management

    IDM/IAM

    http://www.xpandion.com/http://www.spatiq.com/index.phphttp://www.spatiq.com/index.phphttp://www.xpandion.com/
  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    53/109

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    54/109

    Secur i t y Consult ant s

    Information

    Security

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    55/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 55

    Secur i t y Consult ant s-Israeli Market Positioning 1Q09 (Leaders)

    Security

    -Market

    Players

    Secur i t y Int egrat ors

    Information

    Security

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    56/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 56

    Secur i t y Int egrat ors-Israeli Market Positioning 1Q09 (Leaders)

    Security

    -Market

    Players

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    57/109

    A d

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    58/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 58

    Agenda

    1 Information Security

    Communicat ion

    Information

    Security

    Networking2 Networking

    Green IT3 Green IT

    N t ki N t ki

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    59/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 59

    Networking Networking

    2008 2009 2010

    LAN

    equipment 80.0 -25.00% 60.0 8.33% 65.0

    WANequipment 50.0 -20.00% 40.0 12.50% 45.0

    VoIP

    equipment 40.0 -20.00% 32.0 25.00% 40.0

    Totals170.0 -22.35% 132.0 13.64% 150.0

    Networking market size (Ms of $)

    N ki F T d

    Networking

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    60/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 60

    Net working Fut ure Trends

    Datacenter Networking virtualizationNext Generation Networking Internet Protocol (IP) Core

    and High Speed Broadband

    Green Networking

    IPv6

    Network Operating systems

    Network intelligence and policy control

    Network Security

    Communication billing

    g

    Trends

    Technologies Categorization 2009

    Networking

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    61/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 61

    Technologies Categorization 2009

    Investmentto make money

    Cut costs, Increase

    productivity

    Investmentfor regulations

    Commodity IT

    Services

    Using Implementing Looking

    Business Value

    Market Maturity

    Networking

    Vir.

    Business

    Project

    IT Project

    Size of figure =complexity/cost of project

    g

    Trends

    IPv6

    Network

    Security

    UC

    VOIPInfra.

    Optimization

    SAAS/

    Cloud

    Billing NGN

    Y f i d d t i i t

    Networking

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    62/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 62

    Year of savings and product ivi t y

    1%9%

    19%

    29% 31% 32%

    46%

    55%

    NA

    11% 13%

    NA

    36%

    8%

    52%

    23%

    What networking technologies are you investing-in to enhance employee

    productivity and collaboration in 2009? (Answer all that apply)

    2009 2008

    Source: Goldman Sachs Research

    g

    Trends

    STKI M d d 2008 9

    Networking

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    63/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 63

    STKI Madad 2008-9

    VOIP and IPTel

    20%

    Network Infra

    20%

    Miscellaneous

    12%

    Trends

    10%Network Costs

    Reduction

    10%

    Nortel

    10%

    Market Players

    8% UC

    8%

    Optimization

    2%

    Trends

    Local Area Net work TrendsNetworking

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    64/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 64

    Local Area Net work Trends

    Security embedded features in the LAN infra are

    imperative

    Network Virtualization is already here

    LAN vendors should support standard-based platforms Israeli Trends:

    Corporate LAN to endpoints is stable: 100 MBIT Ethernet;

    Backbone LAN: 2 X 1GBIT (10GBIT in some cases)

    Israeli enterprise tend to count on either Cisco or Nortel for their

    backbone network. Other players appear on the network edges

    -LAN

    LAN

    Networking

    -LAN

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    65/109

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 65

    - Israeli Market Positioning 1Q09

    LocalSupp

    ort

    Market Presence

    Player

    This analysis should be used with its

    supporting documents

    Vendors to Watch:

    Alcatel

    Enterasys

    WorldwideLeader

    Nortel

    Juniper

    3COM

    Extreme

    Cisco

    Foundry

    HP

    LAN

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    66/109

    The Nort el Cr isis What s next ?

    Networking

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    67/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 67

    The Nort el Cr isis What s next ?

    Nortel files for Chapter 11 to deal decisively with itshistoric debt burdens

    Nov 10th 2008: A Nortel spokesman said the companyhad enough liquidity to sustain 12 to 18 months of

    operation under the current conditions

    Survival still possible for Nortel, but Companies that exitthe bankruptcy process often emerge in smaller form andare frequently acquired in part or whole by larger suitorslooking for a good deal

    19.2.09: Radware has purchased Nortels Alteon

    -Nortel

    The Nor t el Cr isis

    Networking

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    68/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 68

    Israel i Market What i f Analysis

    Cisco HP

    Juniper

    Gores

    Alcatel

    3COM

    -Nortel

    Acquire Nortels

    Telephony?

    Alliance with Avayaand Microsoft

    Enterasys (LAN and sec.)Siemens (Telephony)

    Goes deeper into the

    Israeli market?

    Goes deeper into the

    Israeli market?

    Acquiring parts of Nortel?

    WAN O i i iNetworking

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    69/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 69

    WAN Opt imizat ion -WAN

    WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN:

    0% 10% 20% 30% 40% 50% 60% 70% 80%

    BCP/DRP

    Server Virtualization

    Data Center Consolidation

    VOIP Deployments

    2007

    2008

    Source: Aberdeen Research

    WAN Opt imizat ionI li M k P i i i 1Q09

    Networking

    -WAN

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    70/109

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 70

    - Israeli Market Positioning 1Q09

    LocalSupp

    ort

    Market Presence

    Player

    This analysis should be used with its

    supporting documents

    WorldwideLeader

    Citrix

    Expand

    F5

    Radware Packeteer*

    *June 2008: A Blue Coat company

    Riverbed

    Blue Coat

    Juniper

    Cisco

    Voice Over IP (VOIP)

    Networking

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    71/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 71

    Voice Over IP (VOIP)

    STK I obser vat ion: Many enterprises are migrating, or

    planning to migrate, their telephony infrastructure from

    traditional circuit-switched technology to newer Internet

    Protocol (IP)-based systems

    Motivations to actually migrate:

    End of life/end of support for current telephony infrastructure

    Moving to a new office/office improvements

    Motivations to wait:

    Phones are working

    -VOIP

    VOIP (Ent erpr ise & Cal l Cent ers)I li M k P i i i 1Q09

    Networking

    -VOIP

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    72/109

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 72

    - Israeli Market Positioning 1Q09

    LocalSupp

    ort

    Market Presence

    Player

    This analysis should be used with its

    supporting documents

    Vendors to Watch:

    WorldwideLeader

    *Most CC in the market are Avaya

    Alcatel-Lucent

    Tadiran

    3COM

    Asterisk

    Avaya*

    Nortel

    Cisco

    Video Over IPNetworking

    Vid OIP

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    73/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 73

    Video Over IP

    By 2011, 60% of Internet traffic is expected to be video

    traffic (Cisco)

    Global organizations use it as a vital working tool

    especially in order to cut travelling costs

    Video technology is considered by many local organizations as

    mostly nice to have

    Local organizations use this technology mainly for

    training/marketing purposes

    Video OIP

    Video Over IP Map

    Networking

    Vid OIP

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    74/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 74

    Video Over IP Map

    Source: http://www.video-over-ip.com/

    Video OIP

    Unif ied Communicat ions (UC)

    Networking

    UC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    75/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 75

    Unif ied Communicat ions (UC)

    Why do we need this?Integration: Of any or all communications, collaborative,

    and business applicationsPresence: guides users to the most appropriate means of

    communicationsMobility: extends applications and integration of

    applications every way you goProductivity: improves business processesWhy now?

    Key drivers today are: Workforce virtualization,Cost reduction, Increasingly available tools,Business improvement opportunities

    UC

    UC ChallengesNetworking

    UC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    76/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 76

    UC Challenges

    The problem:business justification for collaboration technologies comes

    down to soft dollars:

    Productivity Better teamwork

    Better customer service

    How do you define better?What is its business value to the company?

    UC

    UC Preferred Choice

    Networking

    UC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    77/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 77

    UC Preferred Choice

    0% 10% 20% 30% 40% 50% 60%

    Unsure

    Others

    Newer Vendors

    Nokia-Siemens

    3Com

    Alcatel-LucentNortel

    Avaya

    Microsoft

    Cisco

    9%

    4%

    4%

    2%

    3%

    5%10%

    22%

    41%

    56%

    Source: Goldman Sachs Research

    UC

    Networking Integrators

    Networking

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    78/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 78

    - Israeli Market Positioning 1Q09 (Leaders)

    Agenda

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    79/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 79

    Agenda

    1 Information Security

    Communicat ion

    InformationSecurity

    Networking2 Networking

    Green IT3 Green IT

    Green IT

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    80/109

    Your Text hereYour Text here

    80

    Small, incremental changescompounded many times canmean big savings forlarge-scale organizations

    So How Can I Be More Green?

    Green IT

    Trends

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    81/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 81

    So, How Can I Be More Green?

    PC managementVirtualized server

    and storageenvironments

    Secure mobileaccess to networks,

    applications, anddata

    Intelligent archivingState of the art

    power and cooling(all around)

    Teleconferencing

    Go digital! &Printing

    consolidationAsset management

    Workingenvironment (car

    pool, working fromhome)

    Trends

    STKI Madad 2008-9(N I l di P i i )

    Green IT

    Trends

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    82/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 82

    (Not Including Pr int ing)

    Trends

    38%

    DC Facilities

    20%

    Asset

    Management

    6%

    Market Players15%

    PC Energy

    Management

    9% Miscellaneous

    12%

    Trends

    How Dense is Your Dat a Center?

    Green Data

    Center -

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    83/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 83

    How Dense is Your Dat a Center?

    10%

    30%

    31%

    23%

    6%

    What is your average rack power demand (per rack)?

    0 kW to 3 kW

    4 kW to 6 kW

    7 kW to 9 kW

    10 kW to 11 kW

    12 kW or More

    Source: STKI, Information Week

    Trends

    2008 2009 2010

    30.0 33.33% 40.0 25.00% 50.0

    Data Center Environment Israeli Marke t (Ms of $)

    Elect r ici t y Use Trends

    Green Data

    Center -

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    84/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 84

    Elect r ici t y Use Trends

    36

    Trends

    Source: ASHRAE

    Dat a Cent er Met r ics

    Green Data

    Center -

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    85/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 85

    at a Ce t e et cs

    Power Usage Effectiveness(PUE):

    PUE = Total FacilityPower IT Equipment

    Power

    and its reciprocal, the DCiE isdefined as:

    DCiE = 1 PUE = (ITEquipment Power Total

    Facility Power) x 100%

    Source: The Green Grid, EPA

    Trends

    Vir t ualizat ion Calculat ionsGreen Data

    Center -i li i

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    86/109

    Your Text hereYour Text here

    86

    Vir t ualizat ion Calculat ions

    Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=

    Virtualization

    Assumptions (partial list):Average Server Utilization: %5

    Number of peak hours:12

    Cost per KwH: 11 cents

    Average servers growth rate per year: 15%Virtualization:

    level of utilization of servers after virtualization: 50%-70%

    Calculations are based on a maximum of two virtualmachines per core

    Cooling: 1 watt of power for the server to 1.25 watts ofpower for cooling

    Vir t uali zat ion Calculat ions

    Green Data

    Center -Vi li i

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    87/109

    Your Text hereYour Text here

    87

    Vir t uali zat ion Calculat ions

    Infrastructure Prior to

    Virtualization

    Year 1 Year 2 Year 3 Year 4 Year 5

    Total Number of

    Servers:

    540 641 714 821 944

    Power Used for Servers:

    (Watts)

    1,037,500 1,193,125 1,372,094 1,577,908 1,814,594

    Server Electric Cost ($)

    Per Year:

    $1,000,420 $1,150,483 $1,323,055 $1,521,514 $1,749,740

    Total Cooling Electric

    Cost ($) Per Year:

    $1,250,525 $1,438,103 $1,653,819 $1,901,892 $2,187,176

    Total Power & Cooling

    Cost ($) Per Year:

    $2,250,944 $2,588,586 $2,976,875 $3,423,406 $3,936,916

    Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=

    Virtualization

    Vir t ualizat ion Calculat ions

    Green Data

    Center -Vi t li ti

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    88/109

    Your Text hereYour Text here

    88

    Infrastructure After

    Virtualization

    Year 1 Year 2 Year 3 Year 4 Year 5

    Total Workloads: 4,170 4,796 5,515 6,342 7,293

    Physical Systems

    Needed:

    136 156 179 206 237

    Power Used for Servers

    (Peak Watts):

    68,000 78,200 89,700 102,925 118,450

    Power Used for Servers

    (Off-Peak watts):

    45,560 52,394 60,099 68,960 79,361

    Server Electric Cost ($)

    Per Year (Peak):

    $65,570 $75,405 $86,716 $99,723 $114,682

    Server Electric Cost ($)Per Year (Off-Peak):

    $43,932 $50,521 $58,100 $66,815 $76,837

    Total Cooling Electric

    Cost ($) Per Year:

    $136,877 $157,408 $181,019 $208,172 $239,398

    Total Power & Cooling

    Cost ($) Per Year:

    $246,378 $283,335 $325,835 $374,710 $430,917

    Vir t ualizat ion Calculat ions Virtualization

    Vir t ual izat ion Calculat ions -ROIGreen Data

    Center -Vi t li ti

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    89/109

    Your Text hereYour Text here

    89

    Vir t ual izat ion Calculat ions ROI Virtualization

    Year 1 Year 2 Year 3 Year 4 Year 5 Total ("-" meansSavings")

    50%

    Utilization6,074,378$ -1,619,909$ -677,406$ 405,174$ 1,688,365$ 5,870,602$

    60%Utilization1,911,717$ -2,367,498$ -2,129,390$ -1,822,708$ -1,524,026$ -5,931,905$

    70%

    Utilization564,773$ -2,609,364$ -2,583,076$ -2,557,558$ -2,541,227$ -9,726,452$

    Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=

    VDI (Vir t ual Deskt op Inf rast ruct ure) Energy,Management and Securi t y Eff iciency

    Green IT -Virtualization

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    90/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 90

    Management and Securi t y Eff iciency

    Assumptions (Partial list): Number of desktop devices under consideration: 500

    Desired virtualization software engine: VMware ESX

    Average annual Sun VDS server administration costs per

    thin client: 846.10 NIS

    FTEs desktop helpdesk support staff: 1.25

    FTEs desktop security management: 0.5

    Number of Desktop security incidents: 2

    Project Implementation Plan (months from kickoff todeployment): 2

    VDI (Vir t ual Deskt op Inf rast ruct ure) Energy,Management and Securi t y Eff iciency

    Green IT -Virtualization

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    91/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 91

    TCO Comparison

    Cumulative 3 Year

    Solution A:

    TraditionalDesktop Devices

    Solution B: Sun

    Virtual DesktopSolution

    Difference

    (A - B)

    Difference

    (A - B)%

    IT Costs

    Desktop Device Costs 3,259,204 NIS 670,834 NIS 2,588,370 NIS 79.4%

    Desktop Software Costs 782,627 NIS 461,522 NIS 321,104 NIS 41.0%

    Server Infrastructure Costs 296,448 NIS 1,248,949 NIS (952,501 NIS) -321.3%

    Desktop Management Labor Costs 5,724,578 NIS 2,137,760 NIS 3,586,818 NIS 62.7%Desktop Power Costs 314,788 NIS 135,494 NIS 179,294 NIS 57.0%

    Total IT Costs 10,377,645 NIS 4,654,559 NIS 5,723,085 NIS 55.1%

    Business Operating Costs

    Desktop User Productivity Impact 4,473,911 NIS 0 NIS 4,473,911 NIS 100.0%

    Business Risks 538,416 NIS 26,919 NIS 511,496 NIS 95.0%

    Total Business Operating Costs 5,012,327 NIS 26,919 NIS 4,985,408 NIS 99.5%

    Total 15,389,972 NIS 4,681,479 NIS 10,708,493 NIS 69.6%

    Management and Securi t y Eff iciency

    Source: www.alinean.com

    VDI (Vir t ual Deskt op Inf rast ruct ure) Energy,Management and Securi t y Eff iciency

    Green IT -Virtualization

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    92/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 92

    ROI Analysis(Solution B)

    (Probable Case)

    Initial Year 1 Year 2 Year 3

    Benefits (to Solution B from

    Current (AS IS))

    0 NIS 3,115,969 NIS 3,505,821 NIS 3,681,630 NIS

    Cumulative Benefits 3,115,969 NIS 6,621,790 NIS 10,303,420 NISInvestment (Solution B) 1,604,296 NIS 312,617 NIS 170,099 NIS 237,175 NIS

    Cumulative Investment 1,604,296 NIS 1,916,913 NIS 2,087,012 NIS 2,324,187 NIS

    Cash Flow (1,604,296 NIS) 2,803,351 NIS 3,335,722 NIS 3,444,456 NIS

    Cumulative Cash Flow (1,604,296 NIS) 1,199,055 NIS 4,534,777 NIS 7,979,233 NIS

    ROI 343%

    Risk Adjusted ROI 288%NPV Savings 6,361,354 NIS

    IRR 177%

    Management and Securi t y Eff iciency

    Source: www.alinean.com

    PC -Energy Eff iciency and PowerConsumpt ion

    Green IT -

    PC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    93/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 93

    0% 10% 20% 30% 40%50%

    I forget

    It's a hassle

    I don't think it's important

    It's a habitIt takes too long

    My computer goes to hibernate, or to sleep mode

    It's IT policy or procedure to leave it on

    1

    Consumpt ion

    Source: E1, PC Energy Report

    Why dont you always shut down your PC when you have finished working for

    the day? (multiple responses allowed):

    PC Cost s Calculat ions

    Green IT -

    PC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    94/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 94

    PC Cost s Calculat ions

    0

    1

    2

    34

    5

    6

    7

    8

    300*20 Senario 300*20 Senario & Vista 300*9 Senario

    Number of Computers

    AnnualCost(Million

    )

    PC -Energy Eff iciency and PowerConsumpt ion: An Example

    Green IT -

    PC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    95/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 95

    Consumpt ion: An Example

    Source: www.g-patrol.com

    PC -Energy Eff iciency and PowerC t i I l i M k t

    Green IT -

    PC

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    96/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 96

    Israeli Players:

    Microsoft

    Symantec BigFix

    Gpatrol Israeli SU

    Consumpt ion: Israel i Market

    STK I obser vat ion: Some Israeliorganizations, which address the issue ofenergy efficiency of PCs, use homemade

    script based solutions

    Printing

    Green IT -

    Printing

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    97/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 97

    Printing

    P Please think of the environment before printing this presentation

    STOP PRINTING

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    98/109

    STKI Madad 2008-9

    Green IT -

    Printing

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    99/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 99

    Distribution Tools

    17%

    Monitoring and

    Cost Reduction43%

    Outsourcing

    9%

    Printing

    Consolidation

    20%

    Miscellaneous11%

    P Please think of the environment before printing this presentation

    2008 2009 2010

    10.0 50.00% 15.0 66.67% 25.0

    Printing Projec ts Israe li Ma rket Size (Ms of $)

    Printing Consolidation

    Green IT -

    Printing

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    100/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 100

    t g Co so dat o

    P Please think of the environment before printing this presentation

    In todays world, printing has become a significantexpenditure item for almost every organization

    A typical large financial organization in Israel spenddozens of millions of Shekels annually on office printing

    Israeli Office Printing Market has changed great dealsince 2007: Users start seeing the great potential in reorganizing their

    printing environment

    The economic crisis pushes many to look for ways to cutcosts

    Printing consolidation projects usually have a fast,measurable ROI

    Pr int ing Consol idat ion -Rat ios

    Green IT -

    Printing

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    101/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 101

    g

    Organization

    Type

    Heavy

    Printers

    Followers Consolidated High-Tech

    Printers/Users

    Ratio

    1:1 1:5 1:15 1:15 1:30 1:30+

    One of the ways to check the maturity of an organization

    printing environment is to check its printers/users ratio:

    Heavy Printers Consist of financial organizations,

    government agencies, law firms est.

    High-Tech Truly paperless entities (start ups, agile hightech companies est.)

    P Please think of the environment before printing this presentation

    Addressing Pr int ing Consolidat ion Proj ect s

    Green IT -

    Printing

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    102/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 102

    P Please think of the environment before printing this presentation

    Pr int ing Consolidat ion Bot t om Line

    Green IT -

    Printing

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    103/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 103

    g

    P Please think of the environment before printing this presentation

    Pr int ing Consolidat ion Bot t om Line

    Green IT -

    Printing

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    104/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 104

    P Please think of the environment before printing this presentation

    g

    Pr int ing Consolidat ion Bot t om Line

    Green IT -

    Printing

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    105/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 105

    P Please think of the environment before printing this presentation

    g

    Pr int ing Consolidat ion Bot t om Line

    Green IT -

    Printing

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    106/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 106

    P Please think of the environment before printing this presentation

    g

    Pr int ing Consolidat ion Bot t om Line

    Green IT -

    Printing

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    107/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 107

    P Please think of the environment before printing this presentation

    g

    Pr int ing Consolidat ion Bot t om Line

    Green IT -

    Printing

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    108/109

    Your Text hereYour Text here

    Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 108

    P Please think of the environment before printing this presentation

    g

  • 8/14/2019 Shahar MAOR Infrastructure Services Market 2009

    109/109

    Your Text hereYour Text here

    Shahar Geiger MaorVP & Senior Analyst

    [email protected]

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]