Shahar MAOR Infrastructure Services Market 2009
-
Upload
dr-jimmy-schwarzkopf -
Category
Documents
-
view
215 -
download
0
Transcript of Shahar MAOR Infrastructure Services Market 2009
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
1/109
Your Text hereYour Text here
1
Shahar Geiger MaorVP & Senior Analyst
Visit My Blog: http://shaharmaor.blogspot.com/
mailto:[email protected]:[email protected]:[email protected]://shaharmaor.blogspot.com/http://shaharmaor.blogspot.com/mailto:[email protected]:[email protected]:[email protected] -
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
2/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
Agenda
1 Information Security
Communicat ion
Information
Security
Networking
2 Networking
Green IT3 Green IT
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
3/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
Inf ormat ion Secur i t y
Information
Security
2008 2009 2010
Governance & Risk Management
(also BCP) 35.0 42% 50.0 50% 75.0
Security (projects) 95.0 -10.53% 85.0 11.76% 95.0
Security (Software) 90.0 -5.56% 85.0 -5.88% 80.0Total 220 0% 220 14% 250
GRC and Sec urity m arke t size (Ms of $)
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
4/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
Secur i t y/Pr ivacy In t he News
Information
Security
-Trends
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
5/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
Secur i t y Trends
Cloudcomputing
End-usersorganization is
unable to controlthe data
managementenvironment
Outsourcing
Sensitive orconfidential
information maynot be properly
protected
Unauthorizedparties might be
able to accessprivate files without
authorization
cyber crime
External threat oforganized cyber
criminal syndicates
Virtualization
Inability to properlyidentify and
authenticate usersto multiple systems
Third parties mightbe able to access
private files withoutauthorization
Information
Security
-Trends
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
6/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
Secur i t y Trends
Mobility
Inability toproperly
identify and
authenticateremote users
Data breachesinvolvingpersonal
information
Sensitive orconfidential
information thatends up in thehands of cyber
criminals andidentity thieves
Peer-to-peer filesharing
Use of P2Pmight result in
the loss ofsensitive orconfidential
business
informationincluding trade
secrets
Web 2.0 andmesh-ups
Unsupervisedmonitoring of
employees useof Web 2.0
applications canresult in the loss
of criticalconfidential
business dataon the Internet
Information
Security
-Trends
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
7/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
Technologies Categorization 2009
Investment
to make money
Cut costs, Increase
productivity
Investment
for regulations
Commodity IT
Services
Using Implementing Looking
Business Value
Market Maturity
IAM/IDMBusiness
Project
IT Project
Size of figure =complexity/cost of project
SSO
Network
Security
DLP
NAC
Information
Security
-Trends
DB
Sec.
Manage Sec.
Services
Cloud
SIEM/SOCEPSMobile
Sec.
Anti
X
Vir.
Sec.
GRC
Remote
Access
App.
Sec.
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
8/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
STKI Madad 2008-2009
Access
18%
EPS/Anti x
14%
WAF & Apps
11%Trends
8%
Management
8%
DB Protection
7%
NAC
6%
Miscellaneous6%
GRC
5%
Market Players
5%
Network
5%
DLP
4%
Hardening
3%
Information
Security
-Trends
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
9/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
Sophist icat ed Threat Envi ronment
Writers Middle Men
Second-Stage
Abusers
First-Stage
Abusers End Value
Spyware
Viruses
Trojans
Worms
MalwareWriters
Internal TheftAbuse ofPrivilege
InformationHarvesting
MachineHarvesting
ExtortionistDDoS for Hire
Spammer
Phisher
Pharmer/DNSPoisoning
Identity Theft
CompromisedHost and
Application
Botnet Creation
BotnetManagement
Personal
Information
InformationBrokerage
Electronic IPLeakage
Theft
Espionage
Extortion
CommercialSales
FraudulentSales
Click Fraud
Financial Fraud
Tool WritersHacker or
Direct AttackFame
Source: Cisco Israel
Information
Security
-Trends
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
10/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
Appl icat ion Secur i t y
STK I obser vat ion: Secure development should be anintegral part of any new project and therefore should becalculated within the projects budget. STKI survey showsthat spendings on secure development scale from 0% oftotal project budget (Main-Frame based projects) up to10% ( core web applications projects) of total projectbudget.Average spending on secure development is 5% of totalproject budget (including: training, code review andpenetration tests)
Information
Security
-App. Sec
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
11/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
Web Appli cat ions - Vulnerabi l i t ies
Source: http://www.webappsec.org/projects/statistics/
% Sites (All) % Sites (Scanned) % Sites (Black & Whitebox)
Probability to detect vulnerabilities of
different risk degree (results of 32,717 sites
and 69,476 vulnerabilities of different
degrees of severity)
Information
Security
-App. Sec
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
12/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
Web Appl icat ions -Vulnerabil i t ies
Source: http://www.webappsec.org/projects/statistics/
Vulnerability frequency by types:
1. Cross-Site Scripting and SQL Injection vulnerabilities usually appears due tosystem design errors
2. Information Leakage and Predictable Resource Location are often connected with
improper system administration (for example, weak access control)
Information
Security
-App. Sec
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
13/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
Web Appl icat ion Firewal lIsrael i Market Players
Information
Security
-App. Sec
Applicure - dotDefender (Apache and IIS) Cisco* - ACE XML Gateway
Barracuda - Web Application Firewall
(fromerly NetContinuum)
IBM* Data Power
Breach Security - WebDefend Microsoft IAG WAF
Citrix - Application Firewall (FormerlyTeros) Protegrity - Defiance
*Both Cisco ACE XML Gateway and IBM Data Power are not pure WAF players, but were added to the list
http://www.microsoft.com/forefront/edgesecurity/iag/en/us/default.aspxhttp://www.applicure.com/About_dotDefenderhttp://www.cisco.com/en/US/prod/collateral/contnetw/ps5719/ps7314/product_data_sheet0900aecd8060acd2.htmlhttp://www.barracudanetworks.com/ns/products/web-site-firewall-overview.phphttp://www-01.ibm.com/software/integration/datapower/http://www.breach.com/products/webdefend.htmlhttp://www.microsoft.com/forefront/edgesecurity/iag/en/us/default.aspxhttp://www.citrix.com/English/ps2/products/product.asp?contentID=25636http://www.protegrity.com/WebApplicationFirewallhttp://www.protegrity.com/WebApplicationFirewallhttp://www.citrix.com/English/ps2/products/product.asp?contentID=25636http://www.microsoft.com/forefront/edgesecurity/iag/en/us/default.aspxhttp://www.barracudanetworks.com/ns/products/web-site-firewall-overview.phphttp://www.barracudanetworks.com/ns/products/web-site-firewall-overview.phphttp://www.breach.com/products/webdefend.htmlhttp://www.barracudanetworks.com/ns/products/web-site-firewall-overview.phphttp://www-01.ibm.com/software/integration/datapower/http://www.barracudanetworks.com/ns/products/web-site-firewall-overview.phphttp://www.cisco.com/en/US/prod/collateral/contnetw/ps5719/ps7314/product_data_sheet0900aecd8060acd2.htmlhttp://www.applicure.com/About_dotDefenderhttp://www.applicure.com/About_dotDefender -
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
14/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
Web Appl icat ion Firewal lLeading Players -1Q09
Solution What Should I Know? Representatives/
Integrators
F5 - Application Security
Manager (ASM)
One of the best WAFs around. Features a good
policy toolset for adaptive learning. Offer strong
integration to the TMOS family of products.Superb load balancing capabilities. One of two
leading solutions in Israel. Strong market
presence
Trek-IT (Dis.),
Artnet,
Taldor, Spider,Bezeq Int., One
NewAge, Netcom
Imperva SecureSphere The first in the Israeli market. Imperva has an
array of out-of-the-box policies and attack
signatures as well as superior learning mode . Aleading DB protection solution. Has a significant
market share
Comsec (Dis.),
Netcom, Bynet,
Taldor, NewAge,012 Smile
Information
Security
-App. Sec
http://www.f5.com/products/big-ip/product-modules/application-security-manager.htmlhttp://www.f5.com/products/big-ip/product-modules/application-security-manager.htmlhttp://www.imperva.com/products/securesphere.htmlhttp://www.imperva.com/products/securesphere.htmlhttp://www.f5.com/products/big-ip/product-modules/application-security-manager.htmlhttp://www.f5.com/products/big-ip/product-modules/application-security-manager.html -
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
15/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
Appl icat ion Secur i t yIsraeli Players and Posi t ioning -1Q09
Information
Security
-App. Sec
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
16/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
Network Access Cont rolInformation
Security
-Network Sec
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
17/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
NAC Insight s
NAC has not been fully digested by Israeli customers in2008. There should be more activity in 2009
NAC can be deployed less expensively when it is anembedded feature of an existing vendor and customerstake notice of it
Israeli customers first priority: implementing a guestnetworking control
Network Security or Endpoint Security?
NAC is a Layer 2 vs. Layer 3 match
Information
Security
-Network Sec
I f ti
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
18/109
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
LocalSupport
Market Presence
Not a technological positioning, refers only to Israeli market
Focused on enterprise market (not SMB)
Not an STKI recommendation
Market Presence (X)
Market share - existing and new sales (more emphasis)
Mind share (how user organizations rate vendors)
Local Support (Y) is influenced by (X)
Experience & technical knowledge, localization,support, number and kind of integrators
Worldwide leaders marked, based on global positioning
Vendors to watch: Are only just entering israeli market
so cant be positioned but should be watched
STKI Israeli Positioning
Vendor A
Vendor B
Worldwide
Leader
Vendors to Watch:
Vendor C
Information
Security
-Network Sec
NAC I f ti
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
19/109
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
NAC- Israeli Market Positioning 1Q09
LocalSupport
Market Presence
XOR SWAT
Player
This analysis should be used with its
supporting documents
Vendors to Watch:
HP Procurve
Access Layers
Check Point
Enterasys
ForeScoutInsightix
WorldwideLeader
Nortel
McAfeeLeap
Microsoft
Cisco
Symantec
Juniper
Information
Security
-Network Sec
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
20/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
Endpoint Secur i t yInformation
Security
-EPS
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
21/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
Endpoint Secur i t y -Threat sInformation
Security
-EPS
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
22/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
Endpoint Secur i t y -Prot ect ion
O
rganization
Outside
Information
Security
-EPS
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
23/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
Endpoint Secur i t y -Prot ect ion
O
rganization
Outside
Information
Security
-EPS
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
24/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
Endpoint Secur i t y -Prot ect ion
O
rganization
Outside
NAC
Anti X
DLP
Manageability
Information
Security
-EPS
nt u tes
Information
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
25/109
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
nt - u tes- Israeli Market Positioning 1Q09 (Enterprise Leaders Only)
LocalSupport
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Microsoft
McAfee
Symantec
Trend Micro
Information
Security
-EPS
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
26/109
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
Data Centric Security
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
Data Centric
Security
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
27/109
i
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
28/109
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
Data Centric Security Arena
DLP ERM
EncryptionDatabase
Protection
Data Centric
Security
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
29/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
Dat a Leak/Loss Prevent ionData Centric
Security
-DLP
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
30/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
Dat a Leak /Loss Prevent ion
DLP is an overall framework into which different elements fit
There are three types of data that may leak:
Data at rest
Data in transit
Data on endpoints
No single DLP focus area is full proof, an optimal solution
should cover all three areas
DLP is a growing area, and vendors react accordingly
Data Centric
Security
-DLP
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
31/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
DLP Market St at us & Players
World Leaders (consolidation in progress): Symantec (Acquired Vontu, 2007, 350$ M)
Websense (Acquired PortAuthority 2007, 90$ M)
Reconnex (Acquired by McAfee, July 2008, 46$ M) Tablus (Acquired by RSA, 2007, 40$ M)
Vericept ? Workshare?
Main drivers for DLP are:
Regulations such as Payment Card Industry (PCI),Accountability Act (HIPAA)
e-mail security, instant messaging (IM) and
endpoint monitoring solutions
Data Centric
Security
-DLP
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
32/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
DLP Market St at us
Solution Deployed
20%
Plan to Deploy
Soon
20%
Not There" Yet
60%
DLP Deployments Status -Israel 1Q09
Data Centric
Security
-DLP
DLP I li M k t P iti i 1Q09
Data Centric
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
33/109
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
DLP - Israeli Market Positioning 1Q09
LocalSupport
Market Presence
Player
This analysis should be used with its
supporting documents
Vendors to Watch:
WorldwideLeader
FastMovement
Symantec
McAfeeVerdasys
Websense
ProofPoint
RSA
Workshare
IBM (ISS)
Security
-DLP
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
34/109
A l i i d Fi l F
D t C t i
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
35/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
Appl icat ions and Fi le Format sUsed in ERM Implementat ions
Source: Gilbane Group
Data Centric
Security
-ERM
D t C t i
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
36/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
ERM How Does i t Work?
Data owner Recipient
RMS Server
SQL ServerActive Directory
2 3
4
5
2. The User defines set of rules and content
usage rights for the data he wants to
share He is the data owner
3. User distributes data to relevant recipients
4. When recipient tries to open a file a
request is sent to the RMS Server in
order to authorize/deny access
5. RMS enforces rules made by the data
owner
1. New user is authorized to use RMS
1
Source: Microsoft Israel
Data Centric
Security
-DLP
Data Centric
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
37/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
ERM -Israel i Market Players
Microsoft -Rights Management Services
EMC - EMC Documentum IRM Product Suite
Oracle - Oracle Information Rights Management
Adobe Adobe LifeCycle Rights ManagementIsraeli SU:
Secure Islands -A provider of an advanced informationprotection and control (IPC) solution
Covertix Develops innovative software technology totrack, monitor and control documents and files withinand outside the organization
Data Centric
Security
-ERM
Data Centric
http://www.secureislands.com/default.asphttp://www.covertix.com/index.htmlhttp://www.covertix.com/index.htmlhttp://www.secureislands.com/default.asp -
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
38/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
DB Prot ect ion Market St at us
Solution
Deployed
20%
Plan to
Deploy Soon30%
Not There"
Yet
49%
Other\Do Not
Know1%
DB Protection Deployments Status -Israel 1Q09
Leading Israeli Players:
SentrigoImperva
Oracle DB VaultGuardium
DB encryption:
Ged-i (Israeli SU): offershigh-level encryption to
Storage Data
Security
-DB
Protections
Data Centric
http://www.ged-i.com/http://www.ged-i.com/ -
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
39/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
Masking of Product ion Dat aSecurity
-Data
Masking
Data Centric
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
40/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
Masking of Product ion Dat a
What is it? The process of data masking is designed to de-identify data,
such that the data remains based on real information, but nolonger has any practical usage or application
What is the need?
The drive to outsource and offshore application developmentand testing work means that organizations will have little controlover who gets to see their data
Test environments are not physically as secure as productionsystems
What can go wrong? Sensitive data might be downloaded to laptops and stolen Employees might misuse sensitive information and engage in
fraudulent activity
Security
-Data
Masking
Data Centric
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
41/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
Masking of Product ion Dat a
Source: Securosis.com
Security
-Data
Masking
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
42/109
Your Text hereYour Text here
42
SIEM/SOCSIEM/SOC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
43/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 43
SIEM/SOC
What is SIEM? Security Information & Event Management
What is SOC? Security Operation Center
How does it work? Collects and analyzes all log data and basic event management monitors and manages all aspects of enterprise security in real
time, from a single, centralized location The NOC of security
Why do we need it? Need for real-time awareness of internal/ external threats Ensure business continuity and comply with regulations A toolset for improving business logic (Security BI)
SIEM/SOC
Si los of Redundant Informat ion
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
44/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 44
Si los of Redundant Informat ionManagement
Source: Network Intelligence
SIEM/SOC
An Ent erpr ise Plat form for Compl iance
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
45/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
An Ent erpr ise Plat form for Compl ianceand Securi t y
SIEM
Source: Network Intelligence
SIEM/SOC
SIEM/SOC
SIEM/SOC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
46/109
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
SIEM/SOC
- Israeli Market Positioning 1Q09
LocalSupp
ort
Market Presence
Player
This analysis should be used with its
supporting documents
Vendors to Watch:
NetIQ
WorldwideLeader
FastMovement
EMCSymantec
IBM CA
ArcSight
Cisco
IBM -MSS
TriGeo
SIEM/SOC
SIEM/SOC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
47/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 47
Next Generat ion SIEM/SOC: MSS
What does MSS offer?-Comprehensive solution for security management: Firewall/EP Management Service
Intrusion Detection & Prevention Management Service
Vulnerability Management Service
Why should we go there? Cost effective!
Use of best-of-breed security
Why shouldnt we? Who owns my data?
No one else in Israel goes thereyet
SIEM/SOC
-MSS
SIEM/SOC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
48/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
MSS Trends in Israel
STK I obser vat ion: MSS is well accepted in SMBorganizations, but Israeli CISOs in enterprises stillstrongly oppose this trend
The current economic downturn should encouragesome enterprises to reconsider MSS
MSS providers addresses the management (CFOs and
CEOs) in order to attract new clients
SIEM/SOC
-MSS
MSS W ld L dSIEM/SOC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
49/109
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
MSS World Leaders
Deliver
y
Market Penetration
(Source: Frost and Sullivan)
Opportunities in Israel for:
Current world leaders (IBM, Symantec) local ISPsNetwork integratorsTraditional OS players
-MSS
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
50/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
Ident i t y & Access Management (IDM/ IAM)IDM/IAM
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
51/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
IDM Global Mega Trends
Fraud and identity theft will increase strongauthentication use
Strong authentication and SSO will strengthen their ties
Context-based authorization will put risk analysis intoaccess control decisions
Physical and logical security will continue to converge
Federation will slowly grow
IDM/IAM
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
52/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
Trends in t he Israel i Market
Nov 2008: CA acquired Eurekify to enhance its role-basedmanagement suite
ERP based SOD solutions start to be seen, mainly for GRCreasons:
2006: SAP acquired Virsa, enterprise risk management softwareprovider, to bolster SAPs software compliance skills
2008: Oracle acquired Logical Apps, an automated GRC controls,for enterprise applications
Israeli new GRC enforcement Start-Ups: Xpandion -Risk management and behavioral analyzing software
solutions
SPATIQprovides an automated tool for Entitlement Management
IDM/IAM
http://www.xpandion.com/http://www.spatiq.com/index.phphttp://www.spatiq.com/index.phphttp://www.xpandion.com/ -
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
53/109
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
54/109
Secur i t y Consult ant s
Information
Security
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
55/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
Secur i t y Consult ant s-Israeli Market Positioning 1Q09 (Leaders)
Security
-Market
Players
Secur i t y Int egrat ors
Information
Security
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
56/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
Secur i t y Int egrat ors-Israeli Market Positioning 1Q09 (Leaders)
Security
-Market
Players
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
57/109
A d
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
58/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
Agenda
1 Information Security
Communicat ion
Information
Security
Networking2 Networking
Green IT3 Green IT
N t ki N t ki
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
59/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
Networking Networking
2008 2009 2010
LAN
equipment 80.0 -25.00% 60.0 8.33% 65.0
WANequipment 50.0 -20.00% 40.0 12.50% 45.0
VoIP
equipment 40.0 -20.00% 32.0 25.00% 40.0
Totals170.0 -22.35% 132.0 13.64% 150.0
Networking market size (Ms of $)
N ki F T d
Networking
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
60/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
Net working Fut ure Trends
Datacenter Networking virtualizationNext Generation Networking Internet Protocol (IP) Core
and High Speed Broadband
Green Networking
IPv6
Network Operating systems
Network intelligence and policy control
Network Security
Communication billing
g
Trends
Technologies Categorization 2009
Networking
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
61/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
Technologies Categorization 2009
Investmentto make money
Cut costs, Increase
productivity
Investmentfor regulations
Commodity IT
Services
Using Implementing Looking
Business Value
Market Maturity
Networking
Vir.
Business
Project
IT Project
Size of figure =complexity/cost of project
g
Trends
IPv6
Network
Security
UC
VOIPInfra.
Optimization
SAAS/
Cloud
Billing NGN
Y f i d d t i i t
Networking
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
62/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 62
Year of savings and product ivi t y
1%9%
19%
29% 31% 32%
46%
55%
NA
11% 13%
NA
36%
8%
52%
23%
What networking technologies are you investing-in to enhance employee
productivity and collaboration in 2009? (Answer all that apply)
2009 2008
Source: Goldman Sachs Research
g
Trends
STKI M d d 2008 9
Networking
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
63/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
STKI Madad 2008-9
VOIP and IPTel
20%
Network Infra
20%
Miscellaneous
12%
Trends
10%Network Costs
Reduction
10%
Nortel
10%
Market Players
8% UC
8%
Optimization
2%
Trends
Local Area Net work TrendsNetworking
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
64/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
Local Area Net work Trends
Security embedded features in the LAN infra are
imperative
Network Virtualization is already here
LAN vendors should support standard-based platforms Israeli Trends:
Corporate LAN to endpoints is stable: 100 MBIT Ethernet;
Backbone LAN: 2 X 1GBIT (10GBIT in some cases)
Israeli enterprise tend to count on either Cisco or Nortel for their
backbone network. Other players appear on the network edges
-LAN
LAN
Networking
-LAN
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
65/109
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
- Israeli Market Positioning 1Q09
LocalSupp
ort
Market Presence
Player
This analysis should be used with its
supporting documents
Vendors to Watch:
Alcatel
Enterasys
WorldwideLeader
Nortel
Juniper
3COM
Extreme
Cisco
Foundry
HP
LAN
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
66/109
The Nort el Cr isis What s next ?
Networking
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
67/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
The Nort el Cr isis What s next ?
Nortel files for Chapter 11 to deal decisively with itshistoric debt burdens
Nov 10th 2008: A Nortel spokesman said the companyhad enough liquidity to sustain 12 to 18 months of
operation under the current conditions
Survival still possible for Nortel, but Companies that exitthe bankruptcy process often emerge in smaller form andare frequently acquired in part or whole by larger suitorslooking for a good deal
19.2.09: Radware has purchased Nortels Alteon
-Nortel
The Nor t el Cr isis
Networking
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
68/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
Israel i Market What i f Analysis
Cisco HP
Juniper
Gores
Alcatel
3COM
-Nortel
Acquire Nortels
Telephony?
Alliance with Avayaand Microsoft
Enterasys (LAN and sec.)Siemens (Telephony)
Goes deeper into the
Israeli market?
Goes deeper into the
Israeli market?
Acquiring parts of Nortel?
WAN O i i iNetworking
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
69/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
WAN Opt imizat ion -WAN
WAN Bottlenecks: Top infrastructure projects impacting application performance over the WAN:
0% 10% 20% 30% 40% 50% 60% 70% 80%
BCP/DRP
Server Virtualization
Data Center Consolidation
VOIP Deployments
2007
2008
Source: Aberdeen Research
WAN Opt imizat ionI li M k P i i i 1Q09
Networking
-WAN
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
70/109
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
- Israeli Market Positioning 1Q09
LocalSupp
ort
Market Presence
Player
This analysis should be used with its
supporting documents
WorldwideLeader
Citrix
Expand
F5
Radware Packeteer*
*June 2008: A Blue Coat company
Riverbed
Blue Coat
Juniper
Cisco
Voice Over IP (VOIP)
Networking
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
71/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 71
Voice Over IP (VOIP)
STK I obser vat ion: Many enterprises are migrating, or
planning to migrate, their telephony infrastructure from
traditional circuit-switched technology to newer Internet
Protocol (IP)-based systems
Motivations to actually migrate:
End of life/end of support for current telephony infrastructure
Moving to a new office/office improvements
Motivations to wait:
Phones are working
-VOIP
VOIP (Ent erpr ise & Cal l Cent ers)I li M k P i i i 1Q09
Networking
-VOIP
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
72/109
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 72
- Israeli Market Positioning 1Q09
LocalSupp
ort
Market Presence
Player
This analysis should be used with its
supporting documents
Vendors to Watch:
WorldwideLeader
*Most CC in the market are Avaya
Alcatel-Lucent
Tadiran
3COM
Asterisk
Avaya*
Nortel
Cisco
Video Over IPNetworking
Vid OIP
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
73/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 73
Video Over IP
By 2011, 60% of Internet traffic is expected to be video
traffic (Cisco)
Global organizations use it as a vital working tool
especially in order to cut travelling costs
Video technology is considered by many local organizations as
mostly nice to have
Local organizations use this technology mainly for
training/marketing purposes
Video OIP
Video Over IP Map
Networking
Vid OIP
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
74/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
Video Over IP Map
Source: http://www.video-over-ip.com/
Video OIP
Unif ied Communicat ions (UC)
Networking
UC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
75/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
Unif ied Communicat ions (UC)
Why do we need this?Integration: Of any or all communications, collaborative,
and business applicationsPresence: guides users to the most appropriate means of
communicationsMobility: extends applications and integration of
applications every way you goProductivity: improves business processesWhy now?
Key drivers today are: Workforce virtualization,Cost reduction, Increasingly available tools,Business improvement opportunities
UC
UC ChallengesNetworking
UC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
76/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
UC Challenges
The problem:business justification for collaboration technologies comes
down to soft dollars:
Productivity Better teamwork
Better customer service
How do you define better?What is its business value to the company?
UC
UC Preferred Choice
Networking
UC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
77/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
UC Preferred Choice
0% 10% 20% 30% 40% 50% 60%
Unsure
Others
Newer Vendors
Nokia-Siemens
3Com
Alcatel-LucentNortel
Avaya
Microsoft
Cisco
9%
4%
4%
2%
3%
5%10%
22%
41%
56%
Source: Goldman Sachs Research
UC
Networking Integrators
Networking
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
78/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 78
- Israeli Market Positioning 1Q09 (Leaders)
Agenda
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
79/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
Agenda
1 Information Security
Communicat ion
InformationSecurity
Networking2 Networking
Green IT3 Green IT
Green IT
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
80/109
Your Text hereYour Text here
80
Small, incremental changescompounded many times canmean big savings forlarge-scale organizations
So How Can I Be More Green?
Green IT
Trends
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
81/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
So, How Can I Be More Green?
PC managementVirtualized server
and storageenvironments
Secure mobileaccess to networks,
applications, anddata
Intelligent archivingState of the art
power and cooling(all around)
Teleconferencing
Go digital! &Printing
consolidationAsset management
Workingenvironment (car
pool, working fromhome)
Trends
STKI Madad 2008-9(N I l di P i i )
Green IT
Trends
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
82/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 82
(Not Including Pr int ing)
Trends
38%
DC Facilities
20%
Asset
Management
6%
Market Players15%
PC Energy
Management
9% Miscellaneous
12%
Trends
How Dense is Your Dat a Center?
Green Data
Center -
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
83/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 83
How Dense is Your Dat a Center?
10%
30%
31%
23%
6%
What is your average rack power demand (per rack)?
0 kW to 3 kW
4 kW to 6 kW
7 kW to 9 kW
10 kW to 11 kW
12 kW or More
Source: STKI, Information Week
Trends
2008 2009 2010
30.0 33.33% 40.0 25.00% 50.0
Data Center Environment Israeli Marke t (Ms of $)
Elect r ici t y Use Trends
Green Data
Center -
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
84/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 84
Elect r ici t y Use Trends
36
Trends
Source: ASHRAE
Dat a Cent er Met r ics
Green Data
Center -
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
85/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 85
at a Ce t e et cs
Power Usage Effectiveness(PUE):
PUE = Total FacilityPower IT Equipment
Power
and its reciprocal, the DCiE isdefined as:
DCiE = 1 PUE = (ITEquipment Power Total
Facility Power) x 100%
Source: The Green Grid, EPA
Trends
Vir t ualizat ion Calculat ionsGreen Data
Center -i li i
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
86/109
Your Text hereYour Text here
86
Vir t ualizat ion Calculat ions
Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
Virtualization
Assumptions (partial list):Average Server Utilization: %5
Number of peak hours:12
Cost per KwH: 11 cents
Average servers growth rate per year: 15%Virtualization:
level of utilization of servers after virtualization: 50%-70%
Calculations are based on a maximum of two virtualmachines per core
Cooling: 1 watt of power for the server to 1.25 watts ofpower for cooling
Vir t uali zat ion Calculat ions
Green Data
Center -Vi li i
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
87/109
Your Text hereYour Text here
87
Vir t uali zat ion Calculat ions
Infrastructure Prior to
Virtualization
Year 1 Year 2 Year 3 Year 4 Year 5
Total Number of
Servers:
540 641 714 821 944
Power Used for Servers:
(Watts)
1,037,500 1,193,125 1,372,094 1,577,908 1,814,594
Server Electric Cost ($)
Per Year:
$1,000,420 $1,150,483 $1,323,055 $1,521,514 $1,749,740
Total Cooling Electric
Cost ($) Per Year:
$1,250,525 $1,438,103 $1,653,819 $1,901,892 $2,187,176
Total Power & Cooling
Cost ($) Per Year:
$2,250,944 $2,588,586 $2,976,875 $3,423,406 $3,936,916
Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
Virtualization
Vir t ualizat ion Calculat ions
Green Data
Center -Vi t li ti
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
88/109
Your Text hereYour Text here
88
Infrastructure After
Virtualization
Year 1 Year 2 Year 3 Year 4 Year 5
Total Workloads: 4,170 4,796 5,515 6,342 7,293
Physical Systems
Needed:
136 156 179 206 237
Power Used for Servers
(Peak Watts):
68,000 78,200 89,700 102,925 118,450
Power Used for Servers
(Off-Peak watts):
45,560 52,394 60,099 68,960 79,361
Server Electric Cost ($)
Per Year (Peak):
$65,570 $75,405 $86,716 $99,723 $114,682
Server Electric Cost ($)Per Year (Off-Peak):
$43,932 $50,521 $58,100 $66,815 $76,837
Total Cooling Electric
Cost ($) Per Year:
$136,877 $157,408 $181,019 $208,172 $239,398
Total Power & Cooling
Cost ($) Per Year:
$246,378 $283,335 $325,835 $374,710 $430,917
Vir t ualizat ion Calculat ions Virtualization
Vir t ual izat ion Calculat ions -ROIGreen Data
Center -Vi t li ti
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
89/109
Your Text hereYour Text here
89
Vir t ual izat ion Calculat ions ROI Virtualization
Year 1 Year 2 Year 3 Year 4 Year 5 Total ("-" meansSavings")
50%
Utilization6,074,378$ -1,619,909$ -677,406$ 405,174$ 1,688,365$ 5,870,602$
60%Utilization1,911,717$ -2,367,498$ -2,129,390$ -1,822,708$ -1,524,026$ -5,931,905$
70%
Utilization564,773$ -2,609,364$ -2,583,076$ -2,557,558$ -2,541,227$ -9,726,452$
Source: http://www.gtsi.com/cms/events/tls/2008/greenit/virtcalc.aspx?ShopperID=
VDI (Vir t ual Deskt op Inf rast ruct ure) Energy,Management and Securi t y Eff iciency
Green IT -Virtualization
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
90/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 90
Management and Securi t y Eff iciency
Assumptions (Partial list): Number of desktop devices under consideration: 500
Desired virtualization software engine: VMware ESX
Average annual Sun VDS server administration costs per
thin client: 846.10 NIS
FTEs desktop helpdesk support staff: 1.25
FTEs desktop security management: 0.5
Number of Desktop security incidents: 2
Project Implementation Plan (months from kickoff todeployment): 2
VDI (Vir t ual Deskt op Inf rast ruct ure) Energy,Management and Securi t y Eff iciency
Green IT -Virtualization
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
91/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 91
TCO Comparison
Cumulative 3 Year
Solution A:
TraditionalDesktop Devices
Solution B: Sun
Virtual DesktopSolution
Difference
(A - B)
Difference
(A - B)%
IT Costs
Desktop Device Costs 3,259,204 NIS 670,834 NIS 2,588,370 NIS 79.4%
Desktop Software Costs 782,627 NIS 461,522 NIS 321,104 NIS 41.0%
Server Infrastructure Costs 296,448 NIS 1,248,949 NIS (952,501 NIS) -321.3%
Desktop Management Labor Costs 5,724,578 NIS 2,137,760 NIS 3,586,818 NIS 62.7%Desktop Power Costs 314,788 NIS 135,494 NIS 179,294 NIS 57.0%
Total IT Costs 10,377,645 NIS 4,654,559 NIS 5,723,085 NIS 55.1%
Business Operating Costs
Desktop User Productivity Impact 4,473,911 NIS 0 NIS 4,473,911 NIS 100.0%
Business Risks 538,416 NIS 26,919 NIS 511,496 NIS 95.0%
Total Business Operating Costs 5,012,327 NIS 26,919 NIS 4,985,408 NIS 99.5%
Total 15,389,972 NIS 4,681,479 NIS 10,708,493 NIS 69.6%
Management and Securi t y Eff iciency
Source: www.alinean.com
VDI (Vir t ual Deskt op Inf rast ruct ure) Energy,Management and Securi t y Eff iciency
Green IT -Virtualization
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
92/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
ROI Analysis(Solution B)
(Probable Case)
Initial Year 1 Year 2 Year 3
Benefits (to Solution B from
Current (AS IS))
0 NIS 3,115,969 NIS 3,505,821 NIS 3,681,630 NIS
Cumulative Benefits 3,115,969 NIS 6,621,790 NIS 10,303,420 NISInvestment (Solution B) 1,604,296 NIS 312,617 NIS 170,099 NIS 237,175 NIS
Cumulative Investment 1,604,296 NIS 1,916,913 NIS 2,087,012 NIS 2,324,187 NIS
Cash Flow (1,604,296 NIS) 2,803,351 NIS 3,335,722 NIS 3,444,456 NIS
Cumulative Cash Flow (1,604,296 NIS) 1,199,055 NIS 4,534,777 NIS 7,979,233 NIS
ROI 343%
Risk Adjusted ROI 288%NPV Savings 6,361,354 NIS
IRR 177%
Management and Securi t y Eff iciency
Source: www.alinean.com
PC -Energy Eff iciency and PowerConsumpt ion
Green IT -
PC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
93/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 93
0% 10% 20% 30% 40%50%
I forget
It's a hassle
I don't think it's important
It's a habitIt takes too long
My computer goes to hibernate, or to sleep mode
It's IT policy or procedure to leave it on
1
Consumpt ion
Source: E1, PC Energy Report
Why dont you always shut down your PC when you have finished working for
the day? (multiple responses allowed):
PC Cost s Calculat ions
Green IT -
PC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
94/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 94
PC Cost s Calculat ions
0
1
2
34
5
6
7
8
300*20 Senario 300*20 Senario & Vista 300*9 Senario
Number of Computers
AnnualCost(Million
)
PC -Energy Eff iciency and PowerConsumpt ion: An Example
Green IT -
PC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
95/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 95
Consumpt ion: An Example
Source: www.g-patrol.com
PC -Energy Eff iciency and PowerC t i I l i M k t
Green IT -
PC
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
96/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 96
Israeli Players:
Microsoft
Symantec BigFix
Gpatrol Israeli SU
Consumpt ion: Israel i Market
STK I obser vat ion: Some Israeliorganizations, which address the issue ofenergy efficiency of PCs, use homemade
script based solutions
Printing
Green IT -
Printing
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
97/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 97
Printing
P Please think of the environment before printing this presentation
STOP PRINTING
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
98/109
STKI Madad 2008-9
Green IT -
Printing
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
99/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 99
Distribution Tools
17%
Monitoring and
Cost Reduction43%
Outsourcing
9%
Printing
Consolidation
20%
Miscellaneous11%
P Please think of the environment before printing this presentation
2008 2009 2010
10.0 50.00% 15.0 66.67% 25.0
Printing Projec ts Israe li Ma rket Size (Ms of $)
Printing Consolidation
Green IT -
Printing
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
100/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 100
t g Co so dat o
P Please think of the environment before printing this presentation
In todays world, printing has become a significantexpenditure item for almost every organization
A typical large financial organization in Israel spenddozens of millions of Shekels annually on office printing
Israeli Office Printing Market has changed great dealsince 2007: Users start seeing the great potential in reorganizing their
printing environment
The economic crisis pushes many to look for ways to cutcosts
Printing consolidation projects usually have a fast,measurable ROI
Pr int ing Consol idat ion -Rat ios
Green IT -
Printing
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
101/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 101
g
Organization
Type
Heavy
Printers
Followers Consolidated High-Tech
Printers/Users
Ratio
1:1 1:5 1:15 1:15 1:30 1:30+
One of the ways to check the maturity of an organization
printing environment is to check its printers/users ratio:
Heavy Printers Consist of financial organizations,
government agencies, law firms est.
High-Tech Truly paperless entities (start ups, agile hightech companies est.)
P Please think of the environment before printing this presentation
Addressing Pr int ing Consolidat ion Proj ect s
Green IT -
Printing
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
102/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 102
P Please think of the environment before printing this presentation
Pr int ing Consolidat ion Bot t om Line
Green IT -
Printing
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
103/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 103
g
P Please think of the environment before printing this presentation
Pr int ing Consolidat ion Bot t om Line
Green IT -
Printing
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
104/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 104
P Please think of the environment before printing this presentation
g
Pr int ing Consolidat ion Bot t om Line
Green IT -
Printing
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
105/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 105
P Please think of the environment before printing this presentation
g
Pr int ing Consolidat ion Bot t om Line
Green IT -
Printing
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
106/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 106
P Please think of the environment before printing this presentation
g
Pr int ing Consolidat ion Bot t om Line
Green IT -
Printing
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
107/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 107
P Please think of the environment before printing this presentation
g
Pr int ing Consolidat ion Bot t om Line
Green IT -
Printing
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
108/109
Your Text hereYour Text here
Shahar Maors work Copyright 2009 @STKI Do not remove source or attribution from any graphic or portion of graphic 108
P Please think of the environment before printing this presentation
g
-
8/14/2019 Shahar MAOR Infrastructure Services Market 2009
109/109
Your Text hereYour Text here
Shahar Geiger MaorVP & Senior Analyst
mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]