SlideShare une entreprise Scribd logo
1  sur  169
Changing                                           STKI
Data Center                                        Summit
                                                    2013



                            Pini Cohen
                            Sigal Russin


                  IT at the crossroads:
              Lead, follow or get out of the way
Pini Cohen and Sigal Russin’s work/
         Copyright@2013
Do not remove source or attribution from any
       slide, graph or portion of graph
                                           2
Agenda

                        Technology
Mega Trends            Domain Trends




                                     Pini Cohen and Sigal Russin's
                                        work Copyright@2013
                                        Do not remove source or
                                                          3
                                   attribution from any slide, graph
                                          or portion of graph        3
The New ITOperations-different thinking
• 18 Million Visitors, 10x Growth,12 Employees, 410 TB of Data         Pinterest
• An organization with 2 backend engineers can now scale a             Instagram
    system to 30+ million users.
•    ~1000 hardware nodes in production and ~20 engineers              Tumblr
•   Continuous deployment happens 25 times a day because it’s so       Etsy
    easy.
•   No architects, engineers work across the entire stack. You own     TripAdvisor
    your project end to end, and are responsible for design, coding,
    testing, monitoring. Most projects have 1-2 engineers.
                                                                       Amazon
•   You build it, you run it

                                                                            Pini Cohen and Sigal Russin's work
                                                                                     Copyright@2013
                                                                           Do not remove source or attribution
                                                                           from any slide, graph or portion of
                                                                                         graph                 4
Domains of change
•   Focus on generating business value through agility and flexibility
•   Move to distributed architectures
•   Move away from ownership as a core competency
•   Separation of concerns along services boundaries
•   Decentralization and reorganization of processes around services
•   Push of responsibility to as close to the developer as possible




                                                           Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modifications


                                                                                                                             Pini Cohen and Sigal Russin's work
                                                                                                                                      Copyright@2013
                                                                                                                            Do not remove source or attribution
                                                                                                                            from any slide, graph or portion of
                                                                                                                                          graph                 5
Old Datacenter                    New Cloud Datacenter

Licensed and Installed Applications   SaaS (Workday, Pagerduty, EMR)

Central SQL Database                  Distributed Key/Value NoSQL




                                                                                                               Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modifications
Sticky In-Memory Session              Shared Memory Cache Session
Tangled Service Interfaces            Layered Service Interfaces
Instrumented Code                     Instrumented Service Patterns
Fat Complex Objects                   Lightweight Serialized Objects
Components as Jar Files               Components as Services
Chatty Protocols                      Latency Tolerant Protocols
Manual and Static Tools               Automated and Scalable Tools
                                                                       Pini Cohen and Sigal Russin’s work/
                                                                                Copyright@2013
                                                                       Do not remove source or attribution from any
                                                                              slide, graph or portion of graph
                                                                                                                                                                                                                                                 6
Old Datacenter                         New Cloud Datacenter
SA/Database/Storage/Networking Admins    NoOps/OpsDoneMaturelyButStillOps




                                                                                                                  Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modifications
Monolithic Software Development          Teams Organized around Services
Monolithic Applications                  Building Your Own PaaS
Static and Slow Growing Capacity         Incremental and Fast Growing Capacity

Heavy Process/Meetings/Tickets/Waiting   Better Business Agility

Single Location                          Massive Geographical Distribution
Vendor Supply Chains                     Direct to Developer
Focus on How Much it Costs               Focus on How Much Value it Brings
Ownership/CapEx                          Leasing/OpEx/Spot/Reserved/On Demand
                                                                        Pini Cohen and Sigal Russin’s work/
                                                                                 Copyright@2013
                                                                        Do not remove source or attribution from any
                                                                               slide, graph or portion of graph
                                                                                                                                                                                               7
You need to change!




 Source: http://www.forbes.com/pictures/eghe45eefgi/16-things-to-think-about-when-youre-considering-a-career-change/




                                                                                                                         Pini Cohen and Sigal Russin's
                                                                                                                            work Copyright@2013
                                                                                                                            Do not remove source or
                                                                                                                       attribution from any slide, graph
                                                                                                                              or portion of graph        8
Traditional IT is changing
LOB       LOB          LOB                                                     Enterprise
                                           CIO                                Procurement




                                    OCIO           IT Procurement



Software Development                                      IT Infrastructure




                                                                           Pini Cohen and Sigal Russin's work
                                                                                    Copyright@2013
                                                                          Do not remove source or attribution
                                                                          from any slide, graph or portion of
                                                                                        graph                 9
The next IT Organization
Line of Businesses       Pay per                         Software House
                           Use




Enterprise Procurement                                 IT Delivery Services




                                                                                  Managed
                                                                                  Services


                                                                 Pini Cohen and Sigal Russin's
                                                                    work Copyright@2013
                                                                    Do not remove source or
                                                               attribution from any slide, graph
                                                                      or portion of graph       10
The new CIO/VPTech has to become:
An internal strategic consultant more like (the model) HR, legal, financial
 VPs.
    That will help the business move from enterprise IT productivity to business
     productivity
Develops the Enterprise Digital Strategy that builds value through
 innovation:
    Technology solutions for the LOBs and manages the business change needed
     (new business processes)
    Leadership in tablet efforts because business-driven tablet programs will
     uncover transformative opportunities
    Defines and implements technology (used by the clients of the enterprise)
     in order to increase revenues


                                                                                      Dr. Jimmy Schwarzkopf’s work
                                                                                             Copyright@2013
                                                                                    Do not remove source or attribution
                                                                                    from any slide, graph or portion of
                                                                                                  graph                 11
IT Delivery Services Department
IT Delivery Services move:
     from an infrastructure-component focused IT that is expensive to
     sustain and maintain
    to one focused on end-to-end service management, user
     experience and “fair” chargeback policies
Datacenter transformation, consolidations, vendor
 management, cloud, and application rationalization mandate:
         Formal governance structures for operational risks.
         Automation of management and control functionalities
         Secure access of users based on location and function
         Charges for “real” metered service delivery
         Validates, audits, protects, backups data
         Validates cloud provider service levels (SLAs)

                                                                           Dr. Jimmy Schwarzkopf’s work
                                                                                  Copyright@2013
                                                                         Do not remove source or attribution
                                                                         from any slide, graph or portion of
                                                                                       graph                12
The new InfrastructureDelivery manager has to deliver:
•   Enable consumerization (BYOEverything)
•   Business enablement with best of class technologies. Examples:
     • Follow Software Defined X
     • Take advantage of new HW technologies (in memory, GPU, ARM servers)
     • Big Data
•   Manages operational risk, security and cyber for all technologies the enterprise uses
•   Infrastructure investment model – continues cost reduction
•   Manages the IT Department as an IT vendor with new InfraOps delivery model:
     • Private Cloud, automation, self service and chargeback tools
     • Embrace infrastructure as code
     • Deploy public cloud when possible

                                                                               Pini Cohen and Sigal Russin’s work/
                                                                                        Copyright@2013
                                                                                Do not remove source or attribution from any
                                                                                       slide, graph or portion of graph
                                                                                                                         13
Agenda

BYOEverything         Security
                                    Business
Consumerization          &
                                    enabling
                       Cyber
                                    technologies



    Infrastructure                   The new
     investment                     infraops
      model-cost                 delivery model
      reduction
                                                    Pini Cohen and Sigal Russin's work
                                                             Copyright@2013
                                                   Do not remove source or attribution
                                                   from any slide, graph or portion of
                                                                 graph               14
Consumerization of IT (CoIT)
• This mega trend is more than a decade old.
• People are resourceful. They’ll find what they need to be
  successful. They’ll bring what they need to drive the
  business forward.
• Whether it’s the proliferation of mobile devices or on-
  demand software, business people are driving IT.
• Most companies allow for it. Few can effectively deliver
  applications or governance to support it.
                                                                        BYOE
                                                       Pini Cohen and Sigal Russin's work
                                                                Copyright@2013
                                                      Do not remove source or attribution
                                                      from any slide, graph or portion of
                                                                    graph               15
Implications of the changing endpoint paradigm
• The new endpoint experience
• BYOD
• What will happen to the suppliers
    Changing business model
• New Application development technology and functionality
    SW distribution – APP stores

                                                                     BYOE
                                                    Pini Cohen and Sigal Russin's work
                                                             Copyright@2013
                                                   Do not remove source or attribution
                                                   from any slide, graph or portion of
                                                                 graph               16
Source: cisco survey BYOD 2012
                                                   BYOE
                                  Pini Cohen and Sigal Russin's work
                                           Copyright@2013
                                 Do not remove source or attribution
                                 from any slide, graph or portion of
                                               graph               17
BYOE
 Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph               18
BYOE
 Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph               19
BYOE
 Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph               20
BYOE
 Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph               21
KSP is selling tablets and smartphones




                                                           BYOE
                                          Pini Cohen and Sigal Russin's work
                                                   Copyright@2013
                                         Do not remove source or attribution
                                         from any slide, graph or portion of
                                                       graph               22
Bring Your Own Device
• It is happening?
• Does your organization support BYOD devices (smartphones)?




                                Source: http://blogs-images.forbes.com/johnherrema/files/2012/03/BYOD-support.jpg




                                                                                                                                      BYOE
                                                          Source: GOOD technologies survey 2012
                                                                                                                     Pini Cohen and Sigal Russin's work
                                                                                                                              Copyright@2013
                                                                                                                    Do not remove source or attribution
                                                                                                                    from any slide, graph or portion of
                                                                                                                                  graph               23
BYOD Usage and Policies
 Do employees access          Does your organization have a
 business information         BYOD policy to access business
using personal devices?              information?




                                                                    BYOE
                                                   Pini Cohen and Sigal Russin's work
                                                            Copyright@2013
                                                  Do not remove source or attribution
                                                  from any slide, graph or portion of
                                                                graph               24
BYOD Risk Classification
 Information security
 Employee privacy
 Software Licensing - Is software acquired by the
   business be installed on BYOD device?
 Damage to the BYOD device by business IT – who is responsible?
 Technological risk –the more connections you have the lower
  performance (applications, SSL VPN, WI-FI)
 Is there any increase in human Resources with BYOD?
 Increase the use of identity access management tools          BYOE
                                                           Pini Cohen and Sigal Russin's
                                                              work Copyright@2013
                                                              Do not remove source or
                                                         attribution from any slide, graph
                                                                or portion of graph       25
BYOD
                Bring Your Own Device


 Saving in                            Where to
outlay on IT         A policy          Start?
   items            document
                     on BYOD        Supported Devices
                                    Access Permission
 Productivity                       Using VPN
                      Security      Set passcodes     BYOE
                                                  Pini Cohen and Sigal Russin's work
                                                           Copyright@2013
                                                 Do not remove source or attribution
                                                 from any slide, graph or portion of
                                                               graph             26
BYOE
 Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph             27
BYOD
      Bring Your Own Device Policy
What types of devices (version of the operating system) can
access to business resources
Which Access level your different groups of users require
What applications are required for a user.
A VPN is required for personnel likely to be using public Wi-
Fi networks.
Educate users about the importance of setting passwords
and passcodes                                                             BYOE
                                                         Pini Cohen and Sigal Russin's work
                                                                  Copyright@2013
                                                        Do not remove source or attribution
                                                        from any slide, graph or portion of
                                                                      graph             28
Access business information using BYOD
            ‫האם בארגונכם מאפשרים סנכרוןחיבור מכשירים חכמים‬
            ? )‫טלפון פרטיים למאגרי מידע בארגון (אימייל, אפליקציה‬




                                                   31%
                                                   ‫לא‬

Source: current Analysis inc. BYOD survey

                                            69%
                                              ‫כן‬         Source: STKI RT MDM BYOD Survey FEB 2013
                                                                                                                BYOE
                                                                                               Pini Cohen and Sigal Russin's work
                                                                                                        Copyright@2013
                                                                                              Do not remove source or attribution
                                                                                              from any slide, graph or portion of
                                                                                                            graph               29
MAC

       MAC ‫האם בארגונכם מאפשרים סנכרוןחיבור‬
     ?)‫פרטיים למאגרי מידע בארגון (אימייל, אפליקציה‬

   75%
     ‫לא‬




                                      25%
                                      ‫כן‬




Source: STKI RT MDM BYOD Survey FEB 2013
                                                                    BYOE
                                                   Pini Cohen and Sigal Russin's work
                                                            Copyright@2013
                                                  Do not remove source or attribution
                                                  from any slide, graph or portion of
                                                                graph               30
BYOD Policy

           ‫האם בארגונך קיימת מדיניות ברורה בנושא של‬
           ?‫- יישומים מותר להתחבר ולאיזה אסור‬BYOD

                                           25%
                                           ‫בתהליך‬
    44%
      ‫לא‬



                                           31%
                                           ‫כן‬


Source: STKI RT MDM BYOD Survey FEB 2013
                                                                                    BYOE
                                                                   Pini Cohen and Sigal Russin's work
                                                                            Copyright@2013
                                                                  Do not remove source or attribution
                                                                  from any slide, graph or portion of
                                                                                graph               31
BYOD importance




Source: STKI RT MDM BYOD Survey FEB 2013
                                                                               BYOE
                                                              Pini Cohen and Sigal Russin's work
                                                                       Copyright@2013
                                                             Do not remove source or attribution
                                                             from any slide, graph or portion of
                                                                           graph               32
MDM process
     ‫האם ארגונכם הטמיע/נמצא בתהליך הטמעת מוצר‬
       ‫ או פתרון‬MDM ( ‫אבטחת מידע/ניהול למובייל‬
                       ?)‫דומה‬




Source: STKI RT MDM BYOD Survey FEB 2013                                      BYOE
                                                          Pini Cohen and Sigal Russin's work
                                                                   Copyright@2013
                                                         Do not remove source or attribution
                                                         from any slide, graph or portion of
                                                                       graph               33
Privacy employee concern
        ‫האם קיים בארגונך חשש מפגיעה בפרטיות‬
          ?MDM ‫העובד בעת שימוש בכלי מסוג‬




Source: STKI RT MDM BYOD Survey FEB 2013
                                                                                        BYOE
                                                                       Pini Cohen and Sigal Russin's work
                                                                                Copyright@2013
                                                                      Do not remove source or attribution
                                                                      from any slide, graph or portion of
                                                                                    graph               34
‫1102 ‪Important issues when choosing MDM solution‬‬
                                                                       ‫תמיכה במגוון מערכות הפעלה‬                                     ‫3‬
                                           ‫אכיפת מדיניות ארגונית על המכשיר‬                                                          ‫1‬
                                     ‫אבטחת מידע על המכשיר (ססמאות, ‪)AV ,FW‬‬                                                          ‫2‬
                                               ‫הפרדת המידע הארגוני מהמידע הפרטי על המכשיר‬                                            ‫4‬
                                                                   ‫ניהול מצאי, קונפיגורציה ו ‪ Image‬של המכשיר‬                          ‫6‬
                                                                             ‫יכולות הפצת תוכנה ואפליקציות למכשיר‬                      ‫8‬
                                                                ‫ניהול מרכזי ואינטגרציה למערכות ארגוניות‬                              ‫5‬
                                           ‫יכולות תמיכה ותפעול מרחוק של המכשיר (למשל לצרכי ‪)HelpDesk‬‬                                  ‫6‬
                                      ‫יכולות דיווח וניהול הוצאות כספיות הקשורות למכשיר (למשל: התראות על נדידת רשתות בחו"ל)‬          ‫01‬
                                                             ‫ארכיטקטורת הפיתרון (‪ ,SAAS‬שרת באתר, מודל התימחור וכו')‬                   ‫9‬

‫3102 ‪Source: STKI RT MDM BYOD Survey FEB‬‬                                                                                                          ‫‪BYOE‬‬
                                                                                                                              ‫‪Pini Cohen and Sigal Russin's work‬‬
                                                                                                                                       ‫3102@‪Copyright‬‬
                                                                                                                             ‫‪Do not remove source or attribution‬‬
                                                                                                                             ‫‪from any slide, graph or portion of‬‬
                                                                                                                                           ‫‪graph‬‬               ‫53‬
‫3102 ‪Important issues when choosing MDM solution‬‬
                                                                 ‫3102‬
                                                                        ‫תמיכה במגוון מערכות הפעלה‬                                    ‫2‬
                                                   ‫אכיפת מדיניות ארגונית על המכשיר‬                                                   ‫1‬
                                             ‫אבטחת מידע על המכשיר (ססמאות, ‪)AV ,FW‬‬                                                   ‫4‬
                                     ‫הפרדת המידע הארגוני מהמידע הפרטי על המכשיר‬                                                      ‫3‬
                                                                    ‫ניהול מצאי, קונפיגורציה ו ‪ Image‬של המכשיר‬                         ‫6‬
                                                                    ‫יכולות הפצת תוכנה ואפליקציות למכשיר‬                               ‫5‬
                                                                                  ‫ניהול מרכזי ואינטגרציה למערכות ארגוניות‬              ‫7‬
                                       ‫יכולות דיווח וניהול הוצאות כספיות הקשורות למכשיר (למשל: התראות על נדידת רשתות בחו"ל)‬            ‫9‬

                                                              ‫ארכיטקטורת הפיתרון (‪ ,SAAS‬שרת באתר, מודל התימחור וכו')‬                   ‫8‬

                                                                                                                                                ‫‪BYOE‬‬
‫3102 ‪Source: STKI RT MDM BYOD Survey FEB‬‬
                                                                                                                           ‫‪Pini Cohen and Sigal Russin's work‬‬
                                                                                                                                    ‫3102@‪Copyright‬‬
                                                                                                                          ‫‪Do not remove source or attribution‬‬
                                                                                                                          ‫‪from any slide, graph or portion of‬‬
                                                                                                                                        ‫‪graph‬‬               ‫63‬
Management Requirements for Mobile
A. Configuration and protection of lost or compromised devices- password
    enforcement, encryption enforcement, remote lock and wipe, remote
    email configuration, certificates for identity, remote connectivity (Wi-Fi,
    VPN) and detection of compromised OS (jailbreak, rooted etc).
B. Data loss prevention (DLP)- privacy control (GIS), cloud usage control
    (iCloud, dropbox, GoogleDocs) and email DLP controls (protect
    attachments).
C. Provisioning and data security in apps- Google Play market is full of
    malware. Microsoft and blackberry copied Apple approach. Control your
    business apps with group policies and content- managements controls.                                                   BYOE
                                       Source: Mobile Security, Galen M. Gruman, infoworld
                                                                                             Pini Cohen and Sigal Russin’s work/
                                                                                                      Copyright@2013
                                                                                             Do not remove source or attribution from any
                                                                                                    slide, graph or portion of graph
                                                                                                                                      37
Mobile Device Security
    • Beware of Wi-Fi- in public places such as hotels, restaurants, cinema etc.
1

    • Turn off Bluetooth- it can be used to listen in on private conversations. Also on
2     laptops.

    • Connect to your corporate VPN -if you have to use an untrusted network. It enable
3     you to connect in “full tunnel” mode.

    • Keep a close eye on your equipment – never leave any device alone.
4

    • Don’t share files with strangers using USB keys- it can delete your sensitive data or
5     install a malware.
                               Source: information week
                                                                            Pini Cohen and Sigal Russin’s work/
                                                                                     Copyright@2013
                                                                             Do not remove source or attribution from any
                                                                                    slide, graph or portion of graph
                                                                                                                      38
Secure Sandbox vs. Secure container -MAM
                                                                                       Mobile Device Management (MDM)- control
                                                                                       the user owned device from an Enterprise
                                                                                       standpoint. Data meaningful and valuable for
                                                                                       the company should not be lost or end up in
                                                                                       the wrong hands.

                                                                                       Mobile Application Management (MAM) –the
                                                                                       ability of the Enterprise to keep control on
                                                                                       rolling over or calling back applications
                                                                                       deployed in an end-user device without
                                                                                       having impact on the user privacy.


Source:http://www.webtorials.com/discussions/2012/09/thank-you-mam-new-ways-to-plug-
mobile-data-leaks.html

                                                                                              BYOE
                                                                                                                    Pini Cohen and Sigal Russin's
                                                                                                                       work Copyright@2013
                                                                                                                       Do not remove source or
                                                                                                                  attribution from any slide, graph
                                                                                                                         or portion of graph       39
Mobile Device Management -Israeli Market Positioning 1Q13
                                                   Mobile Iron

                                        AirWatch                                          Player
        Local Support
                                                                                           Worldwide
                              FancyFone                                                    Leader

                          Symantec                                Fiberlink
                                              Citrix( Zenprise)
                        BoxTone
                                                             Matrix
                                  McAfee
                                     Market Presence/Perception                                             BYOE
                                                                              Pini Cohen and Sigal Russin’s work/
                                                                                       Copyright@2013
                                                                              Do not remove source or attribution from any
                                                                                     slide, graph or portion of graph
                                                                                                                       40
Mobile Container Management -Israeli Market Positioning 1Q13



                                                                                 Player
                                                         Good
         Local Support

                                                      Technologies                Worldwide
                                                                                  Leader

                                                 Excitor

                                        Sybase


                         Market Presence/Perception
                                                                     Pini Cohen and Sigal Russin’s work/
                                                                              Copyright@2013
                                                                     Do not remove source or attribution from any
                                                                            slide, graph or portion of graph
                                                                                                              41
Case Study - IBM Policy
IBM still gives BlackBerrys to about 40,000 of its 400,000 employees, 80,000
other workers now reach internal IBM networks using other smart phones
and tablets they purchased themselves.


• Disables public file-transfer programs like Apple’s iCloud, dropbox etc.
• Turns off Siri- they worried that the spoken queries, which are uploaded to
  Apple servers, could ultimately reveal sensitive information.
• Each employee’s device is treated differently, depending on what model it is
   and what the person’s job responsibilities are (Email, calender, IBM apps …)
• Developing strategies to reduce the risk of data leakage (Wi-Fi hotspot)

                                    Source: “Mobile Computing in Question” business impact, MIT 2012                  BYOE
                                                                                                Pini Cohen and Sigal Russin's work
                                                                                                         Copyright@2013
                                                                                               Do not remove source or attribution
                                                                                               from any slide, graph or portion of
                                                                                                             graph               42
BYOD challenges (Case study IBM internal work)
• Providing modern and secure network access that supports:
    • Personally owned devices
                                                                                Source: IBM
                                                                                http://www.google.co.il/url?sa=t&rct=j&q=&esrc=s&source=web&
                                                                                cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.esl.dk
                                                                                %2Fmedia%2F35735%2FFredag%2520Carsten%2520B%2520Ander
                                                                                sen%2520Personally-



    • Partitioning technologies
                                                                                owned%2520devices%2520at%2520IBM%2520(ISACA).ppt&ei=9TI
                                                                                wUevYLseRswbS94G4Bw&usg=AFQjCNFnISWnbM8bhmQSsBLhtrvt
                                                                                -XHGmg&bvm=bv.43148975,d.Yms




    • Mobile device management
    • Multiple device types / multiple OS versions
• Defining a mobile application portfolio
• Providing an easy-to-use “app store” for distribution of applications
• Standardization and comprehensive tooling
• Supporting a variety of devices, platforms, carriers and countries
• Securing access to corporate data and developing strategies to reduce the risk of data
  leakage (Wi-Fi hotspot)
• Addressing unexpected legal or compliance demands
                                                                                                                        BYOE
• Managing expenses and determining the right balance of reimbursement
                                                                                  Pini Cohen and Sigal Russin's work
                                                                                           Copyright@2013
                                                                                 Do not remove source or attribution
                                                                                 from any slide, graph or portion of
                                                                                               graph               43
Addressing the challenges with a four-pronged approach
Technology:                                                                                                                  Policy:
   Sunset legacy devices (Symbian, Win                                                                                          Security (ITCS300)
    Mobile)                                                                                                                      Client Standard
   Cross link Traveler accounts with IBM          1. Technology                                                                 Connection tools and service
    Endpoint Manager registration                                                                                                 expense eligibility (CIO 128)
   Digital Certification for all mobile                                                                                         All mobile devices must be
    devices (1st step authentication)                                                                                             registered in IBM Endpoint
   Cross link digital certs to IEM and  4.   Support              2. Policy                                                      Manager
    network access
   WiFI protection via enforced
    registration
   Containerization solutions                                                                                                    Education:
   Remote wipe capability
    Enable and deploy high
                                                    3. Education                                                                     Provide education and

                                                                                                                                      certification to enable
    value applications                                                                                                                employees to be “security
                                                                                                                                      aware”
               Support:                                                                                                              Annual Business Conduct
                  Self-support model,                             Source: IBM
                                                                   http://www.google.co.il/url?sa=t&rct=j&q=&esrc=s&source=web&
                                                                   cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.esl.dk
                                                                                                                                      Guidelines certification
                   powered by IBM’s social                         %2Fmedia%2F35735%2FFredag%2520Carsten%2520B%2520Ander
                                                                   sen%2520Personally-
                                                                   owned%2520devices%2520at%2520IBM%2520(ISACA).ppt&ei=9TI
                                                                                                                                     “Ask the experts”
                   software IBM Connections                        wUevYLseRswbS94G4Bw&usg=AFQjCNFnISWnbM8bhmQSsBLhtrvt
                                                                   -XHGmg&bvm=bv.43148975,d.Yms


                                                                                                                                              Pini Cohen and Sigal Russin's work
                                                                                                                                                                  44
                                                                                                                                                       Copyright@2013
                                                                                                                                             Do not remove source or attribution
                                                                                                                                             from any slide, graph or portion of
                                                                                                                                                           graph             44
Develop a strong usage policy
o Use of personal devices for business purposes is voluntary.

o Eligible employees (all except privileged users) can use personal
  devices as long as they agree to the IBM terms and conditions.

o Employees must adhere to security policies and installation of security
  agent to ensure their device is secure.

o IBM or client information and data (property) maintained or stored on a
  device is owned by IBM.

                                                                                             BYOE
                                                                       Pini Cohen and Sigal Russin's work
                                                                                Copyright@2013
                                                                      Do not remove source or attribution
                                                                      from any slide, graph or portion of
                                                                                    graph             45
Develop a strong usage policy
o Employee agrees to allow IBM to inspect or take possession of the device
  upon request.

o IBM can revoke the ability to use the device.

o IBM can do a remote wipe of the device at any time, if the device is lost or
  stolen.

o User will remove all IBM property when they stop using the device.

o IBM may, but is not obligated to provide any 3rd party software. User must
  obtain valid licenses for any 3rd party software they choose to use for IBM
  business or purchase it .                                                                  BYOE
                                                                       Pini Cohen and Sigal Russin's work
                                                                                Copyright@2013
                                                                      Do not remove source or attribution
                                                                      from any slide, graph or portion of
                                                                                    graph             46
Summary - BYOD

I.      Have sensible, but not restrictive, policies.
        Emphasize user education about the threats such as lost,
        stolen, and infected mobile devices. Enforce reasonable
        policies such as requiring a PIN code.
II.    MDM -Implement remote lock, wipe, and locate features on
       company- and employee owned devices.
III.   Install anti-malware protection or a MAM – security
       container for business apps.
IV.    Use VPNs for everything when connecting to company assets
       from mobile devices, especially when connecting over public
       Wi-Fi.
V.     Focus on authentication and identity.
        Multifactor authentication or federated identity should be
        used to access high-value services on the company network.   47
PC sales are down




                                    Suppliers
                                     Change
                     Pini Cohen and Sigal Russin's work
                              Copyright@2013
                    Do not remove source or attribution
                    from any slide, graph or portion of
                                  graph             48
These changes influence Nasdaq

Microsoft




      Apple




                                                        Suppliers
                                                         Change
                                         Pini Cohen and Sigal Russin's work
                                                  Copyright@2013
                                        Do not remove source or attribution
                                        from any slide, graph or portion of
                                                      graph             49
Suppliers
                 Change
 Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph               50
Windows 8 for “regular” PC’s




                                               Suppliers
                                                Change
                                Pini Cohen and Sigal Russin's work
                                         Copyright@2013
                               Do not remove source or attribution
                               from any slide, graph or portion of
                                             graph             51
Microsoft: from SW (license) to Services
• Computerworld has confirmed that Office 2013 is
   permanently locked to the original machine it was
   installed on…. you will be unable to move it to a new
   machine should the need arise
• Microsoft has made it fairly clear that it is now far
   more interested in getting consumers to sign up for
   its Office 365 product that works off of a subscription
   plan. Since this can be accessed from just about
   anywhere it would eliminate the need for re-
   installing a copy of Office that involves a license.

                                                                             Suppliers
                                                                              Change
                                                              Pini Cohen and Sigal Russin's work
                                                                       Copyright@2013
                                                             Do not remove source or attribution
                                                             from any slide, graph or portion of
                                                                           graph               52
Microsoft is looking for new way to do business
• Windows Blue confirmed in new Microsoft job listings: “Windows Blue
  promises to build and improve upon these aspects of the OS, enhancing ease
  of use and the overall user experience on devices and PCs worldwide.”
• Rumors about Windows Blue:
   • The first of a number of annual operating system updates to Windows 8.
   • There also is a Windows Phone Blue in the works that is expected to
       have the same core code as Windows Blue.
   • It's not clear to me when and whether Microsoft will roll out something
       known as Windows 9, given the new plan to deliver Windows operating
       system updates annually, rather than once every three years
                                                                                                                                                                                                                       Suppliers
               Sources: http://www.zdnet.com/microsofts-windows-blue-may-have-just-hit-milestone-1-7000011514/ and http://www.neowin.net/news/windows-blue-confirmed-in-microsoft-job-listing
                                                                                                                                                                                                                        Change
                                                                                                                                                                                                Pini Cohen and Sigal Russin’s work/
                                                                                                                                                                                                         Copyright@2013
                                                                                                                                                                                                Do not remove source or attribution from any
                                                                                                                                                                                                       slide, graph or portion of graph
                                                                                                                                                                                                                                         53
However
• Service = Subscription = Rental
• The “Cloud way” - you pay for what you need – can grow or
  reduce seats
• There is no asset for the organization
• Negotiation is tricky


                                           Suppliers
                                            Change
                                                        Pini Cohen and Sigal Russin's work
                                                                 Copyright@2013
                                                       Do not remove source or attribution
                                                       from any slide, graph or portion of
                                                                     graph               54
Mobile will cause new development paradigm




                         Source: http://www.kendoui.com/surveys/global-developer-survey-2013.aspx


                                                                            Pini Cohen and Sigal Russin's
                                                                               work Copyright@2013
                                                                               Do not remove source or
                                                                          attribution from any slide, graph
                                                                                 or portion of graph       55
Enterprise App Store




                                                                                                                         Source: http://velositor.com/2012/03/15/almost-3-in-5-enterprises-said-they-were-looking-to-implement-a-corporate-app-store/




Source: http://www.ebizq.net/blogs/mashups/2011/07/is-your-it-organization-ready-for-the-attack-of-the-angry-birds.php




                                                                                                                                                                                                                          Pini Cohen and Sigal Russin’s work/
                                                                                                                                                                                                                                   Copyright@2013
                                                                                                                                                                                                                             Do not remove source or attribution from any
                                                                                                                                                                                                                                    slide, graph or portion of graph
                                                                                                                                                                                                                                                                      56
A new era




Source: http://www.socialtechpop.com/2010/10/old-vs-new-trends-in-social-media/




                                                                                  Pini Cohen and Sigal Russin’s work/
                                                                                           Copyright@2013
                                                                                  Do not remove source or attribution from any
                                                                                         slide, graph or portion of graph
                                                                                                                           57
Agenda

BYOEverything        Security
                                   Business
Consumerization         &
                                   enabling
                      Cyber
                                   technologies



    Infrastructure                  The new
     investment                    infraops
      model-cost                delivery model
      reduction
                                                   Pini Cohen and Sigal Russin's work
                                                            Copyright@2013
                                                  Do not remove source or attribution
                                                  from any slide, graph or portion of
                                                                graph               58
Open Networking Foundation on SDN




   … In the SDN architecture, the control and data
planes are decoupled, network intelligence and state
are logically centralized and the underlying network
 infrastructure is abstracted from the applications …                         Enabling
                                                                            technologies
                                        Source: opennetworking.org
                                                              Pini Cohen and Sigal Russin's work
                                                                       Copyright@2013
                                                             Do not remove source or attribution
                                                             from any slide, graph or portion of
                                                                           graph             59
Enabling
               technologies

 Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph             60
SDN Vendors

o Cisco: Open Networking Environment (ONE), EEM (Tcl),
  Python scripting
o Juniper: Junos XML API and SLAX (human-readable XSLT)
o Arista EOS: XMPP, Linux scripting (including Python and
  Perl)
o Dell Force10: Open Automation Framework (Perl, Python,
  NetBSD shell)
o F5: iRules (Tcl-based scripts)


                                                         Pini Cohen and Sigal Russin's work
                                                                  Copyright@2013
                                                        Do not remove source or attribution
                                                        from any slide, graph or portion of
                                                                      graph             61
Case Study
                              Enabling
                            technologies




              Pini Cohen and Sigal Russin's work
                       Copyright@2013
             Do not remove source or attribution
             from any slide, graph or portion of
                           graph             62
Enabling
               technologies

 Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph             63
Key aspects of SDN
I.   Separation of data and control planes
II.  A uniform vendor-agnostic interface such as OpenFlow
     between control and data planes
III. Logically centralized control plane, realized using a
     network OS, that constructs and presents a logical map of
     the entire network to services or network control
     applications on top
IV. Slicing and virtualization of the underlying network
                                                                                                                             Enabling
       Source : http://yuba.stanford.edu/openflow/documents/openflow_deployment_journal_paper_aug2012.pdf                  technologies

                                                                                                             Pini Cohen and Sigal Russin's work
                                                                                                                      Copyright@2013
                                                                                                            Do not remove source or attribution
                                                                                                            from any slide, graph or portion of
                                                                                                                          graph             64
Today Networking Devices
                   B
A                                          1   C

                                                                                   IP
                                                                                   Routing
                                                                                   Table
                                           2
                                                       1-> B5
                                                       3-> A1

                                           3

    1   2              1   2       4   5           1        2 3
                               3                                                       Enabling
                                                                                     technologies

                                                                Pini Cohen and Sigal Russin’s work/
                                                                         Copyright@2013
                                                                Do not remove source or attribution from any
                                                                       slide, graph or portion of graph
                                                                                                         65
Current Networking Systems
                                                 Enabling
  Microsoft   ERP   SAP   CRM                  technologies




   1
   2
   3

                                                CPU
                                                 RP
                                             SuperVisor




                                 Pini Cohen and Sigal Russin's work
                                          Copyright@2013
                                Do not remove source or attribution
                                from any slide, graph or portion of
                                              graph             66
The “Software-Defined Network”
                     Microsoft     ERP      SAP      CRM
                                                Open API
           Network Operating System –SDN Controller
                                 Open Interface
                                 to Hardware
                              “If header = x, send to port 4”
                                                                    Openflow Firmware
                    Openflow Firmware
                                                                    Packet-Forwarding
                    Packet-Forwarding                                   Hardware
                        Hardware


Openflow Firmware                                  Openflow Firmware
                                                                                               Enabling
Packet-Forwarding                                   Packet-Forwarding                        technologies
    Hardware                                            Hardware               Pini Cohen and Sigal Russin's
                                                                                  work Copyright@2013
                                                                                  Do not remove source or
                                                                             attribution from any slide, graph
                                                                                    or portion of graph       67
Current technology                 Future technology

   ERP          SAP           CRM        ERP          SAP                  CRM


 Windows
Windows       Windows
             Windows        Windows
                            Windows    Windows
                                      Network
                                      Windows      Windows
                                                   NOX-
                                                  Windows           Windows
                                                                  Beacon-SDN
                                                                   Windows
Windows       Linux         FreeBSD     OS          Nicira         controller

           Virtualization                        Virtualization

                x86
                                      Openflow


                                                                    Pini Cohen and Sigal Russin's work
                                                                             Copyright@2013
                                                                   Do not remove source or attribution
                                                                   from any slide, graph or portion of
                                                                                 graph               68
“S” for Software
                                                                                                              Enabling

   Policy/Control SW                                                      1. Static Checking                technologies



                                                                             (“compile time”)
                                                                            “Is my configuration
        Configuration                                                       correct?”
                                                                          2. Dynamic checking
                                                                             (“run time”)
           Data Plane                                                       “Is my data plane
                                                                            behaving correctly?”
Source : Formal checking in networks, ONCR Research , James Hongyi Zeng
                                                                                              Pini Cohen and Sigal Russin's work
                                                                                                       Copyright@2013
                                                                                             Do not remove source or attribution
                                                                                             from any slide, graph or portion of
                                                                                                           graph             69
SDN Benefits

                                                                   SDN allows companies to:
Manage Change                                                   Remove the complexity
                                                                Reduce the cost of network
                                                                 reconfiguration
Integrate Cloud Services                                        Turn the network into a truly
                                                                 dynamic and flexible asset.

Network Investments

                                                                                                                   Enabling
                                                                                                                 technologies
    Source: http://www.accenture.com/us-en/Pages/insight-software-defined-networking-video.aspx
                                                                                                   Pini Cohen and Sigal Russin's work
                                                                                                            Copyright@2013
                                                                                                  Do not remove source or attribution
                                                                                                  from any slide, graph or portion of
                                                                                                                graph             70
Open Flow
    Today, your Routing Protocols / STP determine the Forwarding Table in
     your network.
    OpenFlow is another method for configuring the Forwarding table in the
     Network Switch.

    OpenFlow will replace existing routing protocols !
“If header = x, send to port 4”
“If header = y, overwrite header with z, send to ports 5,6”
“If header = ?, send to me”




                                                                      Pini Cohen and Sigal Russin's work
                                                                               Copyright@2013
                                                                     Do not remove source or attribution
                                                                     from any slide, graph or portion of
                                                                                   graph             71
Enabling
               technologies

 Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph             72
Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph             73
Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph               74
Summary - SDN

A. You should have clear vision about how SDN technology will
   benefit your business.
B. It is very early days for SDN -- the market, standards and
   technology will evolve.
C. Think about SDN implementation challenges: human resource.
   Vendor support, organization impact.
D. Think about the potential impact of SDN on your operational
   costs.
E. Improved network security is a critical potential benefit of
   SDN.
F. Identify a specific initial use case for SDN. For example,
   reducing the time to provision network security to new (or
   migrating) VMs.
                                                                  75
application(s)                Server

              file-system         ScaleIO Server                                                  ECS
             vol. manager
                                                                        ScaleIO ECS eliminates the
              block dev.                                                dependency on SAN hardware
                                  ScaleIO Client
                drivers                                                 ScaleIO ECS software components:
   Space
                       DAS
                                                            ScaleIO     • ScaleIO Data Client (SDC)
 allocated                                                  protocol
to ScaleIO
                                                                        • ScaleIO Data Server (SDS)
                            HBA       NIC/IB




                                                                                    External
                       switch          switch
                                                   Fabric                           Storage
                                  switch                          HBA              Subsystem
                                                                                                             Enabling
                                                                                                           technologies

                                                                                             Pini Cohen and Sigal Russin's work
                                                                                                      Copyright@2013
                                                                                            Do not remove source or attribution
                                                                                            from any slide, graph or portion of
                                                                                                          graph             76
Other vendors are following this trend




                                                                Enabling
                                                              technologies

                                         Pini Cohen and Sigal Russin’s work/
                                                  Copyright@2013
                                         Do not remove source or attribution from any
                                                slide, graph or portion of graph
                                                                                  77
• Does :
                                                           Enabling
Software Defined Network                                 technologies


       +
Software Defined Storage
       +
Software Defined X (more similar technologies)
       =
Software Defined Datacenter?
                                    Pini Cohen and Sigal Russin’s work/
                                             Copyright@2013
                                    Do not remove source or attribution from any
                                           slide, graph or portion of graph
                                                                             78
Software Defined Datacenter
• Forrester: An SDDC is an integrated abstraction layer that defines
  a complete data center by means of a layer of software that
  presents the resources of the data center as pools of virtual and
  physical resources, and allows them to be composed into
  arbitrary user-defined services.



                                                                                                                                                 Enabling
                                        Source: http://www.vmware.com/files/include/microsite/sddc/the_software-defined_datacenter.pdf         technologies

                                                                                                                         Pini Cohen and Sigal Russin’s work/
                                                                                                                                  Copyright@2013
                                                                                                                          Do not remove source or attribution from any
                                                                                                                                 slide, graph or portion of graph
                                                                                                                                                                   79
STKI on Software Defined Datacenter
• Two main vectors in Software Defined X:
                                                                                 Enabling

   • Central control of all related components
                                                                               technologies



   • Use more simple HW – up to “standard servers” for
     everything
• Will enable application to “ask” specific things from the HWinfra
  layer
• Promising concept and a “game changer” but it will take time

                                                          Pini Cohen and Sigal Russin’s work/
                                                                   Copyright@2013
                                                          Do not remove source or attribution from any
                                                                 slide, graph or portion of graph
                                                                                                   80
Enabling
Source: http://atea.lt/wp-content/uploads/2012/11/5-3-Datacenter-of-the-future-Atea-Action-2012.pdf
                                                                                                                     technologies

                                                                                                       Pini Cohen and Sigal Russin's work
                                                                                                                Copyright@2013
                                                                                                      Do not remove source or attribution
                                                                                                      from any slide, graph or portion of
                                                                                                                    graph               81
Enabling
                                                                                                                     technologies
Source: http://atea.lt/wp-content/uploads/2012/11/5-3-Datacenter-of-the-future-Atea-Action-2012.pdf




                                                                                                       Pini Cohen and Sigal Russin's work
                                                                                                                Copyright@2013
                                                                                                      Do not remove source or attribution
                                                                                                      from any slide, graph or portion of
                                                                                                                    graph               82
Facebook changed the DC industry : Open Compute Project
• Open Compute Project: internet/cloud companies working collaboratively to come
   up with a better motherboard design, a better power supply based on Intel or ARM
   chips.
• Facebook donated hardware designs to the Open Compute Project , showing how it
   had significantly cut costs with a new breed of slim-down gear purchased directly
   from manufacturers in Asia.
• Rackspace : (second only to Amazon in the cloud computing game) donateddesigns
   to the Open Compute Project.
     •   Rackspace’s hardware accommodates a different power system than
         Facebook’s gear.
     •   The server includes an extra network connection and some extra management
         tools. And it’s designed to handle a much larger number of connecting cables
• Google and Amazon have also bypassed big-name server makers going directly to
   more nimble manufacturers, but they’ve not donated their designs
                                                                                        Pini Cohen and Sigal Russin’s work/
                                                                                                 Copyright@2013
                                                                                        Do not remove source or attribution from any
                                                                                               slide, graph or portion of graph
                                                                                                                                83
Enabling
technologies      Source: SAP
                Pini Cohen and Sigal Russin's work
                         Copyright@2013
               Do not remove source or attribution
               from any slide, graph or portion of
                             graph               84
SAP HANA
•   From Disk to RAM
•   From Row to Column
•   From Text to Binary
•   Compression of data
•   New data manipulation algorithms – build for the Intel Core level



                                                                             Enabling
                                                                           technologies

                                                             Pini Cohen and Sigal Russin's work
                                                                      Copyright@2013
                                                            Do not remove source or attribution
                                                            from any slide, graph or portion of
                                                                          graph               85
Enabling
               technologies

 Pini Cohen and Sigal Russin's work
          Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
              graph               86
GPGPU
• General-purpose computing on graphics processing units
  (General-purpose graphics processing unit, GPGPU, GPGP or
  less often GP²U) is the utilization of a graphics processing
  unit (GPU), which typically handles computation only for
  computer graphics, to perform computation in applications
  traditionally handled by the central processing unit (CPU).
  Source: wiki

                                                                      Enabling
                                                                    technologies

                                                      Pini Cohen and Sigal Russin's work
                                                               Copyright@2013
                                                     Do not remove source or attribution
                                                     from any slide, graph or portion of
                                                                   graph               87
The GPU-Force!




                                                    Enabling
                                                  technologies
                 Source: http://www.nvidia.com/object/personal-supercomputing.html

                         Pini Cohen and Sigal Russin's work
                                  Copyright@2013
                        Do not remove source or attribution
                        from any slide, graph or portion of
                                      graph               88
Amax GPGPU Cluster




                                      Enabling
                                    technologies

                      Pini Cohen and Sigal Russin's work
                               Copyright@2013
                     Do not remove source or attribution
                     from any slide, graph or portion of
                                   graph               89
Intel’s Xeon PHI
                                    Enabling
                                  technologies




                    Pini Cohen and Sigal Russin's work
                             Copyright@2013
                   Do not remove source or attribution
                   from any slide, graph or portion of
                                 graph               90
The SQream Product Topology
                                                                                         Enabling
                                                                                       technologies

 Data                                                      Data Users
Sources




          Storage ~ 90% crunching
      100TB of original data            Performance – x25 ++
        25%-50% raw data           x10, x25, x40, X100 faster
                                                            Pini Cohen and Sigal Russin's
       x5-x10 compression             than leading DBMSs Do not Copyright@2013
                                                               work
                                                                     remove source or

    5TB-15TB on SQream’s Server                                        attribution from any slide, graph
                                                                              or portion of graph       91
Technology
                                                             Enabling

• Data Crunching:                                          technologies



• Faster compression time X20
• Faster decompression time X50-X70
• Higher compression ratio X5-X15
• Compute:
• Faster MPP in a node X20
• Higher scalability X1 node X3000 cores
• Lower hardware cost 7,000,000$ > 15K
                                             Pini Cohen and Sigal Russin's
                                                work Copyright@2013
                                                Do not remove source or
                                           attribution from any slide, graph
                                                  or portion of graph       92
The internet of things
• “Devices are smart” and have                                    You have fever
                                                               Take a pill right
  sophisticated software installed                                  now!

• What about the software license
                                             I don’t like
  in the device?!                               this tie




                                                                      I need to be
                                                                        changed!


                                                            Pini Cohen and Sigal Russin’s work/
                                                                     Copyright@2013
                                                            Do not remove source or attribution from any
                                                                   slide, graph or portion of graph
                                                                                                     93
Internet of things (sensor/computer to computer)
• "Always On" world around us
   • Cheap, smart, small, image recognition,
      augmented reality
   • Near Field Communication and location
      aware sensors
• Everything gets connected
• Not only “personal” devices but “business”
  devices flourish
                                                 Source: http://www.ibmbigdatahub.com/blog/next-best-action-internet-things



   • Real-time decision support for customers
      and employees                                                                                                             Enabling
                                                                                                                              technologies

                                                                                                        Pini Cohen and Sigal Russin’s work/
                                                                                                                 Copyright@2013
                                                                                                         Do not remove source or attribution from any
                                                                                                                slide, graph or portion of graph
                                                                                                                                                  94
95
                                                                                                                                                                                                    Do not remove source or attribution
                                                                                                                                                                                     technologies



                                                                                                                                                                                                    from any slide, graph or portion of
                                                                                                                                                                                                     Pini Cohen and Sigal Russin's work
                                                                                                                                                                                       Enabling



                                                                                                                                                                                                              Copyright@2013


                                                                                                                                                                                                                  graph




              Srouce: http://www.xbitlabs.com/news/other/display/20120620221606_Calxeda_s_ARM_Based_Web_Server_Fifteen_Times_More_Energy_Efficient_than_Intel_Powered_Company.html
ARM servers
Agenda

BYOEverything        Security
                                   Business
Consumerization         &
                                   enabling
                      Cyber
                                   technologies



    Infrastructure                  The new
     investment                    infraops
      model-cost                delivery model
      reduction
                                                   Pini Cohen and Sigal Russin's work
                                                            Copyright@2013
                                                  Do not remove source or attribution
                                                  from any slide, graph or portion of
                                                                graph               96
Cyber and Security
• The Dangers:
    Blackhole- Hacking as a Service
    APT1
• Solutions/ Tools:
    Categorization of solutions
    Cyber Intelligence
    HoneyPot
• Recommendations

                                               Pini Cohen and Sigal Russin's
                                                  work Copyright@2013
                                                  Do not remove source or
                                             attribution from any slide, graph
                                                    or portion of graph       97
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final

Contenu connexe

Similaire à Stki summit2013 infra_pini sigal_mega_v10 final

Sigal summit 2014 final
Sigal summit 2014 finalSigal summit 2014 final
Sigal summit 2014 finalAriel Evans
 
Stki summit2012infra v7 - major trends - paradign shifts
Stki summit2012infra v7 - major trends - paradign shiftsStki summit2012infra v7 - major trends - paradign shifts
Stki summit2012infra v7 - major trends - paradign shiftsPini Cohen
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014Ariel Evans
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratiosPini Cohen
 
Enterprise Applications, Analytics and Knowledge Management Trends 2013
Enterprise Applications, Analytics and Knowledge Management Trends 2013Enterprise Applications, Analytics and Knowledge Management Trends 2013
Enterprise Applications, Analytics and Knowledge Management Trends 2013Einat Shimoni
 
Delivery 2015 pini
Delivery 2015 piniDelivery 2015 pini
Delivery 2015 piniPini Cohen
 
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsSTKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsPini Cohen
 
Pini sigal Summit 2014 final
Pini sigal  Summit 2014 finalPini sigal  Summit 2014 final
Pini sigal Summit 2014 finalAriel Evans
 
Galit Fein Social Mobile Cloud and IT trends 2013
Galit Fein Social Mobile Cloud and IT trends 2013Galit Fein Social Mobile Cloud and IT trends 2013
Galit Fein Social Mobile Cloud and IT trends 2013Galit Fein
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Knowledge management 2017
Knowledge management 2017Knowledge management 2017
Knowledge management 2017Liatsafir
 
Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014Ariel Evans
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014Ariel Evans
 
For netapp haifa 2012 v3
For netapp haifa 2012 v3For netapp haifa 2012 v3
For netapp haifa 2012 v3Pini Cohen
 
Output management 2013
Output management 2013 Output management 2013
Output management 2013 Ariel Evans
 
Big data 2012 v1
Big data 2012 v1Big data 2012 v1
Big data 2012 v1Pini Cohen
 
Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure ServicesAriel Evans
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014Ariel Evans
 
STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?Pini Cohen
 

Similaire à Stki summit2013 infra_pini sigal_mega_v10 final (20)

Sigal summit 2014 final
Sigal summit 2014 finalSigal summit 2014 final
Sigal summit 2014 final
 
Stki summit2012infra v7 - major trends - paradign shifts
Stki summit2012infra v7 - major trends - paradign shiftsStki summit2012infra v7 - major trends - paradign shifts
Stki summit2012infra v7 - major trends - paradign shifts
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratios
 
Enterprise Applications, Analytics and Knowledge Management Trends 2013
Enterprise Applications, Analytics and Knowledge Management Trends 2013Enterprise Applications, Analytics and Knowledge Management Trends 2013
Enterprise Applications, Analytics and Knowledge Management Trends 2013
 
Delivery 2015 pini
Delivery 2015 piniDelivery 2015 pini
Delivery 2015 pini
 
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsSTKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
 
Pini sigal Summit 2014 final
Pini sigal  Summit 2014 finalPini sigal  Summit 2014 final
Pini sigal Summit 2014 final
 
Galit Fein Social Mobile Cloud and IT trends 2013
Galit Fein Social Mobile Cloud and IT trends 2013Galit Fein Social Mobile Cloud and IT trends 2013
Galit Fein Social Mobile Cloud and IT trends 2013
 
STKI Summit 2013 Presentation
STKI Summit 2013  PresentationSTKI Summit 2013  Presentation
STKI Summit 2013 Presentation
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Knowledge management 2017
Knowledge management 2017Knowledge management 2017
Knowledge management 2017
 
Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014
 
For netapp haifa 2012 v3
For netapp haifa 2012 v3For netapp haifa 2012 v3
For netapp haifa 2012 v3
 
Output management 2013
Output management 2013 Output management 2013
Output management 2013
 
Big data 2012 v1
Big data 2012 v1Big data 2012 v1
Big data 2012 v1
 
Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure Services
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014
 
STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?
 

Plus de Ariel Evans

infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 deliveryAriel Evans
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyberAriel Evans
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networkingAriel Evans
 
Printing om 2014
Printing om 2014Printing om 2014
Printing om 2014Ariel Evans
 
Secure develpment 2014
Secure develpment 2014Secure develpment 2014
Secure develpment 2014Ariel Evans
 
Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Ariel Evans
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalAriel Evans
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013 Ariel Evans
 
Mdm byod survey results 2013
Mdm byod survey results 2013Mdm byod survey results 2013
Mdm byod survey results 2013Ariel Evans
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnetAriel Evans
 

Plus de Ariel Evans (11)

infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 delivery
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyber
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networking
 
Printing om 2014
Printing om 2014Printing om 2014
Printing om 2014
 
Secure develpment 2014
Secure develpment 2014Secure develpment 2014
Secure develpment 2014
 
Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013
 
Mdm byod survey results 2013
Mdm byod survey results 2013Mdm byod survey results 2013
Mdm byod survey results 2013
 
IDM & IAM 2012
IDM & IAM 2012IDM & IAM 2012
IDM & IAM 2012
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 

Stki summit2013 infra_pini sigal_mega_v10 final

  • 1. Changing STKI Data Center Summit 2013 Pini Cohen Sigal Russin IT at the crossroads: Lead, follow or get out of the way
  • 2. Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 2
  • 3. Agenda Technology Mega Trends Domain Trends Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or 3 attribution from any slide, graph or portion of graph 3
  • 4. The New ITOperations-different thinking • 18 Million Visitors, 10x Growth,12 Employees, 410 TB of Data Pinterest • An organization with 2 backend engineers can now scale a Instagram system to 30+ million users. • ~1000 hardware nodes in production and ~20 engineers Tumblr • Continuous deployment happens 25 times a day because it’s so Etsy easy. • No architects, engineers work across the entire stack. You own TripAdvisor your project end to end, and are responsible for design, coding, testing, monitoring. Most projects have 1-2 engineers. Amazon • You build it, you run it Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 4
  • 5. Domains of change • Focus on generating business value through agility and flexibility • Move to distributed architectures • Move away from ownership as a core competency • Separation of concerns along services boundaries • Decentralization and reorganization of processes around services • Push of responsibility to as close to the developer as possible Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modifications Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 5
  • 6. Old Datacenter New Cloud Datacenter Licensed and Installed Applications SaaS (Workday, Pagerduty, EMR) Central SQL Database Distributed Key/Value NoSQL Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modifications Sticky In-Memory Session Shared Memory Cache Session Tangled Service Interfaces Layered Service Interfaces Instrumented Code Instrumented Service Patterns Fat Complex Objects Lightweight Serialized Objects Components as Jar Files Components as Services Chatty Protocols Latency Tolerant Protocols Manual and Static Tools Automated and Scalable Tools Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 6
  • 7. Old Datacenter New Cloud Datacenter SA/Database/Storage/Networking Admins NoOps/OpsDoneMaturelyButStillOps Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modifications Monolithic Software Development Teams Organized around Services Monolithic Applications Building Your Own PaaS Static and Slow Growing Capacity Incremental and Fast Growing Capacity Heavy Process/Meetings/Tickets/Waiting Better Business Agility Single Location Massive Geographical Distribution Vendor Supply Chains Direct to Developer Focus on How Much it Costs Focus on How Much Value it Brings Ownership/CapEx Leasing/OpEx/Spot/Reserved/On Demand Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 7
  • 8. You need to change! Source: http://www.forbes.com/pictures/eghe45eefgi/16-things-to-think-about-when-youre-considering-a-career-change/ Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 8
  • 9. Traditional IT is changing LOB LOB LOB Enterprise CIO Procurement OCIO IT Procurement Software Development IT Infrastructure Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 9
  • 10. The next IT Organization Line of Businesses Pay per Software House Use Enterprise Procurement IT Delivery Services Managed Services Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 10
  • 11. The new CIO/VPTech has to become: An internal strategic consultant more like (the model) HR, legal, financial VPs. That will help the business move from enterprise IT productivity to business productivity Develops the Enterprise Digital Strategy that builds value through innovation: Technology solutions for the LOBs and manages the business change needed (new business processes) Leadership in tablet efforts because business-driven tablet programs will uncover transformative opportunities Defines and implements technology (used by the clients of the enterprise) in order to increase revenues Dr. Jimmy Schwarzkopf’s work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 11
  • 12. IT Delivery Services Department IT Delivery Services move:  from an infrastructure-component focused IT that is expensive to sustain and maintain to one focused on end-to-end service management, user experience and “fair” chargeback policies Datacenter transformation, consolidations, vendor management, cloud, and application rationalization mandate: Formal governance structures for operational risks. Automation of management and control functionalities Secure access of users based on location and function Charges for “real” metered service delivery Validates, audits, protects, backups data Validates cloud provider service levels (SLAs) Dr. Jimmy Schwarzkopf’s work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 12
  • 13. The new InfrastructureDelivery manager has to deliver: • Enable consumerization (BYOEverything) • Business enablement with best of class technologies. Examples: • Follow Software Defined X • Take advantage of new HW technologies (in memory, GPU, ARM servers) • Big Data • Manages operational risk, security and cyber for all technologies the enterprise uses • Infrastructure investment model – continues cost reduction • Manages the IT Department as an IT vendor with new InfraOps delivery model: • Private Cloud, automation, self service and chargeback tools • Embrace infrastructure as code • Deploy public cloud when possible Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 13
  • 14. Agenda BYOEverything Security Business Consumerization & enabling Cyber technologies Infrastructure The new investment infraops model-cost delivery model reduction Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 14
  • 15. Consumerization of IT (CoIT) • This mega trend is more than a decade old. • People are resourceful. They’ll find what they need to be successful. They’ll bring what they need to drive the business forward. • Whether it’s the proliferation of mobile devices or on- demand software, business people are driving IT. • Most companies allow for it. Few can effectively deliver applications or governance to support it. BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 15
  • 16. Implications of the changing endpoint paradigm • The new endpoint experience • BYOD • What will happen to the suppliers  Changing business model • New Application development technology and functionality  SW distribution – APP stores BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 16
  • 17. Source: cisco survey BYOD 2012 BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 17
  • 18. BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 18
  • 19. BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 19
  • 20. BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 20
  • 21. BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 21
  • 22. KSP is selling tablets and smartphones BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 22
  • 23. Bring Your Own Device • It is happening? • Does your organization support BYOD devices (smartphones)? Source: http://blogs-images.forbes.com/johnherrema/files/2012/03/BYOD-support.jpg BYOE Source: GOOD technologies survey 2012 Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 23
  • 24. BYOD Usage and Policies Do employees access Does your organization have a business information BYOD policy to access business using personal devices? information? BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 24
  • 25. BYOD Risk Classification  Information security  Employee privacy  Software Licensing - Is software acquired by the business be installed on BYOD device?  Damage to the BYOD device by business IT – who is responsible?  Technological risk –the more connections you have the lower performance (applications, SSL VPN, WI-FI)  Is there any increase in human Resources with BYOD?  Increase the use of identity access management tools BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 25
  • 26. BYOD Bring Your Own Device Saving in Where to outlay on IT A policy Start? items document on BYOD  Supported Devices  Access Permission Productivity  Using VPN Security  Set passcodes BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 26
  • 27. BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 27
  • 28. BYOD Bring Your Own Device Policy What types of devices (version of the operating system) can access to business resources Which Access level your different groups of users require What applications are required for a user. A VPN is required for personnel likely to be using public Wi- Fi networks. Educate users about the importance of setting passwords and passcodes BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 28
  • 29. Access business information using BYOD ‫האם בארגונכם מאפשרים סנכרוןחיבור מכשירים חכמים‬ ? )‫טלפון פרטיים למאגרי מידע בארגון (אימייל, אפליקציה‬ 31% ‫לא‬ Source: current Analysis inc. BYOD survey 69% ‫כן‬ Source: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 29
  • 30. MAC MAC ‫האם בארגונכם מאפשרים סנכרוןחיבור‬ ?)‫פרטיים למאגרי מידע בארגון (אימייל, אפליקציה‬ 75% ‫לא‬ 25% ‫כן‬ Source: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 30
  • 31. BYOD Policy ‫האם בארגונך קיימת מדיניות ברורה בנושא של‬ ?‫- יישומים מותר להתחבר ולאיזה אסור‬BYOD 25% ‫בתהליך‬ 44% ‫לא‬ 31% ‫כן‬ Source: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 31
  • 32. BYOD importance Source: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 32
  • 33. MDM process ‫האם ארגונכם הטמיע/נמצא בתהליך הטמעת מוצר‬ ‫ או פתרון‬MDM ( ‫אבטחת מידע/ניהול למובייל‬ ?)‫דומה‬ Source: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 33
  • 34. Privacy employee concern ‫האם קיים בארגונך חשש מפגיעה בפרטיות‬ ?MDM ‫העובד בעת שימוש בכלי מסוג‬ Source: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 34
  • 35. ‫1102 ‪Important issues when choosing MDM solution‬‬ ‫תמיכה במגוון מערכות הפעלה‬ ‫3‬ ‫אכיפת מדיניות ארגונית על המכשיר‬ ‫1‬ ‫אבטחת מידע על המכשיר (ססמאות, ‪)AV ,FW‬‬ ‫2‬ ‫הפרדת המידע הארגוני מהמידע הפרטי על המכשיר‬ ‫4‬ ‫ניהול מצאי, קונפיגורציה ו ‪ Image‬של המכשיר‬ ‫6‬ ‫יכולות הפצת תוכנה ואפליקציות למכשיר‬ ‫8‬ ‫ניהול מרכזי ואינטגרציה למערכות ארגוניות‬ ‫5‬ ‫יכולות תמיכה ותפעול מרחוק של המכשיר (למשל לצרכי ‪)HelpDesk‬‬ ‫6‬ ‫יכולות דיווח וניהול הוצאות כספיות הקשורות למכשיר (למשל: התראות על נדידת רשתות בחו"ל)‬ ‫01‬ ‫ארכיטקטורת הפיתרון (‪ ,SAAS‬שרת באתר, מודל התימחור וכו')‬ ‫9‬ ‫3102 ‪Source: STKI RT MDM BYOD Survey FEB‬‬ ‫‪BYOE‬‬ ‫‪Pini Cohen and Sigal Russin's work‬‬ ‫3102@‪Copyright‬‬ ‫‪Do not remove source or attribution‬‬ ‫‪from any slide, graph or portion of‬‬ ‫‪graph‬‬ ‫53‬
  • 36. ‫3102 ‪Important issues when choosing MDM solution‬‬ ‫3102‬ ‫תמיכה במגוון מערכות הפעלה‬ ‫2‬ ‫אכיפת מדיניות ארגונית על המכשיר‬ ‫1‬ ‫אבטחת מידע על המכשיר (ססמאות, ‪)AV ,FW‬‬ ‫4‬ ‫הפרדת המידע הארגוני מהמידע הפרטי על המכשיר‬ ‫3‬ ‫ניהול מצאי, קונפיגורציה ו ‪ Image‬של המכשיר‬ ‫6‬ ‫יכולות הפצת תוכנה ואפליקציות למכשיר‬ ‫5‬ ‫ניהול מרכזי ואינטגרציה למערכות ארגוניות‬ ‫7‬ ‫יכולות דיווח וניהול הוצאות כספיות הקשורות למכשיר (למשל: התראות על נדידת רשתות בחו"ל)‬ ‫9‬ ‫ארכיטקטורת הפיתרון (‪ ,SAAS‬שרת באתר, מודל התימחור וכו')‬ ‫8‬ ‫‪BYOE‬‬ ‫3102 ‪Source: STKI RT MDM BYOD Survey FEB‬‬ ‫‪Pini Cohen and Sigal Russin's work‬‬ ‫3102@‪Copyright‬‬ ‫‪Do not remove source or attribution‬‬ ‫‪from any slide, graph or portion of‬‬ ‫‪graph‬‬ ‫63‬
  • 37. Management Requirements for Mobile A. Configuration and protection of lost or compromised devices- password enforcement, encryption enforcement, remote lock and wipe, remote email configuration, certificates for identity, remote connectivity (Wi-Fi, VPN) and detection of compromised OS (jailbreak, rooted etc). B. Data loss prevention (DLP)- privacy control (GIS), cloud usage control (iCloud, dropbox, GoogleDocs) and email DLP controls (protect attachments). C. Provisioning and data security in apps- Google Play market is full of malware. Microsoft and blackberry copied Apple approach. Control your business apps with group policies and content- managements controls. BYOE Source: Mobile Security, Galen M. Gruman, infoworld Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 37
  • 38. Mobile Device Security • Beware of Wi-Fi- in public places such as hotels, restaurants, cinema etc. 1 • Turn off Bluetooth- it can be used to listen in on private conversations. Also on 2 laptops. • Connect to your corporate VPN -if you have to use an untrusted network. It enable 3 you to connect in “full tunnel” mode. • Keep a close eye on your equipment – never leave any device alone. 4 • Don’t share files with strangers using USB keys- it can delete your sensitive data or 5 install a malware. Source: information week Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 38
  • 39. Secure Sandbox vs. Secure container -MAM Mobile Device Management (MDM)- control the user owned device from an Enterprise standpoint. Data meaningful and valuable for the company should not be lost or end up in the wrong hands. Mobile Application Management (MAM) –the ability of the Enterprise to keep control on rolling over or calling back applications deployed in an end-user device without having impact on the user privacy. Source:http://www.webtorials.com/discussions/2012/09/thank-you-mam-new-ways-to-plug- mobile-data-leaks.html BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 39
  • 40. Mobile Device Management -Israeli Market Positioning 1Q13 Mobile Iron AirWatch Player Local Support Worldwide FancyFone Leader Symantec Fiberlink Citrix( Zenprise) BoxTone Matrix McAfee Market Presence/Perception BYOE Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 40
  • 41. Mobile Container Management -Israeli Market Positioning 1Q13 Player Good Local Support Technologies Worldwide Leader Excitor Sybase Market Presence/Perception Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 41
  • 42. Case Study - IBM Policy IBM still gives BlackBerrys to about 40,000 of its 400,000 employees, 80,000 other workers now reach internal IBM networks using other smart phones and tablets they purchased themselves. • Disables public file-transfer programs like Apple’s iCloud, dropbox etc. • Turns off Siri- they worried that the spoken queries, which are uploaded to Apple servers, could ultimately reveal sensitive information. • Each employee’s device is treated differently, depending on what model it is and what the person’s job responsibilities are (Email, calender, IBM apps …) • Developing strategies to reduce the risk of data leakage (Wi-Fi hotspot) Source: “Mobile Computing in Question” business impact, MIT 2012 BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 42
  • 43. BYOD challenges (Case study IBM internal work) • Providing modern and secure network access that supports: • Personally owned devices Source: IBM http://www.google.co.il/url?sa=t&rct=j&q=&esrc=s&source=web& cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.esl.dk %2Fmedia%2F35735%2FFredag%2520Carsten%2520B%2520Ander sen%2520Personally- • Partitioning technologies owned%2520devices%2520at%2520IBM%2520(ISACA).ppt&ei=9TI wUevYLseRswbS94G4Bw&usg=AFQjCNFnISWnbM8bhmQSsBLhtrvt -XHGmg&bvm=bv.43148975,d.Yms • Mobile device management • Multiple device types / multiple OS versions • Defining a mobile application portfolio • Providing an easy-to-use “app store” for distribution of applications • Standardization and comprehensive tooling • Supporting a variety of devices, platforms, carriers and countries • Securing access to corporate data and developing strategies to reduce the risk of data leakage (Wi-Fi hotspot) • Addressing unexpected legal or compliance demands BYOE • Managing expenses and determining the right balance of reimbursement Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 43
  • 44. Addressing the challenges with a four-pronged approach Technology: Policy:  Sunset legacy devices (Symbian, Win  Security (ITCS300) Mobile)  Client Standard  Cross link Traveler accounts with IBM 1. Technology  Connection tools and service Endpoint Manager registration expense eligibility (CIO 128)  Digital Certification for all mobile  All mobile devices must be devices (1st step authentication) registered in IBM Endpoint  Cross link digital certs to IEM and 4. Support 2. Policy Manager network access  WiFI protection via enforced registration  Containerization solutions Education:  Remote wipe capability Enable and deploy high 3. Education  Provide education and  certification to enable value applications employees to be “security aware” Support:  Annual Business Conduct  Self-support model, Source: IBM http://www.google.co.il/url?sa=t&rct=j&q=&esrc=s&source=web& cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.esl.dk Guidelines certification powered by IBM’s social %2Fmedia%2F35735%2FFredag%2520Carsten%2520B%2520Ander sen%2520Personally- owned%2520devices%2520at%2520IBM%2520(ISACA).ppt&ei=9TI  “Ask the experts” software IBM Connections wUevYLseRswbS94G4Bw&usg=AFQjCNFnISWnbM8bhmQSsBLhtrvt -XHGmg&bvm=bv.43148975,d.Yms Pini Cohen and Sigal Russin's work 44 Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 44
  • 45. Develop a strong usage policy o Use of personal devices for business purposes is voluntary. o Eligible employees (all except privileged users) can use personal devices as long as they agree to the IBM terms and conditions. o Employees must adhere to security policies and installation of security agent to ensure their device is secure. o IBM or client information and data (property) maintained or stored on a device is owned by IBM. BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 45
  • 46. Develop a strong usage policy o Employee agrees to allow IBM to inspect or take possession of the device upon request. o IBM can revoke the ability to use the device. o IBM can do a remote wipe of the device at any time, if the device is lost or stolen. o User will remove all IBM property when they stop using the device. o IBM may, but is not obligated to provide any 3rd party software. User must obtain valid licenses for any 3rd party software they choose to use for IBM business or purchase it . BYOE Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 46
  • 47. Summary - BYOD I. Have sensible, but not restrictive, policies. Emphasize user education about the threats such as lost, stolen, and infected mobile devices. Enforce reasonable policies such as requiring a PIN code. II. MDM -Implement remote lock, wipe, and locate features on company- and employee owned devices. III. Install anti-malware protection or a MAM – security container for business apps. IV. Use VPNs for everything when connecting to company assets from mobile devices, especially when connecting over public Wi-Fi. V. Focus on authentication and identity. Multifactor authentication or federated identity should be used to access high-value services on the company network. 47
  • 48. PC sales are down Suppliers Change Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 48
  • 49. These changes influence Nasdaq Microsoft Apple Suppliers Change Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 49
  • 50. Suppliers Change Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 50
  • 51. Windows 8 for “regular” PC’s Suppliers Change Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 51
  • 52. Microsoft: from SW (license) to Services • Computerworld has confirmed that Office 2013 is permanently locked to the original machine it was installed on…. you will be unable to move it to a new machine should the need arise • Microsoft has made it fairly clear that it is now far more interested in getting consumers to sign up for its Office 365 product that works off of a subscription plan. Since this can be accessed from just about anywhere it would eliminate the need for re- installing a copy of Office that involves a license. Suppliers Change Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 52
  • 53. Microsoft is looking for new way to do business • Windows Blue confirmed in new Microsoft job listings: “Windows Blue promises to build and improve upon these aspects of the OS, enhancing ease of use and the overall user experience on devices and PCs worldwide.” • Rumors about Windows Blue: • The first of a number of annual operating system updates to Windows 8. • There also is a Windows Phone Blue in the works that is expected to have the same core code as Windows Blue. • It's not clear to me when and whether Microsoft will roll out something known as Windows 9, given the new plan to deliver Windows operating system updates annually, rather than once every three years Suppliers Sources: http://www.zdnet.com/microsofts-windows-blue-may-have-just-hit-milestone-1-7000011514/ and http://www.neowin.net/news/windows-blue-confirmed-in-microsoft-job-listing Change Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 53
  • 54. However • Service = Subscription = Rental • The “Cloud way” - you pay for what you need – can grow or reduce seats • There is no asset for the organization • Negotiation is tricky Suppliers Change Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 54
  • 55. Mobile will cause new development paradigm Source: http://www.kendoui.com/surveys/global-developer-survey-2013.aspx Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 55
  • 56. Enterprise App Store Source: http://velositor.com/2012/03/15/almost-3-in-5-enterprises-said-they-were-looking-to-implement-a-corporate-app-store/ Source: http://www.ebizq.net/blogs/mashups/2011/07/is-your-it-organization-ready-for-the-attack-of-the-angry-birds.php Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 56
  • 57. A new era Source: http://www.socialtechpop.com/2010/10/old-vs-new-trends-in-social-media/ Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 57
  • 58. Agenda BYOEverything Security Business Consumerization & enabling Cyber technologies Infrastructure The new investment infraops model-cost delivery model reduction Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 58
  • 59. Open Networking Foundation on SDN … In the SDN architecture, the control and data planes are decoupled, network intelligence and state are logically centralized and the underlying network infrastructure is abstracted from the applications … Enabling technologies Source: opennetworking.org Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 59
  • 60. Enabling technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 60
  • 61. SDN Vendors o Cisco: Open Networking Environment (ONE), EEM (Tcl), Python scripting o Juniper: Junos XML API and SLAX (human-readable XSLT) o Arista EOS: XMPP, Linux scripting (including Python and Perl) o Dell Force10: Open Automation Framework (Perl, Python, NetBSD shell) o F5: iRules (Tcl-based scripts) Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 61
  • 62. Case Study Enabling technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 62
  • 63. Enabling technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 63
  • 64. Key aspects of SDN I. Separation of data and control planes II. A uniform vendor-agnostic interface such as OpenFlow between control and data planes III. Logically centralized control plane, realized using a network OS, that constructs and presents a logical map of the entire network to services or network control applications on top IV. Slicing and virtualization of the underlying network Enabling Source : http://yuba.stanford.edu/openflow/documents/openflow_deployment_journal_paper_aug2012.pdf technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 64
  • 65. Today Networking Devices B A 1 C IP Routing Table 2 1-> B5 3-> A1 3 1 2 1 2 4 5 1 2 3 3 Enabling technologies Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 65
  • 66. Current Networking Systems Enabling Microsoft ERP SAP CRM technologies 1 2 3 CPU RP SuperVisor Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 66
  • 67. The “Software-Defined Network” Microsoft ERP SAP CRM Open API Network Operating System –SDN Controller Open Interface to Hardware “If header = x, send to port 4” Openflow Firmware Openflow Firmware Packet-Forwarding Packet-Forwarding Hardware Hardware Openflow Firmware Openflow Firmware Enabling Packet-Forwarding Packet-Forwarding technologies Hardware Hardware Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 67
  • 68. Current technology Future technology ERP SAP CRM ERP SAP CRM Windows Windows Windows Windows Windows Windows Windows Network Windows Windows NOX- Windows Windows Beacon-SDN Windows Windows Linux FreeBSD OS Nicira controller Virtualization Virtualization x86 Openflow Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 68
  • 69. “S” for Software Enabling Policy/Control SW 1. Static Checking technologies (“compile time”) “Is my configuration Configuration correct?” 2. Dynamic checking (“run time”) Data Plane “Is my data plane behaving correctly?” Source : Formal checking in networks, ONCR Research , James Hongyi Zeng Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 69
  • 70. SDN Benefits SDN allows companies to: Manage Change  Remove the complexity  Reduce the cost of network reconfiguration Integrate Cloud Services  Turn the network into a truly dynamic and flexible asset. Network Investments Enabling technologies Source: http://www.accenture.com/us-en/Pages/insight-software-defined-networking-video.aspx Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 70
  • 71. Open Flow  Today, your Routing Protocols / STP determine the Forwarding Table in your network.  OpenFlow is another method for configuring the Forwarding table in the Network Switch. OpenFlow will replace existing routing protocols ! “If header = x, send to port 4” “If header = y, overwrite header with z, send to ports 5,6” “If header = ?, send to me” Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 71
  • 72. Enabling technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 72
  • 73. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 73
  • 74. Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 74
  • 75. Summary - SDN A. You should have clear vision about how SDN technology will benefit your business. B. It is very early days for SDN -- the market, standards and technology will evolve. C. Think about SDN implementation challenges: human resource. Vendor support, organization impact. D. Think about the potential impact of SDN on your operational costs. E. Improved network security is a critical potential benefit of SDN. F. Identify a specific initial use case for SDN. For example, reducing the time to provision network security to new (or migrating) VMs. 75
  • 76. application(s) Server file-system ScaleIO Server ECS vol. manager ScaleIO ECS eliminates the block dev. dependency on SAN hardware ScaleIO Client drivers ScaleIO ECS software components: Space DAS ScaleIO • ScaleIO Data Client (SDC) allocated protocol to ScaleIO • ScaleIO Data Server (SDS) HBA NIC/IB External switch switch Fabric Storage switch HBA Subsystem Enabling technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 76
  • 77. Other vendors are following this trend Enabling technologies Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 77
  • 78. • Does : Enabling Software Defined Network technologies + Software Defined Storage + Software Defined X (more similar technologies) = Software Defined Datacenter? Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 78
  • 79. Software Defined Datacenter • Forrester: An SDDC is an integrated abstraction layer that defines a complete data center by means of a layer of software that presents the resources of the data center as pools of virtual and physical resources, and allows them to be composed into arbitrary user-defined services. Enabling Source: http://www.vmware.com/files/include/microsite/sddc/the_software-defined_datacenter.pdf technologies Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 79
  • 80. STKI on Software Defined Datacenter • Two main vectors in Software Defined X: Enabling • Central control of all related components technologies • Use more simple HW – up to “standard servers” for everything • Will enable application to “ask” specific things from the HWinfra layer • Promising concept and a “game changer” but it will take time Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 80
  • 81. Enabling Source: http://atea.lt/wp-content/uploads/2012/11/5-3-Datacenter-of-the-future-Atea-Action-2012.pdf technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 81
  • 82. Enabling technologies Source: http://atea.lt/wp-content/uploads/2012/11/5-3-Datacenter-of-the-future-Atea-Action-2012.pdf Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 82
  • 83. Facebook changed the DC industry : Open Compute Project • Open Compute Project: internet/cloud companies working collaboratively to come up with a better motherboard design, a better power supply based on Intel or ARM chips. • Facebook donated hardware designs to the Open Compute Project , showing how it had significantly cut costs with a new breed of slim-down gear purchased directly from manufacturers in Asia. • Rackspace : (second only to Amazon in the cloud computing game) donateddesigns to the Open Compute Project. • Rackspace’s hardware accommodates a different power system than Facebook’s gear. • The server includes an extra network connection and some extra management tools. And it’s designed to handle a much larger number of connecting cables • Google and Amazon have also bypassed big-name server makers going directly to more nimble manufacturers, but they’ve not donated their designs Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 83
  • 84. Enabling technologies Source: SAP Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 84
  • 85. SAP HANA • From Disk to RAM • From Row to Column • From Text to Binary • Compression of data • New data manipulation algorithms – build for the Intel Core level Enabling technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 85
  • 86. Enabling technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 86
  • 87. GPGPU • General-purpose computing on graphics processing units (General-purpose graphics processing unit, GPGPU, GPGP or less often GP²U) is the utilization of a graphics processing unit (GPU), which typically handles computation only for computer graphics, to perform computation in applications traditionally handled by the central processing unit (CPU). Source: wiki Enabling technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 87
  • 88. The GPU-Force! Enabling technologies Source: http://www.nvidia.com/object/personal-supercomputing.html Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 88
  • 89. Amax GPGPU Cluster Enabling technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 89
  • 90. Intel’s Xeon PHI Enabling technologies Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 90
  • 91. The SQream Product Topology Enabling technologies Data Data Users Sources Storage ~ 90% crunching 100TB of original data  Performance – x25 ++ 25%-50% raw data  x10, x25, x40, X100 faster Pini Cohen and Sigal Russin's x5-x10 compression  than leading DBMSs Do not Copyright@2013 work remove source or 5TB-15TB on SQream’s Server attribution from any slide, graph or portion of graph 91
  • 92. Technology Enabling • Data Crunching: technologies • Faster compression time X20 • Faster decompression time X50-X70 • Higher compression ratio X5-X15 • Compute: • Faster MPP in a node X20 • Higher scalability X1 node X3000 cores • Lower hardware cost 7,000,000$ > 15K Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 92
  • 93. The internet of things • “Devices are smart” and have You have fever Take a pill right sophisticated software installed now! • What about the software license I don’t like in the device?! this tie I need to be changed! Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 93
  • 94. Internet of things (sensor/computer to computer) • "Always On" world around us • Cheap, smart, small, image recognition, augmented reality • Near Field Communication and location aware sensors • Everything gets connected • Not only “personal” devices but “business” devices flourish Source: http://www.ibmbigdatahub.com/blog/next-best-action-internet-things • Real-time decision support for customers and employees Enabling technologies Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 94
  • 95. 95 Do not remove source or attribution technologies from any slide, graph or portion of Pini Cohen and Sigal Russin's work Enabling Copyright@2013 graph Srouce: http://www.xbitlabs.com/news/other/display/20120620221606_Calxeda_s_ARM_Based_Web_Server_Fifteen_Times_More_Energy_Efficient_than_Intel_Powered_Company.html ARM servers
  • 96. Agenda BYOEverything Security Business Consumerization & enabling Cyber technologies Infrastructure The new investment infraops model-cost delivery model reduction Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 96
  • 97. Cyber and Security • The Dangers:  Blackhole- Hacking as a Service  APT1 • Solutions/ Tools:  Categorization of solutions  Cyber Intelligence  HoneyPot • Recommendations Pini Cohen and Sigal Russin's work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 97