SlideShare une entreprise Scribd logo
1  sur  243
Télécharger pour lire hors ligne
Trends In
     Infrastructure
        Services




    Tell me and I’ll forget      STKI Summit 2012
Show me and I may remember
                                   Shahar Geiger Maor,
Involve me and I’ll understand     VP & Senior Analyst
Presentation Visualization




                                                                MDM
Networking                                                                                                      Security

                                                                 ollaboration




                                                                                                                                 2
     Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
End-To-End Security Project

                                                                  Web Security                                         Secure
                                WAF                                                                                    Browsing
                                                                  Gateway
Application
Security

                                                                     Information
                                 DLP                                 Laundering
Data
Security


                            Firewalls                                 IPS                               NAC
Network
Security
    Source: Taldor                                                                                                                3
    Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
TEAMS Project (A3)




                                                  Source: Malam-Team                                                        4
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
The New Training Center-IDF




                                                     Source: Bynet                                                          5
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Presentation Visualization -Networking




                                                             MDM
Networking                                                                                                  Security


                                                              ollaboration




                                                                                                                              6
  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
STKI Index-2011 –Top Networking Queries



                                                                                       Data, 29%

                                                      Collaboration, 27%
                                 Market Players, 22%


                                          Trends, 9%

                            ADC, 4%

     Mobile, 4%

Misc., 4%




                                                                                                                                        7
            Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
IPv6

                                                                                                                            8
                                  Source: http://i.imgur.com/l371J.jpg
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Internet Protocol Version 6 (IPv6)




                                                                                                                 You are here

                                                                                                                                9
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
IPv6 Market Status

• Large orgs., cloud service providers, US government –All support
  IPv6.
• IT: All major hardware and software providers support IPv6.

• Israel:


                                   Sector                                              IPv6 Awareness
                        Service Providers                                                             /
                     Telecommunications                                                               /
                    Global Organizations                                                              /
                     Other Organizations



                                                                                                                                   10
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Almost All Agree: IPv6 Is Critical




http://www.computerworld.com.au/slideshow/395230/most_enterprises_will_ipv6_by_2013_survey/                                 11
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
IPv6 Recommendations



1. Awareness, awareness, awareness
2. Basic (internal IT) gap analysis
3. Executives’ awareness
4. Thorough gap analysis
   (professional services) and
   migration plan
5. POC (taste the flavor of IPv6).
6. Future system design and purchase
   –IPv6 enabled


                                                                                                                                12
    Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Presentation Visualization –Data Networking




                                                             MDM
Networking                                                                                                  Security


                                                              ollaboration




                                                                                                                              13
  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Pressure!!!




                                                                                                                            14
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Key Drivers For Network Transformation

  •   Server virtualization
  •   Storage Convergence
  •   East-west traffic patterns
  •   Growth of VMs and “server sprawl” management
Fabric (ˈfa-brik) n. An integrated data center network that supports servers, storage,
appliances and switches on a large scale. It provides a simple way to reach everything in
the data center using location-independent, Layer 2 addressing that creates a flat
network among components. It borrows features from routed network including
dynamically selecting the shortest and best route for connections, converges very quickly
when the network changes, uses all the links in the network and efficiently handles
broadcast and multicast traffic. It has high reliability with very fast convergence when a
failure occurs. It minimizes packet discards or is lossless and has extremely low end-to-
end latency. It automatically adjusts and applies the right configuration to whatever
devices connect to it. Also called Ethernet Fabric and Data Center Fabric. -Robin Layland


                                                                                                                                        15
            Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Changes In Technology Are Making
             Server-to-server Traffic “The” Network Issue


                                                                                                                               SOA
                                                                                                                  Web
 Application                                                                                                      2.0
                                                                                                                              SAAS



                                                                Client
Client – Server Architecture                                                                          Service Oriented Architecture


                                                                               25%
                                                  95%                                                       Server

                                                                                        Server                                     Server
                   Server

         A               B             C
                                                                                        Server
                                                                                                              75%
                                                                                                                                   Server

        D                              DB




                                                  Source: Juniper Networks                                                                  16
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Today’s Network Architectures Can’t Keep Pace




                                              Source: HP Networking                                                          17
 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Distributed Intelligence Details

Optimized Virtual Access Layer

•    Today, access to the network lives in the virtual
     hypervisor                                                                                     Physical
                                                                                                     Virtual
    • Consumes valuable host resources
•    Virtual switch is offloaded to the physical                                                                                                        Server




                                                                                                                           vNIC



                                                                                                                                         vNIC



                                                                                                                                                vNIC
                                                                                                                vNIC
     switch
    • Eliminates the software switch; the advantages of a                                                              Virtual Switch
      distributed virtual switch plus Distributed Intelligence
    • Leverages Virtual Ethernet Port Aggregator (VEPA)
      technology
                                                                                                                                                            NIC
•    Virtual NICs are offloaded to the physical NIC
    • Leverages Virtual Ethernet Bridging (VEB) technology
•    Host resources are freed up for applications
    • Gives 5-20% of host resources back to applications
•    VMs have direct I/O with the network
                                                                                                                                                        Switch
    • Network simplicity; common access across entire VCS;
      network is managed in the network
                                                                 Source: Brocade                                                                       18
             Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Three-tier Architecture & Server-to-Server Traffic


             Three-tier Legacy Network

                                                                         N
                                                                                             Unnecessary layers
                                                                                             add hops and latency




                                                                                             Slows performance of
             W            75% or more of traffic                  E                          Federated Apps &
                                                                                             VM mobility



                                                                                             Up to 50% of ports
                                                                                             interconnect switches;
                                                                         S                   not servers or storage




                                               Source: HP Networking                                                          19
  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Two-tier Architectures Improve Performance


                                       Simplified Two-tier Network

   A-Series Core                                                                                   N
 Switches with IRF                                               IRF
                                                                                                                        IRF Removes a Networking
                                                                                                                        Layer to reduce CAPEX

    A-Series ToR
Switches with IRF,                                  IRF                 Virtual Connect


HP Virtual Connect                                                                                                      IRF enables a single, low
                                       W             75% or more of traffic                 E                           latency hop between up to
                                                                                                                        nine server racks



                                                                                                                        Virtual Connect provides
                                                                                                                        direct flight connections
                                                                                                    S                   within an HP BladeSystem


                                              Rack Servers             Blade Servers

                                                          Source: HP Networking                                                           20
         Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
The Fabric Architecture


                              Core Switches




                                                                                                                        All of the TOP of
                                                                                                                        Racks are a single
                                                                                                                          high capacity
                                                                                                                             Fabric!!!
Aggregation
 switches



                                                         Firewall




                                                   Access
                                                  switches
                                                                                                                               Fabric
                                                                                                                              Switches


                                                                                      4
                       Pod 1                                                                                  Pod 2


                                                       Source: Juniper
  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                                             21
Intelligent L2 Domains
                                                              POD Evolution
                                                                               Inter-POD Connectivity across L3
                             Shipping                       OTV                Failure Boundary Preservation
                                                                                                                                                    Failure
                                                                    IP Cloud
                                                                                                                                                    Boundary

                                                                                                                                                           Core
L3

L3                                                                                                                                                  Aggregation
                                                                                                                              …
L2                                                                    vPC
                                                                                                               …    FabricPath…         …
                                                                                                                       …
                                                                                                                                                        Access
L2
                                                                                                                                              vPC

                                                                                                                                                        Servers


        STP+                                                     vPC/VSS                                              FabricPath
          STP                                                NIC Teaming                                          16x ECMP
     Enhancements                                          Simplified loop-                                  Low Latency / Lossless
        Bridge                                                free trees                                         MAC Scaling
       Assurance                                           2x Multi-pathing                                  Operational Flexibility
       Shipping                                             Shipping                                               Shipping
                                                                         Source: Cisco
                  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                                                      22
Wireless




                                                                                                                            23
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Wireless Trends

• Welcome, IEEE 802.11ac…
• Wireless as a service
• Wireless IPS (Intrusion Prevention System)
• All vendors must have the following features:
1.   Support for 802.11a/b/g/n
2.   Controller-less WiFi network
3.   A network management application
4.   Standards-based security with 802.1X through WPA2
5. Provider can deliver network services (such as voice, video and
     location).


                                                                                                                                     24
         Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Positioning Methodology


  Israeli vendor rating – Market positioning is focused on the enterprise
     sector (not SMB)
         X axis: Market penetration (sales + installed base+ clients
           perspective)
         Y axis: localization, support, Local R&D center, number and
           quality of SIs, etc.
         Worldwide leaders are marked based on global positioning

Vendors to watch: Israeli market newcomers

STKI positioning represents the current Israeli market and not necessarily
what we recommend to our clients




                                                                                                                                   25
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
xxx- Israeli Market Positioning 1Q12



                                                      Vendor B
   Local Support




                                                                                                                            Player


                                                                                                                            Worldwide
                                                                                                                            Leader




                                                Vendor A


                                                 Market Presence

                                                                                                                                26
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Data Center Networking- Israeli Market Positioning 1Q12


         Local Support                                                                 Cisco




                                          Juniper
                                                                                                                                  Player


                         Alcatel-Lucent                                                                                           Worldwide
                                                                                                                                  Leader


                         Avaya
                                                                HP

                                                  Brocade
                                   IBM
                                                       Market Presence

                                                                                                                                      27
      Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Campus Networking- Israeli Market Positioning 1Q12


                                                                          Cisco
       Local Support




                              Alcatel-Lucent                                                                                    Player

                       Extreme                                                         HP                                       Worldwide
                                                                                                                                Leader
                             Avaya
                                                              Juniper
                       Dell
                                                        Enterasys
                                   Brocade

                                                     Market Presence

                                                                                                                                    28
    Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Wireless LAN- Israeli Market Positioning 1Q12




                                                       Cisco
   Local Support




                                                                                                                            Player
                        Motorola
                                                                                                                            Worldwide
                                                                                                                            Leader
                            HP
                                                                               Aruba
        Alcatel-Lucent

                                   Juniper
                            Aerohive
                        Ruckus
                             Enterasys
                                    Market Presence

                                                                                                                                29
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
30
                                Source: Bent Objects
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Application Delivery Controllers


Mega trends:
•Cloud computing
•Virtualization – desktop, storage, network
•Mobility
• Security
•Datacenter consolidation




                                                                                                                                 31
     Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
adc




Source: http://www.enterprisemanagement.com/research/asset_download.php?id=2110
           Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Key Drivers for Data Center Class WAN Optimization

• Disaster recovery
Protect more data across longer distances over converged networks
• Data center consolidation / cloud
Data and server placement not impacted by WAN performance
• Server and storage centralization
Users can be farther from resources
• Real-time collaboration
Improve quality of unified communications (voice/video)
• Virtualization
Multisite VDI and VM migration impacted by poor WAN quality



                                                                                                                                     33
         Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Application Delivery Controllers- Israeli Market Positioning 1Q12



                                                                     Radware
           Local Support




                                                                                                  F5
                                                                                                                                    Player

                                      Citrix                                                                                        Worldwide
                                                                                                                                    Leader


                           A10
                                                                 Cisco


                                         Barracuda

                                                         Market Presence

                                                                                                                                        34
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
WAN Optimization- Israeli Market Positioning 1Q12


    Local Support




                                                                                                                             Player

                             Citrix                                          Riverbed
                                                                                                                             Worldwide
                                                                                                                             Leader

                               F5                               Cisco
                    Silver Peak                Radware
                                                 Juniper
                                                   Bluecoat

                                                  Market Presence

                                                                                                                                 35
 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Presentation Visualization -Collaboration




                                                             MDM
Networking                                                                                                  Security


                                                              ollaboration




                                                                                                                              36
  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
37
Source: http://collaborationbenefits.blogspot.com/2010/04/intersection-of-unified-communications_30.html
          Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Collaboration Basics




                                                      Source: Cisco
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                            38
Email And Phone Are Still The Most Common Way To Interact With Customers

  What are the top methods by which your employees communicate with your
  customers, suppliers and partners?




                                                 Source: Information Week                                                          39
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Drivers Of Unified Communication Projects

1. Improve employee collaboration
2. Improve employee efficiency
3. Improve communications with customers
4. Create a more mobile workforce
5. Legacy PBX retirement
6. Upgrade technology to meet business needs/stay on
   par with peers
7. Reduce operation expenditures
8. Reduce travel expenses
9. Decrease sales cycle times
                                                                                                                                  40
      Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Reasons for Not Using Unified Communications

1. Other projects have a higher priority
2. No definitive business value
3. Lack in-house expertise
4. UC technology is too expensive
5. Sizeable investment in current communications
   platform
6. Auxiliary costs are too expensive (e.g. WAN bandwidth,
   infrastructure upgrades)
7. Deployments are too complex


                                                                                                                                  41
      Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Cloud Based UCC –A Very Good Step Forward




1. B2B: connect to business
   partners, customers, and
   individuals outside
   corporate network
2. Great for small and medium businesses
3. Help in reducing security issues (…but raise others)
4. Standardization


                                                                                                                                     42
         Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
What’s Wrong?



We are still trying to automate
                                                                                          Multitude of vendors leads to
 collaboration…needs to be
                                                                                          “non-immersive” experience
       people centric



                                                                                             Insufficient focus on how
IT driven without alignment to
                                                                                           people collaborate today and
       business priorities
                                                                                             what real pain points are



Not treating Collaboration as a                                                          Many of the benefits in UCC do
       CEO Agenda Item                                                                         not apply locally



                                                                                                                            43
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
How To Do It Right

Step 1: Identify Primary Business Imperatives
                                                                                                                         Time-to-
                                                                                                                          Market
    Innovation                                                 Talent
                                                             Acquisition
                                                            and Retention

                                                                                                           Customer
                                                                   Cost                                     Loyalty
       Quality
                                                                  Control

                                            Sales
                                        Effectiveness

         Cultural                                                            Productivity
        Evolution                                                                                                                    Business
                                                                                                                                    Scaling and
                                                                                                                                      Growth

                                                                                                                                                  44
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
How To Do It Right

Step 2: Associate Relevant Stakeholders and Processes:




                  Innovation
         Accelerating the generation
          and development of new
         ideas into new or improved
            products, services and
                   processes




                                                                                                                                   45
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
How To Do It Right

Step 3: Analyze Existing Collaboration Patterns




                                                                                                                                   46
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
How To Do It Right

Step 4: Execute Collaboration Programs:
 online communities
 blogs and microblogs
 online shared workspaces
 “click-to-connect”
 collaboration spaces
 comprehensive research repository
 connecting experts

…Did we mention LinkedIn?



                                                                                                                                   47
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
The ROI Problem

                                                Elements of ROI Calculation


   Capital                             Operational                                     Alternative
                                                                                                                                        TCO
expenditures                            expenditures                                       cost



 Feature
                                 Job                                                                   Employee
adoption                                                            Training                                                           UC benefit
                            satisfaction                                                              productivity
timeline




                                                           Increased sales
                                                          due to increased
                                                            collaboration


                                                                                                                                               48
           Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
65% Of Orgs Have Implemented UC Capabilities in 50% or Less of Total Users




                                                 Source: Information Week                                                          49
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Presentation Visualization -Customer Center




                                                             MDM
Networking                                                                                                  Security


                                                              ollaboration




                                                                                                                              50
  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
CRM Maturity Model


Business Value
                                                           Analytical                                           Social CRM
  Value investment                                           CRM
                                                                                                           Listening
                                                                        Web                Mobile
                                                                      channel             channel
                                                                                                           platforms
                                                                      projects            projects                                            IT oriented
Investment in order                                                                                                                           Project

to optimize costs                                                                                                                             Business
                                                                                                                                              oriented
                                      Operational                                                                                             Project
                                       CRM/XRM
    Commodity
    investment
                                                                                                                                          *Size of figure
                                                                                                                                          = complexity/
     Regulative                                                                                                                           cost of project

    investment


                                         Using                      Implementing                               Future usage
                                                                Market Maturity
              Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Accelerating Customer Experience


    CRM 1.0                                       CRM 2.0                                                                    CRM 3.0
    Managing                                      Managing influencers                                                       Engaging
    Individual                                    & ‘tribes’                                                                 & Influencing
    customers



Customer
A        Customer Customer
         B        C
                                              The focus shift:


     Transactions                                                Interactions                                                 Experience

             Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                                         52
What is Social CRM

• Social CRM can be used for 2 purposes:
• Listening and Learning: Using the power of personal networks to
  gain intelligence on customers, their habits, interests
     • Brand auditing
     • Awareness of campaigns success/failure
     • Crowdsourcing (new products, design ideas)
• Interacting and Engaging: New channel for customer interactions
  (sales, service, marketing)

• Social CRM projects will be short / simple. Companies will grow
  into it (by using social CRM modules within CRM apps) or SaaS-
  based products. The hardest part will be the “people” and
  “processes” part, change management.
                                                                                                                                   53
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Power To The People – Is It Too Much Power???

• Social media criticism makes Gap dumps new
     logo forces it to revert back to old logo




                                                                                                                                54
    Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Social Media Projects Maturity




                                               (Source: Altimeter Group)                                                    55
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Customer Care Trends


                                                              There’s                            Increasingly
                                                              no place                          unpredictable
                                                               to hide                          environmental
                                                               online                               events


The age of self
                                              From
help, paranoia
                                            ‘push’ to
  and advice
                                              ‘pull’
   seeking


                                                               The rise                          The agile and
                                                                of the                            asset-less
                                                                any x                            organization
                                                              customer                             (…cloud)


                                                                                                                             56
 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Approaching (Interacting with) Customers




(…Too often, digital marketing efforts target only younger customer segments)

                                            Source: McKinsey Global Survey                                                          57
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Key Benefits That Can Influence Consumers To Use a New Form of
                            Payment




                                         Source: Javelin Strategy & Research                                                        58
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Heavy Duty Phone Systems For Trading Rooms




                                                                                                  Directional and time indication
                                                            Call History

           Modularity of Components                                                                                   Call Directory
                                                                                      Backpack

Extensibility                                          Deskshare

                                                              Source: IPC
      Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                                       59
Unified Communications - Israeli Market Positioning 1Q12




                                                               Cisco
         Local Support




                                                                                                                                  Player
                                   Avaya                                             Microsoft
                                                                                                                                  Worldwide
                                                                                                                                  Leader


                         Digium
                           IBM                                 Alcatel-Lucent
                                                    Siemens EC
                                                 Interactive Intelligence

                                                       Market Presence

                                                                                                                                      60
      Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Customer Center Infrastructure - Israeli Market Positioning 1Q12


           Local Support




                                                                                                                                    Player
                                              Cisco
                                                                                                    Avaya                           Worldwide
                                                                                                                                    Leader

                           Aspect
                                                      Alcatel-Lucent
                                               Cosmocom
                                                   Interactive Intelligence
                                                      Siemens EC
                                                         Market Presence

                                                                                                                                        61
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
IP Telephony - Israeli Market Positioning 1Q12


   Local Support                                                                 Cisco




                                                                                                                            Player

                          Alcatel-Lucent
                   Tadiran Telecom                                                      Avaya                               Worldwide
                                                                                                                            Leader




                   Digium
                                                       Microsoft
                                                 Siemens EC
                                                 Market Presence

                                                                                                                                62
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Presentation Visualization -Video




                                                             MDM
Networking                                                                                                  Security


                                                              ollaboration




                                                                                                                              63
  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Global Mobile Data Traffic

100%
 90%
 80%
 70%
                                                                                                                                   VoIP
 60%
                                                                                                                                   Gaming
 50%
                                                                                                                                   File Sharing
 40%
                                                                                                                                   M2M
 30%
                                                                                                                                   Data
 20%
                                                                                                                                   Video
 10%
  0%
                2011            2012           2013             2014             2015
                                                                                                  2016

                                                     Source: Cisco VNI 2012                                                                64
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Enterprise Video Usage




                                              Source: Business Video
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                            65
Israeli Market Status


• Videoconferencing –Mature collaboration tool

• E-learning –Common in global orgs. Good as an enrichment
  for existing tools

• Video streaming and CDN –Specific for content creators
  (…Still waiting for enterprise YouTube)

• Digital signage –For special purposes

• Video Management Systems (storage analytics) –
  Physicalhomeland security
                                                                                                                                   66
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
AudioVideo Conferencing

Immersive
-To work within projection-
based Virtual Reality Systems                                                                                       CXOs
                                                                                                                    (Immersive)
Room
-The most common
                                                                                                                               Mid
tool for                                          Video                                                                        Management
Teleconferencing                               Conferencing
                                                                                                                               (Room)


Endpoint                                                                                                            Employees
–”Skype like”                                                                                                       (Endpoint)


                                                                                                                                      67
         Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Video Collaboration in Practice



  Video
Conference


                                                                                                                                   CDN




       http://www.clalit.co.il/HE-IL/Family/parents/video+rofe+online.htm                                                                68
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Video e-Learning –Next Generation Customer Care Routing



                                                                                                                                          Choose your next
                                                                                                                                          choice on-the-fly




Video evolves according to choices made


                 http://blogs.wsj.com/speakeasy/2010/10/25/andy-grammers-keep-your-head-up-applies-choose-your-
                                               own-adventure-logic-to-music-videos/                                                                  69
              Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Social Video + CDN (Content Delivery Network)



                                                                                                                             Powered by
                                                                                                                             Matrix CDN




                                                                                                                              Powered by
                                                                                                                              NAVIGAYA




                                    Source: http://www.shmone.co.il/                                                                70
 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Digital Signage



                                                      Live
                                                   streaming




                                                                Batch
                                                             streaming


                                                                 On-line
                                                               Integration


                                      Integration
                                     to backoffice
          Source: http://www.diskin.com/he/content/index_b_06.html                                                          71
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Managing Bandwidth For Video




1. Buy more
   bandwidth

                              2. Implement QOS


                                                                           3. Use adaptive
                                                                              technologies


                                                                                                                       4. Call Admission
                                                                                                                          Control (CAC)
                                                                                                                                           72
          Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Video Optimization -Medianet


          Deliver the Network Optimized for Video Anytime, Anywhere, Any Device




                                      Video, Voice and Data Applications


                             Media Services Interface (end-point and Proxy) APIs




                    Plug &                                                                        Media
                     Play                             Multicast
                                                                   NetFlow                       Monitoring
                                                                             RSVP
                                                  NBAR




                                                                                                                                   Management
                                                                             IPSLA




                                                                                                                        Security
                                                   SAF
                              Media                          PfR       QoS
                                                                                          Media
                             Services                                                    Awareness
                              Proxy
                                                             Media
                                                             Optimi-
                                                             zation


                                                      Source: Cisco
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
The Past, Present, and Future of Enterprise Outward Video
                                        Past                                              Present                                       Future
 Creation         One day of shooting with a                                  video production to                            Empowerment of the
  (cost?)             professional crew.                                          the masses.                                    individual
                           (100K$)                                                  (100$)                                          (1$)

Management           VHS tapes and DVDs                                     Dozens of proprietary                              Big data, access
                   required physical space…                                  and public Online                                  management,
                     Some early forms of                                      Video Platforms.                                multiple “instances”
                      searching programs                                       Search still is a                                of each video
                                                                                 challenge
 Delivery                    Television;                                         Different format,                            Videos will still need
                           Mailing out tapes                                      resolution, and                             to be viewed across
                                                                                    bandwidth                                     all devices.
                                                                                   requirements
 Tracking          Broadcasts and mails had                                  Views, what devices                             how effective a video
                      significant tracking                                  are viewing the video,                           is by sales person, by
                          challenges.                                        where in the world                                   customer, by
                                                                                  and more.                                      campaign, etc.
                                Source: http://www.reelseo.com/enterprise-video/                                                                 74
            Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Video Recommendation




                                                                                                                            75
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Tele-Conferencing- Israeli Market Positioning 1Q12

                                                                                    Cisco




                                                                                                            Polycom
      Local Support




                      Adobe                                                                  Logitech
                                                                                            (LifeZise)                         Player
                           Radvision
                                                                                                                               Worldwide
                           Avaya                                                                                               Leader
                                                                 Microsoft
                        Emblaze
                                                                      Vidyo
                      Citrix             AT&T
                               Google Alcatel-Lucent
                                    ooVoo                                                       Skype
                                                    Market Presence

                                                                                                                                   76
   Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
What should be asked before going to the board with a capital request?


1. How much impact do our facilities have on the availability of
important business applications?
2. How much more capacity could we get from existing facilities?
3. What does future demand for data center capacity look like
and how can virtualization affect it?
4. How can we improve capacity allocation by tier?
5. How can we incorporate modular designs into our data center
footprint?
6. What is the complete list of key design decisions and their
financial impact?



                                                                                                                                    77
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
virtualized platforms: A
   way to limit data center capacity requirements




                                     Source: McKinsey & Company                                                             78
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Reducing Capital Costs by Moving Into Lower-Tier Facilities




                                            Source: McKinsey & Company                                                             79
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Israeli Data Center Statistics


 350m2                                      • Average room size (brutto)



    67%                                     • Average size used for IT (netto)


                                            • Host all servers? (Prod.,Test, Dev.
Yes (75%)                                     Backup etc. )

 1.4m2                                      • Average DC room size per IT staff
 0.18m2                                     • Average DC room size per employee

                                                       Source: STKI                                                          80
 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Data Center Outsourcing Benchmark


  A research and service providers’
  benchmark in the Israeli market.
    By: Pini Cohen, Shahar Geiger Maor



Expected publication: May 2012
                 Stay posted for more news…

                                                                                                                                 81
     Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Output Management




                                                                                                                            82
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Output Trends

   Digital Mailing


Printing independence



 Interactive forms and multimedia


 Personalization

12 ‫מרץ‬   Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                                     83
Tablets Replace Paper

• Businesses and governments are trading paper for tablets, saving
  money and promoting efficiency
• In the U.S., airlines are now allowed to rely on tablets instead of
  onboard paper manuals, checklists and charts
• Amsterdam city council members now get iPads, retrieving
  documents through a custom app that other Dutch government
  agencies are set to adopt




                                                                                                                                     84
         Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Next Generation Outputs


Interactive                                                                                                              Voice:
                                                                                                                          MP3




    Accessible

                                                                                           Video



    Mobile friendly


  12 ‫מרץ‬   Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                                       85
Banks ‘Push‘ vs. Customers ‘Pull‘ Model

                                                                               Pull
Push                                                                           •Ownership of services & value
•Control electronic services to                                                network shifts to customer
employees and customers.                                                       •P2P computing & networks
•Choose whom to allow into                                                     develop —secure, managed,
proprietary networks.                                                          controlled, powerful
•Own the value networks.                                                       •Organizations forced to deliver
•Set rules, pace and conditions for                                            into consumer computing domains
interaction with them.                                                         •Architecture extends to consumer
•Pre-defined, prepackaged services.                                            computing environment —
•Establish the parameters for you                                              ―customer centric gets defined
to modify or access your                                                       •―Delivery models‖ subsumed into
information or services.                                                       ―consumption models‖ -ambient
                                                                               findability
                                                                               •Building blocks —contentaware,
                                                                               data, Web Services, process
                                                                               models, orchestration services.




                                                                                                                                   86
       Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Output Management-Israeli Market Positioning 1Q12




                                                             Consist
       Local Support




                                                 Adobe
                                                                                     Autofont                                   Player


                                                                                                                                Worldwide
                                                                                                                                Leader


                       ISIS-Papyrus              Aman/Beeri


                                      HP

                                                     Market Presence

                                                                                                                                    87
    Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Printers-Israeli Market Positioning 1Q12

                                                                              Samsung

                                                                                                                   HP
                                                       Lexmark
   Local Support




                                                                               Brother                                      Player

                               Canon                                                                                        Worldwide
                                                                                                                            Leader


                                                    Epson
                                               Ricoh      Xerox




                                                 Market Presence

                                                                                                                                88
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Market Data




                                     http://xkcd.com/657/large/                                                             89
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Networking Staffing


                                    25’th percentile 50’th percentile 75’th percentile                                                  Average

  “Active” ports as of
    total ports (%)                           58%                                63%                               78%                   66%
  Total ports per 1
  networking staff                            917                              1200                               2000                  2613
 member (voice+data)
 Ports per 1 employee
                                             1.33                               1.93                               2.82                 2.12
    Employees per
  1 Networking staff                          561                                775                              1125                  1119
      member
Data networking : voice
 networking staff ratio                    1.13:1                              1.5:1                                 2:1                1.7:1

                                                                   Source: STKI                                                             90
            Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Networking Budget ~ 10% of IT OpEx




                    Source: The Corporate Executive Board Company                                                           91
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Constant Staffing Mix Within IT




                    Source: The Corporate Executive Board Company
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
                                                                                                                            92
Endpoints




http://www.wired.com/wired/archive/14.07/images/found.jpg graphic
   Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of
                                                                                                                       93
Presentation Visualization




                                                             MDM
Networking                                                                                                  Security


                                                              ollaboration




                                                                                                                              94
  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Desktop-PCs are getting old…Say Hello to the Post-PC Era
• No platform, form factor or technology will dominate.
• BYOD will remain the norm.
• Component prices continue downward trend.
• Off-Desktop devices consume more of the digital
  experience
• Employees will use many devices, syncing data between
  them via the cloud.




                                                                                                                                      95
                                                      Source: Bent Objects
          Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
2012 game changers :




                                  • Consumerization of IT
                                  • Bring your own Device (BYOD)
                                  • Changing Client Architectures
                                                      Tablet computers, smartphones,
                                                          4G, social media, gaming,
                                                           desktop virtualization,
                                                     and other technology innovations
                                                        are bringing possibilities and
                                                     challenges to IT and the workplace
                                                               like never before


                                                                                                                            96
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Experience Economy > Age of the Customer

• From 1900 to 1960, Age of Manufacturing , if you owned a factory,
  you owned the market.

• From 1960 to 2000, Age of Distribution, if you owned the
  distribution channels, you owned the market.

• From 2000 to 2011, Age of Information, if you owned the
  information, you owned the market.

• From 2011, Age of the Customer, if you engage the customer, you
  own the market


                                                                                                                                      97
          Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Why Mobile?




    Communication                              Telecom: fire,                                                                        Mobile Phone
                                                                                        Telephone
     –A basic need                                letters…                                                                             Device




• Population is spreading all          • Starting to close the gap.                • Large distances, real-time.               • Always with me, cost
  over the world.                                                                    Closer to the end-user                      effective, muti-
                                                                                                                                 purpose device, carrier-
• Distance is becoming a               • Short distances, no real-                 • Static                                      side infrastructure,
  communication issue                    time                                                                                    Anywhere-to-anywhere
                                                                                                                                 connection and more…




                                                                                                                                                      98
                  Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Mobile Outsourcing



                                                                                 Social
                                                           Trade
                                         Fun                                                              Tools
                Pics

                                                                                                                      Gesture
  Touch



CalendarMail

                                                                                                                Location
                                                                                                               Ⅱ

                                                                                                      Δ
         Voice                                                                                            Video
                              Content                                             Access
                                                          Search
                                                                                                                                99
    Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Using Mobile Apps more then 10 times a day




                                                                                                                            100
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Using Mobile App to Make a Purchase/ for Client Service




                                                                                                                                  101
      Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Decision Making in the Digital World



                                                                   Seeking Intelligence,
                                                                      Not Content




                         - Real time




60% of purchase decisions
  being made before the
consumer stepped into the
         store!!!
                                                                                                                                    102
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Many clients are asking about how to:


                                                Set a solid
                                       Digital Customer Experience
                                                                                                                MDM

                                                                                                     craft mobile policies
           how to develop
                                                              manage the devices
           mobile custom apps?

                                                                                  Secure their
                              select mobile devices                               mobile content




                                                                                                                             103
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Answers are right here


                           Who is                                                   IT or Business?
                Digital Customer Experience                                         IT higher involvement
                    Owner in enterprise


how to develop
mobile custom apps?
                                               Native or Hybrid Apps



        select mobile devices                                People wants:



                                                             Enterprises wants:




                                                                                                                                       104
           Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
What Do People Want ?




                                                                                                                            105
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Three OSs, Three Ecosystems?




                                                        Source: IDC                                                         106
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Internet vs. Mobile Data Traffic

                           Global Internet Traffic Growth (Fixed)
300%

200%

100%

 0%
       1997                     1998                       1999                       2000                       2001               2002
                                Global Mobile Data Traffic Growth
200%
150%
100%
50%
 0%
       2009                      2010                       2011                        2012                     2013                2014
                                                                                                               (estimate)
                                                      Source: Cisco VNI 2012                                                           107
        Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Mobile Statistics


                                                          – The number of active mobile broadband
                                                          subscriptions worldwide in 2011.



                                                          –The estimated number of mobile subscriptions
                                                          worldwide in 2011.




                                                          –Percentage of handsets shipped globally in 2011
                                                          that included a web browser.




                                                         – Apple iPad’s share of global tablet web traffic
                                                         in December.

Source: http://royal.pingdom.com/2012/01/17/internet-2011-in-numbers/                                                       108
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Different Devices, Different Purpose


                                                                           Work
               Creation
                                                                          Change


                                                                             Flow
              Consumption




                                                                       Experience




                                                                                                                            109
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
List of Tablet Use Cases

      How do you useplan to use your tablet? (Please select all that apply)


       Surfing the web

Writing or reading mail

       Watching video

     listening to music

     social media sites

                 Gaming

                                 0%          10%          20%          30%         40%          50%          60%          70%           80%   90%

                                                           Source: Yankee Group                                                                 110
            Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Bring Your Own Device

                                         Tablets occupy a middle
                                         ground where
                                         consumption and creation                • Easier and more supportable
                                         of data has a wide range.               • More flexible device capability
                                         BYOD needs to be a                           Virtualization
                                         consideration once
                                         interest enters this zone.
BYOD                                                                                                                                                           Full
                                                  Data Consumption and Creation Continuum
Light                                                                                                                                                         BYOC
                                         There are two potential
                                         paths that can be followed
                                         at this point.
                                                                                       Integration
                                                                                 • Full network
- Light data consumption                                                         • Harder to support (e.g. local                     - Heavy data consumption
- Minimal data creation                                                            rather than centralized apps)                     - Local data creation
                                                                                 • Limited by device capabilities
                                                                                                                                     Final steps:
                                                                                                                                     - Full BYOD policy created by
                                         Past this line, infrastructure,                                                               all business groups.
                                         security, and operations                                                                    - TCO calculation in
                                         pillars must be considered in                                                                 conjunction with Finance.
                                         order to support advanced
                                         data creation.



                                                     Source: Info-Tech Research Group                                                                   111
                   Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services
Trends In Infrastructure Services

Contenu connexe

Similaire à Trends In Infrastructure Services

For netapp haifa 2012 v3
For netapp haifa 2012 v3For netapp haifa 2012 v3
For netapp haifa 2012 v3
Pini Cohen
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
OracleIDM
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
Ariel Evans
 
2010 STKI Summit Enterprise Applications, BI and KM Trends
2010 STKI Summit Enterprise Applications, BI and KM Trends2010 STKI Summit Enterprise Applications, BI and KM Trends
2010 STKI Summit Enterprise Applications, BI and KM Trends
guest3dd76e
 
Enterprise Applications, Analytics and Knowledge Management Trends 2013
Enterprise Applications, Analytics and Knowledge Management Trends 2013Enterprise Applications, Analytics and Knowledge Management Trends 2013
Enterprise Applications, Analytics and Knowledge Management Trends 2013
Einat Shimoni
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014
Ariel Evans
 
Ideal-Analytics - Introduction to Version 3.3
Ideal-Analytics - Introduction to Version 3.3Ideal-Analytics - Introduction to Version 3.3
Ideal-Analytics - Introduction to Version 3.3
Yamika Mehra
 

Similaire à Trends In Infrastructure Services (20)

For netapp haifa 2012 v3
For netapp haifa 2012 v3For netapp haifa 2012 v3
For netapp haifa 2012 v3
 
Security Summit July 2009
Security Summit  July 2009Security Summit  July 2009
Security Summit July 2009
 
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalStki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
 
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalStki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
 
STKI Summit 2013 Presentation
STKI Summit 2013  PresentationSTKI Summit 2013  Presentation
STKI Summit 2013 Presentation
 
DLP Trends -Dec 2010
DLP Trends -Dec 2010DLP Trends -Dec 2010
DLP Trends -Dec 2010
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Stki Summit 2010 Infra Services V8
Stki Summit 2010  Infra Services  V8Stki Summit 2010  Infra Services  V8
Stki Summit 2010 Infra Services V8
 
Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
 
כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2
 
2010 STKI Summit Enterprise Applications, BI and KM Trends
2010 STKI Summit Enterprise Applications, BI and KM Trends2010 STKI Summit Enterprise Applications, BI and KM Trends
2010 STKI Summit Enterprise Applications, BI and KM Trends
 
2010 Enterprise Applications, BI & KM Trends
2010 Enterprise Applications, BI & KM Trends2010 Enterprise Applications, BI & KM Trends
2010 Enterprise Applications, BI & KM Trends
 
Enterprise Applications, Analytics and Knowledge Management Trends 2013
Enterprise Applications, Analytics and Knowledge Management Trends 2013Enterprise Applications, Analytics and Knowledge Management Trends 2013
Enterprise Applications, Analytics and Knowledge Management Trends 2013
 
Cloud Security by CK
Cloud Security by CKCloud Security by CK
Cloud Security by CK
 
Sigal summit 2014 final
Sigal summit 2014 finalSigal summit 2014 final
Sigal summit 2014 final
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014
 
Ideal-Analytics - Introduction to Version 3.3
Ideal-Analytics - Introduction to Version 3.3Ideal-Analytics - Introduction to Version 3.3
Ideal-Analytics - Introduction to Version 3.3
 
Cloud cc security
Cloud cc securityCloud cc security
Cloud cc security
 

Plus de Ariel Evans (15)

infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 delivery
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyber
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networking
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014
 
Printing om 2014
Printing om 2014Printing om 2014
Printing om 2014
 
Secure develpment 2014
Secure develpment 2014Secure develpment 2014
Secure develpment 2014
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014
 
Pini sigal Summit 2014 final
Pini sigal  Summit 2014 finalPini sigal  Summit 2014 final
Pini sigal Summit 2014 final
 
Output management 2013
Output management 2013 Output management 2013
Output management 2013
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratios
 
Mdm byod survey results 2013
Mdm byod survey results 2013Mdm byod survey results 2013
Mdm byod survey results 2013
 
IDM & IAM 2012
IDM & IAM 2012IDM & IAM 2012
IDM & IAM 2012
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 

Trends In Infrastructure Services

  • 1. Trends In Infrastructure Services Tell me and I’ll forget STKI Summit 2012 Show me and I may remember Shahar Geiger Maor, Involve me and I’ll understand VP & Senior Analyst
  • 2. Presentation Visualization MDM Networking Security ollaboration 2 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 3. End-To-End Security Project Web Security Secure WAF Browsing Gateway Application Security Information DLP Laundering Data Security Firewalls IPS NAC Network Security Source: Taldor 3 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 4. TEAMS Project (A3) Source: Malam-Team 4 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 5. The New Training Center-IDF Source: Bynet 5 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 6. Presentation Visualization -Networking MDM Networking Security ollaboration 6 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 7. STKI Index-2011 –Top Networking Queries Data, 29% Collaboration, 27% Market Players, 22% Trends, 9% ADC, 4% Mobile, 4% Misc., 4% 7 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 8. IPv6 8 Source: http://i.imgur.com/l371J.jpg Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 9. Internet Protocol Version 6 (IPv6) You are here 9 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 10. IPv6 Market Status • Large orgs., cloud service providers, US government –All support IPv6. • IT: All major hardware and software providers support IPv6. • Israel: Sector IPv6 Awareness Service Providers / Telecommunications / Global Organizations / Other Organizations 10 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 11. Almost All Agree: IPv6 Is Critical http://www.computerworld.com.au/slideshow/395230/most_enterprises_will_ipv6_by_2013_survey/ 11 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 12. IPv6 Recommendations 1. Awareness, awareness, awareness 2. Basic (internal IT) gap analysis 3. Executives’ awareness 4. Thorough gap analysis (professional services) and migration plan 5. POC (taste the flavor of IPv6). 6. Future system design and purchase –IPv6 enabled 12 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 13. Presentation Visualization –Data Networking MDM Networking Security ollaboration 13 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 14. Pressure!!! 14 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 15. Key Drivers For Network Transformation • Server virtualization • Storage Convergence • East-west traffic patterns • Growth of VMs and “server sprawl” management Fabric (ˈfa-brik) n. An integrated data center network that supports servers, storage, appliances and switches on a large scale. It provides a simple way to reach everything in the data center using location-independent, Layer 2 addressing that creates a flat network among components. It borrows features from routed network including dynamically selecting the shortest and best route for connections, converges very quickly when the network changes, uses all the links in the network and efficiently handles broadcast and multicast traffic. It has high reliability with very fast convergence when a failure occurs. It minimizes packet discards or is lossless and has extremely low end-to- end latency. It automatically adjusts and applies the right configuration to whatever devices connect to it. Also called Ethernet Fabric and Data Center Fabric. -Robin Layland 15 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 16. Changes In Technology Are Making Server-to-server Traffic “The” Network Issue SOA Web Application 2.0 SAAS Client Client – Server Architecture Service Oriented Architecture 25% 95% Server Server Server Server A B C Server 75% Server D DB Source: Juniper Networks 16 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 17. Today’s Network Architectures Can’t Keep Pace Source: HP Networking 17 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 18. Distributed Intelligence Details Optimized Virtual Access Layer • Today, access to the network lives in the virtual hypervisor Physical Virtual • Consumes valuable host resources • Virtual switch is offloaded to the physical Server vNIC vNIC vNIC vNIC switch • Eliminates the software switch; the advantages of a Virtual Switch distributed virtual switch plus Distributed Intelligence • Leverages Virtual Ethernet Port Aggregator (VEPA) technology NIC • Virtual NICs are offloaded to the physical NIC • Leverages Virtual Ethernet Bridging (VEB) technology • Host resources are freed up for applications • Gives 5-20% of host resources back to applications • VMs have direct I/O with the network Switch • Network simplicity; common access across entire VCS; network is managed in the network Source: Brocade 18 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 19. Three-tier Architecture & Server-to-Server Traffic Three-tier Legacy Network N Unnecessary layers add hops and latency Slows performance of W 75% or more of traffic E Federated Apps & VM mobility Up to 50% of ports interconnect switches; S not servers or storage Source: HP Networking 19 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 20. Two-tier Architectures Improve Performance Simplified Two-tier Network A-Series Core N Switches with IRF IRF IRF Removes a Networking Layer to reduce CAPEX A-Series ToR Switches with IRF, IRF Virtual Connect HP Virtual Connect IRF enables a single, low W 75% or more of traffic E latency hop between up to nine server racks Virtual Connect provides direct flight connections S within an HP BladeSystem Rack Servers Blade Servers Source: HP Networking 20 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 21. The Fabric Architecture Core Switches All of the TOP of Racks are a single high capacity Fabric!!! Aggregation switches Firewall Access switches Fabric Switches 4 Pod 1 Pod 2 Source: Juniper Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
  • 22. Intelligent L2 Domains POD Evolution Inter-POD Connectivity across L3 Shipping OTV Failure Boundary Preservation Failure IP Cloud Boundary Core L3 L3 Aggregation … L2 vPC … FabricPath… … … Access L2 vPC Servers STP+ vPC/VSS FabricPath STP NIC Teaming 16x ECMP Enhancements Simplified loop- Low Latency / Lossless Bridge free trees MAC Scaling Assurance 2x Multi-pathing Operational Flexibility Shipping Shipping Shipping Source: Cisco Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
  • 23. Wireless 23 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 24. Wireless Trends • Welcome, IEEE 802.11ac… • Wireless as a service • Wireless IPS (Intrusion Prevention System) • All vendors must have the following features: 1. Support for 802.11a/b/g/n 2. Controller-less WiFi network 3. A network management application 4. Standards-based security with 802.1X through WPA2 5. Provider can deliver network services (such as voice, video and location). 24 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 25. Positioning Methodology Israeli vendor rating – Market positioning is focused on the enterprise sector (not SMB)  X axis: Market penetration (sales + installed base+ clients perspective)  Y axis: localization, support, Local R&D center, number and quality of SIs, etc.  Worldwide leaders are marked based on global positioning Vendors to watch: Israeli market newcomers STKI positioning represents the current Israeli market and not necessarily what we recommend to our clients 25 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 26. xxx- Israeli Market Positioning 1Q12 Vendor B Local Support Player Worldwide Leader Vendor A Market Presence 26 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 27. Data Center Networking- Israeli Market Positioning 1Q12 Local Support Cisco Juniper Player Alcatel-Lucent Worldwide Leader Avaya HP Brocade IBM Market Presence 27 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 28. Campus Networking- Israeli Market Positioning 1Q12 Cisco Local Support Alcatel-Lucent Player Extreme HP Worldwide Leader Avaya Juniper Dell Enterasys Brocade Market Presence 28 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 29. Wireless LAN- Israeli Market Positioning 1Q12 Cisco Local Support Player Motorola Worldwide Leader HP Aruba Alcatel-Lucent Juniper Aerohive Ruckus Enterasys Market Presence 29 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 30. 30 Source: Bent Objects Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 31. Application Delivery Controllers Mega trends: •Cloud computing •Virtualization – desktop, storage, network •Mobility • Security •Datacenter consolidation 31 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 32. adc Source: http://www.enterprisemanagement.com/research/asset_download.php?id=2110 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 33. Key Drivers for Data Center Class WAN Optimization • Disaster recovery Protect more data across longer distances over converged networks • Data center consolidation / cloud Data and server placement not impacted by WAN performance • Server and storage centralization Users can be farther from resources • Real-time collaboration Improve quality of unified communications (voice/video) • Virtualization Multisite VDI and VM migration impacted by poor WAN quality 33 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 34. Application Delivery Controllers- Israeli Market Positioning 1Q12 Radware Local Support F5 Player Citrix Worldwide Leader A10 Cisco Barracuda Market Presence 34 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 35. WAN Optimization- Israeli Market Positioning 1Q12 Local Support Player Citrix Riverbed Worldwide Leader F5 Cisco Silver Peak Radware Juniper Bluecoat Market Presence 35 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 36. Presentation Visualization -Collaboration MDM Networking Security ollaboration 36 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 37. 37 Source: http://collaborationbenefits.blogspot.com/2010/04/intersection-of-unified-communications_30.html Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 38. Collaboration Basics Source: Cisco Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
  • 39. Email And Phone Are Still The Most Common Way To Interact With Customers What are the top methods by which your employees communicate with your customers, suppliers and partners? Source: Information Week 39 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 40. Drivers Of Unified Communication Projects 1. Improve employee collaboration 2. Improve employee efficiency 3. Improve communications with customers 4. Create a more mobile workforce 5. Legacy PBX retirement 6. Upgrade technology to meet business needs/stay on par with peers 7. Reduce operation expenditures 8. Reduce travel expenses 9. Decrease sales cycle times 40 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 41. Reasons for Not Using Unified Communications 1. Other projects have a higher priority 2. No definitive business value 3. Lack in-house expertise 4. UC technology is too expensive 5. Sizeable investment in current communications platform 6. Auxiliary costs are too expensive (e.g. WAN bandwidth, infrastructure upgrades) 7. Deployments are too complex 41 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 42. Cloud Based UCC –A Very Good Step Forward 1. B2B: connect to business partners, customers, and individuals outside corporate network 2. Great for small and medium businesses 3. Help in reducing security issues (…but raise others) 4. Standardization 42 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 43. What’s Wrong? We are still trying to automate Multitude of vendors leads to collaboration…needs to be “non-immersive” experience people centric Insufficient focus on how IT driven without alignment to people collaborate today and business priorities what real pain points are Not treating Collaboration as a Many of the benefits in UCC do CEO Agenda Item not apply locally 43 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 44. How To Do It Right Step 1: Identify Primary Business Imperatives Time-to- Market Innovation Talent Acquisition and Retention Customer Cost Loyalty Quality Control Sales Effectiveness Cultural Productivity Evolution Business Scaling and Growth 44 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 45. How To Do It Right Step 2: Associate Relevant Stakeholders and Processes: Innovation Accelerating the generation and development of new ideas into new or improved products, services and processes 45 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 46. How To Do It Right Step 3: Analyze Existing Collaboration Patterns 46 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 47. How To Do It Right Step 4: Execute Collaboration Programs:  online communities  blogs and microblogs  online shared workspaces  “click-to-connect”  collaboration spaces  comprehensive research repository  connecting experts …Did we mention LinkedIn? 47 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 48. The ROI Problem Elements of ROI Calculation Capital Operational Alternative TCO expenditures expenditures cost Feature Job Employee adoption Training UC benefit satisfaction productivity timeline Increased sales due to increased collaboration 48 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 49. 65% Of Orgs Have Implemented UC Capabilities in 50% or Less of Total Users Source: Information Week 49 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 50. Presentation Visualization -Customer Center MDM Networking Security ollaboration 50 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 51. CRM Maturity Model Business Value Analytical Social CRM Value investment CRM Listening Web Mobile channel channel platforms projects projects IT oriented Investment in order Project to optimize costs Business oriented Operational Project CRM/XRM Commodity investment *Size of figure = complexity/ Regulative cost of project investment Using Implementing Future usage Market Maturity Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 52. Accelerating Customer Experience CRM 1.0 CRM 2.0 CRM 3.0 Managing Managing influencers Engaging Individual & ‘tribes’ & Influencing customers Customer A Customer Customer B C The focus shift: Transactions Interactions Experience Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
  • 53. What is Social CRM • Social CRM can be used for 2 purposes: • Listening and Learning: Using the power of personal networks to gain intelligence on customers, their habits, interests • Brand auditing • Awareness of campaigns success/failure • Crowdsourcing (new products, design ideas) • Interacting and Engaging: New channel for customer interactions (sales, service, marketing) • Social CRM projects will be short / simple. Companies will grow into it (by using social CRM modules within CRM apps) or SaaS- based products. The hardest part will be the “people” and “processes” part, change management. 53 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 54. Power To The People – Is It Too Much Power??? • Social media criticism makes Gap dumps new logo forces it to revert back to old logo 54 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 55. Social Media Projects Maturity (Source: Altimeter Group) 55 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 56. Customer Care Trends There’s Increasingly no place unpredictable to hide environmental online events The age of self From help, paranoia ‘push’ to and advice ‘pull’ seeking The rise The agile and of the asset-less any x organization customer (…cloud) 56 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 57. Approaching (Interacting with) Customers (…Too often, digital marketing efforts target only younger customer segments) Source: McKinsey Global Survey 57 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 58. Key Benefits That Can Influence Consumers To Use a New Form of Payment Source: Javelin Strategy & Research 58 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 59. Heavy Duty Phone Systems For Trading Rooms Directional and time indication Call History Modularity of Components Call Directory Backpack Extensibility Deskshare Source: IPC Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
  • 60. Unified Communications - Israeli Market Positioning 1Q12 Cisco Local Support Player Avaya Microsoft Worldwide Leader Digium IBM Alcatel-Lucent Siemens EC Interactive Intelligence Market Presence 60 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 61. Customer Center Infrastructure - Israeli Market Positioning 1Q12 Local Support Player Cisco Avaya Worldwide Leader Aspect Alcatel-Lucent Cosmocom Interactive Intelligence Siemens EC Market Presence 61 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 62. IP Telephony - Israeli Market Positioning 1Q12 Local Support Cisco Player Alcatel-Lucent Tadiran Telecom Avaya Worldwide Leader Digium Microsoft Siemens EC Market Presence 62 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 63. Presentation Visualization -Video MDM Networking Security ollaboration 63 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 64. Global Mobile Data Traffic 100% 90% 80% 70% VoIP 60% Gaming 50% File Sharing 40% M2M 30% Data 20% Video 10% 0% 2011 2012 2013 2014 2015 2016 Source: Cisco VNI 2012 64 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 65. Enterprise Video Usage Source: Business Video Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
  • 66. Israeli Market Status • Videoconferencing –Mature collaboration tool • E-learning –Common in global orgs. Good as an enrichment for existing tools • Video streaming and CDN –Specific for content creators (…Still waiting for enterprise YouTube) • Digital signage –For special purposes • Video Management Systems (storage analytics) – Physicalhomeland security 66 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 67. AudioVideo Conferencing Immersive -To work within projection- based Virtual Reality Systems CXOs (Immersive) Room -The most common Mid tool for Video Management Teleconferencing Conferencing (Room) Endpoint Employees –”Skype like” (Endpoint) 67 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 68. Video Collaboration in Practice Video Conference CDN http://www.clalit.co.il/HE-IL/Family/parents/video+rofe+online.htm 68 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 69. Video e-Learning –Next Generation Customer Care Routing Choose your next choice on-the-fly Video evolves according to choices made http://blogs.wsj.com/speakeasy/2010/10/25/andy-grammers-keep-your-head-up-applies-choose-your- own-adventure-logic-to-music-videos/ 69 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 70. Social Video + CDN (Content Delivery Network) Powered by Matrix CDN Powered by NAVIGAYA Source: http://www.shmone.co.il/ 70 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 71. Digital Signage Live streaming Batch streaming On-line Integration Integration to backoffice Source: http://www.diskin.com/he/content/index_b_06.html 71 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 72. Managing Bandwidth For Video 1. Buy more bandwidth 2. Implement QOS 3. Use adaptive technologies 4. Call Admission Control (CAC) 72 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 73. Video Optimization -Medianet Deliver the Network Optimized for Video Anytime, Anywhere, Any Device Video, Voice and Data Applications Media Services Interface (end-point and Proxy) APIs Plug & Media Play Multicast NetFlow Monitoring RSVP NBAR Management IPSLA Security SAF Media PfR QoS Media Services Awareness Proxy Media Optimi- zation Source: Cisco Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 74. The Past, Present, and Future of Enterprise Outward Video Past Present Future Creation One day of shooting with a video production to Empowerment of the (cost?) professional crew. the masses. individual (100K$) (100$) (1$) Management VHS tapes and DVDs Dozens of proprietary Big data, access required physical space… and public Online management, Some early forms of Video Platforms. multiple “instances” searching programs Search still is a of each video challenge Delivery Television; Different format, Videos will still need Mailing out tapes resolution, and to be viewed across bandwidth all devices. requirements Tracking Broadcasts and mails had Views, what devices how effective a video significant tracking are viewing the video, is by sales person, by challenges. where in the world customer, by and more. campaign, etc. Source: http://www.reelseo.com/enterprise-video/ 74 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 75. Video Recommendation 75 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 76. Tele-Conferencing- Israeli Market Positioning 1Q12 Cisco Polycom Local Support Adobe Logitech (LifeZise) Player Radvision Worldwide Avaya Leader Microsoft Emblaze Vidyo Citrix AT&T Google Alcatel-Lucent ooVoo Skype Market Presence 76 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 77. What should be asked before going to the board with a capital request? 1. How much impact do our facilities have on the availability of important business applications? 2. How much more capacity could we get from existing facilities? 3. What does future demand for data center capacity look like and how can virtualization affect it? 4. How can we improve capacity allocation by tier? 5. How can we incorporate modular designs into our data center footprint? 6. What is the complete list of key design decisions and their financial impact? 77 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 78. virtualized platforms: A way to limit data center capacity requirements Source: McKinsey & Company 78 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 79. Reducing Capital Costs by Moving Into Lower-Tier Facilities Source: McKinsey & Company 79 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 80. Israeli Data Center Statistics 350m2 • Average room size (brutto) 67% • Average size used for IT (netto) • Host all servers? (Prod.,Test, Dev. Yes (75%) Backup etc. ) 1.4m2 • Average DC room size per IT staff 0.18m2 • Average DC room size per employee Source: STKI 80 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 81. Data Center Outsourcing Benchmark A research and service providers’ benchmark in the Israeli market. By: Pini Cohen, Shahar Geiger Maor Expected publication: May 2012 Stay posted for more news… 81 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 82. Output Management 82 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 83. Output Trends Digital Mailing Printing independence Interactive forms and multimedia Personalization 12 ‫מרץ‬ Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 83
  • 84. Tablets Replace Paper • Businesses and governments are trading paper for tablets, saving money and promoting efficiency • In the U.S., airlines are now allowed to rely on tablets instead of onboard paper manuals, checklists and charts • Amsterdam city council members now get iPads, retrieving documents through a custom app that other Dutch government agencies are set to adopt 84 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 85. Next Generation Outputs Interactive Voice: MP3 Accessible Video Mobile friendly 12 ‫מרץ‬ Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 85
  • 86. Banks ‘Push‘ vs. Customers ‘Pull‘ Model Pull Push •Ownership of services & value •Control electronic services to network shifts to customer employees and customers. •P2P computing & networks •Choose whom to allow into develop —secure, managed, proprietary networks. controlled, powerful •Own the value networks. •Organizations forced to deliver •Set rules, pace and conditions for into consumer computing domains interaction with them. •Architecture extends to consumer •Pre-defined, prepackaged services. computing environment — •Establish the parameters for you ―customer centric gets defined to modify or access your •―Delivery models‖ subsumed into information or services. ―consumption models‖ -ambient findability •Building blocks —contentaware, data, Web Services, process models, orchestration services. 86 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 87. Output Management-Israeli Market Positioning 1Q12 Consist Local Support Adobe Autofont Player Worldwide Leader ISIS-Papyrus Aman/Beeri HP Market Presence 87 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 88. Printers-Israeli Market Positioning 1Q12 Samsung HP Lexmark Local Support Brother Player Canon Worldwide Leader Epson Ricoh Xerox Market Presence 88 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 89. Market Data http://xkcd.com/657/large/ 89 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 90. Networking Staffing 25’th percentile 50’th percentile 75’th percentile Average “Active” ports as of total ports (%) 58% 63% 78% 66% Total ports per 1 networking staff 917 1200 2000 2613 member (voice+data) Ports per 1 employee 1.33 1.93 2.82 2.12 Employees per 1 Networking staff 561 775 1125 1119 member Data networking : voice networking staff ratio 1.13:1 1.5:1 2:1 1.7:1 Source: STKI 90 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 91. Networking Budget ~ 10% of IT OpEx Source: The Corporate Executive Board Company 91 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 92. Constant Staffing Mix Within IT Source: The Corporate Executive Board Company Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
  • 93. Endpoints http://www.wired.com/wired/archive/14.07/images/found.jpg graphic Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of 93
  • 94. Presentation Visualization MDM Networking Security ollaboration 94 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 95. Desktop-PCs are getting old…Say Hello to the Post-PC Era • No platform, form factor or technology will dominate. • BYOD will remain the norm. • Component prices continue downward trend. • Off-Desktop devices consume more of the digital experience • Employees will use many devices, syncing data between them via the cloud. 95 Source: Bent Objects Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 96. 2012 game changers : • Consumerization of IT • Bring your own Device (BYOD) • Changing Client Architectures Tablet computers, smartphones, 4G, social media, gaming, desktop virtualization, and other technology innovations are bringing possibilities and challenges to IT and the workplace like never before 96 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 97. Experience Economy > Age of the Customer • From 1900 to 1960, Age of Manufacturing , if you owned a factory, you owned the market. • From 1960 to 2000, Age of Distribution, if you owned the distribution channels, you owned the market. • From 2000 to 2011, Age of Information, if you owned the information, you owned the market. • From 2011, Age of the Customer, if you engage the customer, you own the market 97 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 98. Why Mobile? Communication Telecom: fire, Mobile Phone Telephone –A basic need letters… Device • Population is spreading all • Starting to close the gap. • Large distances, real-time. • Always with me, cost over the world. Closer to the end-user effective, muti- purpose device, carrier- • Distance is becoming a • Short distances, no real- • Static side infrastructure, communication issue time Anywhere-to-anywhere connection and more… 98 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 99. Mobile Outsourcing Social Trade Fun Tools Pics Gesture Touch CalendarMail Location Ⅱ Δ Voice Video Content Access Search 99 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 100. Using Mobile Apps more then 10 times a day 100 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 101. Using Mobile App to Make a Purchase/ for Client Service 101 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 102. Decision Making in the Digital World Seeking Intelligence, Not Content - Real time 60% of purchase decisions being made before the consumer stepped into the store!!! 102 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 103. Many clients are asking about how to: Set a solid Digital Customer Experience MDM craft mobile policies how to develop manage the devices mobile custom apps? Secure their select mobile devices mobile content 103 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 104. Answers are right here Who is IT or Business? Digital Customer Experience IT higher involvement Owner in enterprise how to develop mobile custom apps? Native or Hybrid Apps select mobile devices People wants: Enterprises wants: 104 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 105. What Do People Want ? 105 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 106. Three OSs, Three Ecosystems? Source: IDC 106 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 107. Internet vs. Mobile Data Traffic Global Internet Traffic Growth (Fixed) 300% 200% 100% 0% 1997 1998 1999 2000 2001 2002 Global Mobile Data Traffic Growth 200% 150% 100% 50% 0% 2009 2010 2011 2012 2013 2014 (estimate) Source: Cisco VNI 2012 107 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 108. Mobile Statistics – The number of active mobile broadband subscriptions worldwide in 2011. –The estimated number of mobile subscriptions worldwide in 2011. –Percentage of handsets shipped globally in 2011 that included a web browser. – Apple iPad’s share of global tablet web traffic in December. Source: http://royal.pingdom.com/2012/01/17/internet-2011-in-numbers/ 108 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 109. Different Devices, Different Purpose Work Creation Change Flow Consumption Experience 109 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 110. List of Tablet Use Cases How do you useplan to use your tablet? (Please select all that apply) Surfing the web Writing or reading mail Watching video listening to music social media sites Gaming 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Source: Yankee Group 110 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 111. Bring Your Own Device Tablets occupy a middle ground where consumption and creation • Easier and more supportable of data has a wide range. • More flexible device capability BYOD needs to be a Virtualization consideration once interest enters this zone. BYOD Full Data Consumption and Creation Continuum Light BYOC There are two potential paths that can be followed at this point. Integration • Full network - Light data consumption • Harder to support (e.g. local - Heavy data consumption - Minimal data creation rather than centralized apps) - Local data creation • Limited by device capabilities Final steps: - Full BYOD policy created by Past this line, infrastructure, all business groups. security, and operations - TCO calculation in pillars must be considered in conjunction with Finance. order to support advanced data creation. Source: Info-Tech Research Group 111 Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic