Cyber US Government Silicon Valley Opportunites and Challenges
Download
Report
Transcript Cyber US Government Silicon Valley Opportunites and Challenges
Cyber
US Government
Silicon Valley
Opportunities and Challenges
Greg Oslan, CEO, Narus
March 2011
SINET Workshop & Forum
Overview
Market
Ecosystem
Public/private partnership
Doing business in DC
Our World is a Cyber World
Cyber (Infrastructure): global network
of interdependent information
technology infrastructures,
telecommunications networks and
computer processing systems
Cyberspace (Applications): virtual
world in which individuals interact,
exchange ideas, share information,
provide social support, conduct
business, direct actions, and so on,
using this global network
The Global Internet Trend
State of the Internet in 2010
‒ 5 countries account for > 48% users
‒ BRIC – fastest growth
Mobile Internet access
pandemic
‒ Mobile Internet Users to surpass
Desktop Internet Users (IU) by 2015
‒ 2010 - 1/1.4 Billion M/D Internet
Users
‒ 2015 – 2/1.7 Billion M/D Internet
Users
Source: Morgan Stanley
M – Mobile Internet Users
D – Desktop Internet Users
Mobile Internet Computing
Entered the Mobile Internet Computing Cycle
– Web2.0+Connectivity/Presence
– Value = Unified Communications + Multimedia +
Portability
Unified Communications
– Users spend 70% of their online activity in social
networks
Multimedia Creation
– Traditional Applications are disappearing and
new ones are gaining momentum
Portability
– The virtual world: Desktop experience - ANYTIME,
ANYWHERE!
Source: Morgan Stanley
New Cyber User 2010
A new user profile is emerging
‒ Mobile Computing is about DATA not
Voice
Most popular/used application
‒ 07/09 Social Networking Users
Surpassed Email
‒ 12/09 200 Billion Minutes/Month
spent on Social Networking Sites
User generated content – breakdown
‒ Music, Games and Social to drive
Shift in Traffic Composition [2010]
Global Internet traffic (D+M) – growth
‒ Two-fold increase expected over 20112012
‒ 10.88 to 20.33 PB / Month
‒ Video surpassed P2P in 2010
Global Internet traffic (M only) – growth
‒ 14x traffic growth from 2010E to 2014E
‒ 250 KTB to 3.5MTB / Month
‒ Video to grow 39x by 2014
Trends in Infrastructure/Services
Backhauling driving infrastructure upgrades at
the edge
‒ Each tower today is oversubscribed by a factor of 50
‒ Expensive to operate with such bandwidth demands
Cloud and virtual computing platforms
‒ The preferred content distribution vehicles
Evolution of Traffic Intelligence
‒ From bits to content and users
Mobile Internet Computing
Shaping the Threat Vector Market
Mobile devices (“Computing in your pocket”)
‒ Rogue applications, portability and powerful
Application space (“Easy to hide”)
‒ Facebook: 500,000 Apps/500 M+ Downloads/Year
‒ iPhone: 360,000+ Apps/4B+ Downloads/Year
Social media threats (“Virtual reality”)
‒ Soon became the ideal platform to distribute
threat (Twitter Spam, Facebook abusive apps)
From desktop to cloud computing
‒ Cloud as a means of distribution and infection
(Google Groups, Amazon)
The Cyber Security Market
Dynamic environment
Evolving, more sophisticated threats
Security investment a balance between cost
and risk
Education still early in the lifecycle
Traditional and new technologies
The Ecosystem: A challenge
Multiple Overlapping Components
Cyber Protection
Intercept
Traffic Mgmt
Development Kit
User Interface Layer
Visualization
Centrifuge
Exalede
Forensic Analysis
SEM/SIEM
User Application Layer
Portal
Policy / Logic Layer
Forensic Analysis
Dynamic Analysis
Security / Intercept / Traffic Management
Search
Splunk
Open API
Integration
Database
Data
Analytics
Intelligent Capture Layer
DPI
Infrastructure
NetFlow
Routers
NIC
Third Party
Applications
Cyber Security and Network
Management Convergence
Guarantee
Vulnerability
Signature-Based
Static
Risk Assessment
Behavioral-Based
Indemnity
Forensics
Data
Management;
Search;
Storage
Dynamic
Network Design for Security
- Network Vulnerability
- Optimization
Anomaly-Based
SEM / SIEM
Installation
Management
Processes
Policy
Operations
SLA
New Signatures
Tools
Remediation
Government/Commercial
Partnership Required
We’re only secure when we’re all secure
‒
‒
What about .com; .net; etc?
Commercial multi-nationals vs. Government
Government too slow: typical 5 year cycle minimum
‒
‒
Priority on .mil; .gov
Long way to go
Security is end-to-end in both horizontal and vertical
planes
‒
‒
From end device to end device
From platform through application
Government Business:
Lessons Learned
Washington D.C. is a tough place to do business
Patience required; NIH and
bureaucracy high
Security clearances
Capital
Washington presence
Partnering key as most contract vehicles
are held by large prime integrators
Government: Lessons Learned
But……………….
Has serious money
High barrier to entry means higher
barrier to exit
Loyal once proven
Provides exit option
Buy early, innovative technology
Rewarding to help your country
US Government Efforts
CNCI
ESF
Public policy efforts
OSD pilots
Money being allocated ($500M
just announced)
Challenges Remain From Valley’s
Perspective
You Can Be Part of the Solution
Little VC motivation to support government
market—long sales cycles, club mentality, higher
risk, difficult to understand sales process/cycles;
US no forn bent
Money often comes with strings: IP; export;
employee make-up
Entry process difficult with poor access to contract
vehicles, inability to get new contracts
Is It Worth It?
Depends on what you are selling
Government typically first to truly invest in
new things that don’t have strong ROI
If you’re in “security or cyber,” provides early
adopter opportunity
I Believe It Is; Will take effort from both sides!