Transcript Document
LWS Professional Services
Offer for government area
Jacek Hanusik
Managing Principal CEE
LWS Professional Services
Agenda
• Company snapshot
• Service offerings for government area examples
• Conclusion
7/17/2015
2
Our Company Snapshot:
Over 34,000 Networking Professionals
Worldwide Ready To Serve You
$8.5 Billion In Revenue (FY2003)
Leadership (#1 or #2) In Many Service,
Software, And System Markets,
Including Multi-Vendor Networking
With over one hundred years of carriergrade experience to draw on, Lucent
has the deepest capability and
commitment to service in the industry
Creating new possibilities to enhance people’s lives
by transforming the way the world communicates
7/17/2015
3
Why Lucent Worldwide Services?
Document
Management
Knowledge
Quest
Network
Engagement
Methodology
Communities
Of Practice
Ask Lucent
More than
1600
consultants
and Bell Labs
engineers
LWS Consultant
Client
An
LWS Consultant Brings Expert Knowledge of 15,000+ engagements
7/17/2015
4
Powered by Bell Labs
Skilled experts in network design, reliability, performance, operations
and deployment
Models, methodologies and tools
– To optimize your network as you plan for next generation
migration
– To help you understand evolution scenarios
– To help you understand the technology and business tradeoffs
“The company [Lucent] uses a combination of
sophisticated management tools developed in its own Bell
Labs and commercial applications to administer and
optimize customer infrastructures.”
-- Current Analysis, May 2002
7/17/2015
5
Bell Labs Is Working with Sandia Labs/NISAC on DHS
priorities: model & analyze the Interdependencies Between
Telecom and Other Critical Infrastructures
Oil / Gas
Compressor
Station
Fuel
Supply
Power
Plant
Communications
End
Office
Power
Supply
Substation
Switching
Office
Traffic
Light
Substation
Hospital
Ambulance
Banking & Finance
ATM
Check
Processing
Center
Transportation
Transport
Water
Reservoir
Electric Power
Emergency
Call Center
Emergency
Services
Pension/Service
Military
Payments
Installations
Legislative Offices
Treasury Dept.
Govt. need for Telecom
experience
Contract with Bell Labs
Over 50 deliverables
7/17/2015
5.0/5.0 on Govt. Contracting
Report Card
–Critical infrastructures are Complex and
Interdependent
–They are Key to U.S. economic and national
Security
–They are Vulnerable to natural and
malevolent acts, system complexities, and
interdependencies
–There are Institutional Barriers to
information sharing
Fire Station
Bank
Federal Reserve
Challenges
Continuity
of Gov’t
Services
BL Unique Role: Provide expertise & collaborate with
government to model, simulate & analyze major critical
infrastructures
–reliability
–interdependencies
–system complexities
–disruption consequences
to minimize the impact of outages & disasters.
6
New Technology Introduction
Move to advanced technologies, setup for future growth
Goal
Business
Objective
Generate new revenue streams
Go to market faster with new or enhanced enduser services.
Approach
- Take the Guesswork out:
-Technical and Business Planning resources to forge a “bestin-class” path forward
-Extensive Interoperability Lab Testing Capability
- Tap into our vast network and operations planning
resource putting Bell Labs innovations to work
- Award-winning configuration, provisioning and
management software
- Active Participation with Industry Standardization
Organizations and technical forums
Results
- Smooth and seamless migration to new technologies,
with minimal disruption to existing networks/ services.
- New or enhanced end user services, increased
revenues
Sensitivity Analysis: FMO savings over PMO
TCO ($Ms)
$32.4
$42.4
core network level ofmeshness[0,1]
[0,1]
Avg. transport distance (miles)
% of hair-pin traffic at GSR
$72.4
$82.4
$92.4
$102.4
2.24
3
OC-12 Price Factor
ATM Traffic at ASX Edge (% of Forecast)
# Edge
Edgecollocatedwith
with Core- IP Overlay
Non-IMT ATM ports adjustment factor (%)
Bandwidth per IP circuit (kbps)
Long distance OC-48 $/mile/mo
$62.4
3.36
OC-192 Price Factor
# Edge
Edgecollocatedwith
with Core - MPLS core
$52.4
2
80%
120%
9
7
9
7
0.5
0.1
30%
20%
256
1,024
$120
400
24%
$180
600
FMO Savings Increase
16%
FMO Savings Decrease
Base Case TCO Savings = $69.75M
7/17/2015
Breadth & depth of diverse, multi-technology network
experience allows us to anticipate the future
7
Network Security Services
Protect against financial and liability risks
Assess
Goal
Business
Objective
Manage
Implement
Bell Labs Security Model for Telecom
ITU X.805
Security Layers
Applications Security
Infrastructure Security
Privacy
Integrity
Interruption
Availability
Vulnerabilities
Can Exist In Each
Layer, Plane,
Dimension
Data Confidentiality
VULNERABILITIES
Communication Security
Results
Detailed security assessment report with executable
recommendations provide a quick ROI.
Authentication
Services Security
Non-repudiation
THREATS
Access Management
Approach
Assess network defenses and/or network services
-Assesses security policy via customer’s use of technology
and culture
- Scans networks to determine “reach ability” or topology
visible to an outsider
- Scans hosts and/or services to identify points of exposure
through device level issues or services running
- Provides findings and recommendations to focus mitigation
efforts
Security
Life Cycle
Plan &
Design
Protect your business against security risks,
avoid damage to you valuable brands.
Protect your own and your customers intellectual
property and proprietary information
Interception
Modification
Fabrication
ATTACKS
End User Security
Security Planes
Control/Signaling Security
8 Security Dimensions
Management Security
7/17/2015
We provide unique network views directly from out Bell
Labs Internet Research Lab
8
Improve Reliability and Security with Network
Security Services
Putting Bell Labs innovations to work
Responsible for over 400+ patents in the area of
Reliability & Security
Chosen as leaders, advisors, and members of
numerous government security forums and research
groups, as well as trade association committees and
study groups
Continuous analysis of network protocols,
identifying security vulnerabilities
Our methodologies and people are certified by the
NSA (National Security Agency of U.S.) to perform security
assessments
Our Knowledge Management is sanctioned by the
ISC2 to provide CISSP (Certified Information Systems Security
Professional) training and accreditation
7/17/2015
Nobel Prize
National
Medal of Technology
ISC2 = International Information Systems
9
Security Certification Consortium
Lucent Brick® Family
All Features on All Platforms…from SOHO to Data Center
•New VPN Firewall Brick™ 1100 (Copper and Fiber) provides a 1Gig 3DES thru-put
•LSMS adds best-in-class bandwidth management capabilities
New
8/2000-Best
Carrier-Class
VPN
4/2001-Best
Enterprise
Firewall
11/2001-Best
Multi-Site
VPN
Brick 1100
Brick 1000
up to (4) GigE
up to (9) 10/100
1.4 Gbps firewall
400 Mbps 3DES**
2,000,000 sessions
4,000 VPN tunnels
1,000 virtual firewalls
Brick 500
Brick 300
Brick 80
IPSec
Client 6.0
Easy to use
IPSec w/IKE
Auto policy
download
Stateful Firewall
Client “status logs”
Managed client
option
Interoperable w/full
portfolio
Road Warrior
7/17/2015
Brick 20
(3) 10/100 ports
125 Mbps firewall
2 Mbps 3DES
1,000 sessions
50 VPN tunnels
20 virtual firewalls
SOHO
(4) 10/100 ports
180 Mbps firewall
11 Mbps 3DES
25,000 sessions
400 VPN tunnels
80 virtual firewalls
(8) 10/100 ports
650 Mbps firewall
300 Mbps 3DES**
400,000 sessions
3,000 VPN tunnels
300 virtual firewalls
(14) 10/100 ports
1 GigE port
900 Mbps firewall
350 Mbps 3DES**
300,000 sessions
3,500 VPN tunnels
500 virtual firewalls
Small Enterprise
OR
(13) GigE Copper
(7) 10/100
2.8 Gbps firewall
700 Mbps 3DES**
3,000,000 sessions
7,150 VPN tunnels
1,000 virtual
firewalls
Network
Edge
Customer
Premises
ROBO
Up to (4) GigE Fiber
(7) 10/100
2.8 Gbps firewall
1 Gbps 3DES**
3,000,000 sessions
7,150 VPN tunnels
1,000 virtual
firewalls
Mid Enterprise
Large Enterprise
** with NEW optional encryption accelerator card and LZS
compression
Data Center
10
From Planning to Deployment-Ready
- Managing Complex Test Facilities for Network
Integration
Integration is the system-to-system communications & interoperability required to:
– Obtain a revenue-ready network
– Maximize operational efficiency
– Make the network function as a solution
Application
Services
Operations Software
Internet
Multi-Domain
• Multi-Vendor
Systems Integration
• Complex Network
Configurations
• Adaptive
Development
• Custom Software
• OA&M Operations
• Flow-Through
Provisioning
• Disaster Recovery
Application
Layer
Service Control
Layer
Softswitch
Control
PSTN
Circuit to Packet
Media
Solutions
Gateways
RAS
DSL
GigE
Broadband
Access FR/
IP Service
Switching
Network Transport
Layer
Multi-Service Packet
Metro
Optical
Switching
Access
Optical Core
Network
ATM C
P
E
Wireless
Open Points of Integration
Control
Bearer
Core network
Multi-Technology
7/17/2015
11
Our Extensive Multivendor Experience Spans
More Than 100 Vendors and 450 Products
Cisco – 3G mobility networks
Sonus
Juniper – IP/MPLS networks
Corrigent – Preferred services
partner
“One clear strength Lucent has in the network product
support market is that the company is truly
multivendor and is known for its worldwide
multivendor expertise.”
--IDC, 2003
Note: The above corporate signatures are the property of the companies named, and no implication of endorsement by such companies is intended.
Spanning the full breadth of technologies
7/17/2015
12
Services for Government Operations
Lucent Technologies Worldwide Services Government Operations and
Bell Labs, have a long heritage of providing information technology
(IT) and information assurance (IA) solutions. The solutions range
from small to large-scale deployments encompassing computing
services, networks and software applications. Lucent Government
Operations capabilities include:
• Requirements analysis
• Solution architecture
• Systems design
• Development
• Testing
• Implementation
• Project management
7/17/2015
13
Services for Government Operations
Examples:
•
General Services Administration (GSA) IT Schedule (1999 – present)
integration and interoperability of the infrastructure for voice, video & data
•
CUITN and OSCAR (1993 - present) design & engineering ntwk
infrastructure for military bases
•
Combat Information Transport System (CITS) For the U.S. Air Force
(1998 – Present) communication infrastructure
ATM+Ethernet+FastEthernet+GigaE
•
Korea Communications Infrastructure Upgrade (KCIU) (1998 1999) PDI for ATM ntwk connecting 24 bases in Korea
•
TRADOC (1998 - 2001) PDI for high bandwidth Classrom XXI, Total Army
Distance Learning Program, modeling & simulation facilities
7/17/2015
14
Services for Government Operations
Examples:
• Vitalsuite at the Inland Revenue (tax offices).
• Talking with the Dept of Trade & Industry (DTI) where Lucent
advise on broadband initiatives.
• Advising on 3G mobile availability in rural areas.
• Advising the Welsh Development Agency on backbone
requirements for digital content networks.
• PSAX for the Royal Navy.
7/17/2015
15
We Know Networks
Standards &
Industry
Leadership
Architectures,
Protocols &
Algorithms
Testing &
Deployment
Readiness
Planning &
engineering
Design &
Optimization
Enhancement
1
Product
Performance
Models &
Simulations
Business
Modeling
Reliability
Security
7/17/2015
16
Thank you.
Questions?
http://www.lucent.com
http://www.lucent.com/security