Business Transformation
Download
Report
Transcript Business Transformation
The Power of Technology
to Transform the Future
Opportunities & Challenges for Next-Decade
Services
Outline
Top 10 Services/Technology Trends
Cyber & IoT Security
What Is Next?
2
Services Of The Future
1.
2.
3.
4.
Doctors Inside You…........Predicting & Preventing heart attack
Tele Immersion……………...Shared presence via simulated environment
Self Driving Cars…………….Driverless Uber
Ambient Intelligence Services
..Manage our lives effortlessly via IOT
5. Smart Car/Building/City…Detecting population concerns
6. Privacy Services……………..I am Cloaked
7. Super & Personal Clouds..Always-on, your content
8. Nano Bot Shot……………….No more virus shots
9. Financial Planner…………..I made you money today
10. Personal Assistant………..My trusted computer assistant
The Power of Technology to Transform the Future
3
Top Ten Technology Trends
7. Business Analytics =
E-Apps + Knowledge Mining + Big Data
8. Apps / NLU / ASR
Convergence (SIP, XML, VXML, HTML5, WebRTC)
1. Fully Distributed
(IP/MPLS/Enet)
for the Sextuple Play
Photonic – Automated - AAN
3. Security
Massively
Critical
2. Wireless Access
Will be Common @1Tbps
9. Open Source
Components at the
Network Edge
6. E-Collaboration
& Mobility & M2M, IOT Dominate
the Workplace
5. Remote
Intelligence/Sensors
Everywhere (M2M, IOT)
10. Dynamic
Network
Computing/Storage
Cloud Computing
(SDN-NFV-OF-OAPI)
4. Wired/WLAN/Mobility
Personal Device Convergence
Wi-Fi/Li-Fi Off-Load
Massive Implication for the Networks of CSPs
4
Pervasive Content = Bandwidth Crunch
Global Mobile Network Data Traffic
20,000
18,000
Petabytess
16,000
Web/Internet
VoIP
Video Streaming/TV
14,000
P2P
12,000
Audio Streaming
LTE offers only
~3x-5x improvement
10,000
20 x
Bandwidth
Gap
8,000
6,000
4,000
2,000
0
2008
2009
2010
2011
2012
2013
2014
Mobile Data Demand is Exploding Due to Pervasive Content,
Leading to a Looming Wireless Bandwidth Gap
5
Solving the Bandwidth Crunch
Invent spectrum-multiplying solutions that
enable optimal data usage and a richer
multimedia experience
Compression (3-5X), caching, local
content routing, streaming UHDTV
media (1/2 Cost and Opex),
mobility
Push Shannon’s Limit More Bps/Hz (5 – 10X)
Bigger
Pipes
Better
Pipes
More
Pipes
Maximize throughput at
cell edge, uniform
coverage, Smart Cell
Inventions for efficient
bandwidth utilization
across Tier 1 networks
6
Connectivity Challenges For “The Services of
The Future”
LTE-A/5-6G
M2M/IOT
Maximize
Throughput
LTE
Bigger Pipes
Untapped
Spectrum
Femto /
WiFi/LiFi
Cognitive
Spectrum
Management
Connectivity
and Mobility
More Efficient
Data Handling
More Pipes
Better Pipes
Collaborative
Communications
Compression
Local Content
Routing
Core Solutions That Support Increased Data Usage &
A Richer Multimedia Experience
7
Cloud: Global Impact
Virtualization – Servers, Storage and Networks
Social, Political and Financial Considerations
8
Data Center Evolution
Virtualize
From Physical
Infrastructure
To Virtual
Apps &
Workload
Apps &
VMs
Compute
Network
SDN –NFV
Consolidate
Data Center
Consolidation
For Lower
Cost &
Complexity
Integrate
Automate
Deeper
Integration
with Business
Processes /
OSS / BSS
Data Center
Management
Automation
And
Orchestration
Private
Data Center
Federate
Optimal
Combination
of Private &
Public Cloud
Resources
Public
Cloud
Private
Data Center
(Self-Hosted)
Private
Cloud
Storage
(Service ProviderHosted)
IoT Fog
From Physical Silo’s To Network-Based IT-As-A-Service &
Anything-As-A-Service (XaaS) Compounded with Big Data
9
Outline
Trends: Data, Services & Networks
Cyber & IoT Security
What Is Next?
10
Threat Velocities are Sophisticated
Attack Methods
Espionage Targets
Attack Motivation
7% 1%
28%
25%
23%
33%
21%
15%
31%
75%
17%
24%
Manufacturing
Professional
Financial
Malware
Transportation
Hacking
Social (pf)
Physical
Espionage
Misuse
Other
o Nearly 70% of attacks were discovered by external parties
o 700% increase in mobile malware on smart phones
o 66% of breaches were discovered months after the attack (156 day avg)
Security Is Broken Across Enterprise & SPs
11
Security shifted from Perimeter to Network
Current State of Industry
“Distributed Enterprise Edge Security”
3rd
Network “Intelligence and Analytics
3rd Party Network
Party Network
IP Network Core
IP Network Edge
VPN, Firewall, IDS,
Anti-Virus, Etc.
Edge
Client
Enterprise
Edge
Edge
Client
Enterprise
Security Investment at Edge
IDS, Firewalls, Anti-Virus, Anti-SPAM
Deployed by Customer
Inefficient, Expensive, Non-Holistic
Legacy SIEM, Log Management
Client
Enterprise
Security built into the
network core,
protecting customer
From inside -> out
Behavioral Analytics
Automated Forensics
Core visibility
BYOD & Mobility Edge
Data Centers
Private &
Hybrid Clouds
Client
Enterprise
Continuous Machine Learning
Smart Packet Inspection
Behavioral Big Data Analytics
Integration with legacy systems
Visualization
Attacks enter into the core of the network and no longer through the
perimeter Causing Broken Security Model within Enterprise
12
Once inside a Threat Actor must move Lateral
Virtual Machines
Remote
Offices and
Branches
Data
Center
•Blocks threats
attacking applications
and op
WAN
Wireless
LAN
Network Core
LAN
Unified Network
Security Policy
Console
Behavioural Analytics will Become Golden Thread For Cyber
Security Detection in 21st Century
13
How do we stay ahead of the bad guys?
Anomaly Detection
Proactive
Incident
Response
Threat
Detection
Network
Events
Logs
Correlation
Greater Risk Visibility
Security Analytics
Security Framework:
•
SIEM/Splunk
•
Firewall
•
End Point Protection
•
Security Anomalytics -
}
90%
10%
Lower Detection Times
Modify
Controls for
Security
Posture
Perimeter + Core
Monitoring
End-to-End Security
Remediation
Post-Threat
Assessment
New “Anomaly Detection” compliance
requirement for Financial Services
14
15
How to Secure and Manage the Ever Growing IoT?
HyperConverged Datacenters with Fog
computing
Analytics
Engines to
Process IoT Data
and IoT Security
Securing
Smart
Factories
Securing
Smart
Cities
Securing
BYOD
Securing
IoT
Devices
Securing
Smart
Electric
Grids
Securing
Smart
Buildings
16
Outline
Trends: Data, Services & Networks
Cyber & IoT Security
What Is Next?
17
What Is Next?
Networks
o Application
aware networks
2015
Devices
o 3D Display
o Storage
o NLU / NLP
visualization
o Wearable
o Virtual retinal
networks
o Autonomous
o Fuel Cells
display
o 1 Gbps
o 256 GB SSD
networks
o
10
Gbps
consumer BB
o 8K Broadcastingo 1TB Mobile
consumer BB
o IPV6
Storage
o Thumb Print
o
100
Gbps
o Cognitive networks
o Holographic
o Smart Sensors
o NFV
consumer BB
Displayo Digital scent
o IoT Sensors Scanner
o Cloaked
o Drone
o End of
o Robot vision
network
Domination
o Nano Computers
Bcast TV
o Big Data
o 3-D
o Distributed
o On-demand
o Exabyte backbone
Everywhere
o
SDN
Printing
networks
o Affordable
o Common
o Cognitive
dominates reconfig. networks o Yottabyte DC
Green
Energy
Robotics
computing
o 100Gbps last mile
everywhere
o Doctor inside U
o
RT/On-demand
sport
o
Teleimmersion
o 6G 1+ Gbps
o Agricultural robot
streaming
o Last wireline
o LTE-a
o Ambient Intelligenceo Computer generated o Self driving car
o 7G 10 Gbps
phone retired
o Biometric
50 Mbps
solutions
imagery o Cognitive personal
o Quantum
o 5G 500 Mbps cryptography
o Nano Bot Shot
assistant o RFID
o Cognitive Radio
o Cognitive financial
o Cognitive SMEs
o 100 to 1 Wireless vs.
planner o eCollaboration
o Mobile video
Wireline End Points
o
Interactive
o Super Hi Def TV- 8K o Ultra Hi Def TV- 4K
w/ QoS
Video
o Speech to Speech
o Rich Media
o Privacy
o Personal device
Translation
Search
services
convergence
o Netflix on steroid
o Wireless
VoIP
o Autonomous UI
o Hybrid cloud
2020
2025
2015
2020
2025
2030
2025
2020
2015
2025
2020
services
o WiFi OffLoad
Wireless
2015
o Location based
services
Dr. Eslambolchi - 2020 Venture Partners, 2015
Content /
Applications
18
The Power of Technology
to Transform the Future
Opportunities & Challenges for Next-Decade
Services