Cyber US Government Silicon Valley Opportunites and Challenges

advertisement
Cyber
US Government
Silicon Valley
Opportunities and Challenges
Greg Oslan, CEO, Narus
March 2011
SINET Workshop & Forum
Overview
 Market
 Ecosystem
 Public/private partnership
 Doing business in DC
Our World is a Cyber World
Cyber (Infrastructure): global network
of interdependent information
technology infrastructures,
telecommunications networks and
computer processing systems
Cyberspace (Applications): virtual
world in which individuals interact,
exchange ideas, share information,
provide social support, conduct
business, direct actions, and so on,
using this global network
The Global Internet Trend
 State of the Internet in 2010
‒ 5 countries account for > 48% users
‒ BRIC – fastest growth
 Mobile Internet access
pandemic
‒ Mobile Internet Users to surpass
Desktop Internet Users (IU) by 2015
‒ 2010 - 1/1.4 Billion M/D Internet
Users
‒ 2015 – 2/1.7 Billion M/D Internet
Users
Source: Morgan Stanley
M – Mobile Internet Users
D – Desktop Internet Users
Mobile Internet Computing
 Entered the Mobile Internet Computing Cycle
– Web2.0+Connectivity/Presence
– Value = Unified Communications + Multimedia +
Portability
 Unified Communications
– Users spend 70% of their online activity in social
networks
 Multimedia Creation
– Traditional Applications are disappearing and
new ones are gaining momentum
 Portability
– The virtual world: Desktop experience - ANYTIME,
ANYWHERE!
Source: Morgan Stanley
New Cyber User 2010
 A new user profile is emerging
‒ Mobile Computing is about DATA not
Voice
 Most popular/used application
‒ 07/09 Social Networking Users
Surpassed Email
‒ 12/09 200 Billion Minutes/Month
spent on Social Networking Sites
 User generated content – breakdown
‒ Music, Games and Social to drive
Shift in Traffic Composition [2010]
 Global Internet traffic (D+M) – growth
‒ Two-fold increase expected over 20112012
‒ 10.88 to 20.33 PB / Month
‒ Video surpassed P2P in 2010
 Global Internet traffic (M only) – growth
‒ 14x traffic growth from 2010E to 2014E
‒ 250 KTB to 3.5MTB / Month
‒ Video to grow 39x by 2014
Trends in Infrastructure/Services
 Backhauling driving infrastructure upgrades at
the edge
‒ Each tower today is oversubscribed by a factor of 50
‒ Expensive to operate with such bandwidth demands
 Cloud and virtual computing platforms
‒ The preferred content distribution vehicles
 Evolution of Traffic Intelligence
‒ From bits to content and users
Mobile Internet Computing
Shaping the Threat Vector Market
 Mobile devices (“Computing in your pocket”)
‒ Rogue applications, portability and powerful
 Application space (“Easy to hide”)
‒ Facebook: 500,000 Apps/500 M+ Downloads/Year
‒ iPhone: 360,000+ Apps/4B+ Downloads/Year
 Social media threats (“Virtual reality”)
‒ Soon became the ideal platform to distribute
threat (Twitter Spam, Facebook abusive apps)
 From desktop to cloud computing
‒ Cloud as a means of distribution and infection
(Google Groups, Amazon)
The Cyber Security Market
 Dynamic environment
 Evolving, more sophisticated threats
 Security investment a balance between cost
and risk
 Education still early in the lifecycle
 Traditional and new technologies
The Ecosystem: A challenge
Multiple Overlapping Components
Cyber Protection
Intercept
Traffic Mgmt
Development Kit
User Interface Layer
Visualization
Centrifuge
Exalede
Forensic Analysis
SEM/SIEM
User Application Layer
Portal
Policy / Logic Layer
Forensic Analysis
Dynamic Analysis
Security / Intercept / Traffic Management
Search
Splunk
Open API
Integration
Database
Data
Analytics
Intelligent Capture Layer
DPI
Infrastructure
NetFlow
Routers
NIC
Third Party
Applications
Cyber Security and Network
Management Convergence
Guarantee
Vulnerability
Signature-Based
Static
Risk Assessment
Behavioral-Based
Indemnity
Forensics
Data
Management;
Search;
Storage
Dynamic
Network Design for Security
- Network Vulnerability
- Optimization
Anomaly-Based
SEM / SIEM
Installation
Management
Processes
Policy
Operations
SLA
New Signatures
Tools
Remediation
Government/Commercial
Partnership Required
 We’re only secure when we’re all secure
‒
‒
What about .com; .net; etc?
Commercial multi-nationals vs. Government
 Government too slow: typical 5 year cycle minimum
‒
‒
Priority on .mil; .gov
Long way to go
 Security is end-to-end in both horizontal and vertical
planes
‒
‒
From end device to end device
From platform through application
Government Business:
Lessons Learned
Washington D.C. is a tough place to do business
 Patience required; NIH and
bureaucracy high
 Security clearances
 Capital
 Washington presence
 Partnering key as most contract vehicles
are held by large prime integrators
Government: Lessons Learned
But……………….
 Has serious money
 High barrier to entry means higher
barrier to exit
 Loyal once proven
 Provides exit option
 Buy early, innovative technology
Rewarding to help your country
US Government Efforts
CNCI
 ESF
 Public policy efforts
 OSD pilots
 Money being allocated ($500M
just announced)

Challenges Remain From Valley’s
Perspective
You Can Be Part of the Solution
Little VC motivation to support government
market—long sales cycles, club mentality, higher
risk, difficult to understand sales process/cycles;
US no forn bent
 Money often comes with strings: IP; export;
employee make-up
 Entry process difficult with poor access to contract
vehicles, inability to get new contracts

Is It Worth It?
 Depends on what you are selling
 Government typically first to truly invest in
new things that don’t have strong ROI
 If you’re in “security or cyber,” provides early
adopter opportunity
I Believe It Is; Will take effort from both sides!
Download