Transcript Document
LWS Professional Services Offer for government area Jacek Hanusik Managing Principal CEE LWS Professional Services Agenda • Company snapshot • Service offerings for government area examples • Conclusion 7/17/2015 2 Our Company Snapshot: Over 34,000 Networking Professionals Worldwide Ready To Serve You $8.5 Billion In Revenue (FY2003) Leadership (#1 or #2) In Many Service, Software, And System Markets, Including Multi-Vendor Networking With over one hundred years of carriergrade experience to draw on, Lucent has the deepest capability and commitment to service in the industry Creating new possibilities to enhance people’s lives by transforming the way the world communicates 7/17/2015 3 Why Lucent Worldwide Services? Document Management Knowledge Quest Network Engagement Methodology Communities Of Practice Ask Lucent More than 1600 consultants and Bell Labs engineers LWS Consultant Client An LWS Consultant Brings Expert Knowledge of 15,000+ engagements 7/17/2015 4 Powered by Bell Labs Skilled experts in network design, reliability, performance, operations and deployment Models, methodologies and tools – To optimize your network as you plan for next generation migration – To help you understand evolution scenarios – To help you understand the technology and business tradeoffs “The company [Lucent] uses a combination of sophisticated management tools developed in its own Bell Labs and commercial applications to administer and optimize customer infrastructures.” -- Current Analysis, May 2002 7/17/2015 5 Bell Labs Is Working with Sandia Labs/NISAC on DHS priorities: model & analyze the Interdependencies Between Telecom and Other Critical Infrastructures Oil / Gas Compressor Station Fuel Supply Power Plant Communications End Office Power Supply Substation Switching Office Traffic Light Substation Hospital Ambulance Banking & Finance ATM Check Processing Center Transportation Transport Water Reservoir Electric Power Emergency Call Center Emergency Services Pension/Service Military Payments Installations Legislative Offices Treasury Dept. Govt. need for Telecom experience Contract with Bell Labs Over 50 deliverables 7/17/2015 5.0/5.0 on Govt. Contracting Report Card –Critical infrastructures are Complex and Interdependent –They are Key to U.S. economic and national Security –They are Vulnerable to natural and malevolent acts, system complexities, and interdependencies –There are Institutional Barriers to information sharing Fire Station Bank Federal Reserve Challenges Continuity of Gov’t Services BL Unique Role: Provide expertise & collaborate with government to model, simulate & analyze major critical infrastructures –reliability –interdependencies –system complexities –disruption consequences to minimize the impact of outages & disasters. 6 New Technology Introduction Move to advanced technologies, setup for future growth Goal Business Objective Generate new revenue streams Go to market faster with new or enhanced enduser services. Approach - Take the Guesswork out: -Technical and Business Planning resources to forge a “bestin-class” path forward -Extensive Interoperability Lab Testing Capability - Tap into our vast network and operations planning resource putting Bell Labs innovations to work - Award-winning configuration, provisioning and management software - Active Participation with Industry Standardization Organizations and technical forums Results - Smooth and seamless migration to new technologies, with minimal disruption to existing networks/ services. - New or enhanced end user services, increased revenues Sensitivity Analysis: FMO savings over PMO TCO ($Ms) $32.4 $42.4 core network level ofmeshness[0,1] [0,1] Avg. transport distance (miles) % of hair-pin traffic at GSR $72.4 $82.4 $92.4 $102.4 2.24 3 OC-12 Price Factor ATM Traffic at ASX Edge (% of Forecast) # Edge Edgecollocatedwith with Core- IP Overlay Non-IMT ATM ports adjustment factor (%) Bandwidth per IP circuit (kbps) Long distance OC-48 $/mile/mo $62.4 3.36 OC-192 Price Factor # Edge Edgecollocatedwith with Core - MPLS core $52.4 2 80% 120% 9 7 9 7 0.5 0.1 30% 20% 256 1,024 $120 400 24% $180 600 FMO Savings Increase 16% FMO Savings Decrease Base Case TCO Savings = $69.75M 7/17/2015 Breadth & depth of diverse, multi-technology network experience allows us to anticipate the future 7 Network Security Services Protect against financial and liability risks Assess Goal Business Objective Manage Implement Bell Labs Security Model for Telecom ITU X.805 Security Layers Applications Security Infrastructure Security Privacy Integrity Interruption Availability Vulnerabilities Can Exist In Each Layer, Plane, Dimension Data Confidentiality VULNERABILITIES Communication Security Results Detailed security assessment report with executable recommendations provide a quick ROI. Authentication Services Security Non-repudiation THREATS Access Management Approach Assess network defenses and/or network services -Assesses security policy via customer’s use of technology and culture - Scans networks to determine “reach ability” or topology visible to an outsider - Scans hosts and/or services to identify points of exposure through device level issues or services running - Provides findings and recommendations to focus mitigation efforts Security Life Cycle Plan & Design Protect your business against security risks, avoid damage to you valuable brands. Protect your own and your customers intellectual property and proprietary information Interception Modification Fabrication ATTACKS End User Security Security Planes Control/Signaling Security 8 Security Dimensions Management Security 7/17/2015 We provide unique network views directly from out Bell Labs Internet Research Lab 8 Improve Reliability and Security with Network Security Services Putting Bell Labs innovations to work Responsible for over 400+ patents in the area of Reliability & Security Chosen as leaders, advisors, and members of numerous government security forums and research groups, as well as trade association committees and study groups Continuous analysis of network protocols, identifying security vulnerabilities Our methodologies and people are certified by the NSA (National Security Agency of U.S.) to perform security assessments Our Knowledge Management is sanctioned by the ISC2 to provide CISSP (Certified Information Systems Security Professional) training and accreditation 7/17/2015 Nobel Prize National Medal of Technology ISC2 = International Information Systems 9 Security Certification Consortium Lucent Brick® Family All Features on All Platforms…from SOHO to Data Center •New VPN Firewall Brick™ 1100 (Copper and Fiber) provides a 1Gig 3DES thru-put •LSMS adds best-in-class bandwidth management capabilities New 8/2000-Best Carrier-Class VPN 4/2001-Best Enterprise Firewall 11/2001-Best Multi-Site VPN Brick 1100 Brick 1000 up to (4) GigE up to (9) 10/100 1.4 Gbps firewall 400 Mbps 3DES** 2,000,000 sessions 4,000 VPN tunnels 1,000 virtual firewalls Brick 500 Brick 300 Brick 80 IPSec Client 6.0 Easy to use IPSec w/IKE Auto policy download Stateful Firewall Client “status logs” Managed client option Interoperable w/full portfolio Road Warrior 7/17/2015 Brick 20 (3) 10/100 ports 125 Mbps firewall 2 Mbps 3DES 1,000 sessions 50 VPN tunnels 20 virtual firewalls SOHO (4) 10/100 ports 180 Mbps firewall 11 Mbps 3DES 25,000 sessions 400 VPN tunnels 80 virtual firewalls (8) 10/100 ports 650 Mbps firewall 300 Mbps 3DES** 400,000 sessions 3,000 VPN tunnels 300 virtual firewalls (14) 10/100 ports 1 GigE port 900 Mbps firewall 350 Mbps 3DES** 300,000 sessions 3,500 VPN tunnels 500 virtual firewalls Small Enterprise OR (13) GigE Copper (7) 10/100 2.8 Gbps firewall 700 Mbps 3DES** 3,000,000 sessions 7,150 VPN tunnels 1,000 virtual firewalls Network Edge Customer Premises ROBO Up to (4) GigE Fiber (7) 10/100 2.8 Gbps firewall 1 Gbps 3DES** 3,000,000 sessions 7,150 VPN tunnels 1,000 virtual firewalls Mid Enterprise Large Enterprise ** with NEW optional encryption accelerator card and LZS compression Data Center 10 From Planning to Deployment-Ready - Managing Complex Test Facilities for Network Integration Integration is the system-to-system communications & interoperability required to: – Obtain a revenue-ready network – Maximize operational efficiency – Make the network function as a solution Application Services Operations Software Internet Multi-Domain • Multi-Vendor Systems Integration • Complex Network Configurations • Adaptive Development • Custom Software • OA&M Operations • Flow-Through Provisioning • Disaster Recovery Application Layer Service Control Layer Softswitch Control PSTN Circuit to Packet Media Solutions Gateways RAS DSL GigE Broadband Access FR/ IP Service Switching Network Transport Layer Multi-Service Packet Metro Optical Switching Access Optical Core Network ATM C P E Wireless Open Points of Integration Control Bearer Core network Multi-Technology 7/17/2015 11 Our Extensive Multivendor Experience Spans More Than 100 Vendors and 450 Products Cisco – 3G mobility networks Sonus Juniper – IP/MPLS networks Corrigent – Preferred services partner “One clear strength Lucent has in the network product support market is that the company is truly multivendor and is known for its worldwide multivendor expertise.” --IDC, 2003 Note: The above corporate signatures are the property of the companies named, and no implication of endorsement by such companies is intended. Spanning the full breadth of technologies 7/17/2015 12 Services for Government Operations Lucent Technologies Worldwide Services Government Operations and Bell Labs, have a long heritage of providing information technology (IT) and information assurance (IA) solutions. The solutions range from small to large-scale deployments encompassing computing services, networks and software applications. Lucent Government Operations capabilities include: • Requirements analysis • Solution architecture • Systems design • Development • Testing • Implementation • Project management 7/17/2015 13 Services for Government Operations Examples: • General Services Administration (GSA) IT Schedule (1999 – present) integration and interoperability of the infrastructure for voice, video & data • CUITN and OSCAR (1993 - present) design & engineering ntwk infrastructure for military bases • Combat Information Transport System (CITS) For the U.S. Air Force (1998 – Present) communication infrastructure ATM+Ethernet+FastEthernet+GigaE • Korea Communications Infrastructure Upgrade (KCIU) (1998 1999) PDI for ATM ntwk connecting 24 bases in Korea • TRADOC (1998 - 2001) PDI for high bandwidth Classrom XXI, Total Army Distance Learning Program, modeling & simulation facilities 7/17/2015 14 Services for Government Operations Examples: • Vitalsuite at the Inland Revenue (tax offices). • Talking with the Dept of Trade & Industry (DTI) where Lucent advise on broadband initiatives. • Advising on 3G mobile availability in rural areas. • Advising the Welsh Development Agency on backbone requirements for digital content networks. • PSAX for the Royal Navy. 7/17/2015 15 We Know Networks Standards & Industry Leadership Architectures, Protocols & Algorithms Testing & Deployment Readiness Planning & engineering Design & Optimization Enhancement 1 Product Performance Models & Simulations Business Modeling Reliability Security 7/17/2015 16 Thank you. Questions? http://www.lucent.com http://www.lucent.com/security