lws professional services o ffer for government area
DESCRIPTION
LWS Professional Services O ffer for government area. Jacek Hanusik Managing Principal CEE LWS Professional Services. Agenda. Company snapshot Service offerings for government area examples Conclusion. Our Company Snapshot:. - PowerPoint PPT PresentationTRANSCRIPT
LWS Professional Services Offer for government area
Jacek HanusikManaging Principal CEELWS Professional Services
204/22/23
Agenda
• Company snapshot• Service offerings for government area examples• Conclusion
304/22/23
Our Company Snapshot:Over 34,000 Networking Professionals
Worldwide Ready To Serve You$8.5 Billion In Revenue (FY2003)Leadership (#1 or #2) In Many Service,
Software, And System Markets, Including Multi-Vendor Networking
With over one hundred years of carrier-grade experience to draw on, Lucent has the deepest capability and commitment to service in the industry
Creating new possibilities to enhance people’s lives by transforming the way the world communicates
404/22/23
Why Lucent Worldwide Services?
Ask Lucent
NetworkEngagementMethodology
DocumentManagement
KnowledgeQuest
CommunitiesOf Practice
LWS Consultant Client
More than1600
consultantsand Bell Labs
engineers
An LWS Consultant Brings Expert Knowledge of 15,000+ engagements
504/22/23
Powered by Bell LabsSkilled experts in network design, reliability, performance,
operations and deploymentModels, methodologies and tools
– To optimize your network as you plan for next generation migration
– To help you understand evolution scenarios– To help you understand the technology and business
tradeoffs
“The company [Lucent] uses a combination of sophisticated management tools developed in its own Bell Labs and commercial applications to administer and optimize customer infrastructures.”
-- Current Analysis, May 2002
604/22/23
Bell Labs Is Working with Sandia Labs/NISAC on DHS priorities: model & analyze the Interdependencies Between Telecom and Other Critical InfrastructuresOil / Gas Compressor
StationFuel Supply
Electric Power
Substation
Power Plant
Power Supply
CommunicationsEnd Office
Switching Office
Transportation
Transport
TrafficLight
Reservoir Substation
Water
Fire Station
HospitalEmergencyCall Center
Ambulance
Emergency Services
Banking & FinanceCheck Processing Center
Bank
Federal ReserveATM
MilitaryInstallations
Pension/ServicePayments
Treasury Dept.Legislative Offices
Continuityof Gov’t Services
Challenges–Critical infrastructures are Complex and Interdependent
–They are Key to U.S. economic and national Security
–They are Vulnerable to natural and malevolent acts, system complexities, and interdependencies
–There are Institutional Barriers to information sharing
BL Unique Role: Provide expertise & collaborate with government to model, simulate & analyze major critical infrastructures –reliability–interdependencies–system complexities–disruption consequences
to minimize the impact of outages & disasters.
Govt. need for Telecom experience
Contract with Bell Labs
Over 50 deliverables5.0/5.0 on Govt. Contracting
Report Card
704/22/23
New Technology IntroductionMove to advanced technologies, setup for future growth
Goal Business Objective Generate new revenue streamsGo to market faster with new or enhanced
end-user services.Approach- Take the Guesswork out:
-Technical and Business Planning resources to forge a “best-in-class” path forward
-Extensive Interoperability Lab Testing Capability - Tap into our vast network and operations planning
resource putting Bell Labs innovations to work - Award-winning configuration, provisioning and
management software- Active Participation with Industry Standardization
Organizations and technical forumsResults- Smooth and seamless migration to new
technologies, with minimal disruption to existing networks/ services.
- New or enhanced end user services, increased revenues
Sensitivity Analysis: FMO savings over PMO
24%
3.36
3
120%
9
9
0.5
30%
1,024
$180
600
16%
2.24
2
80%
7
7
0.1
20%
256
$120
400
$32.4 $42.4 $52.4 $62.4 $72.4 $82.4 $92.4 $102.4
OC-192 Price FactorOC-12 Price Factor
ATM Traffic at ASX Edge (% of Forecast)# Edgecollocatedwith Core - IP Overlay# Edgecollocatedwith Core - MPLS core
core network level ofmeshness[0,1]Non-IMT ATM ports adjustment factor (%)
Bandwidth per IP circuit (kbps)Long distance OC-48 $/mile/moAvg. transport distance (miles)
% of hair-pin traffic at GSR
TCO ($Ms)
24%
120%
9
9
0.5
30%
1,024
$180
600
16%
2.24
2
80%
7
7
0.1
20%
256
$120
400
$32.4 $42.4 $52.4 $62.4 $72.4 $82.4 $92.4 $102.4
OC-192 Price FactorOC-12 Price Factor
# Edge with Core - IP Overlay# Edge with Core - MPLS core
[0,1]Non-IMT ATM ports adjustment factor (%)
Bandwidth per IP circuit (kbps)Long distance OC-48 $/mile/moAvg. transport distance (miles)
% of hair-pin traffic at GSR
Base Case TCO Savings = $69.75M
FMO Savings Increase
FMO Savings Decrease
Sensitivity Analysis: FMO savings over PMO
24%
3.36
3
120%
9
9
0.5
30%
1,024
$180
600
16%
2.24
2
80%
7
7
0.1
20%
256
$120
400
$32.4 $42.4 $52.4 $62.4 $72.4 $82.4 $92.4 $102.4
OC-192 Price FactorOC-12 Price Factor
ATM Traffic at ASX Edge (% of Forecast)# Edgecollocatedwith Core - IP Overlay# Edgecollocatedwith Core - MPLS core
core network level ofmeshness[0,1]Non-IMT ATM ports adjustment factor (%)
Bandwidth per IP circuit (kbps)Long distance OC-48 $/mile/moAvg. transport distance (miles)
% of hair-pin traffic at GSR
TCO ($Ms)
24%
120%
9
9
0.5
30%
1,024
$180
600
16%
2.24
2
80%
7
7
0.1
20%
256
$120
400
$32.4 $42.4 $52.4 $62.4 $72.4 $82.4 $92.4 $102.4
OC-192 Price FactorOC-12 Price Factor
# Edge with Core - IP Overlay# Edge with Core - MPLS core
[0,1]Non-IMT ATM ports adjustment factor (%)
Bandwidth per IP circuit (kbps)Long distance OC-48 $/mile/moAvg. transport distance (miles)
% of hair-pin traffic at GSR
Base Case TCO Savings = $69.75M
FMO Savings Increase
FMO Savings Decrease
Breadth & depth of diverse, multi-technology network experience allows us to anticipate the
future
804/22/23
Network Security Services Protect against financial and liability risks
Goal Business Objective Protect your business against security risks, avoid damage to you valuable brands. Protect your own and your customers intellectual property and proprietary informationApproachAssess network defenses and/or network services
-Assesses security policy via customer’s use of technology and culture
- Scans networks to determine “reach ability” or topology visible to an outsider
- Scans hosts and/or services to identify points of exposure through device level issues or services running
- Provides findings and recommendations to focus mitigation efforts
ResultsDetailed security assessment report with executable recommendations provide a quick ROI.
We provide unique network views directly from out Bell We provide unique network views directly from out Bell Labs Internet Research LabLabs Internet Research Lab
Acc
ess
Man
agem
ent
End User Security
Control/Signaling SecurityManagement Security
8 Security Dimensions
Dat
a C
onfid
entia
lity
Com
mun
icat
ion
Secu
rity
Inte
grity
Ava
ilabi
lity
Priv
acy
Aut
hent
icat
ion
Non
-rep
udia
tion
VULNERABILITIES
THREATS
ATTACKS
InterruptionInterruption
FabricationFabrication
InterceptionInterception
ModificationModification
Security Layers
Vulnerabilities Can Exist In Each Layer, Plane,Dimension
Applications Security
Services Security
Infrastructure Security
Security Planes
Bell Labs Security Model for TelecomITU X.805
Assess
Implement
Plan &
Design
Man
age Security
Life Cycle
Assess
Implement
Plan &
Design
Man
age Security
Life Cycle
904/22/23
Improve Reliability and Security with Network Security Services Putting Bell Labs innovations to work Responsible for over 400+ patents in the area of Reliability & Security
Chosen as leaders, advisors, and members of numerous government security forums and research groups, as well as trade association committees and study groups
Continuous analysis of network protocols, identifying security vulnerabilities
Our methodologies and people are certified by the NSA (National Security Agency of U.S.) to perform security assessments
Our Knowledge Management is sanctioned by the ISC2 to provide CISSP (Certified Information Systems Security Professional) training and accreditation
ISC2 = International Information Systems Security Certification Consortium
Nobel Prize
NationalMedal of Technology
1004/22/23
New
** with NEW optional encryption accelerator card and LZS compression
IPSec Client 6.0
Easy to use IPSec w/IKEAuto policy downloadStateful FirewallClient “status logs”Managed client optionInteroperable w/full
portfolio
Brick 80
Brick 20
(3) 10/100 ports125 Mbps firewall2 Mbps 3DES1,000 sessions50 VPN tunnels20 virtual firewalls
Road Warrior
Network Edge
Brick 300
Customer Premises
Brick 500
Brick 1000
(4) 10/100 ports180 Mbps firewall11 Mbps 3DES25,000 sessions400 VPN tunnels80 virtual firewalls
(8) 10/100 ports650 Mbps firewall300 Mbps 3DES**400,000 sessions3,000 VPN tunnels300 virtual firewalls
(14) 10/100 ports1 GigE port900 Mbps firewall350 Mbps 3DES**300,000 sessions3,500 VPN tunnels500 virtual firewalls
up to (4) GigE up to (9) 10/100 1.4 Gbps firewall400 Mbps 3DES**2,000,000 sessions4,000 VPN tunnels1,000 virtual firewalls
Lucent Brick® Family All Features on All Platforms…from SOHO to Data Center
Brick 1100
Up to (4) GigE Fiber(7) 10/100 2.8 Gbps firewall1 Gbps 3DES**3,000,000 sessions7,150 VPN tunnels1,000 virtual firewalls
(13) GigE Copper(7) 10/100 2.8 Gbps firewall700 Mbps 3DES**3,000,000 sessions7,150 VPN tunnels1,000 virtual firewalls
Data CenterSOHO Small EnterpriseROBO Mid Enterprise Large Enterprise
OR
•New VPN Firewall Brick™ 1100 (Copper and Fiber) provides a 1Gig 3DES thru-put•LSMS adds best-in-class bandwidth management capabilities
8/2000-Best Carrier-Class
VPN
11/2001-Best Multi-Site
VPN
4/2001-Best Enterprise
Firewall
1104/22/23
ApplicationLayer
ControlBearer
Service Control Layer Softswitch
ControlIP ServiceSwitching
ApplicationServices
Network TransportLayer
PSTN
Internet
Multi-Service Packet Switching
Core network
Optical CoreBroadband
AccessGigE
DSLAccessNetwork
RAS
FR/ATM
Wireless
CPE
Media Gateways
Circuit to PacketSolutions
Metro Optical
Multi-Technology
Ope
n Po
ints
of I
nteg
ratio
n
Multi-D
omain
From Planning to Deployment-Ready- Managing Complex Test Facilities for Network Integration
Integration is the system-to-system communications & interoperability required to:– Obtain a revenue-ready network– Maximize operational efficiency– Make the network function as a solution
• Multi-Vendor Systems Integration• Complex Network Configurations• Adaptive Development• Custom Software• OA&M Operations• Flow-Through Provisioning• Disaster Recovery
Ope
ratio
ns S
oftw
are
1204/22/23
Our Extensive Multivendor Experience Spans More Than 100 Vendors and 450 ProductsCisco – 3G mobility
networksJuniper – IP/MPLS networks Corrigent – Preferred
services partner
Spanning the full breadth of technologies
“One clear strength Lucent has in the network product support market is that the company is truly multivendor and is known for its worldwide multivendor expertise.”
--IDC, 2003
Sonus
Note: The above corporate signatures are the property of the companies named, and no implication of endorsement by such companies is intended.
1304/22/23
Services for Government Operations
Lucent Technologies Worldwide Services Government Operations and Bell Labs, have a long heritage of providing information technology (IT) and information assurance (IA) solutions. The solutions range from small to large-scale deployments encompassing computing services, networks and software applications. Lucent Government Operations capabilities include:
• Requirements analysis
• Solution architecture
• Systems design
• Development
• Testing
• Implementation
• Project management
1404/22/23
Services for Government Operations
Examples:• General Services Administration (GSA) IT Schedule (1999 – present)
integration and interoperability of the infrastructure for voice, video & data
• CUITN and OSCAR (1993 - present) design & engineering ntwk infrastructure for military bases
• Combat Information Transport System (CITS) For the U.S. Air Force (1998 – Present) communication infrastructure ATM+Ethernet+FastEthernet+GigaE
• Korea Communications Infrastructure Upgrade (KCIU) (1998 - 1999) PDI for ATM ntwk connecting 24 bases in Korea
• TRADOC (1998 - 2001) PDI for high bandwidth Classrom XXI, Total Army Distance Learning Program, modeling & simulation facilities
1504/22/23
Services for Government Operations
Examples:• Vitalsuite at the Inland Revenue (tax offices).
• Talking with the Dept of Trade & Industry (DTI) where Lucent advise on broadband initiatives.
• Advising on 3G mobile availability in rural areas.
• Advising the Welsh Development Agency on backbone requirements for digital content networks.
• PSAX for the Royal Navy.
1604/22/23
111 Product
Enhancement
Planning & engineering
Design & Optimization
Reliability
Architectures, Protocols & Algorithms
Performance Models &
Simulations
Security
Testing & Deployment Readiness
Standards & Industry
Leadership
BusinessModeling
We Know Networks
Thank you. Questions?
http://www.lucent.comhttp://www.lucent.com/security