Upload
zlata
View
45
Download
1
Tags:
Embed Size (px)
DESCRIPTION
GED- i Ltd. Secure data R esides on Cloud, Hosting & Local SAN storage Transferred over public/private networks Store data Very Fast SAN storage. www.ged-i.com +972 9 8355600 [email protected]. About GED- i Ltd. Israeli Company Founded in 2005 Development started in 2006 - PowerPoint PPT Presentation
Citation preview
GED-i LtdGED-i Ltd
GED-I Proprietary
www.ged-i.com +972 9 8355600 [email protected]
Secure data
Resides on Cloud, Hosting & Local SAN storage
Transferred over public/private networks
Store data
Very Fast SAN storage
About GED-i Ltd
GED-I Proprietary
• Israeli Company• Founded in 2005• Development started in 2006• Held by 3 founders and private investors• Funding • External - Private & Governmental - about $800,000• Founders – About $2M
• Office is Netanya, Israel• Patent allowance in USA
Company Status
GED-I Proprietary
• Sales – Initial revenues of more than $200,000• Sales – Win of project estimated of $1M (G4Crypt)• Sales channels - Europe, Asia, Israel
• Products - GSA 2000, G4Crypt - Commercial• Oracle/SUN’s Partner• IBM’s Storage Proven, Integrated Solution• HP – Interoperability, Integrated solution
Management: David Saar, MBA – CEO
24 years leading High-tech companies in Executive positions. Served as Vsecure Technologies Inc CEO, founder and the GM of TSK Israel Ltd and ECI Telecom Director of Worldwide Marketing.
Elisha Atzmon, PhD – CTO, 12 years in advanced systems Research, Analysis and Implementation.
Lior Greenblat, MSc – VP R&D, 10 years in leading design, development and implementation
Advisory Board: Nadav Kedem, MSc
Most recently serves as the manager and Director of R&D at EMC Israel
Giora Cohen, BSc 25 years in leading design, development and implementation of high-tech technologies
Rony Shapiro, MSc – VP R&D, 22 years in leading design, development and implementation of security systems.
4
GED-I Proprietary
GED-i Team
Security Target Markets
GED-I Proprietary
5
Cloud Computing
Cloud Operator as Infrastructure as Service
Enterprise external DC Enterprise DRP
Enterprise
Internal data center Private cloud DRP / Hosting Network connecting
remote sites
Sensitive and Confidential Data at:
Target Markets - Customers
GED-I Proprietary
6
Enterprise branches
University campus
Hospital sites
Research Centers
Grocery chains
Casino sites
Telecom
Enterprise
Cloud Operator
University
Bank
Payment Processor
Insurance
Hospital
Government
Defense
Airlines company
Municipal Authority
Police
ISP
Telecom
Airports
Cities
Communication
Law enforcement
Defense bases
Private Networks
Data security for the Civilian & HLS
GED-I Proprietary
Cloud/Storage Security - Why
• PCI DSS• CA 1386• DOD 5015
Compliance to Privacy Regulations
Data Security• Data Security is a “Show Stopper” for cloud
computing, mainly to Enterprises• Data deployment risks – Cloud, Hosting, Data Center • Control over Data Security measures
• HIPAA• GBL• Basel II
Cloud Security Problem
CLOUD Customer
Customer
Customer
Data
Processing
Data1
Data2
Integrity, AvailabilityConfidentiality,
GED-I Proprietary
8
GED-I Proprietary
SaaS IaaSPaaS
Private
Public
GED-i’s product PositioningCloud Customer mapping
• Users (Enterprises, SMB)
• Operators
• Operator Infrastructure• Operator revenue
generator
• Users (Enterprises, SMB)
• Operators
• Operators Infrastructure
GED-I Proprietary
Privileged User Access – Privileged administrators and control over their access
Regulatory Compliance Data Location – Local regulations compliance Data Segregation – Shared environment, Encryption Recovery Investigative Support Long-term viability
X – available by GED-I
X – Not available by GED-i
7 Cloud Security RisksBy Gartner
GED-I Proprietary
11
GSA 2000 - Storage Encryption • Data Encryption (AES 256 XTS) • For Local Data Center, Hosting site and Cloud site
G4EC - Encryption and Access Control• Ensures the confidentiality of the data located at the Hosting/Cloud• Key manager and Encryption control unit, located at the customer site
GED-i’s Data Security suite
The Only End to End Solution
G4Crypt - Network Encryption• IP network Data encryption as it is transmitted between Customer sites
and cloud sites.
GED-I Proprietary
12
Data resides in remote cloud site - Data may be exposed to unauthorized eyes
Solution – GED-I storage encryption (GSA 2000)
User’s access to cloud site through public or private networks - Data may be viewed or changed
Solution – GED-I’s network encryption (G4Crypt)
Access Control – User has no control on users access to his own Data/Servers
Solution – GED-I’s Remote control over data encryption and accessibility (G4EC)
Data and Servers availability–
User has no control when his Data are approachable
Solution – GED-I’s Remote control over data encryption and accessibility (G4EC)
Shared Cloud infrastructures and services –
Separation between different cloud users
Solution – GED-I’s Remote control over data encryption and accessibility (GSA 2000)
Cloud’s Vulnerabilities and
GED-i’s Security Suite
GED-I Proprietary
13
Local Server
Clients
User Site
Cloud Services at remote site
Cloud
Data
Cloud
Servers
GKS 2000 Key Server
Cloud Data Encrypted
GSA 2000 EE Encryption Engine
Cloud data
Controlled by Cloud Client
GED-i’s Cloud Security suite
Transmitted Data Encrypted
IPSEC Agent
G4Crypt
&@
&@ &@
AB
Hybrid Cloud
GED-I Proprietary
Server
Clients
Clients
Public CloudGSA 2000 EE
Encryption Engines
GKS 2000 Key Server
GSA 2000 EE Encryption Engine
Main Site
CISCO MDS 9000
CISCO MDS 9000
CISCO MDS 9000
CISCO MDS 9000
Cloud Servers
Private Cloud
Cloud Storage
Local Storage
GED-I Proprietary
Data Encrypted on Cloud Storage devices Encryption per Physical server Encryption Keys at customer site Data Path encryption from Cloud site to Customer site NPIV data path – multi servers to multi targets Encryption per VM server Encryption per end-user VM Full Data Path encryption from Cloud storage to Cloud
Customer site Access to data only upon G4EC activation
X – available X - Under/Final development X - development
Security Offering status
GED-I Proprietary
Storage
Server
Clients
GKS 2000 Key Server
Storage data is Encrypted and Available to End Users
?&#@
Storage’s Data Security offering
ABCD
High Availability Solution
GED-I Proprietary
17
GEM 2000(Element Manager)Ethernet
FC / iSCSI
AES 256
Storage
Server
Clients
Clients
GSA 2000 EE (Encryption Engine)
GKS 2000 (Key Server)
GSA 2000 EE (Encryption Engine)
ABCD#W~Z
Why GED-i
Technology The BEST security - 2 (4) encryption layers with millions of keys Central Solution for any type of data or application Integrated solution into IBM (HP) storage Dedicated HW solution - Plug and Play, no performances degradation
but - S/W product available on standard HW servers (IBM, HP) A whole media protection approach Separated Key Manager locally or remotely Easy to install and to maintain Suitable to any Servers OS Suitable to any Storage manufacturer (IBM, EMC, HP, HDS, DELL...)
GED-I Proprietary
Why to encrypt (with GED-i)
Business Data Security is Enterprise’s “Show Stopper” Solution for Cloud/Storage/Hosting Operators for
Enterprises Solution for Enterprises for Cloud/Hosting/Storage Low TCO since no need to secure each application
independently Competitive Advantage over other operators Suitable to existing HW – Low investment
GED-I Proprietary
• Product Sales– Customers
• Cloud operators, Storage Center, Data Center, ISP (Amazon EC2)• The High-End Market : Enterprises, Health, Financing, Research Centers,
Government, Banking
– Channels - Partnership with Storage, IT and Security integrators/VARs to Local channels perform: Sales, integration, support, GED-I 2nd line support Transfer price may based on % of end user price (30%-35%)
– Pricing: starting at $30K
• Technology Sale - OEM/ Cooperation– Storage Devices Manufacturer (EMC, IBM, SUN, HP, DELL,
HDS,…)– Communication Devices Manufacturer (CISCO, Brocade)– Security: CA, Symantec, Check Point
GED-I Proprietary
GED-I’s Go to Market & Business Model
Storage Security - Based on external disks market size report by Gartner Q1/2010
GED-I Proprietary
21
Market size
Grow rate Sales in M$ 8% per security in M$ Penetration Addressable Market size M$
2012 5% $19,000 $1,520 35% $540
2013 5% $20,000 $1,600 35% $560
Sales Target
GED-I Proprietary
Assumptions
1.Sales through VARs and OEM agreements
2. moderate forecast
3. Based on $5M Investment
Product Type Price Description
Superior (1+2) $30,000 Superior configuration: 1*GKS +2*GSA+1*G4EC
Superior (1+3) $40,000 Superior configuration: 1*GKS +3*GSA+1*G4EC
Superior (1+4) $50,000 Superior configuration: 1*GKS +4*GSA+1*G4EC
Sales Projection summary (in end user price) as detailed below:
Year 1 2 3 4 5 Total
Sales $1M $6M $12M $20M $28M $67M
FeasibilityFeasibility
GED-I Proprietary
Based on• Existing customers• Discussions with: IBM, HP• Conferences• Consultants• Articles• Market Researches• Internal Knowhow
Investment OptionsInvestment Options
GED-I Proprietary
Targets• Expanding marketing and Sales activity• Product line expansion• More focus on the cloud market• 24 months of operation• Profitability
Investment sum equity Note
$6M 25% Investment
$25M 100% Buyout
SAN Storage
GED-I Proprietary
25
GFSS
GED-I Fast SAN Storage
For Performance demanding
application
Fast SAN Storage
GED-I Proprietary
26
For performance demanding applications:
“READ” at very fast speed
“WRITE” at very fast speed or no writing at all
“SAVE” to disk at regular speed, periodical or no data saving at all
For Mid-Range (SMB)
Utilizing standard HW platforms
SAN Storage
GED-I Proprietary
27
Target Market Mid-range (SMB) market
Competition VERY EXPENSIVE traditional storage
Advantages
No competition in the target market (??)
Usage of “every” 3rd party Server or JBOD
Un-matched price level (S/W)
Target Applications
GED-I Proprietary
28
Query Data Bases (DB)
VOD Download Servers Image Processing
Data Confidential application
Music on Demand
Simulation Video Processing
Sharing Systems Army Systems
Fast Boot Application
QA/Testing systems
Network Security
GED-I Proprietary
29
G4Cypt
Network Encryption
For public and Private Network
Click to edit Master title style
Encrypting Data transmitted
between IT islands
Network Encryption
Encrypted IP Network
IPsec AES 256Public Network
ABCD%&^#
ABCD
Click to edit Master title style
G4Crypt Models
An encryption appliance Desktop or 19” Rack mountable device Point to Multi Point (P2MP) and Point to Point (P2P)
AES 256 standard encryption Full Duplex Encryption Encryption rates at 100, 300, 600Mbs and near 1Gbs HW Bypass for fast recovery Remote management (SNMP, SSH )
Click to edit Master title style
Radio Network Encryption
Central Site
Site A Site B
Site CSite D
G4Crypt 300
Click to edit Master title style
Total Solution by GED-i
Thank YouThank You
GED-I Proprietary
For contact:
GED-I Ltd
www.ged-i.com
+972 9 8355600
+972 52 6498246
About GED-i Ltd
GED-I Proprietary
Israeli Company
Founded in 2005
Office is Netanya, Israel
Patent granted in USA
Sales channels - Europe, Asia, Israel
Sales – Selected to secure Italy PA network
The ProblemThe Problem
GED-I Proprietary
Privacy regulations, Data breaches result in huge financial damages and business optimization obliges to secure private data and are the rationale behind the need to encrypt data on storage devices.
Today, almost all the data resides on storage devices is not encrypted. The vulnerability of non-encrypted stored data is one of the most critical security problems to enterprises, financial, health organization, government and defense.
The merging of Cloud Computing and virtualization technologies, which based on storing data at remote sites, creates major security considerations which increases the need for remote data encryption.
Moreover, in the few cases of encrypted data, a penetration into storage system, lost or stolen Disk gives the thief sufficient time to use advanced tools over Known Data Structure over a large amount of data to break the encryption (if any), to hack into and to expose the information.
Product DescriptionProduct Description
GED-I Proprietary
GED-i’s appliance is installed adjacent to the Storage device ports and any data transferred to the storage device is encrypted and decrypted while it is transferred back to the user in real time. All the data is kept encrypted on the storage disks.
The required key-information for the encryption process and for the decryption process is saved on a dedicated external key server (or in All-in-ONE solution on an external retractable physical device such as a flash memory on USB port, PCMCIA, CD, server disk, etc).
Technology DescriptionTechnology Description
GED-I Proprietary
GED-i’s solution is a Central Storage Data Security that uses 4 layers of Encryption:
The basic layer is a standard AES-256-XTS encryption of the data,
The second layer is storage segmentation, The third level is geometric restructuring
(scrambling) layer implemented as part of the actual writing to the storage device.
The fourth layer, the interference, involves special operations on the storage device to reduce the traceability of the storage surface characteristics.
Security Target Markets
GED-I Proprietary
39
Cloud Computing
Cloud Operator as Infrastructure as Service
Enterprise external DC
Enterprise DRP
Enterprise
Internal data center Private cloud DRP / Hosting Network connecting
remote sites
Sensitive and Confidential Data at:
Target Markets - Customers
GED-I Proprietary
40
Enterprise branches
University campus
Hospital sites
Research Centers
Grocery chains
Casino sites
Telecom
Enterprise
Cloud Operator
University
Bank
Payment Processor
Insurance
Hospital
Government
Defense
Airlines company
Municipal Authority
Police
ISP
Telecom
Airports
Cities
Communication
Law enforcement
Defense bases
Private Networks
Data security for the Civilian & HLS
GED-I Proprietary
Storage Data security What is it
Encrypting Data resides on Storage Devices
Preventing INTERNAL data hacking
Data is secured even if was copied
Secures ANY type of data
For Enterprise Internal DC or Cloud site DC
GED-I Proprietary
Network Data security What is it
Encrypting Data transferred over Public or Private networks
Preventing Data exposure even if data is
hacked
Securing Enterprise data transferred between Remote Operational sites
GED-I Proprietary
Cloud/Storage Security - Why
• PCI DSS• CA 1386• DOD 5015
Compliance to Privacy Regulations
Data Security• Data Security is a “Show Stopper” for cloud
computing, mainly to Enterprises• Data deployment risks – Cloud, Hosting, Data Center • Control over Data Security measures
• HIPAA• GBL• Basel II
Cloud Security Problem
CLOUD Customer
Customer
Customer
Data
Processing
Data1
Data2
Integrity, AvailabilityConfidentiality,
GED-I Proprietary
44
GED-I Proprietary
45
GSA 2000 - Storage Encryption • Data Encryption (AES 256 XTS) • For Local Data Center, Hosting site and Cloud site
G4EC - Encryption and Access Control• Ensures the confidentiality of the data located at the Hosting/Cloud• Key manager and Encryption control unit, located at the customer site
G4Crypt - Network Encryption• IP network Data encryption as it is transmitted between Customer sites
and cloud sites.
GED-i’s Data Security suite
The Only End to End Solution
GED-I Proprietary
46
Local Server
Clients
User Site
Cloud Services at remote site
Cloud
Data
Cloud
Servers
GKS 2000 Key Server
Cloud Data Encrypted
GSA 2000 EE Encryption Engine
Cloud data
Controlled by Cloud Client
GED-i’s Cloud Security suite
Transmitted Data Encrypted
IPSEC Agent
G4Crypt
&@
&@ &@
AB
Hybrid Cloud
GED-I Proprietary
Server
Clients
Clients
Public CloudGSA 2000 EE
Encryption Engines
GKS 2000 Key Server
GSA 2000 EE Encryption Engine
Main Site
CISCO MDS 9000
CISCO MDS 9000
CISCO MDS 9000
CISCO MDS 9000
Cloud Servers
Private Cloud
Cloud Storage
Local Storage
GED-I Proprietary
Storage
Server
Clients
GKS 2000 Key Server
Storage data is Encrypted and Available to End Users
ABCD?&#@
Storage’s Data Security offering
High Availability Solution
GED-I Proprietary
49
GEM 2000(Element Manager)Ethernet
FC / iSCSI
AES 256
Storage
Server
Clients
Clients
GSA 2000 EE (Encryption Engine)
GKS 2000 (Key Server)
GSA 2000 EE (Encryption Engine)
ABCD#W~Z
Why GED-i
Technology The BEST security - 2 (4) encryption layers with millions of keys Central Solution for any type of data or application Integrated solution into IBM (HP) storage Dedicated HW solution - Plug and Play, no performances degradation
but - S/W product available on standard HW servers (IBM, HP) A whole media protection approach Separated Key Manager locally or remotely Easy to install and to maintain Suitable to any Servers OS Suitable to any Storage manufacturer (IBM, EMC, HP, HDS, DELL...)
GED-I Proprietary
Why to encrypt (with GED-i)
Business Data Security is Enterprise’s “Show Stopper” Solution for Cloud/Storage/Hosting Operators for
Enterprises Solution for Enterprises for Cloud/Hosting/Storage Low TCO since no need to secure each application
independently Competitive Advantage over other operators Suitable to existing HW – Low investment
GED-I Proprietary
Pricing – GSA 2000
Based on number of storage secured ports Per single main SAN storage 2-6 ports should be secured Major customers may have 10s-100s storage units Basic price is per single GSA 2000 appliance used to encrypt
single storage port - $10K-$16K (end user price) Actual value of basic price is depended on the link speed
(1Gbps, 4 Gbps, 8Gps) Single GSA 2000 used to encrypt 2 storage ports – $20K-$32K Single GSA 2000 used to encrypt 4 storage port – $36K-$58K Maximum encrypted storage ports per GSA 2000 – 4 ports Price is for HW and SW In special case GED-I may grant the authority to local integrator
to integrate the SW with locally purchased HW
GED-I Proprietary
Business Model
Partnership with USA based channels such as integrators and VARs
Local channels perform: Sales, integration, support GED-I supplies 2nd line support Transfer price may based on % of end user price (30%-35%) or
fix transfer price with free end-user pricing (projects)
GED-I Proprietary
Network Security
GED-I Proprietary
54
G4Cypt
Network Encryption
For public and Private Network
Click to edit Master title style
Encrypting Data transmitted
between IT islands
Network Encryption
Encrypted IP Network
IPsec AES 256Public Network
ABCD%&^#
ABCD
Click to edit Master title style
G4Crypt Models
An encryption appliance Desktop or 19” Rack mountable device Point to Multi Point (P2MP) and Point to Point (P2P)
AES 256 standard encryption Full Duplex Encryption Encryption rates at 100, 300, 600Mbs and near 1Gbs HW Bypass for fast recovery Remote management (SNMP, SSH )
Click to edit Master title style
Radio Network Encryption
Central Site
Site A Site B
Site CSite D
G4Crypt 300
Click to edit Master title style
Total Solution by GED-i
SAN Storage
GED-I Proprietary
59
GFSS
GED-I Fast SAN Storage
For Performance demanding
application
Fast SAN Storage
GED-I Proprietary
60
For performance demanding applications:
“READ” at very fast speed
“WRITE” at very fast speed or no writing at all
“SAVE” to disk at regular speed, periodical or no data saving at all
For Mid-Range (SMB)
Utilizing standard HW platforms
SAN Storage
GED-I Proprietary
61
Target Market Mid-range (SMB) market
Competition VERY EXPENSIVE traditional storage
Advantages
No competition in the target market (??)
Usage of “every” 3rd party Server or JBOD
Un-matched price level (S/W)
Target Applications
GED-I Proprietary
62
Fast Boot Application
Query Data Bases (DB)
VOD Download Servers
Image Processing
Data Confidential application
Music on Demand
Simulation Video Processing
Sharing Systems
Army Systems
SAN Storage
GED-I Proprietary
63
Model Name Read write Save on Disk
FR-NW Yes – at very high speed No No
FR-FW Yes – at very high speed Yes – at very high speed, only to memory LU
No
FR-PW Yes – at very high speed Yes Yes – from time to time
FR-SW Yes – at very high speed Yes Yes – immediately, at Standard disks speed
Benefits
As a result of GED-I unique technology and product architecture that enables to overcome the Storage inherent vulnerabilities, GED-I’s solution advantages over other solutions are:
Stronger security through 4 layers protection: AES, Segmentation, Scrambling and Interference.
Real Physical separation between the Encryption Engine and remote Key Server. Increasing the solution immunity to physical theft and to penetration and copy of the Encryption unit.
Use of hundreds of thousands or even millions of AES 256 encryption Keys
Line Speed or “Near” line speed
Selection of H/W platform from leading server manufacturers (IBM, SUN, HP)
Integrated solution into IBM’s Storage
Data decryption is always guaranteed due to the secured backup of the remote Key server.
No use of Backdoors for recovery due to the secured copy of the remote key server.
No Use of Master key for recovery due to the secured copy of the remote key server.
The 4 layers technology guarantees long term security even if the AES, or other standard encryption methods, will be mathematically compromised.
As the media volume becomes larger, the protection gets stronger GED-I Proprietary
GED-I vs. Competition
GED-I Proprietary
GED-I vs. Competition
GED-I Proprietary
GED-I vs. Competition
GED-I Proprietary
Thank YouThank You
GED-I Proprietary
For contact:
GED-I Ltd
www.ged-i.com
+972 9 8355600
+972 52 6498246
Use Case
GED-I Proprietary
ATO ( Turkish, Ankara Chamber of Commerce ).
(1) Storage encryption solution for SAN storage based on 2* GSA 2000 encryption engines and single Key manager GKS 2000. On line, Real time Encryption and decryption!
(2) Securing HP SAN storage devices
(3) FC link at 4Gbps.
Ofek Aerial Photography (For Defense/Governmental and Public market).
(1) Storage encryption solution for SAN storage based on GSA 2000 encryption engines. On line, Real time Encryption and decryption of about 1TB per day !
(2) Storage and users Network optimization planning and design
(3) Securing SUN SAN storage
(4) iSCSI link at 1Gbps
Private Network of "Ministero Grazia e Giustizia" (Minister of Justice) in Italy
(1) IP to IPsec Encryption for 300Mbs using the G4Crypt product , January 2010
GED-i High Availability Solution
Customer in Israel
GED-I Proprietary
Ethernet
Ethe
rnet
GKS 2000 (Key Server) GEM 2000
(Element Manager)
GSA 2000 EE (Encryption Engine)
CIFS
AES 256 XTS
SUN Storage
7410
File Server
Port 1
Port 2
Port 4
Port 3
Clients
Clients
CIFS
Backup tape
SUN StorageTeK SL24FC
Encrypted data backupNON- Encrypted data backup
CIFS
iSCSI
iSCSI
Port 5
CIFS
GED-i High Availability Solution
Governmental Customer in Europe
GED-I Proprietary
Ethernet
Ethe
rnet
GKS 2000 (Key Server)
GEM 2000(Element Manager)
2 * GSA 2000 EE 1U Twin server
(Encryption Engine)
AES 256 XTS
HP EVA
File Server
Port i
Clients
Clients
FCPort j
FC
Clients
Integrated solution HPCloud in Europe
GED-I Proprietary
72
FC
Server
Clients
Ethernet
GKS 2000 Key Server
HP
2 * GSA 2000 EE HP BL460 G7
HP EVA
HP EVA
Customer SiteCloud Site
GED-i Ltd Data Security/Encryption solutions
GED-i Ltd Data Security/Encryption solutions
GED-I Proprietary
The only solution that guarantees security of stored data through four layers of encryption.
Companies spent $6.65M in average to recover from single data lost in 2008. According to the Ponemon Institute's 2008 Cost of Data Breach study,
GED-i provides leading Security/Encryption solutions for enterprise's storage devices and IP networks,
ensuring data privacy even if the data was exposed or viewed by unauthorized entity.
Pricing – G4Crypt
Based on link speed ( 100Mbps, 300Mbps, 600Mbps, 1Tbps) Server model may be used to connect to up to 15 clients model Basic price is per single client G4Crypt appliance used to
encrypt single link - ex. 3200$ per 300Mbs link speed Actual value of basic price is depended on the link speed Server Model price is depended on number of connected clients Price is for HW and SW – ex server for 6 clients at 300Mbs –
4200$. In special case GED-I may grant the authority to local integrator
to integrate the SW with HW
GED-I Proprietary
Pricing – G4Crypt
Based on link speed ( 100Mbps, 300Mbps, 600Mbps, 1Tbps) Server model may be used to connect to up to 15 clients model Basic price is per single client G4Crypt appliance used to
encrypt single link - ex. 3200$ per 300Mbs link speed Actual value of basic price is depended on the link speed Server Model price is depended on number of connected clients Price is for HW and SW – ex server for 6 clients at 300Mbs –
4200$. In special case GED-I may grant the authority to local integrator
to integrate the SW with HW
GED-I Proprietary