Image Title

Search Results for 1.2 millionunfilled security professional roles:

Will Kapcio, HackerOne & Sean Ryan, HackerOne | AWS re:Inforce 2022


 

(theme music) >> Okay, welcome back everyone, theCUBE's live coverage here in Boston, Massachusetts for AWS re:Inforce '22. Big show for ground security, Amazon re:Invent's coming up. That's the big event of all time for AWS. re:MARS was another one, re:Inforce, the re:Shows, they call them, theCUBE's got you covered. I'm John Furrier, host of theCUBE with Dave Vellante, who's in an analyst session right now. He'll be back shortly. We've got 2 great guests from an amazing company, HackerOne, been on theCUBE many times, (mumbles) Marten Mickos, of course, a big time, (mumbles) We got two great guests. Sean Ryan, Sr. Principal Product Marketing Manager Will Kapcio, Senior Sales Engineer. Gents, welcome to theCUBE. >> Thanks for having us John. >> So Marten's been on many times, he's such a character. He's such a legend. >> Yeah. >> Your company has had great traction, great community, just this phenomenal example of community meets technology and problem solver. >> Yeah. >> He's been part of that organization. Here at re:Inforce they're just kind of getting wind of it now, right? You hear an open, teamwork, breaking down the silos, a big theme is this whole idea of open community, but yet be hardcore with the security. It's been a big part of the re:Inforce. What do you guys think of the show so far? >> Loving it. Partly too, we're both local here in the Boston area. So the commute was pretty nice. (everyone laughs) And the heat wave broke the other day so that's wonderful, but yeah, great show. It's good to be back in person doing this kind of stuff and just, it's really lively. You get a lot of good energy. We've had a bunch of people stopping by trying to learn what we're all about and so, it's really fun. Great show so far. >> And you guys have a great company. Take a minute to explain for the folks who may not know HackerOne. Tell them what you guys do real quick in one minute. >> Okay, the quick elevator pitch. (chuckles) So really we're making the internet safer using a community of ethical hackers. And so our platform enables that so we can skill match the best talent that's out there around the world to help find all the vulnerabilities that your company needs to discover. So you can plug those holes and keep yourself safe. >> So in an era of a talent gap, Will, you know the technologies out there, but sometimes the skills are not there. So you guys can feel the void kind of a crowdsourced vibe, right? >> Yeah, exactly. If you're trying to build a security program, and apply defense in depth, we offer a terrific way to engage additional security talent either because you can't hire enough or your team is simply overloaded, too much to do, so. >> Hackers like to be a little bit, white hat hackers like to be independent, might want some flexibility in their schedule, live around the world. >> Yes. No question for hackers that do it full time, that do it part-time and then everything in between. >> Well, you guys are in the middle here with some real products. So talk about what's going on here. How vulnerable are the surface areas in organizations that you're seeing? >> Yeah, probably more so than you would think. So we ran a survey earlier this year, 800 security and IT professionals across North America and Europe. And one of the findings from that survey was that nearly a third, actually over a third, 37% of the attack surfaces, not secured. Some of it's not even known. They don't know what they don't know. They just have this entire area. And you can imagine, I mean there's a lot of reasons you know, real legitimate reasons that this happens. One of those really being that we don't know what we don't know. We haven't scanned our attack surface. >> And also it's about a decade of no perimeter anymore. >> Yes. >> Welcome to the cloud. >> For sure. Absolutely. And people are moving quick, right? You know, the Cloud perfect example. Cloud people are building new applications on top of these new underlying configurations happening on a constant basis. Acquisitions, you know, that's just a fast moving thing. Nobody can keep track of it. There's a lot of different skill sets you need you know. And yeah, skill shortage out there too. As we talked about. >> What's the attacker solution you guys have? You guys have this HackerOne attack resistance component, what's that about? >> That's right. So that is to solve what we call the attack resistance gap. So that area that's not protected, hasn't been secured, on top of just not knowing what those assets are, or how vulnerable they are. The other thing that happens is people are sort of doing status quo testing, or they're not able to keep up with effective testing. So scanners are great. They can catch common vulnerabilities, but they're not going to catch those really hard to find vulnerabilities. The thing that the really sophisticated attackers are going to go after. >> Yeah. >> So we use... This large community that we have of ethical hackers around the world to be able to skill match them and get them doing bug bounties, doing pen tests, really bulletproofing the organization, and helping them risk-rank what they find. >> Yeah. >> Triage these, do the retesting, you know, get it very secure. So that's how we do it on a high level. Will, you might have a-- >> Yeah. I mean there's a tremendous amount of automation out there, right? But you can't quite at least not yet replace critical thinking. >> Yeah. >> From smart security minds. So HackerOne has a number of solutions where we can apply those minds in different ways at different parts of the software life cycle at different cadences, to fit our customers' needs, to fit their security needs, and make sure that there's more complete human coverage throughout their software lifecycle, and not just automation. >> Yeah. I think that's a great point, Will and Sean, because you think about open source is like not only grown significantly, it's like's it is the software industry. If you believe that, which I do. Open source is there it's all software free. The integration is creating a DevOps movement that's going the whole level. So Devs are doing great. They're pumping out codes. In fact, I heard a quote here on theCUBE earlier this morning from the CTO Sequence Security that said: "Shift left but shield right." So shifting left is build your security into the code, but still you got to have a shield. You guys have this shielding capability with your attack module management service. So you now you got the Devs thinking: "I got to get better security native" So but they're pumping out so much code. >> Yep. >> There's more use cases, so there's going to be code reviews needed for stuff that she said, "What is this? We got to code review new stuff. A developer created something." >> Yes. >> I mean, that's what happened. That's what's going on everywhere, right? >> Exactly. We often hear that for every 100 developers, you've got one security professional. (John laughs) You know, talk about skill shortage that's just not sustainable. How are you going to keep up with that? >> Yeah. >> So-- >> Your phone is ringing off the hook. There's no phones anymore, but like technically-- >> Yeah, yeah, exactly. So, you know, yeah, you need to go external find some experts who can help you figure that out, and keep up with that cadence, you know keeps going and going. >> So, HackerOne. I love the ethical thing. I mean, you know, I'm a big fan. Everyone who watches theCUBE knows I'm a big fan of Marten and your company, but it's not just bug bounties that you do. That's just people think of, they see that in the news. "Oh, I made a million dollars from saving Microsoft teams from being exploited" or something like that, or weird things big numbers. But you do more than that. There's code reviews, there's assessments, like a variety of different things, right? >> Yes, exactly. Exactly. >> What are the hottest areas? >> Yeah, I mean, that's exactly why we coined the term, Attack Resistance Management really is to help describe all those areas that we cover, so you're right, bug bounty is our flagship product. It's what we're best known for. And it's a terrific solution. But on top of that, we're able to layer things like vulnerability disclosure, pen testing and code review. >> Pen test is actually really important-- >> Attack surface management, you know, a whole suite of complimentary offerings to help you engage these hackers in new and interesting ways. >> Yeah. >> The bug bounty is very popular because it's fun. >> Yeah. >> I mean if your going to work on something... It's fun for the hackers but the white hat hackers, the companies they can see where's my bugs it's the fear of missing out and the fear of getting screwed over. That's the biggest driver, right, you Know-- >> Yes, definitely and we now have a product called assets. So this is attack surface management. And what we're able to do with that is bring that in leverage the ethical hackers to risk-rank. What's your assets out there? How vulnerable are these? What's critical? Feed that in, and then you know, as Will was saying we've got all kinds of different testing options. Sometimes bug bounty continuous that works. Sometimes you want pen test, you know, you want it bound. >> Well, the thing about the thing about the pen test, well the soccer report, Amazon's got soccer reports but pen test is a moving train. >> Yeah >> Cause if you're pushing new code, you got to pen test it all the time. It's not a one and done. >> Exactly. >> You got to keep it running. Just one and run, right? >> You can't do the old school penetration test once a year, big monolithic thing. You know, this is just a check the box for compliances like, no, you need to be focusing this on the assets that you're releasing, which are constantly changing. And doing ongoing smaller cadences of pen testing. >> I had someone at a conference had a few cocktails in them, confessed to me, that they forged a pen test report. >> Oh man. >> Wow! (everyone laughs) >> Because he's like, "Oh! It was three months ago. Don't Worry about it." Like, but a lot can happen in three months. No, this is reality, they are like, "I can't turn it around fast enough" They had an Apsec review... >> Yeah. >> In their company and... >> And that's it. >> I mean, I'm not saying everyone's doing bad behavior, but like people can look the other way that creates more vulnerabilities. >> It can happen. And even just that time space. Let's say you're only doing a pen test once a year or once every two years. That's a long time. It's a lot of dwell time, you can have an attacker inside mulling around your network. >> All right. So we get a big service here. This one, AWS, we're here at re:Inforce the trend that you see Amazon getting closer to the ecosystem, lot more integration. How are you guys taking HackerOne's attack surface area product management software, closer to Amazon? What's going involved? Because at the end of the day they're enabling a lot of value and their partners are growing and becoming platforms within of themselves. What is the connection with Amazon? Keeping those apps running? How do you guys do that? >> Yeah. So we've got a specific assessment type for AWS. So... On the one hand, we're bringing in the right group of ethical hack hackers who are AWS certified. They have the right skillset, we're matching them. We've got the right assessment type for them to be able to track against and find the right vulnerabilities, report on those. So this is our pen test offering geared particularly towards the AWS platform. And then we also have an AWS security hub integration. So if customers are using the AWS security hub, we can plug into that, feed that information. And that gets more to it, the defense and depth for your AWS. >> And you guys verify all the ethical hackers? Everything's verified? >> Oh yes, absolutely. Fully. >> Yep. So they're verified for their pen testing experience, and skills and of course their AWS skills in particular. And their work experience, making sure that it's long enough that it's good, background check, the whole nine, so. >> How far has Amazon come from your perspective, over the past few years with the security partnerships? I mean their services have grown every year. I mean, every Amazon re:Invent, thousands of new announcements, new services. I mean if they update the DNS server, it's a new thing. Right? So like everything's happening. >> Yeah. >> What's different now? >> It's great to see. I mean, you look around at how many different types of security solutions there are here how many different types of partners, and it just shows you that defense in depth again, it's a really critical thing. Been a wonderful partner for us. I mean that, they're a big fan of us. They tell us that all the time. >> Yeah, 'cause the customers use you. >> Cause they're customers too. Right. Exactly. Exactly. But no, it's, it's been great. So we're looking at, we've got some things on the roadmap, some continued integrations that we look forward to doing with AWS, but you know, again it's a great powerful platform. It gives customers a lot of freedom, but with that freedom comes the responsibility that's needed to actually-- >> Will, what's your take? We hear hybrid security keys, management systems, announced today, encrypt everything, don't have over permissive environments. Obviously they're talking about more platform and that type of stuff >> Absolutely. My take would be, I think our own partnership with the AWS security team is great evidence that they're thinking about the right things. We worked within conjunction with them to develop our pen test methodology. So that combined for proprietary HackerOne platform data and findings across all of our customers that are common issues found in AWS environments with their own knowledge and their own experiences from the AWS security team directly. So it's a pretty powerful checklist that we're able to run through on some of these customers and make sure that all of the most common miss-configurations and such are covered. >> Yeah. They're highly motivated to do that. 'Cause they get blamed for the S3 buckets being kept open. It's not even their fault. >> Right. (crosstalk) >> We got hack over in Amazon. Amazon's terrible! >> Yeah. You know, one of the things we like to talk about is the fact that, you know, cloud is really about automation, right? >> Yeah. >> Yep. >> But you can't automate that human ingenuity the skills that come with an actual human who has the experience and the know how to fix these things. >> It's a lot going on in Amazon. It's always been kind of like, you just described earlier in theCUBE. An erector set, not Lego blocks yet, but still kind of, you still got to build it. It's getting better in the Lego model, but there are challenges in protecting cloud, Will. I mean this is a big part of protecting cloud platforms like AWS. What are some of those challenges? >> I think some of the challenges are the ephemeral nature of the cloud can really result in developers, and you know really business units across an organization spinning up assets that IT or security don't know about. And so that's where things like HackerOne assets in those attack surface management style solutions come into play, trying to identify those assets proactively and make sure that they're receiving some sort of attention from the security team whether it's automated or manual or ideally both. >> You guys got a good solution. So how about the partnership? We got one minute left. Talk about your partnership with AWS. You guys are certified in their security group, with their team and marketplace, right? Talk about some of those things. >> Yeah, we've been in marketplace over a year. We've had that the specific solution that I mentioned the App Pen test for AWS in place and integrated with security hub for some time now. There's some other stats that we could probably share around the ethical hackers that we have working on that. We have a number of certified AWS hackers, who again they have the right skill set for AWS, and they've been a great partner. We are very focused on continuing to work with them, and build out some new offerings going forward. >> Well, you guys have done a great job. Will, tell your team congratulations on the tech side, on the product side, very strong community. You guys had a lot of success. Congratulations! And thanks for sharing on theCUBE, appreciate it. >> Thanks for having us John. >> Thank you for your time-- We're here at re:Inforce where all the access tab is open, it's team oriented, we got cloud scale, data, encryption on everything. Big news coming out of re:Inforce, well, theCUBE's got it covered here. I'm John Furrier, your host. Thanks for watching. We'll be right back with more coverage after this short break. (theme music)

Published Date : Jul 26 2022

SUMMARY :

That's the big event of all time for AWS. So Marten's been on many and problem solver. It's been a big part of the re:Inforce. So the commute was pretty nice. And you guys have a great company. So you can plug those holes So you guys can feel the void either because you can't hire enough Hackers like to be a that do it full time, that do it part-time Well, you guys are in the middle here 37% of the attack surfaces, not secured. decade of no perimeter anymore. You know, the Cloud perfect example. So that is to solve what we around the world to be do the retesting, But you can't quite and make sure that there's So you now you got the Devs thinking: We got to code review new stuff. I mean, that's what happened. How are you going to keep up with that? Your phone is ringing off the hook. So, you know, yeah, bounties that you do. Exactly. really is to help describe to help you engage these hackers The bug bounty is very and the fear of getting screwed over. bring that in leverage the Well, the thing about the you got to pen test it all the time. You got to keep it running. You can't do the old school confessed to me, that they Like, but a lot can but like people can look the other way And even just that time space. the trend that you see and find the right vulnerabilities, Oh yes, absolutely. check, the whole nine, so. over the past few years with and it just shows you that on the roadmap, some and that type of stuff and make sure that all of the most common motivated to do that. Right. We got hack over in Amazon. you know, cloud is really the skills that come with an actual human It's getting better in the Lego model, and you know really business units So how about the partnership? We've had that the specific solution congratulations on the tech side, all the access tab is open,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

AWSORGANIZATION

0.99+

John FurrierPERSON

0.99+

Sean RyanPERSON

0.99+

AmazonORGANIZATION

0.99+

Marten MickosPERSON

0.99+

MartenPERSON

0.99+

JohnPERSON

0.99+

WillPERSON

0.99+

Will KapcioPERSON

0.99+

BostonLOCATION

0.99+

SeanPERSON

0.99+

North AmericaLOCATION

0.99+

MicrosoftORGANIZATION

0.99+

EuropeLOCATION

0.99+

one minuteQUANTITY

0.99+

Boston, MassachusettsLOCATION

0.99+

three months agoDATE

0.99+

once a yearQUANTITY

0.99+

2 great guestsQUANTITY

0.98+

LegoORGANIZATION

0.98+

OneQUANTITY

0.98+

earlier this yearDATE

0.98+

todayDATE

0.98+

over a yearQUANTITY

0.97+

bothQUANTITY

0.97+

800 security and IT professionalsQUANTITY

0.97+

nineQUANTITY

0.97+

theCUBEORGANIZATION

0.97+

nearly a thirdQUANTITY

0.96+

oneQUANTITY

0.96+

a million dollarsQUANTITY

0.96+

HackerOneORGANIZATION

0.94+

over a third, 37%QUANTITY

0.93+

three monthsQUANTITY

0.93+

two great guestsQUANTITY

0.92+

CTO Sequence SecurityORGANIZATION

0.91+

S3COMMERCIAL_ITEM

0.9+

ApsecORGANIZATION

0.9+

earlier this morningDATE

0.9+

once every two yearsQUANTITY

0.89+

2022DATE

0.86+

HackerOnePERSON

0.86+

InforceORGANIZATION

0.84+

thousands of new announcementsQUANTITY

0.77+

one of the findingsQUANTITY

0.76+

100 developersQUANTITY

0.75+

about a decadeQUANTITY

0.74+

re:ShowsEVENT

0.72+

one security professionalQUANTITY

0.7+

Day One Afternoon Keynote | Red Hat Summit 2018


 

[Music] [Music] [Music] [Music] ladies and gentlemen please welcome Red Hat senior vice president of engineering Matt Hicks [Music] welcome back I hope you're enjoying your first day of summit you know for us it is a lot of work throughout the year to get ready to get here but I love the energy walking into someone on that first opening day now this morning we kick off with Paul's keynote and you saw this morning just how evolved every aspect of open hybrid cloud has become based on an open source innovation model that opens source the power and potential of open source so we really brought me to Red Hat but at the end of the day the real value comes when were able to make customers like yourself successful with open source and as much passion and pride as we put into the open source community that requires more than just Red Hat given the complexity of your various businesses the solution set you're building that requires an entire technology ecosystem from system integrators that can provide the skills your domain expertise to software vendors that are going to provide the capabilities for your solutions even to the public cloud providers whether it's on the hosting side or consuming their services you need an entire technological ecosystem to be able to support you and your goals and that is exactly what we are gonna talk about this afternoon the technology ecosystem we work with that's ready to help you on your journey now you know this year's summit we talked about earlier it is about ideas worth exploring and we want to make sure you have all of the expertise you need to make those ideas a reality so with that let's talk about our first partner we have him today and that first partner is IBM when I talk about IBM I have a little bit of a nostalgia and that's because 16 years ago I was at IBM it was during my tenure at IBM where I deployed my first copy of Red Hat Enterprise Linux for a customer it's actually where I did my first professional Linux development as well you and that work on Linux it really was the spark that I had that showed me the potential that open source could have for enterprise customers now iBM has always been a steadfast supporter of Linux and a great Red Hat partner in fact this year we are celebrating 20 years of partnership with IBM but even after 20 years two decades I think we're working on some of the most innovative work that we ever have before so please give a warm welcome to Arvind Krishna from IBM to talk with us about what we are working on Arvind [Applause] hey my pleasure to be here thank you so two decades huh that's uh you know I think anything in this industry to going for two decades is special what would you say that that link is made right Hatton IBM so successful look I got to begin by first seeing something that I've been waiting to say for years it's a long strange trip it's been and for the San Francisco folks they'll get they'll get the connection you know what I was just thinking you said 16 it is strange because I probably met RedHat 20 years ago and so that's a little bit longer than you but that was out in Raleigh it was a much smaller company and when I think about the connection I think look IBM's had a long long investment and a long being a long fan of open source and when I think of Linux Linux really lights up our hardware and I think of the power box that you were showing this morning as well as the mainframe as well as all other hardware Linux really brings that to life and I think that's been at the root of our relationship yeah absolutely now I alluded to a little bit earlier we're working on some new stuff and this time it's a little bit higher in the software stack and we have before so what do you what would you say spearheaded that right so we think of software many people know about some people don't realize a lot of the words are called critical systems you know like reservation systems ATM systems retail banking a lot of the systems run on IBM software and when I say IBM software names such as WebSphere and MQ and db2 all sort of come to mind as being some of that software stack and really when I combine that with some of what you were talking about this morning along hybrid and I think this thing called containers you guys know a little about combining the two we think is going to make magic yeah and I certainly know containers and I think for myself seeing the rise of containers from just the introduction of the technology to customers consuming at mission-critical capacities it's been probably one of the fastest technology cycles I've ever seen before look we completely agree with that when you think back to what Paul talks about this morning on hybrid and we think about it we are made of firm commitment to containers all of our software will run on containers and all of our software runs Rell and you put those two together and this belief on hybrid and containers giving you their hybrid motion so that you can pick where you want to run all the software is really I think what has brought us together now even more than before yeah and the best part I think I've liked we haven't just done the product in downstream alignment we've been so tied in our technology approach we've been aligned all the way to the upstream communities absolutely look participating upstream participating in these projects really bringing all the innovation to bear you know when I hear all of you talk about you can't just be in a single company you got to tap into the world of innovation and everybody should contribute we firmly believe that instead of helping to do that is kind of why we're here yeah absolutely now the best part we're not just going to tell you about what we're doing together we're actually going to show you so how every once you tell the audience a little bit more about what we're doing I will go get the demo team ready in the back so you good okay so look we're doing a lot here together we're taking our software and we are begging to put it on top of Red Hat and openshift and really that's what I'm here to talk about for a few minutes and then we go to show it to you live and the demo guard should be with us so it'll hopefully go go well so when we look at extending our partnership it's really based on three fundamental principles and those principles are the following one it's a hybrid world every enterprise wants the ability to span across public private and their own premise world and we got to go there number two containers are strategic to both of us enterprise needs the agility you need a way to easily port things from place to place to place and containers is more than just wrapping something up containers give you all of the security the automation the deploy ability and we really firmly believe that and innovation is the path forward I mean you got to bring all the innovation to bear whether it's around security whether it's around all of the things we heard this morning around going across multiple infrastructures right the public or private and those are three firm beliefs that both of us have together so then explicitly what I'll be doing here number one all the IBM middleware is going to be certified on top of openshift and rel and through cloud private from IBM so that's number one all the middleware is going to run in rental containers on OpenShift on rail with all the cloud private automation and deployability in there number two we are going to make it so that this is the complete stack when you think about from hardware to hypervisor to os/2 the container platform to all of the middleware it's going to be certified up and down all the way so that you can get comfort that this is certified against all the cyber security attacks that come your way three because we do the certification that means a complete stack can be deployed wherever OpenShift runs so that way you give the complete flexibility and you no longer have to worry about that the development lifecycle is extended all the way from inception to production and the management plane then gives you all of the delivery and operation support needed to lower that cost and lastly professional services through the IBM garages as well as the Red Hat innovation labs and I think that this combination is really speaks to the power of both companies coming together and both of us working together to give all of you that flexibility and deployment capabilities across one can't can't help it one architecture chart and that's the only architecture chart I promise you so if you look at it right from the bottom this speaks to what I'm talking about you begin at the bottom and you have a choice of infrastructure the IBM cloud as well as other infrastructure as a service virtual machines as well as IBM power and IBM mainframe as is the infrastructure choices underneath so you choose what what is best suited for the workload well with the container service with the open shift platform managing all of that environment as well as giving the orchestration that kubernetes gives you up to the platform services from IBM cloud private so it contains the catalog of all middle we're both IBM's as well as open-source it contains all the deployment capability to go deploy that and it contains all the operational management so things like come back up if things go down worry about auto scaling all those features that you want come to you from there and that is why that combination is so so powerful but rather than just hear me talk about it I'm also going to now bring up a couple of people to talk about it and what all are they going to show you they're going to show you how you can deploy an application on this environment so you can think of that as either a cloud native application but you can also think about it as how do you modernize an application using micro services but you don't want to just keep your application always within its walls you also many times want to access different cloud services from this and how do you do that and I'm not going to tell you which ones they're going to come and tell you and how do you tackle the complexity of both hybrid data data that crosses both from the private world to the public world and as well as target the extra workloads that you want so that's kind of the sense of what you're going to see through through the demonstrations but with that I'm going to invite Chris and Michael to come up I'm not going to tell you which one's from IBM which runs from Red Hat hopefully you'll be able to make the right guess so with that Chris and Michael [Music] so so thank you Arvind hopefully people can guess which ones from Red Hat based on the shoes I you know it's some really exciting stuff that we just heard there what I believe that I'm I'm most excited about when I look out upon the audience and the opportunity for customers is with this announcement there are quite literally millions of applications now that can be modernized and made available on any cloud anywhere with the combination of IBM cloud private and OpenShift and I'm most thrilled to have mr. Michael elder a distinguished engineer from IBM here with us today and you know Michael would you maybe describe for the folks what we're actually going to go over today absolutely so when you think about how do I carry forward existing applications how do I build new applications as well you're creating micro services that always need a mixture of data and messaging and caching so this example application shows java-based micro services running on WebSphere Liberty each of which are then leveraging things like IBM MQ for messaging IBM db2 for data operational decision manager all of which is fully containerized and running on top of the Red Hat open chip container platform and in fact we're even gonna enhance stock trader to help it understand how you feel but okay hang on so I'm a little slow to the draw sometimes you said we're gonna have an application tell me how I feel exactly exactly you think about your enterprise apps you want to improve customer service understanding how your clients feel can't help you do that okay well this I'd like to see that in action all right let's do it okay so the first thing we'll do is we'll actually take a look at the catalog and here in the IBM cloud private catalog this is all of the content that's available to deploy now into this hybrid solution so we see workloads for IBM will see workloads for other open source packages etc each of these are packaged up as helm charts that are deploying a set of images that will be certified for Red Hat Linux and in this case we're going to go through and start with a simple example with a node out well click a few actions here we'll give it a name now do you have your console up over there I certainly do all right perfect so we'll deploy this into the new old namespace and will deploy notate okay alright anything happening of course it's come right up and so you know what what I really like about this is regardless of if I'm used to using IBM clout private or if I'm used to working with open shift yeah the experience is well with the tool of whatever I'm you know used to dealing with on a daily basis but I mean you know I got to tell you we we deployed node ourselves all the time what about and what about when was the last time you deployed MQ on open shift you never I maybe never all right let's fix that so MQ obviously is a critical component for messaging for lots of highly transactional systems here we'll deploy this as a container on the platform now I'm going to deploy this one again into new worlds I'm gonna disable persistence and for my application I'm going to need a queue manager so I'm going to have it automatically setup my queue manager as well now this will deploy a couple of things what do you see I see IBM in cube all right so there's your stateful set running MQ and of course there's a couple of other components that get stood up as needed here including things like credentials and secrets and the service etc but all of this is they're out of the box ok so impressive right but that's the what I think you know what I'm really looking at is maybe how a well is this running you know what else does this partnership bring when I look at IBM cloud private windows inches well so that's a key reason about why it's not just about IBM middleware running on open shift but also IBM cloud private because ultimately you need that common management plane when you deploy a container the next thing you have to worry about is how do I get its logs how do I manage its help how do I manage license consumption how do I have a common security plan right so cloud private is that enveloping wrapper around IBM middleware to provide those capabilities in a common way and so here we'll switch over to our dashboard this is our Griffin and Prometheus stack that's deployed also now on cloud private running on OpenShift and we're looking at a different namespace we're looking at the stock trader namespace we'll go back to this app here momentarily and we can see all the different pieces what if you switch over to the stock trader workspace on open shipped yeah I think we might be able to do that here hey there it is alright and so what you're gonna see here all the different pieces of this op right there's d b2 over here I see the portfolio Java microservice running on Webster Liberty I see my Redis cash I see MQ all of these are the components we saw in the architecture picture a minute ago ya know so this is really great I mean so maybe let's take a look at the actual application I see we have a fine stock trader app here now we mentioned understanding how I feel exactly you know well I feel good that this is you know a brand new stock trader app versus the one from ten years ago that don't feel like we used forever so the key thing is this app is actually all of those micro services in addition to things like business rules etc to help understand the loyalty program so one of the things we could do here is actually enhance it with a a AI service from Watson this is tone analyzer it helps me understand how that user actually feels and will be able to go through and submit some feedback to understand that user ok well let's see if we can take a look at that so I tried to click on youth clearly you're not very happy right now here I'll do one quick thing over here go for it we'll clear a cache for our sample lab so look you guys don't actually know as Michael and I just wrote this no js' front end backstage while Arvin was actually talking with Matt and we deployed it real-time using continuous integration and continuous delivery that we have available with openshift well the great thing is it's a live demo right so we're gonna do it all live all the time all right so you mentioned it'll tell me how I'm feeling right so if we look at so right there it looks like they're pretty angry probably because our cache hadn't been cleared before we started the demo maybe well that would make me angry but I should be happy because I mean I have a lot of money well it's it's more than I get today for sure so but you know again I don't want to remain angry so does Watson actually understand southern I know it speaks like eighty different languages but well you know I'm from South Carolina to understand South Carolina southern but I don't know about your North Carolina southern alright well let's give it a go here y'all done a real real know no profanity now this is live I've done a real real nice job on this here fancy demo all right hey all right likes me now all right cool and the key thing is just a quick note right it's showing you've got a free trade so we can integrate those business rules and then decide to I do put one trade if you're angry give me more it's all bringing it together into one platform all running on open show yeah and I can see the possibilities right of we've not only deployed services but getting that feedback from our customers to understand well how well the services are being used and are people really happy with what they have hey listen Michael this was amazing I read you joining us today I hope you guys enjoyed this demo as well so all of you know who this next company is as I look out through the crowd based on what I can actually see with the sun shining down on me right now I can see their influence everywhere you know Sports is in our everyday lives and these guys are equally innovative in that space as they are with hybrid cloud computing and they use that to help maintain and spread their message throughout the world of course I'm talking about Nike I think you'll enjoy this next video about Nike and their brand and then we're going to hear directly from my twitting about what they're doing with Red Hat technology new developments in the top story of the day the world has stopped turning on its axis top scientists are currently racing to come up with a solution everybody going this way [Music] the wrong way [Music] please welcome Nike vice president of infrastructure engineering Mike witig [Music] hi everybody over the last five years at Nike we have transformed our technology landscape to allow us to connect more directly to our consumers through our retail stores through Nike comm and our mobile apps the first step in doing that was redesigning our global network to allow us to have direct connectivity into both Asia and AWS in Europe in Asia and in the Americas having that proximity to those cloud providers allows us to make decisions about application workload placement based on our strategy instead of having design around latency concerns now some of those workloads are very elastic things like our sneakers app for example that needs to burst out during certain hours of the week there's certain moments of the year when we have our high heat product launches and for those type of workloads we write that code ourselves and we use native cloud services but being hybrid has allowed us to not have to write everything that would go into that app but rather just the parts that are in that application consumer facing experience and there are other back-end systems certain core functionalities like order management warehouse management finance ERP and those are workloads that are third-party applications that we host on relevent over the last 18 months we have started to deploy certain elements of those core applications into both Azure and AWS hosted on rel and at first we were pretty cautious that we started with development environments and what we realized after those first successful deployments is that are the impact of those cloud migrations on our operating model was very small and that's because the tools that we use for monitoring for security for performance tuning didn't change even though we moved those core applications into Azure in AWS because of rel under the covers and getting to the point where we have that flexibility is a real enabler as an infrastructure team that allows us to just be in the yes business and really doesn't matter where we want to deploy different workload if either cloud provider or on-prem anywhere on the planet it allows us to move much more quickly and stay much more directed to our consumers and so having rel at the core of our strategy is a huge enabler for that flexibility and allowing us to operate in this hybrid model thanks very much [Applause] what a great example it's really nice to hear an IQ story of using sort of relish that foundation to enable their hybrid clout enable their infrastructure and there's a lot that's the story we spent over ten years making that possible for rel to be that foundation and we've learned a lot in that but let's circle back for a minute to the software vendors and what kicked off the day today with IBM IBM s one of the largest software portfolios on the planet but we learned through our journey on rel that you need thousands of vendors to be able to sport you across all of your different industries solve any challenge that you might have and you need those vendors aligned with your technology direction this is doubly important when the technology direction is changing like with containers we saw that two years ago bread had introduced our container certification program now this program was focused on allowing you to identify vendors that had those shared technology goals but identification by itself wasn't enough in this fast-paced world so last year we introduced trusted content we introduced our container health index publicly grading red hats images that form the foundation for those vendor images and that was great because those of you that are familiar with containers know that you're taking software from vendors you're combining that with software from companies like Red Hat and you are putting those into a single container and for you to run those in a mission-critical capacity you have to know that we can both stand by and support those deployments but even trusted content wasn't enough so this year I'm excited that we are extending once again to introduce trusted operations now last week we announced that cube con kubernetes conference the kubernetes operator SDK the goal of the kubernetes operators is to allow any software provider on kubernetes to encode how that software should run this is a critical part of a container ecosystem not just being able to find the vendors that you want to work with not just knowing that you can trust what's inside the container but knowing that you can efficiently run that software now the exciting part is because this is so closely aligned with the upstream technology that today we already have four partners that have functioning operators specifically Couchbase dynaTrace crunchy and black dot so right out of the gate you have security monitoring data store options available to you these partners are really leading the charge in terms of what it means to run their software on OpenShift but behind these four we have many more in fact this morning we announced over 60 partners that are committed to building operators they're taking their domain expertise and the software that they wrote that they know and extending that into how you are going to run that on containers in environments like OpenShift this really brings the power of being able to find the vendors being able to trust what's inside and know that you can run their software as efficiently as anyone else on the planet but instead of just telling you about this we actually want to show you this in action so why don't we bring back up the demo team to give you a little tour of what's possible with it guys thanks Matt so Matt talked about the concept of operators and when when I think about operators and what they do it's taking OpenShift based services and making them even smarter giving you insight into how they do things for example have we had an operator for the nodejs service that I was running earlier it would have detected the problem and fixed itself but when we look at it what really operators do when I look at it from an ecosystem perspective is for ISVs it's going to be a catalyst that's going to allow them to make their services as manageable and it's flexible and as you know maintainable as any public cloud service no matter where OpenShift is running and to help demonstrate this I've got my buddy Rob here Rob are we ready on the demo front we're ready awesome now I notice this screen looks really familiar to me but you know I think we want to give folks here a dev preview of a couple of things well we want to show you is the first substantial integration of the core OS tectonic technology with OpenShift and then the other thing is we are going to dive in a little bit more into operators and their usefulness so Rob yeah so what we're looking at here is the service catalog that you know and love and openshift and we've got a few new things in here we've actually integrated operators into the Service Catalog and I'm going to take this filter and give you a look at some of them that we have today so you can see we've got a list of operators exposed and this is the same way that your developers are already used to integrating with products they're right in your catalog and so now these are actually smarter services but how can we maybe look at that I mentioned that there's maybe a new view I'm used to seeing this as a developer but I hear we've got some really cool stuff if I'm the administrator of the console yeah so we've got a whole new side of the console for cluster administrators to get a look at under the infrastructure versus this dev focused view that we're looking at today today so let's go take a look at it so the first thing you see here is we've got a really rich set of monitoring and health status so we can see that we've got some alerts firing our control plane is up and we can even do capacity planning anything that you need to do to maintenance your cluster okay so it's it's not only for the the services in the cluster and doing things that you know I may be normally as a human operator would have to do but this this console view also gives me insight into the infrastructure itself right like maybe the nodes and maybe handling the security context is that true yes so these are new capabilities that we're bringing to open shift is the ability to do node management things like drain and unscheduled nodes to do day-to-day maintenance and then as well as having security constraints and things like role bindings for example and the exciting thing about this is this is a view that you've never been able to see before it's cross-cutting across namespaces so here we've got a number of admin bindings and we can see that they're connected to a number of namespaces and these would represent our engineering teams all the groups that are using the cluster and we've never had this view before this is a perfect way to audit your security you know it actually is is pretty exciting I mean I've been fortunate enough to be on the up and shift team since day one and I know that operations view is is something that we've you know strived for and so it's really exciting to see that we can offer that now but you know really this was a we want to get into what operators do and what they can do for us and so maybe you show us what the operator console looks like yeah so let's jump on over and see all the operators that we have installed on the cluster you can see that these mirror what we saw on the Service Catalog earlier now what we care about though is this Couchbase operator and we're gonna jump into the demo namespace as I said you can share a number of different teams on a cluster so it's gonna jump into this namespace okay cool so now what we want to show you guys when we think about operators you know we're gonna have a scenario here where there's going to be multiple replicas of a Couchbase service running in the cluster and then we're going to have a stateful set and what's interesting is those two things are not enough if I'm really trying to run this as a true service where it's highly available in persistent there's things that you know as a DBA that I'm normally going to have to do if there's some sort of node failure and so what we want to demonstrate to you is where operators combined with the power that was already within OpenShift are now coming together to keep this you know particular database service highly available and something that we can continue using so Rob what have you got there yeah so as you can see we've got our couch based demo cluster running here and we can see that it's up and running we've got three members we've got an off secret this is what's controlling access to a UI that we're gonna look at in a second but what really shows the power of the operator is looking at this view of the resources that it's managing you can see that we've got a service that's doing load balancing into the cluster and then like you said we've got our pods that are actually running the software itself okay so that's cool so maybe for everyone's benefit so we can show that this is happening live could we bring up the the Couchbase console please and keep up the openshift console both sides so what we see there we go so what we see on the on the right hand side is obviously the same console Rob was working in on the left-hand side as you can see by the the actual names of the pods that are there the the couch based services that are available and so Rob maybe um let's let's kill something that's always fun to do on stage yeah this is the power of the operator it's going to recover it so let's browse on over here and kill node number two so we're gonna forcefully kill this and kick off the recovery and I see right away that because of the integration that we have with operators the Couchbase console immediately picked up that something has changed in the environment now why is that important normally a human being would have to get that alert right and so with operators now we've taken that capability and we've realized that there has been a new event within the environment this is not something that you know kubernetes or open shipped by itself would be able to understand now I'm presuming we're gonna end up doing something else it's not just seeing that it failed and sure enough there we go remember when you have a stateful application rebalancing that data and making it available is just as important as ensuring that the disk is attached so I mean Rob thank you so much for you know driving this for us today and being here I mean you know not only Couchbase but as was mentioned by matt we also have you know crunchy dynaTrace and black duck I would encourage you all to go visit their booths out on the floor today and understand what they have available which are all you know here with a dev preview and then talk to the many other partners that we have that are also looking at operators so again rub thank you for joining us today Matt come on out okay this is gonna make for an exciting year of just what it means to consume container base content I think containers change how customers can get that I believe operators are gonna change how much they can trust running that content let's circle back to one more partner this next partner we have has changed the landscape of computing specifically with their work on hardware design work on core Linux itself you know in fact I think they've become so ubiquitous with computing that we often overlook the technological marvels that they've been able to overcome now for myself I studied computer engineering so in the late 90s I had the chance to study processor design I actually got to build one of my own processors now in my case it was the most trivial processor that you could imagine it was an 8-bit subtractor which means it can subtract two numbers 256 or smaller but in that process I learned the sheer complexity that goes into processor design things like wire placements that are so close that electrons can cut through the insulation in short and then doing those wire placements across three dimensions to multiple layers jamming in as many logic components as you possibly can and again in my case this was to make a processor that could subtract two numbers but once I was done with this the second part of the course was studying the Pentium processor now remember that moment forever because looking at what the Pentium processor was able to accomplish it was like looking at alien technology and the incredible thing is that Intel our next partner has been able to keep up that alien like pace of innovation twenty years later so we're excited have Doug Fisher here let's hear a little bit more from Intel for business wide open skies an open mind no matter the context the idea of being open almost only suggests the potential of infinite possibilities and that's exactly the power of open source whether it's expanding what's possible in business the science and technology or for the greater good which is why-- open source requires the involvement of a truly diverse community of contributors to scale and succeed creating infinite possibilities for technology and more importantly what we do with it [Music] you know what Intel one of our core values is risk-taking and I'm gonna go just a bit off script for a second and say I was just backstage and I saw a gentleman that looked a lot like Scott Guthrie who runs all of Microsoft's cloud enterprise efforts wearing a red shirt talking to Cormier I'm just saying I don't know maybe I need some more sleep but that's what I saw as we approach Intel's 50th anniversary these words spoken by our co-founder Robert Noyce are as relevant today as they were decades ago don't be encumbered by history this is about breaking boundaries in technology and then go off and do something wonderful is about innovation and driving innovation in our industry and Intel we're constantly looking to break boundaries to advance our technology in the cloud in enterprise space that is no different so I'm going to talk a bit about some of the boundaries we've been breaking and innovations we've been driving at Intel starting with our Intel Xeon platform Orion Xeon scalable platform we launched several months ago which was the biggest and mark the most advanced movement in this technology in over a decade we were able to drive critical performance capabilities unmatched agility and added necessary and sufficient security to that platform I couldn't be happier with the work we do with Red Hat and ensuring that those hero features that we drive into our platform they fully expose to all of you to drive that innovation to go off and do something wonderful well there's taking advantage of the performance features or agility features like our advanced vector extensions or avx-512 or Intel quick exist those technologies are fully embraced by Red Hat Enterprise Linux or whether it's security technologies like txt or trusted execution technology are fully incorporated and we look forward to working with Red Hat on their next release to ensure that our advancements continue to be exposed and their platform and all these workloads that are driving the need for us to break boundaries and our technology are driving more and more need for flexibility and computing and that's why we're excited about Intel's family of FPGAs to help deliver that additional flexibility for you to build those capabilities in your environment we have a broad set of FPGA capabilities from our power fish at Mac's product line all the way to our performance product line on the 6/10 strat exten we have a broad set of bets FPGAs what i've been talking to customers what's really exciting is to see the combination of using our Intel Xeon scalable platform in combination with FPGAs in addition to the acceleration development capabilities we've given to software developers combining all that together to deliver better and better solutions whether it's helping to accelerate data compression well there's pattern recognition or data encryption and decryption one of the things I saw in a data center recently was taking our Intel Xeon scalable platform utilizing the capabilities of FPGA to do data encryption between servers behind the firewall all the while using the FPGA to do that they preserve those precious CPU cycles to ensure they delivered the SLA to the customer yet provided more security for their data in the data center one of the edges in cyber security is innovation and route of trust starts at the hardware we recently renewed our commitment to security with our security first pledge has really three elements to our security first pledge first is customer first urgency we have now completed the release of the micro code updates for protection on our Intel platforms nine plus years since launch to protect against things like the side channel exploits transparent and timely communication we are going to communicate timely and openly on our Intel comm website whether it's about our patches performance or other relevant information and then ongoing security assurance we drive security into every one of our products we redesigned a portion of our processor to add these partition capability which is adding additional walls between applications and user level privileges to further secure that environment from bad actors I want to pause for a second and think everyone in this room involved in helping us work through our security first pledge this isn't something we do on our own it takes everyone in this room to help us do that the partnership and collaboration was next to none it's the most amazing thing I've seen since I've been in this industry so thank you we don't stop there we continue to advance our security capabilities cross-platform solutions we recently had a conference discussion at RSA where we talked about Intel Security Essentials where we deliver a framework of capabilities and the end that are in our silicon available for those to innovate our customers and the security ecosystem to innovate on a platform in a consistent way delivering that assurance that those capabilities will be on that platform we also talked about things like our security threat technology threat detection technology is something that we believe in and we launched that at RSA incorporates several elements one is ability to utilize our internal graphics to accelerate some of the memory scanning capabilities we call this an accelerated memory scanning it allows you to use the integrated graphics to scan memory again preserving those precious cycles on the core processor Microsoft adopted this and are now incorporated into their defender product and are shipping it today we also launched our threat SDK which allows partners like Cisco to utilize telemetry information to further secure their environments for cloud workloads so we'll continue to drive differential experiences into our platform for our ecosystem to innovate and deliver more and more capabilities one of the key aspects you have to protect is data by 2020 the projection is 44 zettabytes of data will be available 44 zettabytes of data by 2025 they project that will grow to a hundred and eighty s data bytes of data massive amount of data and what all you want to do is you want to drive value from that data drive and value from that data is absolutely critical and to do that you need to have that data closer and closer to your computation this is why we've been working Intel to break the boundaries in memory technology with our investment in 3d NAND we're reducing costs and driving up density in that form factor to ensure we get warm data closer to the computing we're also innovating on form factors we have here what we call our ruler form factor this ruler form factor is designed to drive as much dense as you can in a 1u rack we're going to continue to advance the capabilities to drive one petabyte of data at low power consumption into this ruler form factor SSD form factor so our innovation continues the biggest breakthrough and memory technology in the last 25 years in memory media technology was done by Intel we call this our 3d crosspoint technology and our 3d crosspoint technology is now going to be driven into SSDs as well as in a persistent memory form factor to be on the memory bus giving you the speed of memory characteristics of memory as well as the characteristics of storage given a new tier of memory for developers to take full advantage of and as you can see Red Hat is fully committed to integrating this capability into their platform to take full advantage of that new capability so I want to thank Paul and team for engaging with us to make sure that that's available for all of you to innovate on and so we're breaking boundaries and technology across a broad set of elements that we deliver that's what we're about we're going to continue to do that not be encumbered by the past your role is to go off and doing something wonderful with that technology all ecosystems are embracing this and driving it including open source technology open source is a hub of innovation it's been that way for many many years that innovation that's being driven an open source is starting to transform many many businesses it's driving business transformation we're seeing this coming to light in the transformation of 5g driving 5g into the networked environment is a transformational moment an open source is playing a pivotal role in that with OpenStack own out and opie NFV and other open source projects were contributing to and participating in are helping drive that transformation in 5g as you do software-defined networks on our barrier breaking technology we're also seeing this transformation rapidly occurring in the cloud enterprise cloud enterprise are growing rapidly and innovation continues our work with virtualization and KVM continues to be aggressive to adopt technologies to advance and deliver more capabilities in virtualization as we look at this with Red Hat we're now working on Cube vert to help move virtualized workloads onto these platforms so that we can now have them managed at an open platform environment and Cube vert provides that so between Intel and Red Hat and the community we're investing resources to make certain that comes to product as containers a critical feature in Linux becomes more and more prevalent across the industry the growth of container elements continues at a rapid rapid pace one of the things that we wanted to bring to that is the ability to provide isolation without impairing the flexibility the speed and the footprint of a container with our clear container efforts along with hyper run v we were able to combine that and create we call cotta containers we launched this at the end of last year cotta containers is designed to have that container element available and adding elements like isolation both of these events need to have an orchestration and management capability Red Hat's OpenShift provides that capability for these workloads whether containerized or cube vert capabilities with virtual environments Red Hat openshift is designed to take that commercial capability to market and we've been working with Red Hat for several years now to develop what we call our Intel select solution Intel select solutions our Intel technology optimized for downstream workloads as we see a growth in a workload will work with a partner to optimize a solution on Intel technology to deliver the best solution that could be deployed quickly our effort here is to accelerate the adoption of these type of workloads in the market working with Red Hat's so now we're going to be deploying an Intel select solution design and optimized around Red Hat OpenShift we expect the industry's start deploying this capability very rapidly I'm excited to announce today that Lenovo is committed to be the first platform company to deliver this solution to market the Intel select solution to market will be delivered by Lenovo now I talked about what we're doing in industry and how we're transforming businesses our technology is also utilized for greater good there's no better example of this than the worked by dr. Stephen Hawking it was a sad day on March 14th of this year when dr. Stephen Hawking passed away but not before Intel had a 20-year relationship with dr. Hawking driving breakthrough capabilities innovating with him driving those robust capabilities to the rest of the world one of our Intel engineers an Intel fellow which is the highest technical achievement you can reach at Intel got to spend 10 years with dr. Hawking looking at innovative things they could do together with our technology and his breakthrough innovative thinking so I thought it'd be great to bring up our Intel fellow Lema notch Minh to talk about her work with dr. Hawking and what she learned in that experience come on up Elina [Music] great to see you Thanks something going on about the breakthrough breaking boundaries and Intel technology talk about how you use that in your work with dr. Hawking absolutely so the most important part was to really make that technology contextually aware because for people with disability every single interaction takes a long time so whether it was adapting for example the language model of his work predictor to understand whether he's gonna talk to people or whether he's writing a book on black holes or to even understand what specific application he might be using and then making sure that we're surfacing only enough actions that were relevant to reduce that amount of interaction so the tricky part is really to make all of that contextual awareness happen without totally confusing the user because it's constantly changing underneath it so how is that your work involving any open source so you know the problem with assistive technology in general is that it needs to be tailored to the specific disability which really makes it very hard and very expensive because it can't utilize the economies of scale so basically with the system that we built what we wanted to do is really enable unleashing innovation in the world right so you could take that framework you could tailor to a specific sensor for example a brain computer interface or something like that where you could actually then support a different set of users so that makes open-source a perfect fit because you could actually build and tailor and we you spoke with dr. Hawking what was this view of open source is it relevant to him so yeah so Stephen was adamant from the beginning that he wanted a system to benefit the world and not just himself so he spent a lot of time with us to actually build this system and he was adamant from day one that he would only engage with us if we were commit to actually open sourcing the technology that's fantastic and you had the privilege of working with them in 10 years I know you have some amazing stories to share so thank you so much for being here thank you so much in order for us to scale and that's what we're about at Intel is really scaling our capabilities it takes this community it takes this community of diverse capabilities it takes two births thought diverse thought of dr. Hawking couldn't be more relevant but we also are proud at Intel about leading efforts of diverse thought like women and Linux women in big data other areas like that where Intel feels that that diversity of thinking and engagement is critical for our success so as we look at Intel not to be encumbered by the past but break boundaries to deliver the technology that you all will go off and do something wonderful with we're going to remain committed to that and I look forward to continue working with you thank you and have a great conference [Applause] thank God now we have one more customer story for you today when you think about customers challenges in the technology landscape it is hard to ignore the public cloud these days public cloud is introducing capabilities that are driving the fastest rate of innovation that we've ever seen in our industry and our next customer they actually had that same challenge they wanted to tap into that innovation but they were also making bets for the long term they wanted flexibility and providers and they had to integrate to the systems that they already have and they have done a phenomenal job in executing to this so please give a warm welcome to Kerry Pierce from Cathay Pacific Kerry come on thanks very much Matt hi everyone thank you for giving me the opportunity to share a little bit about our our cloud journey let me start by telling you a little bit about Cathay Pacific we're an international airline based in Hong Kong and we serve a passenger and a cargo network to over 200 destinations in 52 countries and territories in the last seventy years and years seventy years we've made substantial investments to develop Hong Kong as one of the world's leading transportation hubs we invest in what matters most to our customers to you focusing on our exemplary service and our great product and it's both on the ground and in the air we're also investing and expanding our network beyond our multiple frequencies to the financial districts such as Tokyo New York and London and we're connecting Asia and Hong Kong with key tech hubs like San Francisco where we have multiple flights daily we're also connecting Asia in Hong Kong to places like Tel Aviv and our upcoming destination of Dublin in fact 2018 is actually going to be one of our biggest years in terms of network expansion and capacity growth and we will be launching in September our longest flight from Hong Kong direct to Washington DC and that'll be using a state-of-the-art Airbus a350 1000 aircraft so that's a little bit about Cathay Pacific let me tell you about our journey through the cloud I'm not going to go into technical details there's far smarter people out in the audience who will be able to do that for you just focus a little bit about what we were trying to achieve and the people side of it that helped us get there we had a couple of years ago no doubt the same issues that many of you do I don't think we're unique we had a traditional on-premise non-standardized fragile infrastructure it didn't meet our infrastructure needs and it didn't meet our development needs it was costly to maintain it was costly to grow and it really inhibited innovation most importantly it slowed the delivery of value to our customers at the same time you had the hype of cloud over the last few years cloud this cloud that clouds going to fix the world we were really keen on making sure we didn't get wound up and that so we focused on what we needed we started bottom up with a strategy we knew we wanted to be clouded Gnostic we wanted to have active active on-premise data centers with a single network and fabric and we wanted public clouds that were trusted and acted as an extension of that environment not independently we wanted to avoid single points of failure and we wanted to reduce inter dependencies by having loosely coupled designs and finally we wanted to be scalable we wanted to be able to cater for sudden surges of demand in a nutshell we kind of just wanted to make everything easier and a management level we wanted to be a broker of services so not one size fits all because that doesn't work but also not one of everything we want to standardize but a pragmatic range of services that met our development and support needs and worked in harmony with our public cloud not against it so we started on a journey with red hat we implemented Red Hat cloud forms and ansible to manage our hybrid cloud we also met implemented Red Hat satellite to maintain a manager environment we built a Red Hat OpenStack on crimson vironment to give us an alternative and at the same time we migrated a number of customer applications to a production public cloud open shift environment but it wasn't all Red Hat you love heard today that the Red Hat fits within an overall ecosystem we looked at a number of third-party tools and services and looked at developing those into our core solution I think at last count we had tried and tested somewhere past eight different tools and at the moment we still have around 62 in our environment that help us through that journey but let me put the technical solution aside a little bit because it doesn't matter how good your technical solution is if you don't have the culture and the people to get it right as a group we needed to be aligned for delivery and we focused on three core behaviors we focused on accountability agility and collaboration now I was really lucky we've got a pretty fantastic team for whom that was actually pretty easy but but again don't underestimate the importance of getting the culture and the people right because all the technology in the world doesn't matter if you don't have that right I asked the team what did we do differently because in our situation we didn't go out and hire a bunch of new people we didn't go out and hire a bunch of consultants we had the staff that had been with us for 10 20 and in some cases 30 years so what did we do differently it was really simple we just empowered and supported our staff we knew they were the smart ones they were the ones that were dealing with a legacy environment and they had the passion to make the change so as a team we encouraged suggestions and contributions from our overall IT community from the bottom up we started small we proved the case we told the story and then we got by him and only did did we implement wider the benefits the benefit through our staff were a huge increase in staff satisfaction reduction and application and platform outage support incidents risk free and failsafe application releases work-life balance no more midnight deployments and our application and infrastructure people could really focus on delivering customer value not on firefighting and for our end customers the people that travel with us it was really really simple we could provide a stable service that allowed for faster releases which meant we could deliver value faster in terms of stats we migrated 16 production b2c applications to a public cloud OpenShift environment in 12 months we decreased provisioning time from weeks or occasionally months we were waiting for hardware two minutes and we had a hundred percent availability of our key customer facing systems but most importantly it was about people we'd built a culture a culture of innovation that was built on a foundation of collaboration agility and accountability and that permeated throughout the IT organization not those just those people that were involved in the project everyone with an IT could see what good looked like and to see what it worked what it looked like in terms of working together and that was a key foundation for us the future for us you will have heard today everything's changing so we're going to continue to develop our open hybrid cloud onboard more public cloud service providers continue to build more modern applications and leverage the emerging technology integrate and automate everything we possibly can and leverage more open source products with the great support from the open source community so there you have it that's our journey I think we succeeded by not being over awed and by starting with the basics the technology was key obviously it's a cool component but most importantly it was a way we approached our transition we had a clear strategy that was actually developed bottom-up by the people that were involved day to day and we empowered those people to deliver and that provided benefits to both our staff and to our customers so thank you for giving the opportunity to share and I hope you enjoy the rest of the summer [Applause] I got one thanks what a great story would a great customer story to close on and we have one more partner to come up and this is a partner that all of you know that's Microsoft Microsoft has gone through an amazing transformation they've we've built an incredibly meaningful partnership with them all the way from our open source collaboration to what we do in the business side we started with support for Red Hat Enterprise Linux on hyper-v and that was truly just the beginning today we're announcing one of the most exciting joint product offerings on the market today let's please give a warm welcome to Paul correr and Scott Scott Guthrie to tell us about it guys come on out you know Scot welcome welcome to the Red Hat summer thanks for coming really appreciate it great to be here you know many surprises a lot of people when we you know published a list of speakers and then you rock you were on it and you and I are on stage here it's really really important and exciting to us exciting new partnership we've worked together a long time from the hypervisor up to common support and now around hybrid hybrid cloud maybe from your perspective a little bit of of what led us here well you know I think the thing that's really led us here is customers and you know Microsoft we've been on kind of a transformation journey the last several years where you know we really try to put customers at the center of everything that we do and you know as part of that you quickly learned from customers in terms of I'm including everyone here just you know you've got a hybrid of state you know both in terms of what you run on premises where it has a lot of Red Hat software a lot of Microsoft software and then really is they take the journey to the cloud looking at a hybrid of state in terms of how do you run that now between on-premises and a public cloud provider and so I think the thing that both of us are recognized and certainly you know our focus here at Microsoft has been you know how do we really meet customers with where they're at and where they want to go and make them successful in that journey and you know it's been fantastic working with Paul and the Red Hat team over the last two years in particular we spend a lot of time together and you know really excited about the journey ahead so um maybe you can share a bit more about the announcement where we're about to make today yeah so it's it's it's a really exciting announcement it's and really kind of I think first of its kind in that we're delivering a Red Hat openshift on Azure service that we're jointly developing and jointly managing together so this is different than sort of traditional offering where it's just running inside VMs and it's sort of two vendors working this is really a jointly managed service that we're providing with full enterprise support with a full SLA where the you know single throat to choke if you will although it's collectively both are choke the throats in terms of making sure that it works well and it's really uniquely designed around this hybrid world and in that it supports will support both Windows and Linux containers and it role you know it's the same open ship that runs both in the public cloud on Azure and on-premises and you know it's something that we hear a lot from customers I know there's a lot of people here that have asked both of us for this and super excited to be able to talk about it today and we're gonna show off the first demo of it just a bit okay well I'm gonna ask you to elaborate a bit more about this how this fits into the bigger Microsoft picture and I'll get out of your way and so thanks again thank you for coming here we go thanks Paul so I thought I'd spend just a few minutes talking about wouldn't you know that some of the work that we're doing with Microsoft Asher and the overall Microsoft cloud I didn't go deeper in terms of the new offering that we're announcing today together with red hat and show demo of it actually in action in a few minutes you know the high level in terms of you know some of the work that we've been doing at Microsoft the last couple years you know it's really been around this this journey to the cloud that we see every organization going on today and specifically the Microsoft Azure we've been providing really a cloud platform that delivers the infrastructure the application and kind of the core computing needs that organizations have as they want to be able to take advantage of what the cloud has to offer and in terms of our focus with Azure you know we've really focused we deliver lots and lots of different services and features but we focused really in particular on kind of four key themes and we see these four key themes aligning very well with the journey Red Hat it's been on and it's partly why you know we think the partnership between the two companies makes so much sense and you know for us the thing that we've been really focused on has been with a or in terms of how do we deliver a really productive cloud meaning how do we enable you to take advantage of cutting-edge technology and how do we kind of accelerate the successful adoption of it whether it's around the integration of managed services that we provide both in terms of the application space in the data space the analytic and AI space but also in terms of just the end-to-end management and development tools and how all those services work together so that teams can basically adopt them and be super successful yeah we deeply believe in hybrid and believe that the world is going to be a multi cloud and a multi distributed world and how do we enable organizations to be able to take the existing investments that they already have and be able to easily integrate them in a public cloud and with a public cloud environment and get immediate ROI on day one without how to rip and replace tons of solutions you know we're moving very aggressively in the AI space and are looking to provide a rich set of AI services both finished AI models things like speech detection vision detection object motion etc that any developer even at non data scientists can integrate to make application smarter and then we provide a rich set of AI tooling that enables organizations to build custom models and be able to integrate them also as part of their applications and with their data and then we invest very very heavily on trust Trust is sort of at the core of a sure and we now have more compliant certifications than any other cloud provider we run in more countries than any other cloud provider and we really focus around unique promises around data residency data sovereignty and privacy that are really differentiated across the industry and terms of where Iser runs today we're in 50 regions around the world so our region for us is typically a cluster of multiple data centers that are grouped together and you can see we're pretty much on every continent with the exception of Antarctica today and the beauty is you're going to be able to take the Red Hat open shift service and run it on ashore in each of these different locations and really have a truly global footprint as you look to build and deploy solutions and you know we've seen kind of this focus on productivity hybrid intelligence and Trust really resonate in the market and about 90 percent of Fortune 500 companies today are deployed on Azure and you heard Nike talked a little bit earlier this afternoon about some of their journeys as they've moved to a dot public cloud this is a small logo of just a couple of the companies that are on ashore today and what I do is actually even before we dive into the open ship demo is actually just show a quick video you know one of the companies thing there are actually several people from that organization here today Deutsche Bank who have been working with both Microsoft and Red Hat for many years Microsoft on the other side Red Hat both on the rel side and then on the OpenShift side and it's just one of these customers that have helped bring the two companies together to deliver this managed openshift service on Azure and so I'm just going to play a quick video of some of the folks that Deutsche Bank talking about their experiences and what they're trying to get out of it so we could roll the video that'd be great technology is at the absolute heart of Deutsche Bank we've recognized that the cost of running our infrastructure was particularly high there was a enormous amount of under utilization we needed a platform which was open to polyglot architecture supporting any kind of application workload across the various business lines of the third we analyzed over 60 different vendor products and we ended up with Red Hat openshift I'm super excited Microsoft or supporting Linux so strongly to adopting a hybrid approach we chose as here because Microsoft was the ideal partner to work with on constructs around security compliance business continuity as you as in all the places geographically that we need to be we have applications now able to go from a proof of concept to production in three weeks that is already breaking records openshift gives us given entities and containers allows us to apply the same sets of processes automation across a wide range of our application landscape on any given day we run between seven and twelve thousand containers across three regions we start see huge levels of cost reduction because of the level of multi-tenancy that we can achieve through containers open ship gives us an abstraction layer which is allows us to move our applications between providers without having to reconfigure or recode those applications what's really exciting for me about this journey is the way they're both Red Hat and Microsoft have embraced not just what we're doing but what each other are doing and have worked together to build open shift as a first-class citizen with Microsoft [Applause] in terms of what we're announcing today is a new fully managed OpenShift service on Azure and it's really the first fully managed service provided end-to-end across any of the cloud providers and it's jointly engineer operated and supported by both Microsoft and Red Hat and that means again sort of one service one SLA and both companies standing for a link firmly behind it really again focusing around how do we make customers successful and as part of that really providing the enterprise-grade not just isolates but also support and integration testing so you can also take advantage of all your rel and linux-based containers and all of your Windows server based containers and how can you run them in a joint way with a common management stack taking the advantage of one service and get maximum density get maximum code reuse and be able to take advantage of a containerized world in a better way than ever before and make this customer focus is very much at the center of what both companies are really centered around and so what if I do be fun is rather than just talk about openshift as actually kind of show off a little bit of a journey in terms of what this move to take advantage of it looks like and so I'd like to invite Brendan and Chris onstage who are actually going to show off a live demo of openshift on Azure in action and really walk through how to provision the service and basically how to start taking advantage of it using the full open ship ecosystem so please welcome Brendan and Chris we're going to join us on stage for a demo thanks God thanks man it's been a good afternoon so you know what we want to get into right now first I'd like to think Brandon burns for joining us from Microsoft build it's a busy week for you I'm sure your own stage there a few times as well you know what I like most about what we just announced is not only the business and technical aspects but it's that operational aspect the uniqueness the expertise that RedHat has for running OpenShift combined with the expertise that Microsoft has within Azure and customers are going to get this joint offering if you will with you know Red Hat OpenShift on Microsoft Azure and so you know kind of with that again Brendan I really appreciate you being here maybe talk to the folks about what we're going to show yeah so we're going to take a look at what it looks like to deploy OpenShift on to Azure via the new OpenShift service and the real selling point the really great part of this is the the deep integration with a cloud native app API so the same tooling that you would use to create virtual machines to create disks trade databases is now the tooling that you're going to use to create an open chip cluster so to show you this first we're going to create a resource group here so we're going to create that resource group in East us using the AZ tool that's the the azure command-line tooling a resource group is sort of a folder on Azure that holds all of your stuff so that's gonna come back into the second I've created my resource group in East us and now we're gonna use that exact same tool calling into into Azure api's to provision an open shift cluster so here we go we have AZ open shift that's our new command line tool putting it into that resource group I'm gonna get into East us alright so it's gonna take a little bit of time to deploy that open shift cluster it's doing a bunch of work behind the scenes provisioning all kinds of resources as well as credentials to access a bunch of different as your API so are we actually able to see this to you yeah so we can cut over to in just a second we can cut over to that resource group in a reload so Brendan while relating the beauty of what you know the teams have been doing together already is the fact that now open shift is a first-class citizen as it were yeah absolutely within the agent so I presume not only can I do a deployment but I can do things like scale and check my credentials and pretty much everything that I could do with any other service with that that's exactly right so we can anything that you you were used to doing via the my computer has locked up there we go the demo gods are totally with me oh there we go oh no I hit reload yeah that was that was just evil timing on the house this is another use for operators as we talked about earlier today that's right my dashboard should be coming up do I do I dare click on something that's awesome that was totally it was there there we go good job so what's really interesting about this I've also heard that it deploys you know in as little as five to six minutes which is really good for customers they want to get up and running with it but all right there we go there it is who managed to make it see that shows that it's real right you see the sweat coming off of me there but there you can see the I feel it you can see the various resources that are being created in order to create this openshift cluster virtual machines disks all of the pieces provision for you automatically via that one single command line call now of course it takes a few minutes to to create the cluster so in order to show the other side of that integration the integration between openshift and Azure I'm going to cut over to an open shipped cluster that I already have created alright so here you can see my open shift cluster that's running on Microsoft Azure I'm gonna actually log in over here and the first sign you're gonna see of the integration is it's actually using my credentials my login and going through Active Directory and any corporate policies that I may have around smart cards two-factor off anything like that authenticate myself to that open chef cluster so I'll accept that it can access my and now we're gonna load up the OpenShift web console so now this looks familiar to me oh yeah so if anybody's used OpenShift out there this is the exact same console and what we're going to show though is how this console via the open service broker and the open service broker implementation for Azure integrates natively with OpenShift all right so we can go down here and we can actually see I want to deploy a database I'm gonna deploy Mongo as my key value store that I'm going to use but you know like as we talk about management and having a OpenShift cluster that's managed for you I don't really want to have to manage my database either so I'm actually going to use cosmos DB it's a native Azure service it's a multilingual database that offers me the ability to access my data in a variety of different formats including MongoDB fully managed replicated around the world a pretty incredible service so I'm going to go ahead and create that so now Brendan what's interesting I think to me is you know we talked about the operational aspects and clearly it's not you and I running the clusters but you do need that way to interface with it and so when customers are able to deploy this all of this is out of the box there's no additional contemporary like this is what you get when you create when you use that tool to create that open chef cluster this is what you get with all of that integration ok great step through here and go ahead don't have any IP ranges there we go all right and we create that binding all right and so now behind the scenes openshift is integrated with the azure api's with all of my credentials to go ahead and create that distributed database once it's done provisioning actually all of the credentials necessary to access the database are going to be automatically populated into kubernetes available for me inside of OpenShift via service discovery to access from my application without any further work so I think that really shows not only the power of integrating openshift with an azure based API but actually the power of integrating a Druze API is inside of OpenShift to make a truly seamless experience for managing and deploying your containers across a variety of different platforms yeah hey you know Brendan this is great I know you've got a flight to catch because I think you're back onstage in a few hours but you know really appreciate you joining us today absolutely I look forward to seeing what else we do yeah absolutely thank you so much thanks guys Matt you want to come back on up thanks a lot guys if you have never had the opportunity to do a live demo in front of 8,000 people it'll give you a new appreciation for standing up there and doing it and that was really good you know every time I get the chance just to take a step back and think about the technology that we have at our command today I'm in awe just the progress over the last 10 or 20 years is incredible on to think about what might come in the next 10 or 20 years really is unthinkable you even forget 10 years what might come in the next five years even the next two years but this can create a lot of uncertainty in the environment of what's going to be to come but I believe I am certain about one thing and that is if ever there was a time when any idea is achievable it is now just think about what you've seen today every aspect of open hybrid cloud you have the world's infrastructure at your fingertips and it's not stopping you've heard about this the innovation of open source how fast that's evolving and improving this capability you've heard this afternoon from an entire technology ecosystem that's ready to help you on this journey and you've heard from customer after customer that's already started their journey in the successes that they've had you're one of the neat parts about this afternoon you will aren't later this week you will actually get to put your hands on all of this technology together in our live audience demo you know this is what some it's all about for us it's a chance to bring together the technology experts that you can work with to help formulate how to pull off those ideas we have the chance to bring together technology experts our customers and our partners and really create an environment where everyone can experience the power of open source that same spark that I talked about when I was at IBM where I understood the but intial that open-source had for enterprise customers we want to create the environment where you can have your own spark you can have that same inspiration let's make this you know in tomorrow's keynote actually you will hear a story about how open-source is changing medicine as we know it and literally saving lives it is a great example of expanding the ideas it might be possible that we came into this event with so let's make this the best summit ever thank you very much for being here let's kick things off right head down to the Welcome Reception in the expo hall and please enjoy the summit thank you all so much [Music] [Music]

Published Date : May 9 2018

SUMMARY :

from the bottom this speaks to what I'm

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Doug FisherPERSON

0.99+

StephenPERSON

0.99+

BrendanPERSON

0.99+

ChrisPERSON

0.99+

Deutsche BankORGANIZATION

0.99+

Robert NoycePERSON

0.99+

Deutsche BankORGANIZATION

0.99+

IBMORGANIZATION

0.99+

MichaelPERSON

0.99+

ArvindPERSON

0.99+

20-yearQUANTITY

0.99+

March 14thDATE

0.99+

MattPERSON

0.99+

San FranciscoLOCATION

0.99+

NikeORGANIZATION

0.99+

PaulPERSON

0.99+

Hong KongLOCATION

0.99+

AntarcticaLOCATION

0.99+

Scott GuthriePERSON

0.99+

2018DATE

0.99+

AsiaLOCATION

0.99+

Washington DCLOCATION

0.99+

LondonLOCATION

0.99+

MicrosoftORGANIZATION

0.99+

10 yearsQUANTITY

0.99+

two minutesQUANTITY

0.99+

ArvinPERSON

0.99+

Tel AvivLOCATION

0.99+

two numbersQUANTITY

0.99+

two companiesQUANTITY

0.99+

2020DATE

0.99+

Paul correrPERSON

0.99+

SeptemberDATE

0.99+

Kerry PiercePERSON

0.99+

30 yearsQUANTITY

0.99+

20 yearsQUANTITY

0.99+

8-bitQUANTITY

0.99+

Mike witigPERSON

0.99+

Red HatORGANIZATION

0.99+

2025DATE

0.99+

fiveQUANTITY

0.99+

dr. HawkingPERSON

0.99+

LinuxTITLE

0.99+

Arvind KrishnaPERSON

0.99+

DublinLOCATION

0.99+

first partnerQUANTITY

0.99+

RobPERSON

0.99+

first platformQUANTITY

0.99+

Matt HicksPERSON

0.99+

todayDATE

0.99+

CiscoORGANIZATION

0.99+

last yearDATE

0.99+

OpenShiftTITLE

0.99+

last weekDATE

0.99+

Mary O'Brien, IBM Securities | IBM Think 2018


 

>> Announcer: Live from Las Vegas, it's The Cube. Covering IBM Think 2018, brought to you by IBM. >> Welcome back to IBM Think 2018. My name is Dave Vellante and you're watching The Cube, the leader in live tech coverage. This is IBM's inaugural Think event. Companies consolidated about six major events into one We're trying to figure it out, 30-40,000 people there's too many people to count, it's just unbelievable. Mary O'Brien is here, she is the vice president of research and development at IBM in from Cork, Ireland. Mary, great to see you, thanks for coming on The Cube. >> Thank you, Dave. >> So tell us a little bit more about your role at IBM as head of research and development. >> Okay so I'm head of research and development for IBM Security explicitly so in that capacity I manage a worldwide team of researchers and developers and we take products from, you know, incubation, initial ideas all the way through to products in the field. Products that help defend businesses against cyber crime. >> So, Jenny was talking today about, you know, security is one of the tenants of your offerings at the core. >> Mary: Yes. >> So, everybody talks about security. >> You can't bolt it on, you know, there's a lot of sort of conversations around that. What does that mean, security at the core from a design and R & D perspective? >> That actually means that the developers of applications are actually aware of security best practices as they design, as they architect and design their applications. So that they don't deliver applications to the field that have vulnerabilities that can be exploited. So, instead of trying to secure a perimeter of an application or a product or, you know, a perimeter full stop they actually design security into the application. It makes it a much more efficient, much cheaper way to deliver security and also, you know, much stronger security base there. >> So, I wonder if you could relate, sort of, what you guys are doing in security with what's happened in the market over the last 10 or 15 years. So, it used to be security was, you know, hacktivists and you know throw some malware in and maybe do some disruption has become cyber criminals, you know, big business now and then of course you've got nation states. >> Mm-hmm How have you had to respond specifically within the R & D organization to deal with those threats? >> So, you know, you have described the evolution of cyber crime over the last years and for sure it's no longer kids in a basement you know, hacking to, for the fun of it. Cyber crime is big business and, you know, there's money to be made for cyber criminals. So, as a result they are looking to hack in and get high value assets out of enterprises, and of course, we as an organization and as a security business unit have had to respond to that. By really understanding, you know, what constitutes a very mature set of security competencies and practices and you know how we break down this massive problem into you know, bite sized consumable pieces that any business can consume and work into their enterprise in order to protect them. So, we have developed a portfolio of products that look at protecting all parts of your enterprise. You know, by infusing security everywhere, you know, on your devices, on the, you know, the perimeter of your business. Protecting your data, protecting all sorts, and we also have developed a huge practice of security professionals who actually will go out and do it for you or will, you know, assess your security posture and tell you where you've got problems and how to fix them. >> I remember a piece that our head of research, >> Peter Burris, wrote years ago and it was entitled something like "Bad User Behavior will Trump Good Security Every Time" and so my understanding is phishing is obviously one of the big problems today. How do you combat that, can you use machine intelligence to help people, you know, users that aren't security conscious sort of avoid the mistakes that they've been making? >> So, before I get into the, the complicated, advanced, you know, machine learning and artificial intelligence practices that we are bringing to bear now, you know, it's important to be clear that you know, a vast number of breaches come from the inside. So, they come from either the sloppy employee who doesn't change their password often or uses the same password for work and play and the same password everywhere. Or, you know, the unfortunate employee who clicks on a malicious link and you know, takes in some malware into their devices and malware that can actually you know, move horizontally through the business. Or it can come from you know, the end user or the insider with malicious intent. Okay, so, it's pretty clear to all of us that basic security hygiene is the fundamental so actually making sure that your laptop, your devices are patched. They have the latest security patches on board. Security practices are understood. Basic password hygiene and et cetera, that's kind of the start. >> Uh oh. >> Okay keep going. >> Okay, so-- >> I'm starting to sweat. >> So, you know, and of course, you know, in this era of cyber crime as we've seen it evolve in the last few years, the security industry has reached a perfect storm because it's well known that by 2020 there will be 1.2 million unfilled security professional roles, okay? Now, couple that with the fact that there are in the region, in the same time frame, in the region of 50 billion connected devices in the internet of things. So what's happening is the attack landscape and you know, the attack surface is increasing. The opportunity for the cyber criminalist to attack is increasing and the number of professionals available to fight that crime is not increasing because of this huge shortage. So, you know, you heard Jenny this morning talking about the era of man assisted by machine so infusing artificial intelligence and machine learning into security products and practices is another instantiation of man being assisted by machine and that is our, our tool and our new practice in the fight against cyber crime. >> So when I talk to security professionals consistently they tell us that they have more demand for their services than supply to chase down, you know, threats. They have, they struggle to prioritize. They struggle with just too many false positives and they need help. They're not as productive as they'd like to be. Can machine intelligence assist there? >> Absolutely, so computers, let's face it, computers are ideally placed to pour over vast quantities of data looking for trends, anomalies, and really finding the needle in the haystack. They have such a vast capacity to do this that's way out, you know, that really surpasses what a human can do and so you know, with, in this era of machine learning you can actually you know, equip a computer with a set of basic rules and you know, set it loose on vast quantities of data and let it test and iterate those rules with this data and become increasingly knowledgeable you know, about the data. The trends in the data, what the data, what good data looks like, what anomalous data looks like and at speed point out the anomalies and find that needle in the haystack. >> So, there's a stat, depending on which, you know, firm you look at or which organization you believe, but it's scary none the less. That the average penetration is only detected 250 or 350 days after the infiltration, and that is a scary stat, it would take a year to find out that somebody has infiltrated my organization or whatever it is, 200 days. Is that number shrinking, is the industry as a whole, not just IBM, attacking that figure? First of all, is it a valid figure, and are you able to attack that? >> Well, the figure is definitely scary. I don't know whether your figure is exactly >> Yeah, well the latest figure but it's a scary figure >> Yeah. and it's well known that attackers will get in. So, of course, there's, uh there's the various phases of, you know, protecting yourself. So, you're going to try to avoid the attackers getting in in the first place. Using the various hygienic means of you know, keeping your devices, you know, clean and free from vulnerabilities and so on. But you've also got to be aware that the attacker does get in so now you've got to make sure that you limit the damage that they can cause when they're in. So, of course, you know security is a, you know you can take a layered approach to security. So you've got to firstly understand what is your most valuable data, where are your most valuable assets and layer up the levels of security around those first. So you make sure that if the attacker gets in, they don't get there and you limit the damage they can do and then of course you limit their ability to exfiltrate data and get anything out of your organization. Because I mean if they are just in there, of course they can do some damage. But, the real damage happens when they can manage to exfiltrate data and do something with that. >> So again Mary, it make sense that artificial intelligence or machine intelligence could help with this but specifically what do you see as the future role of Watson as it relates to cyber security? >> So, I mentioned the shortage of security professionals and that growing problem, okay so Watson in our cyber security space acts as an assistant to the security analyst. So, we have taught Watson the language of cyber security, and Watson manages to ingest vast troves of unstructured security data, that means blogs and you know, written text of security data from, that's available on the internet and out there all day, everyday. It just ingests this and fills a corpus of knowledge with this, with these jewels of information. And, basically that information and that corpus of knowledge is now available to a security analyst who, you know, a junior security analyst could take years to become very efficient and to really be able to recognize the needle in the haystack themselves. But with the Watson assistant they can embellish their understanding and what they see and all of the, all of the relationships and the data that augments the detail about a cyber incident you know, fairly instantaneous. And it, you know, really augment their own knowledge with the knowledge that would take years to generate, you know. >> So, I wonder if we could talk about collaboration a little bit because this is good versus evil. You guys are like one of the super heroes and your competitors are also sort of super heroes. >> Of course. >> You got Batman, you got Superman, Catwoman, and Spiderman, et cetera. How do you guys collaborate and share in a, highly competitive industry? Well, they're vary as far as you know, appearing for sharing okay, so firstly you absolutely nailed the importance for sharing because you know, the cyber criminals share on the dark web. They actually share, they sell their wares, they trade, you know so very important for us to share as well. So, you know, there are various industry forum for sharing and also organizations like IBM have created collaborative capabilities like we have our X-force Exchange which is basically a sharing portal. So, any of our competitors or other security organizations or interested parties can create you know, a piece of work describing a particular incident that they are investigating or a particular event that's happening and others can add to it and they can share information. Now, historically people have not been keen to share in this space so it is an evolving event. >> So speaking of super heroes I got to ask ya, a lot of security professionals that I talk to say well when I was a kid I read comic books. You know, I envisioned saving the world. So, how did you, how did you get into this, and was that you as a kid? Did you like-- >> No, it wasn't. I'm not a long term security professional. But, I've been in technology and evolving products for, you know, in the telecommunication business and now security over many years. So, I got into this to bring that capability of delivering quality software and hardware products to the field back in 2013 when a part of our IBM security business needed some leadership. So, I had the opportunity to take my family to Atlanta, Georgia to lead a part of the IBM security business then. >> Well, it's a very challenging field. It's one of those, you know, never ending, you know, missions so thank you for your hard work and congratulations on all the success. >> Thank you David. >> Alright, appreciate you coming on The Cube, Mary. >> Thank you. >> Keep it right there everybody, we will be back with our next guest, you're watching The Cube. We're live from IBM Think 2018 in Las Vegas, be right back. (pleasant music)

Published Date : Mar 22 2018

SUMMARY :

Covering IBM Think 2018, brought to you by IBM. Mary O'Brien is here, she is the vice president about your role at IBM as head of research and development. and we take products from, you know, So, Jenny was talking today about, you know, You can't bolt it on, you know, there's of an application or a product or, you know, So, it used to be security was, you know, So, you know, you have described the evolution you know, users that aren't security conscious malware that can actually you know, and of course, you know, in this era to chase down, you know, threats. with a set of basic rules and you know, you know, firm you look at or which organization Well, the figure is definitely scary. the various phases of, you know, protecting yourself. a security analyst who, you know, a junior You guys are like one of the super heroes the importance for sharing because you know, the a lot of security professionals that I talk to products for, you know, in the telecommunication you know, missions so thank you for your Alright, appreciate you coming Keep it right there everybody, we will be back

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JennyPERSON

0.99+

DavidPERSON

0.99+

Mary O'BrienPERSON

0.99+

Dave VellantePERSON

0.99+

IBMORGANIZATION

0.99+

MaryPERSON

0.99+

Peter BurrisPERSON

0.99+

DavePERSON

0.99+

2013DATE

0.99+

SupermanPERSON

0.99+

Las VegasLOCATION

0.99+

250QUANTITY

0.99+

200 daysQUANTITY

0.99+

Cork, IrelandLOCATION

0.99+

BatmanPERSON

0.99+

SpidermanPERSON

0.99+

350 daysQUANTITY

0.99+

2020DATE

0.99+

CatwomanPERSON

0.99+

Atlanta, GeorgiaLOCATION

0.99+

todayDATE

0.98+

IBM SecuritiesORGANIZATION

0.98+

oneQUANTITY

0.98+

firstQUANTITY

0.98+

WatsonPERSON

0.98+

a yearQUANTITY

0.97+

The CubeTITLE

0.97+

30-40,000 peopleQUANTITY

0.96+

TrumpPERSON

0.95+

1.2 million unfilled security professional rolesQUANTITY

0.93+

years agoDATE

0.92+

FirstQUANTITY

0.92+

firstlyQUANTITY

0.91+

this morningDATE

0.9+

50 billion connected devicesQUANTITY

0.9+

six major eventsQUANTITY

0.89+

too many peopleQUANTITY

0.88+

IBM Think 2018EVENT

0.87+

ThinkEVENT

0.82+

last few yearsDATE

0.8+

X-force ExchangeTITLE

0.75+

2018DATE

0.72+

CubeTITLE

0.7+

WatsonTITLE

0.69+

Think 2018EVENT

0.65+

lastDATE

0.62+

15 yearsQUANTITY

0.61+

last yearsDATE

0.58+

10QUANTITY

0.54+

tenantsQUANTITY

0.39+

ThinkCOMMERCIAL_ITEM

0.33+

Sheila Jordan | ServiceNow Knowledge14


 

>> Q. At service now Knowledge fourteen is sponsored by service. Now here are your hosts, Dave Volonte and Jeff Frick. >> We're back. Sheila Jordan is here. She's the CEO of Symantec. We're live. This is the Cube. We're at service now. Knowledge fourteen at Mosconi in San Francisco. We're going to hear today, Wednesday and most of Thursday. So stop by. If you're at Mosconi, Mosconi south, Come in. Look to the right. Cuba's there. Stop by and say hello. Shelley. Welcome to the Cube. Thank you >> very much. Excited to be here. >> Yes, sir. You were across the street. I guess that, uh, the CEO event, right. What's what's the vibe like over there? Describe it. >> Well, I would say this about that three hundred or so CEOs and it really is fascinating because everyone's kind of discovering how important the clouds becoming and how relevant, Because becoming in the in the CIA world, it was years ago. It was more about if the clouds coming. And now it's here. And it's a question of CEOs of struggling whether answer, The question is, how does this really integrate with kind on from solutions? So, really, it's making the cloud more and more real. >> You know, it's interesting. Five years ago, if I asked the CIA about the clouds, you know, they would say It's another quiver in the another arrow in the quiver and you know we're looking at it. It's at its centre and some might say, Hey, we're not using the cloud, especially financial services. But practitioners would roll their eyes on the clouds. The clouds, I t. What do you mean? The cloud that cloud, the cloud that seems to have changed on the practitioner bases is more accepting of that notion of the cloud. What's changed? >> Well, I was a couple things. One is, I think, that when we used to kind of roll, our eyes were very concerned about the security of the cloud, for sure. And I think with the cloud providers have seen lots of improvements in the security angle. Nothing I'LL tell you is in it. We constantly get the pressure of delivering things faster and cheaper, and the cloud offers us that solution to be able to deliver things faster and cheaper, whether that's, you know, for your HR systems or whether that's for something of a solution. So promise Israel. We're beginning to see that, and I think they're really shoring up the security aspects of this. How >> does it change your roll? One of the changes that are sort of required from CEOs. Perspective. >> Yeah, I will say that I think that the CEO today is really focused on five big things mobile cloud structure and unstructured data. So the whole day to play as well as, you know, kind of your personal or professional identity. And then, of course, the final one is the Internet of everything. So Mohr devices coming into the enterprise. And I really think the thing that flows through those five things is two things. One is data that flows through that. So where the data is sourced from a cloud or on crime, the end user wants to have a similar experience whether we're the data source from and the second component is of course, you know how weak secure that. You know, The whole notion of security is becoming more and more critical that, you know, security things at the network layer is good, but in the end, device is good. But now we're being asked to really make sure that we're securing things across the entire enterprise stack. While everything's changing devices are changing, the sourcing is changing as well as you know now the new devices with the Internet of things. >> We do a lot of big data shows and it talks about the data is the new oil and, you know, the data centric organization. How real is that? It that Samantha? I mean, you've only been there three months, I know, but you know, least on your observations, just semantic. But generally in your community, how real is that? >> I think is very real. In fact, I would say that the job of the CEO is to protect the company's assets and to protect the data. And that's assumed that the employees assume that the CIA was going to do that. It's certainly become a bit more difficult, given cybercriminals are getting smarter and there's more hackers and more were ways to hack and, of course, the devices coming in. But I still think that the role of the CEO has to be to protect the country's assets. >> There's an interesting discussion we have. We actually do a conference in chief Data officer conference with them it in July, and the premise that Emmett has put forth is that chief data officer is a new role in the organization should be independent of the CIA, should appear of the CEO and have ownership over, you know, a lot of different. So the data assets the data taxonomy, data sources. It's still fuzzy where the lines are done. When you talkto a lot of the big data practitioners, they say, No way. That's the CEO's job. Um, have you thought about that much in terms of you need the datas are Are you the datas are? >> Yeah, I actually think you could, but especially, I think it depends on certain industries would make that more more >> realistic. Air Service is the regular. >> Actually think the chief information officer has information and data already, and I think that's a big part of our role. So whether it's a separate role or not, the coordination, the combination and reliance on each roll is really critical. >> So don't you have enough to do? Yes, well, now they wanted to innovate right way force of innovation. They want you to be a business partner of Value Creator outside of just the acid. So how does that all playing? Well, measure And >> that's why I guess it's so fun. We've always said that being an I t you gotta like change and being an I t for aninety company, you're really gonna like change. And I would say that it is What's exciting about the CIA role is yes, I can't authorize it simplistically, but it's around, run the business, changed the business and grow the business. And if historically, it might have been that CEOs were just about run the business, not anymore. CEOs are expecting us to run, change and grow. And we got to find solutions and technology cost effectively of how we can do that. >> And now you've got all these megatrends hitting you like a ton of bricks. Like you said, Cloud Mobile social. How's that kind of change the game in the last couple of years? >> Well, I thinkit's both exciting and daunting at the same time. I think it's exciting because it does open things up and again. Most of our employees are also our. All of our employees are consumers, so they're having this consumer like experience and they want to come into it and they want to come to work and now the same kind of experience. So I think it opens up a whole new way for us to deliver services. And one of the things we're working on in semantics is to create a services led organisation. What? We actually are delivering services. So your email services you're content service, your video service, your pricing service so that we can really deliver these services in a way that you have consumed the services as a consumer. >> So you used to be a mean still is most like tea shops. Talk about systems, you know? Sure, it's covered by claims system. That's where my investment is going. It's this big silo infrastructure built around. Do you see that changing? Where were the parlance, even changes to my services? This is my service catalog. Salome Charging for >> that. Yes, I do. Pretty sixteen pretty substantially. And we're implementing that kind of service is lead mentality. It's semantic now, and the reason is because the system of the applications is at some level kind of irrelevant. You know, you gotta replace systems and applications, but ultimately you don't want to replace the service customer. Our employees want to get used to having that video service. They really don't care anymore where it sourced from on from in the cloud, and they don't necessarily care about what technology was used to get there. They want their service. So I think as a ninety organization won by creating the services led organisation, you are really clear about how you're spending the dollars and really clear about how the transparency of the cost of those services and then really clear to your point. You know, I love to shop on the Internet as a consumer, and I'm so used to picking and clicking right. And so we want to deliver services that simply to the organization that people understand the service in the cost of the services. >> So did you see I love the whole concept of portfolio management, the application portfolio, run, the business, grow the business transformed business, the old meta group, you know, taxonomy. I love that and and And I could see I used to work with CEOs all the time, and they would actually use that and say, OK, we're just going to subjectively say, Here's my run. The business absence. My grows, the business grow. The business has transformed the business. We're going to allocate the portfolio accordingly. Do you look at your services catalogue the same way. And how does it where would you like to see it? It's It's very difficult to get out of that seventy thirty year, you know, because by definition, you're always running. Yes, you know so But how do you look at that? That mix and how do you What's your ideal mix? >> Well, it's very difficult because you do have to do kind of portfolio planning, but I do think with Cloud Solutions it offices offers us a different solution to be more cost effective and agile. So clearly you're gonna have some and run the business. But I'm not necessarily spending a lot of money on the actual infrastructure to take some on from solutions that we used to do. So the cost will be total cost of ownership. It should be less with some of the cloud services. That's the promise. So when I think about run, grow change, I know other sources like Gardner and Forrester will say that a large enterprise company spends sixty five seventy percent on run the business. Still, even though I've made all these advancements, we haven't aspirational goal. It's Samantha Guy t. I'm not sure we can get there because again it feeds. But if we could get to a point that we are really a third, a third a third, wouldn't it be cool if I could deliver two thirds of the spent on change and grow versus run? So it's aspirational, but I'm not giving you that. >> But you know what? So maybe maybe we're thinking about the wrong way, because maybe that's an impossible equation to solve. Maybe we should be looking. I wonder if you'd get your feedback on this just struck me. Maybe we should think about it like almost like product cycles. I remember one of the CEOs around here. We usedto be very proud of the fact that a product cycle intensive business said seventy percent of the products that we have, you know, on the seventy percent of our revenue is coming from products that we've announced in the last twelve months. Maybe that's how we should be looking out for, because by definition they're going to be more modern, more innovative, and with the services catalog approach, you may be able to do that. These are the services that we've launched in the last X number of months, we could look att consumption. Do you think that's ah, Reasonable, >> I think is actually interesting way to look at. And I would say that was some of the things that service now is actually introducing. You know, one of the things we want A ninety is just visibility. What service is being used if I had a rank them and them? Ranking and writing. Oh, they four stars, five stars. We want that visibility across organization and delete, delete, delete. The things are defective and that aren't working sometimes the nineteen. We don't know that or see that. So one of the things I think it's really important is with service now or any other solutions is that when we get that visibility, we could go back and say to the organization, Look for people using the service. You know, it's no longer effective as it used to be, less deleted and again that feeds into that cost savings will feed into run the business and growing >> Jr s getting rid of stuff. We never get rid of stuff. And I really that's my goal is value. We have to leave. You need to leave Well, That's interesting that you put a different twist on. We hear a lot about now the apus king, right? Everyone is about the at the at the AP line of business was to build your own app. But you're really putting the certain delivering. The APP is a service above explore application and knocking down the value of the particular app that delivers that service. >> Yeah, I am, for a couple reasons. First of all, not miso and a mobile device you're going to need your absolute All are addicted to our certain laps, for sure. But the reason why I think about that on the Enterprise is because a service is going to be ultimately comprised of the technology process and culture and people, right. So a nap in my mind still gets us to just the technology. When reality To make these service Israel and continue to optimize the services, you're gonna need the service owner. You got people in process to really optimize that service. So it's the super structure >> right above the to deliver the revised >> Yes, yes, and that's a really good point. I think in the past it is always and we always will be held the total cost of ownership. It's really, really, really critical that we show and be fully transparent of our cost. But I actually think with the new technology that's available and we're being expected by our CEO's is we have to deliver value as muchas cost value at a reduced cost or an approved cost. But I think the the conversation needs to continue to push. What's the value that technology can deliver? Not on ly the Kansai, and that's happening. >> We heard earlier today. Friend of yourself, Frank Ski? No, but he was talking about how you had, you know? So the traditional days you got application group, you got infrastructure group infrastructure does operations. They you know, they take the code and take it. You know, the employees at the application guys, you know, we all know the story. Now you see the devil ops culture you're seeing programmable infrastructure. Is that happening in your organization? You see those sort of two worlds defusing or morphing into the business and becoming a devil sculpture >> in pocket. So and say where we have those labs or where we have proof of concepts in pockets, Yes, hasn't been pervasively changed in the organization. Not quite yet. And I think a couple things One is we're in some ways just learning about kind of infrastructure as a service and how I can actually you push up a server and fifteen seconds or less type thing and provisions at server in fifteen seconds. So we're learning as an organization, the whole sum or is Asians are simply better than others, but we're learning on the whole infrastructure of the service. We're learning how we could deliver the applications as a service. So I think the next net and so we're using agile development things and scrums and things like that. But I think the next natural evolution is Dev Ops. Now, I would say that you gotta be kind of careful and where you play and push that because it's a holy learning. You gotta make sure the people challenge. You have been really? Yeah, skills and talents. But I do think it's the next next area, folks. >> So we'LL pick up on infrastructure is a service. We obviously you got the gold standard of of Amazon. Look at him. He's gonna go. Wow, That's pretty impressive what they've done do you look at that and say, OK, there's a big chunk stuff in the margins development that we should just put in tow that cloud Or do you say, why don't we duplicate that? Replicate that in house. Which approach do you think your organization? Well, >> for almost two reasons we're doing Private Cloud. You know, again, I want to be the biggest proof point of semantics products that I possibly can. So that means I have to be customer one toe are semantic products and test them out and make sure we're giving the feed back back to the semantic group. So we're building our private cloud inside semantic right now, which really will become that infrastructure as a service using the latest and greatest technology software to find networks, etcetera, that we're really going to get the whole stack that allows us to do that. And I will tell you that that where we are today versus what the vision is, it will actually leapfrog the foundation of what we're able to do with the company. >> Okay, so So you want essentially duplicate that and guess what You know, the public loud guys are doing That's very secure environment pressures on. Yes, Believe me, I know in time. So now now does that chance. Talking about skill sets before they change the type of people you need to bring in, you have to hire more PHDS way. >> Well, it's not really the species is the real technical talent that no, this new space. So again we had done a several years. Semitic has outsourced their I t organization. And as we bring that in, we gotta make sure and bring in the right skills that supports the new technology. >> So also, outsourcing ended up being, you know, sort of my mess for less, and then it ended up not being less so. You know, a lot of guys have brought that back in, but okay, so you sort of replicated, tryto, tryto leapfrog that capability. Do you become a a profit center? >> Oh, I think it's dangerous. I think it's a real slippery slope if it becomes a profit center. And the reason I say that, it's because I think our focus and our number one job is to really deliver an optimal excellent experience for employees while providing again being in it for ninety company. I think our job is to make sure we deliver the best experience we can while showcasing our products internally and testing and using them. The second you have another motive or another driver, I think it takes the eye. >> So I kind of agree with you. I mean, I do what I don't In the one hand, if you were to sell your services externally than I gave him that, I would disagree, Right? But because you've got a captive audience, you saying you would basically monopolistic power, corrupt, like all monopoly, we >> can certainly come up with what I've pushed suggested my team is way can come up with a whole bunch of ideas of how to improve the product. Or maybe there's a gap in our product strategy that we can suggest to the business unit. So I think in that case, as we come up with and we are the number one customer of our products, that we have ways to enhance it before the product goes to market or opens up another opportunity. Our business unit leaders are really open >> Now. What about chargebacks? Okay, so you're not going profit center. What about chargebacks? >> You know, another thing that I think is a pretty slippery slope. You know cross charging charge bags. It's a complex overhead that ifyou're one company, why do you add that I'm a real a real simple person, and I just like it simple and easy as someone hold accountable and >> companies don't do it, they fif. Fifteen percent of companies will do charge back. It sort of stuck there >> a lot of a lot of over a lot. Yeah, and I'd rather drive accountability into the person that's delivering the service has accountability to do that. It's cost effectively as possible. >> So, Sheila, on the Five Things you mentioned, one of them was your your personality. Well, it was a personal thing I know is you went to a very quickly. >> I'm sorry. So five big trends that I see happening from a knight from a trending perspective in the industry that CIA is really going to need to be thinking about it. And they have already This isn't new, but I do think the five together is pretty powerful. It's of course, mobility, right? It's cloud all the cloud services. Third is around data. So both unstructured and structure data coming together. And of course, I think Nirvana on that one is when unstructured data could be fed into part of the decision. Making like structure data is right. That's going interesting. The fourth is the convergence of personal professional identities. So people are coming into the organization with their mobile phones and they want one phone. They want one device. So how does it professionals and what's the right solution for different industries merged, or at least containerized, whichever one you want to do? The personal versus professional identities and in the last one is, of course, mobility is one thing. But all this explosion of other devices >> get me on the mobile, >> right? And so and then what? Lose all that together is data and, of course, security way have to make sure all that secured as we traverse all those different trends. >> Actually, we're here. Where do you report into the organization >> by reporter Seo Stevens? Let >> Seo. Okay, so let's say Stephen's doing your performance review. You know, when you came on its okay, these air, your objectives if you maybe, you know, you guys write it together. What a Your objectives for the next twelve months. >> Yeah, so it's interesting times, it's semantic, and I would say that we've agreed that it is been there now sixty days so over. Greed is really this. Insourcing is a pretty big effort initiative and especially around how we can stand up our own data center, our own network, all the others ligation migration. It's a pretty big effort. The other part, I would tell you, is pretty important for semantic right now. Is the global Security Office reports to me as well, so understanding the security risks and making sure that we really do have have understood and really being thought, leadership in the security space. That's kind of number two. And I would say, in general the overall services lead how we change the structure of the organization, the number three >> and and I would imagine here on early consumer of a lot of the semantics security product. >> Yes, they are. >> So you must be pretty important. Constituent throttle groups have a lot of a lot of juice with those guys. It >> that's part of the job it's really, really fun is when we could actually provide some important feedback on their products and see it see it built into the road map. It gets quite exciting >> So how you know, we heard again Frank this morning saying, Look, see, I always gotta know as much about the business is business people do. That's that's a tall order, especially in a company the size of a semantic. But do you buy that? At least in part on How do you How do you develop that knowledge? >> Well, I would say that, you know, first of all, yes, I buy into it. I really do think and again it goes back to being in it for ninety company Being there customer you have. You have a pretty big seat at the table, and I think it's really important that you're not only giving advice and counsel on, you know, the product strategy and where we think there could be potential gaps and where things could be improved. But you also have to tell someone you know what that price old or we don't want to use that anymore or show some of the some of the inefficiencies in the product. So I think one is being absolutely tied to the product strategy, and having a voice in the product strategy is really critical. And again, I think, given that you represent the customer base at that table is also quite exciting. >> You go to sales meeting. >> I'm actually not yet sixty days, but we actually have a big customer meeting coming up next week which I'll be attending. >> Yeah. I mean, that's a great way to learn about the products and the challenges. >> Yes, that too. And I love talking to the customers in my previous rules, like talkto the customers in line. >> So they talk about the evolution of the rules, Theo in the not tech company, um, and change of tech as a competitive different theater in York Disney for you before Cisco Ice Arlington. So how is that changing >> lights? They Actually, it's kind of similar challenges in being an I t. For the tech company. You really are kind of tied to the product of being an instrumental influence in the product strategy. That's one in a non tech company. You are challenged with this whole notion. Well, that's what I get as a consumer. So I still even thinking a non titan technology company when they come to work and they have a less technical experience in the user. Experience is less than one way to get at home. I think consumers in general are just getting smarter and smarter. Smarter about I have that that email storage ten acts that at home I have my mobile device that were You know, all these things that were experienced as consumers is coming into all the industries in that expectation of I wanna work differently is just that you get on company >> with no appreciation of what it means even more just the magic in the Magic Kingdom about that conversation we had before. I mean, is the gold toe really replicate that or just get good enough? You know, I think you know Microsoft. There we say suffers Good enough. They made a ton of money and good enough business because can you get there because you're talking about scale of Amazon and Google and Facebook and Microsoft? So do you have to be just good enough? Where do you have to be? Good as good or better? You said leapfrog back, or that was that was notable. >> Gonna leapfrog our data center structure data center strategy. What I think is I do think in delivering a servant out has two teenage children in college, and they sometimes wonder. You know why work is that both now manage the enterprise, and they can't quite figure out talking to interns at work. They can't figure out why they don't have. This is twenty twenty one. Yes, I can't quite figure out why the experiences the same. And when I told my children as well as the intern Group, I says, Listen, work is a bit more complicated than face the pictures and status, you know, work really is. And as a nineteen professional, you have this obligation and responsibility to protect the company's assets. So, no, do I ever want to get to a point that it's as easy as Facebook? What do I ever want to get to a point that you know, pictures on instagram and things like that? It's not practical to put that in the enterprise. Do I want to get to a point that their applications that they use on a daily basis and we're driving a sales sales forecast and it's really important that timely and decision making of that as an app on their phone? Yes, I do. >> And it's self serving self service mobile. >> So yes, I think we have to be really careful and really explicit about what app. So the right APS for work and what happens to the ones that you know are just too much risk >> that this expectation set in communications and all the stuff that new CEO has really got a good act with a head of steam. It's good crystal. All right? Shall we gotta leave it there? Thanks very much for coming with >> me as well. Thank >> you. Thank you. All right, but keep it right there. We'LL be back to wrap up Day one from service now. Knowledge, We're live. This's the Cube right back.

Published Date : Apr 30 2014

SUMMARY :

Now here are your hosts, Dave Volonte and Jeff Frick. This is the Cube. Excited to be here. I guess that, uh, the CEO event, how important the clouds becoming and how relevant, Because becoming in the in the CIA world, The cloud that cloud, the cloud that seems to have changed on the you know, for your HR systems or whether that's for something of a solution. One of the changes that are sort of required from CEOs. So the whole day to play as well as, you know, kind of your personal or professional identity. We do a lot of big data shows and it talks about the data is the new oil and, And that's assumed that the employees assume that the CIA was going to do that. So the data assets the data taxonomy, data sources. Air Service is the regular. the combination and reliance on each roll is really critical. So don't you have enough to do? We've always said that being an I t you gotta like change and being How's that kind of change the game in the last couple of years? And one of the things we're working on in semantics So you used to be a mean still is most like tea shops. You know, you gotta replace systems and applications, but ultimately you don't want to replace the service customer. the application portfolio, run, the business, grow the business transformed business, the old meta group, you know, on the actual infrastructure to take some on from solutions that we used to do. cycle intensive business said seventy percent of the products that we have, So one of the things I think it's really important is with service now or any You need to leave Well, That's interesting that you put a different twist on. So it's the super structure But I think the the conversation needs to continue to push. So the traditional days you got application group, Now, I would say that you gotta be kind of careful that we should just put in tow that cloud Or do you say, why don't we duplicate And I will tell you that that Talking about skill sets before they change the type of people you need to bring in, Well, it's not really the species is the real technical talent that no, this new space. So also, outsourcing ended up being, you know, sort of my mess for less, And the reason I say that, it's because I think our focus and our number one job is to really deliver an optimal I mean, I do what I don't In the one hand, if you were to sell your So I think in that case, as we come up with and we are the number one customer Okay, so you're not going profit center. why do you add that I'm a real a real simple person, and I just like it simple companies don't do it, they fif. person that's delivering the service has accountability to do that. So, Sheila, on the Five Things you mentioned, one of them was your your personality. So people are coming into the organization with their mobile phones sure all that secured as we traverse all those different trends. Where do you report into the organization You know, when you came on its okay, these air, your objectives if you maybe, you know, you guys write it together. Is the global Security Office reports So you must be pretty important. and see it see it built into the road map. So how you know, we heard again Frank this morning saying, Look, see, I always gotta know as much about the Well, I would say that, you know, first of all, yes, I buy into it. And I love talking to the customers in my previous rules, like talkto the customers in line. So how is that changing just that you get on company So do you have to be just good enough? than face the pictures and status, you know, work really is. So the right APS for work and what happens to the ones that you know are just too much risk that this expectation set in communications and all the stuff that new CEO has really got Thank This's the Cube right back.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VolontePERSON

0.99+

Sheila JordanPERSON

0.99+

Frank SkiPERSON

0.99+

SheilaPERSON

0.99+

Jeff FrickPERSON

0.99+

MicrosoftORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

CIAORGANIZATION

0.99+

ShelleyPERSON

0.99+

SymantecORGANIZATION

0.99+

JulyDATE

0.99+

GoogleORGANIZATION

0.99+

FrankPERSON

0.99+

StephenPERSON

0.99+

FacebookORGANIZATION

0.99+

seventy percentQUANTITY

0.99+

fifteen secondsQUANTITY

0.99+

five starsQUANTITY

0.99+

sixty daysQUANTITY

0.99+

two thingsQUANTITY

0.99+

Samantha GuyPERSON

0.99+

next weekDATE

0.99+

four starsQUANTITY

0.99+

one phoneQUANTITY

0.99+

one deviceQUANTITY

0.99+

Seo StevensPERSON

0.99+

GardnerORGANIZATION

0.99+

ThirdQUANTITY

0.99+

second componentQUANTITY

0.99+

oneQUANTITY

0.99+

three monthsQUANTITY

0.99+

SamanthaPERSON

0.99+

five thingsQUANTITY

0.99+

San FranciscoLOCATION

0.99+

fourthQUANTITY

0.99+

nineteenQUANTITY

0.99+

EmmettPERSON

0.99+

bothQUANTITY

0.99+

OneQUANTITY

0.99+

Fifteen percentQUANTITY

0.99+

todayDATE

0.99+

Cisco Ice ArlingtonORGANIZATION

0.99+

nineteen professionalQUANTITY

0.99+

fiveQUANTITY

0.99+

ShalPERSON

0.99+

ninety companyQUANTITY

0.98+

sixty five seventy percentQUANTITY

0.98+

three hundredQUANTITY

0.98+

ThursdayDATE

0.98+

seventy thirty yearQUANTITY

0.98+

MosconiLOCATION

0.98+

Five years agoDATE

0.97+

fifQUANTITY

0.97+

CubaLOCATION

0.97+

one companyQUANTITY

0.97+

FirstQUANTITY

0.97+

instagramORGANIZATION

0.97+

thirdQUANTITY

0.96+

two teenage childrenQUANTITY

0.96+

each rollQUANTITY

0.95+

SalomePERSON

0.93+

Five ThingsQUANTITY

0.92+

five big trendsQUANTITY

0.91+

MohrORGANIZATION

0.91+

TheoPERSON

0.91+

WednesdayDATE

0.91+

last twelve monthsDATE

0.91+

this morningDATE

0.9+

earlier todayDATE

0.9+

less than one wayQUANTITY

0.89+

Knowledge fourteenORGANIZATION

0.88+

Day oneQUANTITY

0.88+