Image Title

Search Results for 30different security solutions:

Armando Acosta, Dell Technologies and Matt Leininger, Lawrence Livermore National Laboratory


 

(upbeat music) >> We are back, approaching the finish line here at Supercomputing 22, our last interview of the day, our last interview of the show. And I have to say Dave Nicholson, my co-host, My name is Paul Gillin. I've been attending trade shows for 40 years Dave, I've never been to one like this. The type of people who are here, the type of problems they're solving, what they talk about, the trade shows are typically, they're so speeds and feeds. They're so financial, they're so ROI, they all sound the same after a while. This is truly a different event. Do you get that sense? >> A hundred percent. Now, I've been attending trade shows for 10 years since I was 19, in other words, so I don't have necessarily your depth. No, but seriously, Paul, totally, completely, completely different than any other conference. First of all, there's the absolute allure of looking at the latest and greatest, coolest stuff. I mean, when you have NASA lecturing on things when you have Lawrence Livermore Labs that we're going to be talking to here in a second it's a completely different story. You have all of the academics you have students who are in competition and also interviewing with organizations. It's phenomenal. I've had chills a lot this week. >> And I guess our last two guests sort of represent that cross section. Armando Acosta, director of HPC Solutions, High Performance Solutions at Dell. And Matt Leininger, who is the HPC Strategist at Lawrence Livermore National Laboratory. Now, there is perhaps, I don't know you can correct me on this, but perhaps no institution in the world that uses more computing cycles than Lawrence Livermore National Laboratory and is always on the leading edge of what's going on in Supercomputing. And so we want to talk to both of you about that. Thank you. Thank you for joining us today. >> Sure, glad to be here. >> For having us. >> Let's start with you, Armando. Well, let's talk about the juxtaposition of the two of you. I would not have thought of LLNL as being a Dell reference account in the past. Tell us about the background of your relationship and what you're providing to the laboratory. >> Yeah, so we're really excited to be working with Lawrence Livermore, working with Matt. But actually this process started about two years ago. So we started looking at essentially what was coming down the pipeline. You know, what were the customer requirements. What did we need in order to make Matt successful. And so the beauty of this project is that we've been talking about this for two years, and now it's finally coming to fruition. And now we're actually delivering systems and delivering racks of systems. But what I really appreciate is Matt coming to us, us working together for two years and really trying to understand what are the requirements, what's the schedule, what do we need to hit in order to make them successful >> At Lawrence Livermore, what drives your computing requirements I guess? You're working on some very, very big problems but a lot of very complex problems. How do you decide what you need to procure to address them? >> Well, that's a difficult challenge. I mean, our mission is a national security mission dealing with making sure that we do our part to provide the high performance computing capabilities to the US Department of Energy's National Nuclear Security Administration. We do that through the Advanced Simulation computing program. Its goal is to provide that computing power to make sure that the US nuclear rep of the stockpile is safe, secure, and effective. So how we go about doing that? There's a lot of work involved. We have multiple platform lines that we accomplish that goal with. One of them is the advanced technology systems. Those are the ones you've heard about a lot, they're pushing towards exit scale, the GPU technologies incorporated into those. We also have a second line, a platform line, called the Commodity Technology Systems. That's where right now we're partnering with Dell on the latest generation of those. Those systems are a little more conservative, they're right now CPU only driven but they're also intended to be the everyday work horses. So those are the first systems our users get on. It's very easy for them to get their applications up and running. They're the first things they use usually on a day to day basis. They run a lot of small to medium size jobs that you need to do to figure out how to most effectively use what workloads you need to move to the even larger systems to accomplish our mission goals. >> The workhorses. >> Yeah. >> What have you seen here these last few days of the show, what excites you? What are the most interesting things you've seen? >> There's all kinds of things that are interesting. Probably most interesting ones I can't talk about in public, unfortunately, 'cause of NDA agreements, of course. But it's always exciting to be here at Supercomputing. It's always exciting to see the products that we've been working with industry and co-designing with them on for, you know, several years before the public actually sees them. That's always an exciting part of the conference as well specifically with CTS-2, it's exciting. As was mentioned before, I've been working with Dell for nearly two years on this, but the systems first started being delivered this past August. And so we're just taking the initial deliveries of those. We've deployed, you know, roughly about 1600 nodes now but that'll ramp up to over 6,000 nodes over the next three or four months. >> So how does this work intersect with Sandia and Los Alamos? Explain to us the relationship there. >> Right, so those three laboratories are the laboratories under the National Nuclear Security Administration. We partner together on CTS. So the architectures, as you were asking, how do we define these things, it's the labs coming together. Those three laboratories we define what we need for that architecture. We have a joint procurement that is run out of Livermore but then the systems are deployed at all three laboratories. And then they serve the programs that I mentioned for each laboratory as well. >> I've worked in this space for a very long time you know I've worked with agencies where the closest I got to anything they were actually doing was the sort of guest suite outside the secure area. And sometimes there are challenges when you're communicating, it's like you have a partner like Dell who has all of these things to offer, all of these ideas. You have requirements, but maybe you can't share 100% of what you need to do. How do you navigate that? Who makes the decision about what can be revealed in these conversations? You talk about NDA in terms of what's been shared with you, you may be limited in terms of what you can share with vendors. Does that cause inefficiency? >> To some degree. I mean, we do a good job within the NSA of understanding what our applications need and then mapping that to technical requirements that we can talk about with vendors. We also have kind of in between that we've done this for many years. A recent example is of course with the exit scale computing program and some things it's doing creating proxy apps or mini apps that are smaller versions of some of the things that we are important to us. Some application areas are important to us, hydrodynamics, material science, things like that. And so we can collaborate with vendors on those proxy apps to co-design systems and tweak the architectures. In fact, we've done a little bit that with CTS-2, not as much in CTS as maybe in the ATS platforms but that kind of general idea of how we collaborate through these proxy applications is something we've used across platforms. >> Now is Dell one of your co-design partners? >> In CTS-2 absolutely, yep. >> And how, what aspects of CTS-2 are you working on with Dell? >> Well, the architecture itself was the first, you know thing we worked with them on, we had a procurement come out, you know they bid an architecture on that. We had worked with them, you know but previously on our requirements, understanding what our requirements are. But that architecture today is based on the fourth generation Intel Xeon that you've heard a lot about at the conference. We are one of the first customers to get those systems in. All the systems are interconnected together with the Cornell Network's Omni-Path Network that we've used before and are very excited about as well. And we build up from there. The systems get integrated in by the operations teams at the laboratory. They get integrated into our production computing environment. Dell is really responsible, you know for designing these systems and delivering to the laboratories. The laboratories then work with Dell. We have a software stack that we provide on top of that called TOSS, for Tri-Lab Operating System. It's based on Redhead Enterprise Linux. But the goal there is that it allows us, a common user environment, a common simulation environment across not only CTS-2, but maybe older systems we have and even the larger systems that we'll be deploying as well. So from a user perspective they see a common user interface, a common environment across all the different platforms that they use at Livermore and the other laboratories. >> And Armando, what does Dell get out of the co-design arrangement with the lab? >> Well, we get to make sure that they're successful. But the other big thing that we want to do, is typically when you think about Dell and HPC, a lot of people don't make that connection together. And so what we're trying to do is make sure that, you know they know that, hey, whether you're a work group customer at the smallest end or a super computer customer at the highest end, Dell wants to make sure that we have the right setup portfolio to match any needs across this. But what we were really excited about this, this is kind of our, you know big CTS-2 first thing we've done together. And so, you know, hopefully this has been successful. We've made Matt happy and we look forward to the future what we can do with bigger and bigger things. >> So will the labs be okay with Dell coming up with a marketing campaign that said something like, "We can't confirm that alien technology is being reverse engineered." >> Yeah, that would fly. >> I mean that would be right, right? And I have to ask you the question directly and the way you can answer it is by smiling like you're thinking, what a stupid question. Are you reverse engineering alien technology at the labs? >> Yeah, you'd have to suck the PR office. >> Okay, okay. (all laughing) >> Good answer. >> No, but it is fascinating because to a degree it's like you could say, yeah, we're working together but if you really want to dig into it, it's like, "Well I kind of can't tell you exactly how some of this stuff is." Do you consider anything that you do from a technology perspective, not what you're doing with it, but the actual stack, do you try to design proprietary things into the stack or do you say, "No, no, no, we're going to go with standards and then what we do with it is proprietary and secret."? >> Yeah, it's more the latter. >> Is the latter? Yeah, yeah, yeah. So you're not going to try to reverse engineer the industry? >> No, no. We want the solutions that we develop to enhance the industry to be able to apply to a broader market so that we can, you know, gain from the volume of that market, the lower cost that they would enable, right? If we go off and develop more and more customized solutions that can be extraordinarily expensive. And so we we're really looking to leverage the wider market, but do what we can to influence that, to develop key technologies that we and others need that can enable us in the high forms computing space. >> We were talking with Satish Iyer from Dell earlier about validated designs, Dell's reference designs for for pharma and for manufacturing, in HPC are you seeing that HPC, Armando, and is coming together traditionally and more of an academic research discipline beginning to come together with commercial applications? And are these two markets beginning to blend? >> Yeah, I mean so here's what's happening, is you have this convergence of HPC, AI and data analytics. And so when you have that combination of those three workloads they're applicable across many vertical markets, right? Whether it's financial services, whether it's life science, government and research. But what's interesting, and Matt won't brag about, but a lot of stuff that happens in the DoE labs trickles down to the enterprise space, trickles down to the commercial space because these guys know how to do it at scale, they know how to do it efficiently and they know how to hit the mark. And so a lot of customers say, "Hey we want what CTS-2 does," right? And so it's very interesting. The way I love it is their process the way they do the RFP process. Matt talked about the benchmarks and helping us understand, hey here's kind of the mark you have to hit. And then at the same time, you know if we make them successful then obviously it's better for all of us, right? You know, I want to secure nuclear stock pile so I hope everybody else does as well. >> The software stack you mentioned, I think Tia? >> TOSS. >> TOSS. >> Yeah. >> How did that come about? Why did you feel the need to develop your own software stack? >> It originated back, you know, even 20 years ago when we first started building Linux clusters when that was a crazy idea. Livermore and other laboratories were really the first to start doing that and then push them to larger and larger scales. And it was key to have Linux running on that at the time. And so we had the. >> So 20 years ago you knew you wanted to run on Linux? >> Was 20 years ago, yeah, yeah. And we started doing that but we needed a way to have a version of Linux that we could partner with someone on that would do, you know, the support, you know, just like you get from an EoS vendor, right? Security support and other things. But then layer on top of that, all the HPC stuff you need either to run the system, to set up the system, to support our user base. And that evolved into to TOSS which is the Tri-Lab Operating System. Now it's based on the latest version of Redhead Enterprise Linux, as I mentioned before, with all the other HPC magic, so to speak and all that HPC magic is open source things. It's not stuff, it may be things that we develop but it's nothing closed source. So all that's there we run it across all these different environments as I mentioned before. And it really originated back in the early days of, you know, Beowulf clusters, Linux clusters, as just needing something that we can use to run on multiple systems and start creating that common environment at Livermore and then eventually the other laboratories. >> How is a company like Dell, able to benefit from the open source work that's coming out of the labs? >> Well, when you look at the open source, I mean open source is good for everybody, right? Because if you make a open source tool available then people start essentially using that tool. And so if we can make that open source tool more robust and get more people using it, it gets more enterprise ready. And so with that, you know, we're all about open source we're all about standards and really about raising all boats 'cause that's what open source is all about. >> And with that, we are out of time. This is our 28th interview of SC22 and you're taking us out on a high note. Armando Acosta, director of HPC Solutions at Dell. Matt Leininger, HPC Strategist, Lawrence Livermore National Laboratories. Great discussion. Hopefully it was a good show for you. Fascinating show for us and thanks for being with us today. >> Thank you very much. >> Thank you for having us >> Dave it's been a pleasure. >> Absolutely. >> Hope we'll be back next year. >> Can't believe, went by fast. Absolutely at SC23. >> We hope you'll be back next year. This is Paul Gillin. That's a wrap, with Dave Nicholson for theCUBE. See here in next time. (soft upbear music)

Published Date : Nov 17 2022

SUMMARY :

And I have to say Dave You have all of the academics and is always on the leading edge about the juxtaposition of the two of you. And so the beauty of this project How do you decide what you need that you need to do but the systems first Explain to us the relationship there. So the architectures, as you were asking, 100% of what you need to do. And so we can collaborate with and the other laboratories. And so, you know, hopefully that said something like, And I have to ask you and then what we do with it reverse engineer the industry? so that we can, you know, gain And so when you have that combination running on that at the time. all the HPC stuff you need And so with that, you know, and thanks for being with us today. Absolutely at SC23. with Dave Nicholson for theCUBE.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Matt LeiningerPERSON

0.99+

Dave NicholsonPERSON

0.99+

Dave NicholsonPERSON

0.99+

Paul GillinPERSON

0.99+

National Nuclear Security AdministrationORGANIZATION

0.99+

Armando AcostaPERSON

0.99+

Cornell NetworkORGANIZATION

0.99+

DellORGANIZATION

0.99+

MattPERSON

0.99+

CTS-2TITLE

0.99+

US Department of EnergyORGANIZATION

0.99+

DavePERSON

0.99+

twoQUANTITY

0.99+

10 yearsQUANTITY

0.99+

40 yearsQUANTITY

0.99+

two yearsQUANTITY

0.99+

next yearDATE

0.99+

Lawrence LivermoreORGANIZATION

0.99+

100%QUANTITY

0.99+

CTSTITLE

0.99+

Dell TechnologiesORGANIZATION

0.99+

PaulPERSON

0.99+

LinuxTITLE

0.99+

NASAORGANIZATION

0.99+

HPC SolutionsORGANIZATION

0.99+

bothQUANTITY

0.99+

Lawrence Livermore LabsORGANIZATION

0.99+

todayDATE

0.99+

Los AlamosORGANIZATION

0.99+

OneQUANTITY

0.99+

Lawrence Livermore National LaboratoryORGANIZATION

0.99+

ArmandoORGANIZATION

0.99+

each laboratoryQUANTITY

0.99+

second lineQUANTITY

0.99+

over 6,000 nodesQUANTITY

0.99+

20 years agoDATE

0.98+

three laboratoriesQUANTITY

0.98+

28th interviewQUANTITY

0.98+

Lawrence Livermore National LaboratoriesORGANIZATION

0.98+

threeQUANTITY

0.98+

firstQUANTITY

0.98+

Tri-LabORGANIZATION

0.98+

SandiaORGANIZATION

0.97+

oneQUANTITY

0.97+

FirstQUANTITY

0.97+

two marketsQUANTITY

0.97+

SupercomputingORGANIZATION

0.96+

first systemsQUANTITY

0.96+

fourth generationQUANTITY

0.96+

this weekDATE

0.96+

LivermoreORGANIZATION

0.96+

Omni-Path NetworkORGANIZATION

0.95+

about 1600 nodesQUANTITY

0.95+

Lawrence Livermore National LaboratoryORGANIZATION

0.94+

LLNLORGANIZATION

0.93+

NDAORGANIZATION

0.93+

Sam Grocott, Dell Technologies | Dell Technologies Summit 2022


 

(bright music) >> Hello everyone, this is Dave Vellante, and you're watching The Cube's coverage of the Dell Technology Summit 2022, with exclusive behind the scenes interviews featuring Dell executive perspectives. And right now we're going to explore Apex, which is Dell's As-a-Service offering, Dell's multi-cloud and Edge strategies, and the momentum around those. And we have news around Project Frontier, which is Dell's vision for its Edge platform. And there's so much happening here. And don't forget, it's Cyber Security Awareness Month. Sam Grocott is here. He's the Senior Vice President of Marketing at Dell Technologies. Sam, always great to see you. How you doing? >> Always great to be here, Dave. >> All right, let's look at cloud. Everybody's talking about cloud Apex, multi-cloud. What's the update? How's it going? Where's the innovation and focal points of the strategy? >> Yeah, yeah. Look, Dave, if you think back over the course of this year, you've really heard us pivot as a company and discussing more and more about how multi-cloud is becoming a reality for our customers today. And when we listen and talk with our customers, they really describe multi-cloud challenges in a few key threads. One, the complexity is growing very, very quickly. Two, they're having a harder time controlling how their users are accessing the various different clouds. And then of course, finally, the cloud costs are growing unchecked, as well. So we like to describe this phenomenon as multi-cloud by design, where essentially organizations are waking up and seeing cloud sprawl around their organization every day. And this is creating more and more of those challenges. So of course at Dell we've got a strong point of view that you don't need to build multi-cloud by default, rather it's multi-cloud by design, where you're very intentional in how you do multi-cloud. And how we deliver multi-cloud by design is through Apex. Apex is our modern cloud and our modern consumption experience. So when you think about the innovation as well, Dave like, we've been on a pretty quick track record here in that, you know, the beginning of this year we introduced brand new Apex backup services that provides that SAS-based backup service. We've introduced, or announced, Project Alpine which is bringing our storage software intellectual property from on-prem, and putting it and running it natively in the public cloud. We've also introduced new Apex cyber recovery services that is simplifying how customers protect against cyber attacks. They can run in Amazon, Azure, AW I'm sorry, Amazon, AWS, Azure, or Google. And then, you know, we are really focused on this multi-cloud ecosystem. We announced key partnerships with SAS providers such as Snowflake, where you can now access our information, or our data, from on-prem through the Snowflake cloud. Or if needed, we can actually move the data to the Snowflake cloud, if required. So we're continuing to build out that ecosystem SAS providers. And then finally I would say, you know, we made a big strategic announcement just recently with Red Hat, where we're not only delivering new Apex container services, but we announced a strategic partnership to build jointly engineered solutions to address hybrid and multi-cloud solutions going forward. You know VMware is going to always continue to be a key partner of ours. At the more recent VMware explorer, we announced new Tansu integration. So Dave, I think in a nutshell, we've been innovating at a very, very fast pace. We think there is a better way to do multi-cloud and that's multi-cloud by design. >> Yeah, we heard that at Dell Technologies World. First time I had heard that multi-cloud by design versus to the default, which is great. Alpine, which is sort of our, what we call, "super cloud in the making." And then of course the ecosystem is critical for any cloud company. VMware of course, you know, top partner. But the Snowflake announcement was very interesting. Red Hat, so seeing that expand. Now let's go out to the Edge. How's it going with the Edge expansion? There's got to be new, speaking of ecosystem, the Edge is like a whole different you know, OT type of ecosystem, >> That's right. Telcos. And what's this new Frontier platform all about? >> Yeah, yeah. So we've talked a lot about cloud and multi-clouds. We've talked about private and hybrid clouds. We've talked about public clouds, clouds and Kronos, Telcos, et cetera. There's really been one key piece of our multi-cloud and technology strategy that we haven't spent a lot of time on. And that's the Edge. And we do see that as that next frontier for our customers to really gain that competitive advantage that is created from their data and get closer to the point of creation where the data lives, and that's at the Edge. We see the Edge infrastructure space growing very, very quickly. We've seen upwards of 300% year-of-year growth in terms of amount of data being created at the Edge. That's almost 3000 exabytes of data by 2026. So just incredible growth. And the Edge is not really new for Dell. We've been at it for over 20 years of delivering Edge solutions. 81% of the Fortune 100 companies in the US use Dell Solutions today at the Edge. And we are the number one OEM provider of Edge Solutions with over 44,000 customers across over 40 industries in things like manufacturing, retail, Edge, healthcare, and more. So Dave, while we've been at it for a long time, we have such a deep understanding of how our customers are using Edge Solutions. Say, the bottom line is the game has got to change. With that growth that we talked about, the new use cases that are emerging, we've got to unlock this new Frontier for customers to take advantage of the Edge. And that's why we are announcing and revealing Project Frontier. And with Project Frontier in its most simplest form is a software platform that's going to help customers and organizations really radically simplify their edge deployments by automating their edge operations. You know, with Project Frontier organizations are really going to be able to manage, and operate their edge infrastructure and application securely, efficiently, and at scale. >> Okay, so it is, first of all, I like the name. It is software, it's a software architecture. So presumably a lot of API capabilities. >> That's right. >> Integration. Is there hardware involved? >> Yeah, so of course you'll run it on a Dell infrastructure. We'll be able to do both infrastructure orchestration through the platform, but as well as application orchestration. And you know, really there's a handful of key drivers that have been really pushing our customers to take on and look at building a better way to do the edge with Project Frontier. And I think I would just highlight a handful of them. You know, freedom of choice. We definitely see this as an open ecosystem out there even more so at the Edge than any other part of the IT stack. You know, being able to provide that freedom of choice for software applications or IoT frameworks, operational technology, or OT for any of their edge use cases, that's really, really important. Another key area that we're helping to solve with Project Frontier is, you know, being able to expect zero trust security across all their Edge applications, from design to deployment, you know, and of course backed by a secure supply chain is really, really important to customers. And then getting that greater efficiency and reliability of operations with a centralized management through Project Frontier and Zero Touch deployments. You know, one of the biggest challenges especially when you get out to the far, far reach of the Frontier, is really IT resources and being able to have that IT expertise. And we built in an enormous amount of automation to help streamline the Edge deployments where you might be deploying a single-edge solution which is highly unlikely, or hundreds or thousands, which is becoming more and more likely. So Dave, we do think Project Frontier is the right Edge platform for customers to build their Edge applications on now, and certain, excuse me, certainly and into the future. >> Yeah. Sam, no truck rolls. I like it. (laughing) And you, you mentioned, you mentioned Zero trust. So we have Mother's Day, you know, we have Father's Day. The kids always ask, "When's Kids' day?" And we of course we say, "Every day is Kids' Day," and every day should be Cybersecurity Awareness Day. So, (laughs) but we have Cybersecurity Awareness Month. What does it mean for Dell? What are you hearing from customers and how are you responding? >> Yeah, yeah. No, there isn't a more prevalent top-of-mind conversation, whether it's the boardroom or the IT departments, or every company is really have been forced to reckon with the cyber security and ransom secure issues out there. You know, every decision in IT department makes, impacts your security profile. Those decisions can certainly, positively, hopefully impact it, but also can negatively impact it, as well. So, data security is really not a new area of focus for Dell. It's been an area that we've been focused on for a long time. But there are really three core elements to cybersecurity and data security as we go forward. The first is really setting the foundation of trust is really, really important across any IT system and having the right supply chain and the right partner to partner with to deliver that. It's kind of the foundation in step one. Second, you need to, of course, go with technology that is trustworthy. It doesn't mean you are putting it together correctly. It means that you're essentially assembling the right piece parts together, that coexist together in the right way. You know, to truly change that landscape of the attackers out there that are going to potentially create risk for your environment, we are definitely pushing and helping to embrace the zero trust principles and architectures that are out there. So finally, while when you think about security it certainly is not absolute all correct. Security architectures assume that, you know, there are going to be challenges, there are going to be pain points, but you've got to be able to plan for recovery. And I think that's the holistic approach that we're taking with Dell. >> Well, and I think too, it's obviously security is a complicated situation. Now with cloud you've got, you know, shared responsibility models, you got that multi-cloud, you got that across clouds, you're asking developers to do more. So I think the key takeaway is as a security pro, I'm looking for my technology partner through their R&D and their, you mentioned, supply chain processes to take that off my plate so I can go plug holes elsewhere. Okay. Sam, put a bow- >> That's right. >> on Dell Technology Summit for us and give us your closing thoughts. >> Yeah, look, I think we're at a transformative point in IT. You know, customers are moving more and more quickly to multi-cloud environments. They're looking to consume IT in different ways, such as as a service. A lot of customers, Edge is new and an untapped opportunity for them to get closer to their customers and to their data. And of course there's more and more cyber threats out there every day. You know, our customers when we talk with them, they really want simple, consistent infrastructure options that are built on an open ecosystem that allows them to accomplish their goals quickly and successfully. And look, I think at Dell we've got the right strategy we've got the right portfolio. We are the trusted partner of choice to help them lead their future transformations into the future. So, Dave, look, I think it's, it's absolutely one of the most exciting times in IT, and I can't wait to see where it goes from here. >> Sam, always fun catching up with you. Appreciate your time. >> Thanks, Dave. >> All right. At Dell Tech World in Vegas this past year, one of the most interesting conversations I personally had was around hybrid work and the future of work, and the protocols associated with that, and the mindset of, you know, the younger generation. And that conversation was with Jenn Saavedra, and we're going to speak to Jenn about this and other people and culture topics. Keep it right there. You're watching The Cube's exclusive coverage of Dell Technology Summit 2022. (bright music)

Published Date : Oct 5 2022

SUMMARY :

and the momentum around those. What's the update? And then finally I would say, you know, VMware of course, you know, top partner. And what's this new the game has got to change. of all, I like the name. there hardware involved? of the Frontier, is really IT resources and how are you responding? and the right partner to to take that off my plate and give us your closing thoughts. that allows them to accomplish their goals Sam, always fun catching up with you. and the mindset of, you

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JennPERSON

0.99+

Dave VellantePERSON

0.99+

Sam GrocottPERSON

0.99+

Jenn SaavedraPERSON

0.99+

TelcosORGANIZATION

0.99+

DavePERSON

0.99+

AmazonORGANIZATION

0.99+

AWSORGANIZATION

0.99+

DellORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

SASORGANIZATION

0.99+

USLOCATION

0.99+

SamPERSON

0.99+

hundredsQUANTITY

0.99+

Red HatORGANIZATION

0.99+

2026DATE

0.99+

81%QUANTITY

0.99+

300%QUANTITY

0.99+

VegasLOCATION

0.99+

KronosORGANIZATION

0.99+

firstQUANTITY

0.99+

SecondQUANTITY

0.99+

VMwareORGANIZATION

0.99+

over 20 yearsQUANTITY

0.99+

EdgeORGANIZATION

0.99+

Dell TechnologiesORGANIZATION

0.99+

TwoQUANTITY

0.99+

over 44,000 customersQUANTITY

0.99+

bothQUANTITY

0.99+

Project AlpineORGANIZATION

0.98+

EdgeTITLE

0.98+

Dell SolutionsORGANIZATION

0.98+

Mother's DayEVENT

0.98+

OneQUANTITY

0.98+

Edge SolutionsORGANIZATION

0.98+

Father's DayEVENT

0.98+

Dell Technology Summit 2022EVENT

0.97+

over 40 industriesQUANTITY

0.97+

thousandsQUANTITY

0.97+

AzureORGANIZATION

0.97+

FrontierORGANIZATION

0.97+

three core elementsQUANTITY

0.96+

AlpineORGANIZATION

0.96+

Dell Tech WorldORGANIZATION

0.95+

step oneQUANTITY

0.95+

todayDATE

0.95+

SnowflakeORGANIZATION

0.93+

Project FrontierORGANIZATION

0.93+

almost 3000 exabytesQUANTITY

0.93+

Cyber Security Awareness MonthEVENT

0.93+

First timeQUANTITY

0.92+

Dell Technology SummitEVENT

0.92+

this yearDATE

0.92+

oneQUANTITY

0.92+

ApexORGANIZATION

0.92+

Dell Technologies Summit 2022EVENT

0.91+

Dell Technologies WorldORGANIZATION

0.91+

AWORGANIZATION

0.91+

SnowflakeTITLE

0.88+

Arun Krishnamoorthy, Dell Technologies & Mihir Maniar, Dell Technologies | Dell Tech World '22


 

>> The cube presents, Dell technologies world, brought to you by Dell. >> Hey everyone. Welcome back to the Cube's live coverage of Dell technologies world 2022 from the Venetian in Las Vegas. Lisa Martin here with Dave Valante. Dave, this is our second day. Lots of conversations. We've been talking a lot about apex, multi-cloud, edge, resilience, cyber resilience. >> It is a number one topic actually. I mean, a lot of multi-cloud talk obviously, too. But I think security is the hot topic at the end. >> It is a hot topic and we've got two guests joining us from Dell technologies. We're going to unpack that and talk about some of the great new things they are enabling. Please welcome. One of our alumni, Mihir Maniar, vice president at Dell technologies and Arun Krishnamoorthy, global strategy, resiliency and security at Dell technologies. All right guys, welcome to the program. >> Pleasure, meeting you, Lisa and Dave. >> So ransomware, it's a household term. I'm pretty sure my mom even knows what ransomware is. >> Exactly. >> Legitimately. >> Yeah. >> But I mean, if you look at the numbers, a ransomware attack is happening once every 11 seconds. The numbers, the stats say, you know, an estimated 75% of organizations are going to face an attack, 75% by 2025, it's around the corner. So it's no longer a matter of, are we going to get hit? if we get hit, it's when? and that resiliency and that recovery is absolutely critical. Talk about some of the things there, Dell's comprehensive approach to helping organizations really build resiliency. >> That's a great point. So if you go to see, organizations are going to get hit, if not already, 75% already out there. And then we find that through research, a lot of our customers need a lot of help. They need help because security is really complex. I mean, they have a tough job, right? Because there's so many attacks happening at the same time. One single ransomware incident can cost them on an average 13 million dollars. They have to integrate 50 plus different security vendors to go and build a secured defense in depth, kind of a mechanism. They're liable to the board. At the same time, they have lines of business that are talking about, hey, can you provide me security, but make sure productivity doesn't get impacted. So it's a tough role for them. And that's where Dell services comes in, where our Dell managed security services. We have a full comprehensive suite of offers for our customers to help them, right. To remain secure. And we're focused on the services based on a NIST framework. So I can talk more about the NIST framework as hobby, go about doing. >> There's a lot of talk in the community about, should I pay the ransom? Should they not pay the ransom? And I suppose your advice would be well pay up front and avoid the ransom if you can. Right? >> Absolutely. >> Yeah. Yeah, Dave, what we've seen is the ransomware payment has been very unreliable. We know of many, many examples where either they paid the ransom and they were not able to recover data or they got the decryption keys and the recover process was too slow. So we are all about helping customers understand the risks that they have today and giving them some pragmatic technology solutions. >> Talk about that conversation, where is it, Arun, happening at the customer level as security is a board level conversation. >> Right. >> Are you still talking with the CIOs in lines of business? Who all is involved in really understanding, where all these vulnerabilities are within an organization? >> Yeah, so that's a great question. So we work with CIOs, we work with CSOs, a lot more and the CSOs actually are facing the skills shortage problem. >> Yes. >> That's where they need actually help from, vendors like Dell. And talking about ransomware, if you go to see a NIST framework, it goes all the way from identification of threats to prevention, creating prevention measures with different defense in depth. How do you detect and respond to threats in time. Because time is critical actually and the recovering from threats. So in that whole process, it's better for customers to have the full suite of security services installed, so that they don't end up paying the ransomware eventually, right. To provide their whole defense mechanism. >> So the adversary is very, they're motivated, they're well funded, incredibly sophisticated these days. Okay. So how do you not lose, if you're a customer. What's the playbook that you're helping your customers proceed with? >> Yeah, it's a great, so in the NIST framework, as I mentioned before, services are evolving around, how do you identify the threats that exist in the customer's network? So we provide advisory services and we provide assessment of the customer's vulnerability, that exist so we can detect those vulnerabilities. And then we can build the prevention mechanisms, once you detect those vulnerabilities. This is all about what you cannot see, you can't really defend against. So that's where the whole assessment comes in, where you can go and do a zero trust assessment for the customers, you know, entire infrastructure, and then figure out where those issues lie. So we can go and block those loopholes with the prevention mechanisms. And in prevention mechanisms, actually we have a whole zero trust prevention mechanism. So you can actually go and build out, end to end defense in depth kind of security. >> Arun, before the pandemic, the term zero trust, people would roll their eyes. It was kind of a buzzword and it's becoming sort of a mandate. >> Yeah. >> What does zero trust mean to your customers? How are you helping them achieve it? >> Yeah. So, great question, Dave. A lot of customers think zero trust is a product. It's not. It's a framework. It's a mindset. It helps customer think through what kind of access do I want to give my users, my third party, my customers? Where does my data sit in my environment? Have I configure the right network policies? Have I segmented my network? So it is a collection of different strategies that work across cloud, across data, across network, across applications that interact with each other and what we are helping customers with, understand what that zero trust actually means and how they can translate into actionable technology implementations. >> How do you help customers do that? When we know that, I mean, the average customer has what, seven different backup protection solutions, all alone. If we're talking about like data protection. How do you help them understand, what's in their environment now? If they're talking about protecting applications, users, data, network. What's that conversation? And what's that process like to simplify, their protection so that they really can achieve cyber resilience? >> That's correct. That's a great it question, Lisa. One of the big issues we see with customers is they don't know what they don't know. There's data across multi-cloud, which is great. It enables productivity, but it also is not within the four walls of a data center. So one of the first things we do is identify where customer's data is? Where is their application live? And then we look for blind spots. Are you protecting your SaaS workloads? Are you protecting your endpoints? And we give them a holistic strategy on data protection. And you bring up a great point, a lot of customers have had accidental growth over the years. They started off with one tool and then different business needs drove them to different tools. And maybe now is a good time to evaluate what is your tool set? Can we consolidate it? And reduce the risk in the environment. >> Yeah, I dunno if you guys are be probably familiar with that. I use it a lot, when I write, it's an optive, NSS eye test and it says, here's the security landscape, the taxonomy. It's got to be the most complicated of any, in the business. And so my question is ecosystem, right. You've got to have partners, right. But there's so many choices. How are you helping to solve that problem of consolidating choices and tools? >> That's a great point. So if you look at the zero trust framework, which Lisa, you talked about. In the zero trust framework, we have few things we look at, and that is through Dell's technologies and partner technologies. So we can provide things like secure access, context based, right. So which users can access which applications, identity based. The second one is, which applications can talk to which applications, for micro segmentation, again identity based. And then you have an encryption everywhere. Encryption with data in motion, data in rest. Because encryption is super important to prevent hacks. So, and then you have cloud workloads. We have cloud workload protection. So some of those things, we rely on our partners and some of them actually, we have technologies in the house, like Arun talked about the cyber resilience and the wall that we have in house. So we provide the end-to-end framework for our customers for zero trust, where we can go and identify. We can assess, we can go build it out for them. We can detect and respond with our excellent MDR service, that we came out with last, just last year. So that MDR service allows you to detect attacks and respond automatically using our AI enabled platform that reduces the signal from the noise and allows to prevent these attacks, right, from happening. >> Arun, question for you, as we've seen the proliferation of cyber attacks during the pandemic, we've seen the sophistication increasing, the personalization is increasing. Ransomware is as service is making it, there is no barrier to entry these days. >> Right. >> How has Dell technologies overall, cyber resilience strategy evolved in the last couple of years? I imagine that there's been some silver linings and some accelerations there. >> No, absolutely, Lisa. One of the things we recognized very early on with big cyber attacks going on five years ago, we knew that as much as customers had great technologies to prevent a cyber attack, it was a matter of when, not if, so we created the first purpose built solution to help customers respond and recover from a cyber attack. We created innovative technologies to isolate the data in a cyber wall. We have immutable technologies that lock the data. So they can't be tampered with. And we also build some great intelligence based on AIML. In fact, this is the first and only product in the world that looks it's backup data, does full content indexing and it's able to look for behaviors or patterns in your environment that you could normally not find with signature based detection systems. So it's very revolutionary and we want to help customers not only on the prevention side, which is proactive. We want them to be equally, have a sound strategy on how they would respond and recover from a cyber attack. >> Okay. So there's two pieces there, proactive, and then if and when you get hit, how do you react. And I think about moments in cyber, I mean, Stuxnet was obviously a huge turning point. And then of course the SolarWinds and you see that, the supply chain hacks, you see the island hopping and the living off the land and the stealth moves. So it's almost like, wow, some of these techniques have even been proactive. You're not going to catch them. Right. So you've got to have this, you talked about the NIST framework multilevel, but I mean, customers are aware, obviously everybody, customer you talk to. the SolarWinds, But it seems like, they're still sleeping with one eye open. Like they're really nervous. Right. >> Right. >> And like, we haven't figured it out as an industry yet. And so that's where solutions like this are so critical because you're almost resigning yourself to the fact that while, you may not find it being proactive. >> Yeah. Right. >> But you've got to have, you know, it's like putting tapes in a truck and driving them somewhere. Do you sense that it was a major milestone in the industry? Milestone, negative milestone. And that was a turning point and it was kind of a wake up call for the industry, a new wake up call. What's your sense of how the industry is responding? >> Yeah. I think that's a great point. So if you go to see the verbiage is that it's not, if you're going to get attacked, it's when you're going to get attacked. So the attacks are going to happen no matter what. So that's the reason why the defense in depth and the zero trust framework comes into play. The customers have to have an end-to-end holistic framework, so that they can have, not just the defensive mechanisms, but also detect and respond when the attacks happen. And then as you mentioned, some of them, you just can't catch all of them. So we have excellent incident response and recovery mechanisms. So if the attack happened, it will cause damage. We can do forensics analysis. And on top of that, we can go and recover, like the cyber recovery wall, we can recover that data, make them production again. >> Right. Ready. >> I guess. I'm sorry. What I was trying to ask is, do you think we've understand SolarWinds? Have the industry figured it out? >> Yeah. You know, great question. Right. I think this is where customers have to take a pragmatic approach, on how they do security. And we talk about concepts like intrinsic security. So in other words, you can do a certain activity in your environment and punt the ball to some other team to figure out security, part of what Dell does. You know, you asked the question, right. There's a lot of tools, where do customers start? One of the big values we bring to customers is the initial awareness and just educating customers. Hey, what happened in these watershed moment with these different attacks, right. Wannacry, stuxnet. And how did those customers respond and where did they fail? So let's do some lessons learned with past attacks and let's move forward with some pragmatic solutions. And we usually don't overwhelm our customers with a lot of tools. Let's have a road map. Let's do an incremental build of your security posture. And over time, let's get your entire organization to play with it. >> You talk about awareness, obviously that's critical, but one of the other things that's critical with the cyber threats and the what's going on today is, the biggest threat vector still is people. >> Exactly. >> So talk to me, about out some of the things that you help organizations do. When you're talking about, from an awareness perspective. It's training the people not to open certain links, if they look suspicious, that sort of thing. How involved is Dell technologies with your customers from a strategic perspective about really drilling this into the end users that they've got a lot of responsibility here. >> Yeah, if you go to see phishing is one of the most common attack vectors to go and infiltrate these attacks. So Dell has a whole employee education program that they rolled out. So we all are aware of the fact that clicking on links and phishing, is a risk factor. And we are trying to take that same message to our customers through an employee awareness training service. So we can actually provide education for the employees, from getting these phishing attacks happening. >> Yeah. That's really critical because as I mentioned, we talked about the sophistication, but the personalization, the social engineering is off the church these days. And it's so easy for someone to, especially with all this distractions that we have going on. >> Right. >> If you're working from home and you've got kids at home or dogs barking and whatnot. It's easy to be fooled into something that looks incredibly legitimate. >> Yeah, Yeah. >> You know, you bring another great point, right. You can keep telling people in your environment, don't do things, don't do it. You create a friction, right. We want people to be productive. We want them to use different access to different applications, both in house and in the cloud. So this is where technology comes into play. There are some modern malware defenses that will help customers, identify some of these email phishing, spear phishing. So they are in a better prepared position. And we don't want to curb productivity, but we want to also make a very secure environment where people can work. >> That's a great point is, that it has to be frictionless. >> I do have a question for you guys with respect to SaaS applications. I talk to a lot of customers, using certain SaaS applications who have this sort of, there's a dual responsibility model there, where the SaaS vendor's responsible for the application, protection. But Mr. And miss customer, you're responsible for the data. We are? >> Yeah. >> Are you finding that a lot of organizations are going help. We've got Google workspace, Microsoft 365, Salesforce and it's really incredibly business critical data. Dell technologies help us protect this because this is a vulnerability that we were not aware of. >> Absolutely. And that's why we have the backup service with apex. Where we can actually have SaaS data, which is backed up, using our apex solution for backup recovery. So, yes, that's very critical. We have the end-to-end portfolio for backing it up, having the vault, which is a air gap solution, recovering from it, when you have an attack. And I think the value prop that Dell brings to the table is, we have the client side and we have the data center side, right. With the multi-cloud. So we provide a completely hardened infrastructure where, all the way from supply chain to secure OS, secure bot and secure image. Everything is kind of harden with stick hardening on top of that. And then we have the services layer to go and make sure we can assess the risks. We can detect and respond. We can recover, right. So that we can keep our customers completely secure. That's the value prop that we bring to the table with unmatched scale of Dell services, right. In terms of the scale that we bring to the table, to our customers and help them out. >> Well, it's an interesting opportunity, and it's certainly, from a threats perspective, one that's going to persist, obviously we know that. Great that there's been such a focus from Dell on cyber resiliency for its customers, whether we're talking about multi-cloud, On-Prem, public cloud, SaaS applications, it's critical. It's a techno. It's a solution that every industry has to take advantage of. Guys, thank you so much for joining us. Wish we had more time. I could talk about this all day. >> Yes. >> Thank you. >> Great work going on there. Congratulations on what was going on with apex and the announcement. And I'm sure we'll be hearing more from you in the future. >> Excellent. Thank you, Lisa. >> Thank you very much. >> We are super excited about Dell services and what we can bring for manual security services for our customers. >> Great. >> Excellent. >> Appreciate it. >> Thanks, guys. >> Thank you. >> For our guests and for Dave Valante. I'm Lisa Martin. And You're watching the cube, live from day two of our coverage of Dell technologies world, live from Las Vegas. Dave and I will be right back with our last guest of the day. (upbeat music)

Published Date : May 4 2022

SUMMARY :

brought to you by Dell. from the Venetian in Las Vegas. the hot topic at the end. the great new things So ransomware, it's a household term. The numbers, the stats say, you know, So if you go to see, organizations and avoid the ransom if you can. and the recover process was too slow. happening at the customer level and the CSOs actually are facing and the recovering from threats. So the adversary is very, And then we can build the the term zero trust, Have I configure the I mean, the average customer has what, So one of the first things we do of any, in the business. that we came out with last, during the pandemic, in the last couple of years? One of the things we and the living off the land And like, we haven't figured the industry is responding? and the zero trust Right. Have the industry figured it out? and punt the ball to some other team and the what's going on today is, about out some of the things So we can actually provide distractions that we have going on. It's easy to be fooled into something Yeah, And we don't want to curb productivity, that it has to be frictionless. I do have a question for you guys that we were not aware of. So that we can keep our and it's certainly, and the announcement. and what we can bring for Dave and I will be right back

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

Dave ValantePERSON

0.99+

Mihir ManiarPERSON

0.99+

DavePERSON

0.99+

Arun KrishnamoorthyPERSON

0.99+

DellORGANIZATION

0.99+

LisaPERSON

0.99+

Las VegasLOCATION

0.99+

two piecesQUANTITY

0.99+

firstQUANTITY

0.99+

13 million dollarsQUANTITY

0.99+

75%QUANTITY

0.99+

2025DATE

0.99+

second dayQUANTITY

0.99+

two guestsQUANTITY

0.99+

last yearDATE

0.99+

Dell TechnologiesORGANIZATION

0.99+

OneQUANTITY

0.99+

one toolQUANTITY

0.99+

first purposeQUANTITY

0.99+

five years agoDATE

0.98+

second oneQUANTITY

0.98+

GoogleORGANIZATION

0.98+

oneQUANTITY

0.98+

apexTITLE

0.98+

SolarWindsORGANIZATION

0.97+

todayDATE

0.96+

zero trustQUANTITY

0.96+

pandemicEVENT

0.96+

bothQUANTITY

0.94+

last couple of yearsDATE

0.93+

ArunPERSON

0.93+

VenetianLOCATION

0.93+

day twoQUANTITY

0.91+

NISTORGANIZATION

0.91+

zeroQUANTITY

0.87+

zero trustQUANTITY

0.87+

once every 11 secondsQUANTITY

0.82+

one eyeQUANTITY

0.79+

SalesforceORGANIZATION

0.79+

50 plus different security vendorsQUANTITY

0.78+

One single ransomware incidentQUANTITY

0.77+

Microsoft 365ORGANIZATION

0.74+

2022DATE

0.73+

seven different backup protection solutionsQUANTITY

0.72+

NSSORGANIZATION

0.7+

Arun Krishnamoorthy, Dell Technologies & Mihir Maniar, Dell Technologies | Dell Techn World 2022


 

>> The CUBE presents Dell technologies world brought to you by Dell. >> Hey everyone. Welcome back to theCube's live coverage of Dell technologies World 2022 from the Venetian in Las Vegas. Lisa Martin here with Dave Vellante, Dave this is our second day, lots of conversations. We've been talking a lot about APEX, Multi-cloud, edge, resilience, cyber resilience. >> I guess the number one topic actually. I mean, a lot of Multi-cloud talk obviously too, but I think security is the hot topic at the event. >> It is a hot topic, and we've got two guests joining us from Dell technologies. We're going to unpack that and talk about some of the great new things they are enabling. Please welcome. One of our alumni, Mihir Maniar our vice president at Dell technologies and Aaron Krishnmoorthy, global strategy resiliency and security at Dell technologies. Guys, welcome to the program. >> Pleasure meeting you Lisa and Dave. >> So ransomware, it's a household term. I'm pretty sure my mom even knows what ransomware is. >> Exactly. >> Legitimately. But I mean, if you look at the numbers, a ransomware attack is happening once every 11 seconds, the numbers, the stats say, an estimated 75% of organizations are going to face an attack, 75%, by 2025, it's around the corner. So it's no longer a matter of are we going to get hit? If we get hit? It's when? And that resiliency, and that recovery is absolutely critical. Talk about some of the things there, Dell's comprehensive approach to helping organizations really build resiliency. >> That's a great point. So if you go to see organizations are going to get hit, if not already 75% already out there. And then we find that through research, a lot of our customers need a lot of help. They need help because security is really complex. I mean, they have a tough job, because there's so many attacks happening at the same time. One single ransomware incident can cost them on an average $13 million. They have to integrate 50 plus different security vendors to go and build a secured defense in depth, kind of for mechanism, they're liable to the board, at the same time they have lines of business that are talking about, hey, can you provide me, you know, security, but make sure productivity doesn't get impacted. So it's a tough role for them, And that's where Dell services comes in, where our Dell Managed Security Services. We have a full comprehensive suite of offers for our customers to help them to remain secure. And we have focused on the services based on a NEST framework, so I can talk more about the NEST framework as a hobby about, go about doing that. >> There's a lot of talk in the community about should I pay the ransom? Should they not pay the ransom? And I suppose your advice would be, well pay up front and avoid the ransom if you can. >> Absolutely. Yeah. Dave, what we've seen is the ransomware payment has been very unreliable. We know of many, many examples where either they paid the ransom and they were not able to recover data, or they got the decryption keys and the recover process was too slow. So we are all about helping customers understand the risks that they have today, and giving them some pragmatic technology solutions. >> Talk about that conversation. Where is it happening at the customer level, as security is a board level conversation. Are you still talking with the CIOs lines of business, who else is involved in really understanding where all these vulnerabilities are within an organization? >> Yeah. So that's a great question. So we work with CIOs, we work with CSOs a lot more and the CSOs actually are facing the skills shortage problem. >> Yes. >> That's where they need actually help from vendors like Dell. And talking about ransomware, if you go to see a NEST framework, it goes all the way from identification of threats to prevention, creating measures with defense in depth. How do you detect and respond to threats in time? Because time is critical actually. And recovering from threats. So in that whole process, it's better for customers to have the full suite of security services installed, so that they don't end up paying the ransomware eventually. To provide the whole defense mechanism. >> So the adversary is, very, they're motivated. They're well funded, incredibly sophisticated these days. So how do you not lose if you're a customer? What's the playbook that you're helping your customers proceed with? >> Yeah, it's a great, so in the NEST framework as I mentioned before, services are evolving around, how do you identify the threats that exist in the customer's network? So we provide advisory services and we provide assessment of the customer's vulnerabilities that exist, so we can detect those vulnerabilities, and then we can build the prevention mechanisms once we detect those vulnerabilities. It's all about what you cannot see, you can't really defend against. So that's where the whole assessment comes in, where you can go and do a zero trust assessment for the customers entire infrastructure, and then figure out where those issues lie. So we can go and block those loopholes, with the prevention mechanisms. In the prevention mechanisms, actually we have a whole zero trust prevention mechanism. So you can actually go and build out, end to end defense in depth, kind of security. >> Arun, before the pandemic, the term zero trust people would roll their eyes. It was kind of a buzzword, and it's becoming sort of a mandate. What does zero trust mean to your customers? How are you helping them achieve it? >> Yeah. So great question, Dave. A lot of customers think zero trust is a product. It's not, it's a framework, it's a mindset. It helps customer think through, what kind of access do I want to give my users, my third party, my customers? Where does my data sit in my environment? Have I configured the right network policies? Have I segmented my network? So it is a collection of different strategies that work across cloud, across data, across network, across applications that interact with each other and what we are helping customers with understand what that zero trust actually means and how they can translate into actionable technology implementations. >> What do you help customers do that when we know that, I mean, the average customer has what? Seven different backup protection solutions alone, if we're talking about like data protection. How do you help them understand what's in their environment now? If they're talking about protecting applications, users, data, network, what's that conversation? And what's that process like to simplify their protection so that they really can achieve cyber resilience? >> That's correct. That's a great question, Lisa. One of the big issues we see with customers, is they don't know what they don't know. There's data across multi-cloud, which is great, it enables productivity, but it also is not within the four walls of a data center. So one of the first things we do is identify where customer's data is, where is their application live? And then we look for blind spots. Are you protecting your SaaS workloads? Are you protecting your endpoints? And we give them a holistic strategy on data protection and you bring up a great point. A lot of customers have had accidental growth over the years. They started off with one tool and then different business needs drove them to different tools. Maybe now is a good time to evaluate what is your tool set, can we consolidate it and reduce the risk in the environment. >> Yeah, I dunno if you guys are probably familiar with that. I use it a lot when I write, it's an Optive chart and it's this eye test and it says here's this security landscape that taxonomy it's got to be the most complicated of any in the business. And so my question is ecosystem, you've got to have partners. But there's so many choices, how are you helping to solve that problem of consolidating choices and tools? >> That's a great point. So if you look at the zero trust framework which Lisa you talked about, in the zero trust framework, we have few things we look at, that is through Dell's technologies and partner technologies. So we can provide things like secure access, context based. So which users can access which applications. Identity based, the second one is which applications can talk to which applications for micro segmentation. Again, identity based. And then you have encryption everywhere, encryption with data and motion data and rest. Encryption is super important to prevent hacks. So, and then you have cloud workloads, we have cloud workload protection. So some of those things, we rely on our partners and some of them actually we have technologies in house I was like Arun talked about the cyber resilience and the world that we have in house. So we provide the end-to-end framework for our customer for zero trust, where we can go and identify, we can assess, we can go build it out for them. We can detect and respond with our excellent MDR service that we came out with last, just last year. So that MDR service allows you to detect attacks and respond automatically using our AI and ML platform, that reduces the signal from the noise and allows to prevent these attacks from happening. >> Arun, question for you as we've seen the proliferation of cyber attacks during the pandemic, we've seen the sophistication increasing, the personalization is increasing. Ransomware as a service is making it, there is no barrier to entry these days. How has Dell technologies overall cyber resilience strategy evolved in the last couple of years? I imagine that there's been some silver linings and some accelerations there. >> Yeah, absolutely Lisa. One of the things we recognized very early on when big cyber attacks going on five years ago, we knew that at as much as customers had great technologies to prevent a cyber attack, it was a matter of when, not if. So we created the first purpose built solution to help customers respond and recover from a cyber attack. We created innovative technologies to isolate the data in a cyber wall. We have imutable technologies that lock the data, so they can't be tampered with. And we also build some great intelligence based on IML. In fact, this is the first and only product in the world that looks at backup data, does full content indexing, and it's able to look for behaviors or patterns in your environment that you could normally not find with signature based detection systems. So it's very revolutionary and we want to help customers not only on the prevention side, which is proactive. We want them to be equally, have a sound strategy on how they would respond and recover from a cyber attack. >> So there's two pieces there, proactive, and then if, and when you get hit, how do you react? And I think about moments in cyber, I mean Stuxnet was obviously a huge turning point. And then of course the solar winds. And you see that the supply chain hacks, you see the island hopping and the living off the land and the stealth moves. So, it's almost like wow, some of these techniques have even being proactive, you're not going to catch 'em. So you've got to have this, you talked about the NEST framework multi-level, but I mean customers are aware, obviously everybody customer you talk to the solar winds, blah, blah. But it seems like they're still sleeping with one eye open. Like they're really nervous. And like we haven't figured it out as an industry yet. And so that's where solutions like this are so critical because you're almost resigning yourself to the fact that, well, you may not find it being proactive. >> Yeah, right. >> But you've got to have, the last, it's like putting tapes in a truck and driving them somewhere. What do you? Do you sense that it was a major milestone in the industry, milestone, negative milestone and that was a turning point and it was kind of a wake up call for the industry, a new wake up call. What's your sense of how the industry is responding? >> Yeah, I think that's a great point. So if you go to see the verbiages that it's not, if you're going to get attacked, it's when you're going to get attacked. So the attacks are going to happen no matter what. So that's the reason why the defense in depth and the zero test framework comes into play, where customers have to have an end-to-end holistic framework, so that they can have not just an defensive mechanisms, but also detect and respond when the attacks happen. And then as you mentioned, some of them, you just can't catch all of them. So we have excellent incident response and recovery mechanisms. So if the attack happened, it will cause damage. We can do forensics analysis. And on top of that, we can go and recover like the cyber recovery wall. We can recover that data and them production again, ready. >> I guess, I'm sorry. What I was trying to ask is, do you think we've understand solar winds, have the industry figured it out? >> Yeah, great question. I think this is where customers have to take a pragmatic approach on how they do security. And we talk about concepts like intrinsic security. So in other words, you can do a certain activity in your environment and punt the ball to some other team to figure out security. Part of what Dell does, you asked the question, there's a lot of tools, where do customers start? One of the big values we bring to customers is the initial awareness and just educating customers. Hey, what happened in these water-shed moment, in with these different attacks. Wannacry, Stuxnet, and how did those customers respond and where did they fail? So let's do some lessons learned with past attacks and let's move forward with some pragmatic solutions. And, we usually don't overwhelm our customers with a lot of tools. Let's have a roadmap, let's do an incremental build of your security posture. And over time, let's get your enter organization to play with it. >> You talk about awareness, obviously that's critical, but one of the other things that's critical with the cyber threats and the what's going on today is the biggest threat venture still is people. >> Exactly. >> So talk to us about some of the things that you help organizations do. When you're talking about the from an awareness perspective, it's training the people not to open certain links if they look suspicious, that sort of thing. How involved is Dell technologies with your customers from a strategic perspective about really drilling this into the end users that they've got a lot of responsibility here? >> Yeah, if you go to see phishing is one of the most common attack vectors to go and infiltrate these attacks. So Dell has a whole employee education program that they rolled out. So we all are aware of the fact, that clicking on links and phishing is a risk factor. And we are trying to take that same message to our customers through an employee awareness training service. So we can actually provide education for the employees from getting these phishing attacks happening. >> Yeah, that's really critical because as I mentioned, we talked about the sophistication, but the personalization, the social engineering is off the charts these days. And it's so easy for someone to, especially with with all this distractions that we have going on, if you're working from home and you've got kids at home or dogs barking and whatnot, it's easy to be fooled into something that looks incredibly legitimate. >> You bring another great point. You can keep tell people in your environment don't do things, don't do it. You create a friction. We want people to be productive. We want them to use different access to different applications, both inhouse and in the cloud. So this is where technology comes into play. There are some modern malware defenses that will help customers identify some of these email phishing, spear phishing. So they are in a better prepared position. And we don't want to curb productivity, but we want to also make, a very secure environment where people can. >> That's a great point is it has to be frictionless. I do have a question for you guys with respect to SaaS applications. I talk to a lot of customers using certain SaaS applications who have this sort of, there's a, a dual responsibility model there, where the SaaS vendors responsible for the application protection. But Mr. and Miss customer, you're responsible for the data, we are. Are you finding that a lot of organizations are going help. We've got, Google workspace, Microsoft 365, Salesforce, that, and it's really incredibly business critical to data. Dell technologies help us protect this, because this is on vulnerability that we were not aware of. >> Absolutely, and that's why we have the backup service with APEX, where we can actually have stats, data which is backed up using IEX solution for backup recovery. So, yes, that's very critical. We have the end to end portfolio for backing it up, having the vault, which is a air gap solution, recovering from it when you have an attack. And I think the value prop that Dell brings to the table is we have the client side and we have the data center side, With the Multi-cloud. So we provide a completely hardened infrastructure, where we all the way from supply chain to secure OS, secure boot and secure image. Everything is kind of hardened with stick hardening on top of that. And then we have the services layer to go and make sure we can assess the risks, we can detect and respond, we can recover. So that we can keep our customers completely secure. That's the value prop that we bring to the table with unmatched scale of Dell services. In terms of the scale that we bring to the table to our customers and help them out. >> It's an interesting opportunity. And it's certainly from a threats perspective, one that's going to persist. Obviously we know that, great that there's been such a focus from Dell on cyber resiliency for its customers, whether we're talking about multi-cloud OnPrem, public cloud, SaaS applications, it's critical. It's a techno, it's a solution that every industry has to take advantage of guys. Thank you so much for joining us. I wish we had more time. I could talk about this all day. >> Thank you. >> Great work going on there. Congratulations on what was going on with APEX and the announcement, and I'm sure we'll be hearing more from you in the future. >> Excellent. Thank you, Lisa. We are super excited about Dell services and what we can bring for managed security services for our customers. >> Excellent. >> Appreciate it. >> Thanks guys. >> Thank you. >> For our guests and for Dave Vellante. I'm Lisa Martin, you're watching theCube live from day two of our coverage of Dell technologies World, live from Las Vegas. Dave and I will be right back with our last guest of the day. (gentle music)

Published Date : May 4 2022

SUMMARY :

brought to you by Dell. from the Venetian in Las Vegas. I guess the number one topic actually. talk about some of the great So ransomware, it's a household term. Talk about some of the things there, So if you go to see organizations and avoid the ransom if you can. and the recover process was too slow. at the customer level, and the CSOs actually are facing it goes all the way from So the adversary is, and then we can build the term zero trust people Have I configured the the average customer has what? and reduce the risk in the environment. complicated of any in the business. and the world that we have in house. strategy evolved in the One of the things we and the living off the land and that was a turning point and the zero test have the industry figured it out? the ball to some other team but one of the other So talk to us about some of the things So we can actually provide that we have going on, And we don't want to curb productivity, that we were not aware of. We have the end to end one that's going to persist. and the announcement, and what we can bring for and I will be right back

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Aaron KrishnmoorthyPERSON

0.99+

Dave VellantePERSON

0.99+

Lisa MartinPERSON

0.99+

Mihir ManiarPERSON

0.99+

DavePERSON

0.99+

LisaPERSON

0.99+

DellORGANIZATION

0.99+

Arun KrishnamoorthyPERSON

0.99+

two piecesQUANTITY

0.99+

75%QUANTITY

0.99+

last yearDATE

0.99+

firstQUANTITY

0.99+

Las VegasLOCATION

0.99+

second dayQUANTITY

0.99+

two guestsQUANTITY

0.99+

$13 millionQUANTITY

0.99+

Dell TechnologiesORGANIZATION

0.99+

2025DATE

0.99+

APEXORGANIZATION

0.99+

50 plusQUANTITY

0.99+

one toolQUANTITY

0.99+

second oneQUANTITY

0.99+

OneQUANTITY

0.98+

five years agoDATE

0.98+

oneQUANTITY

0.98+

pandemicEVENT

0.98+

todayDATE

0.98+

zero trustQUANTITY

0.98+

VenetianLOCATION

0.97+

first purposeQUANTITY

0.96+

Dell TechnORGANIZATION

0.96+

bothQUANTITY

0.95+

one eyeQUANTITY

0.95+

Dell technologiesORGANIZATION

0.93+

day twoQUANTITY

0.93+

NESTTITLE

0.91+

last couple of yearsDATE

0.9+

zero testQUANTITY

0.89+

CUBECOMMERCIAL_ITEM

0.88+

SalesforceORGANIZATION

0.87+

Seven different backup protection solutionsQUANTITY

0.83+

ArunPERSON

0.83+

One single ransomwareQUANTITY

0.82+

zero trustQUANTITY

0.81+

first thingsQUANTITY

0.79+

zeroQUANTITY

0.79+

IEXTITLE

0.78+

StuxnetORGANIZATION

0.77+

once every 11 secondsQUANTITY

0.77+

trustORGANIZATION

0.71+

WannacryORGANIZATION

0.69+

Dell technologies World 2022EVENT

0.68+

dualQUANTITY

0.65+

Suni Potti & Lior Div | CUBE Conversation, October 2021


 

hello and welcome to this special cube conversation i'm dave nicholson and this is part of our continuing coverage of google cloud next 2021 i have two very special guests with me and we are going to talk about the topic of security uh i have sunil potti who is vice president and general manager of google cloud security uh who in a previous life had senior leadership roles at nutanix and citrix along with lior div who is the ceo and co-founder of cyber reason lior was formerly a commander in the much famed unit 8200 uh part of the israeli defense forces uh where he was actually a medal of honor recipient uh very uh honored to have him here this morning sunil and lior welcome to the cube sunil welcome back to the cube yeah great to be here david and and to be in the presence of a medal of honor recipient by the way a good friend of mine leor so be here well good to have both of you here so uh i'm the kind of person who likes my dessert before my uh before my entree so why don't we just get right to it you're the two of you are here to announce something very very significant uh in the field of security uh sunil do you want to start us out what are we here to talk about yeah i mean i think maybe uh you know just to set this context um as as many of you know about a decade ago a nation's sponsored attack you know actually got into google plus a whole bunch of tech companies you know the project aurora was quite uh you know infamous for a certain period of time and actually google realized almost a decade ago that look you know security can't just be a side thing it has to be the primary thing including one of the co-founders becoming for lack of a better word the chief security officer for a while but one of the key takeaways from that whole incident was that look you have to be able to detect everything and trust nothing and and the underpinning for at least one of them led to this whole zero trust architectures that everybody now knows about but the other part which is not as popular at least in industry vernacular but in many ways equally important and some ways more important is the fact that you need to be able to detect everything so that you can actually respond and that led to the formation of you know a project internal to google to actually say that look let's democratize uh storage and make sure that nobody has to pay for capturing security events and that led to the formation of this uh new industry concept called a security data lake in chronicle was born and then as we started evolving that over into the enterprise segment partnering with you know cyber reason on one hand created a one plus one equals three synergy between say the presence around what do you detect from the end point but also generally just so happens that as lior will tell you the cyber reason technology happens to start with endpoint but it's actually the core tech is around detecting events but doing it in a smart way to actually respond to them in much more of a contextual manner but beyond just that you know synergy between uh you know a world-class planet scale you know security data like forming the foundation and integrating you know in a much more cohesive way with uh cyber reasons detection response offering the spirit was actually that this is the first step of a long journey to really hit the reset button in terms of going from reactive mode of security to a proactive mode of security especially in a nation-state-sponsored attack vector so maybe leo you can speak a few minutes on that as well absolutely so um as you said i'm coming from a background of uh nation state hacking so for us at cyberism it's uh not is foreign uh what the chinese are doing uh on a daily basis and the growing uh ransomware cartel that's happening right now in russia um when we looked at it we said then uh cyberism is very famous by our endpoint detection and response capability but when we establish cyber reason we establish the cyberism on a core or almost fundamental idea of finding malicious operation we call it the male idea so basically instead of looking for alerts or instead of looking for just pieces of data we want to find the hackers we want to find the attack we want to be able to tell basically the full story of what's going on uh in order to do that we build the inside cyberism basically from day one the ability to analyze any data in real time in order to stitch it into the story of the male the malicious operation but what we realize very quickly that while our solution can process more than 27 trillion events a week we cannot feed it fast enough just from end point and we are kind of blind when it comes to the rest of the attack surface so we were looking uh to be honest quite a while for the best technology that can feed this engine and to as sunil said the one plus one equal three or four or five to be able to fight against those hackers so in this journey uh we we found basically chronicle and the combination of the scale that chronicle bringing the ability to feed the engine and together basically to be able to find those hackers in real time and real time is very very important and then to response to those type of attack so basically what is uh exciting here we created a solution that is five times faster than any solution that exists right now in the market and most importantly it enables us to reverse the atmospheric advantage and basically to find them and to push them out so we're moving from hey just to tell you a story to actually prevent hackers to being in your environment so leor can you i want to double click on that just just a little bit um can you give give us a kind of a concrete example of this difference between simply receiving alerts and uh and actually um you know taking taking uh uh correlating creating correlations and uh and actually creating actionable proactive intelligence can you give us an example of that working in in the real world yeah absolutely we can start from a simple example of ransomware by the time that i will tell you that there is a ransomware your environment and i will send an alert uh it will be five computers that are encrypted and by the time that you gonna look at the alert it's gonna be five thousand uh basically machines that are encrypted and by the time that you will do something it's going to be already too little too late and this is just a simple example so preventing that thing from happening this is critical and very timely manner in order to prevent the damage of ransomware but if you go aside from ransomware and you look for example of the attack like solarwind basically the purpose of this attack was not to create damage it was espionage the russian wanted to collect data on our government and this is kind of uh the main purpose that they did this attack so the ability to be able to say hey right now there is a penetration this is the step that they are doing and there is five ways to push them out of the environment and actually doing it this is something that today it's done manually and with the power of chronicle and cyberism we can do it automatically and that's the massive difference sunil are there specific industries that should be really interested in this or is this a is this a broad set of folks that should be impacted no you know in some ways uh you know the the the saying these days to learn's point on ransomware is that you know if if a customer or an enterprise has a reasonable top-line revenue you're a target you know you're a target to some extent so in that sense especially given that this has moved from pure espionage or you know whether it be you know government oriented or industrial espionage to a financial fraud then at that point in time it applies to pretty much a wide gamut of industries not just financial services or you know critical infrastructure companies like oil and gas pipeline or whatever it could be like any company that has any sort of ip that they feel drives their top line business is now a target for such attacks so when you talk about the idea of partnership and creating something out of a collaboration what's the meat behind this what what what do you what are you guys doing beyond saying you know hey sunil lior these guys really like each other and they respect what the other is doing what's going on behind the scenes what are you actually implementing here moving forward so every partnership is starting with love so it's good [Laughter] but then it need to translate to to really kind of pure value to our customers and pure value coming from a deep integration when it's come to the product so basically uh what will happen is every piece of data that we can collect at cyber is in uh from endpoint any piece of data that the chronicle can collect from any log that exists in the world so basically this is kind of covering the whole attack surface so first we have access to every piece of information across the full attack surface then the main question is okay once you collect all this data what you're gonna do with it and most of companies or all the companies today they don't have an answer they're saying oh we're gonna issue an alert and we hope that there is a smart person behind the keyboard that can understand what just happened and make a decision and with this partnership and with this integration basically we're not asking and outsourcing the question what to do to the user we're giving them the answer we're telling them hey this is the story of the attack this is all the pieces that's going on right now and in most cases we're gonna say hey and by the way we just stopped it so you can prevent it from the future when will people be able to leverage this capability in an integrated way and and and by the way restate how this is going to market as an integrated solution what is what is the what is what are we going to call this moving forward so basically this is the cyber reason xdr uh powered by chronicle and we are very very um uh happy about it yeah and i think just to add to that i would say look the the meta strategy here and the way it'll manifest is in this offering that comes out in early 2022 um is that if you think about it today you know a classical quote-unquote security pipeline is to detect you know analyze and then respond obviously you know just just doing those three in a good way is hard doing it in real time at scale is even harder so just that itself was where cyber reason and chronicle would add real value where we are able to collect a lot of events react in real time but a couple of things that i think that you know to your original point of why this is probably going to be a little for game changer in the years to come is we're trying to change that from detect analyze respond to detect understand and anticipate so because ultimately that's really how we can change you know the profile from being reactive in a world of ransomware or anything else to being proactive against a nation sponsored or nation's influenced attacks because they're not going to stop right so the only way to do this is to rather than just go back up the hatches is just really you know change change the profile of how you'll actually anticipate what they were probably going to do in 6 months or 12 months and so the the graph technology that powers the heart of you know cyber reason is going to be intricately woven in with the contextual information that chronicle can get so that the intermediate step is not just about analysis but it's about truly understanding the overall strategy that has been employed in the past to predict what could happen in the future so therefore then actions could be taken downstream that you can now say hey most likely this these five buckets have this kind of personal information data there's a reasonable chance that you know if they're exposed to the internet then as you create more such buckets in that project you're going to be susceptible to more ransomware attacks or some other attacks right and that's the the the kind of thinking or the transformation that we're trying to bring out with this joint office so lior uh this this concept of uh of mallops and uh cyber reason itself you weren't just born yesterday you've been you've been uh you have thousands of customers around the globe he does look like he was born i i know i know i know well you you know it used to be that the ideal candidate for ceo of a startup company was someone who dropped out of stanford i think it's getting to the point where it's people who refused admission to stanford so uh the the dawn of the 14 year old ceo it's just it's just around the corner but uh but lior do you get frustrated when you see um you know when you become aware of circumstances that would not have happened had they implemented your technology as it exists today yeah we have a for this year it was a really frustrating year that starting with solarwind if you analyze the code of solarwind and we did it but other did it as well basically the russians were checking if cyberism is installed on the machine and if we were installed on the machine they decided to stop the attack this is something that first it was a great compliment for us from you know our not friend from the other side that decided to stop the attack but on a serious note it's like we were pissed because if people were using this technology we know that they are not going to be attacked when we analyze it we realize that we have three different ways to find the solar wind hackers in a three different way so this is just one example and then the next example in the colonial pipeline hack we were the one that found darkseid as a group that we were hacking we were the first one that released a research on them and we showed how we can prevent the basically what they are doing with our technology so when you see kind of those type of just two examples and we have many of them on a daily basis we just know that we have the technology in order to do that now when we're combining uh the chronicle technology into the the technology that we already have we basically can reverse the adversary advantage this is something that you're not doing in a single day but this is something that really give power to the defenders to the communities of siso that exist kind of across the us um and i believe that if we're going to join forces and lean into this community and and basically push the solution out the ability for us to fight against those cartels specifically the ransomware cartels is going to be massive sunil this time next year when we are in uh google cloud next 2022 um are you guys going to come back on and offer up the we told you so awards because once this is actually out there and readily available the combination of chronicle and cyber reasons technology um it's going to be hard for some csos to have an excuse uh it may be it may be a uncomfortable to know that uh they could have kept the door secure uh but didn't yeah where's that bad business is that bad business to uh hand out awards for doing dumb things i don't know about uh you know a version of darwin awards probably don't make sense but but but generally speaking so i do think uh you know we're all like as citizens in this right because you know we talk about customers i mean you know alphabet and google is a customer in some ways cyber reason is a customer the cube is a customer right so i think i think the robot hitting the road a year from now will be we should we should do this where i don't know if the cube does more than two folks at the same time david but we should i mean i'm sure we'll have enough to have at least a half a dozen in in the room to kind of talk about the solution because i think the the you know as you can imagine this thing didn't materialize i mean it's been being cooked for a while between your team and our team and in fact it was inspired by feedback from some joint customers out in the market and all that good stuff so so a year from now i think the best thing would be not just having customers to talk about the solution but to really talk about that transformation from respond to anticipate and do they feel better on their security posture in a world that they know like and leo should probably spend a few minutes on this is i think we're on the tip of the sphere of this nation-state era and what we've just seen in the last few years is what maybe the nation-states have seen over two decades ago and they're going to run those playbooks on the enterprise for the next decade or so yeah leor talk about that for a minute yeah it's it's really you know just to continue the sunil thought it's it's really about finding the unknown because what's happening on the other side it's like specifically china and russia and lately we saw iran starting to gain uh power um basically their job is to become better and better and to basically innovate and create a new type of attack on a daily basis as technology has evolved so basically there is a very simple equation as we're using more technology and relying more on technology the other side is going to exploit it in order to gain more power espionage and create financial damage but it's important to say that this evolution it's not going to stop this is just the beginning and a lot of the data that was belong just to government against government fight basically linked in the past few years now criminals starting to use it as well so in a sense if you think about it what's happening right now there is basically a cold war that nobody is talking about it between kind of the giant that everybody is hacking everybody and in the crossfire we see all of those enterprises across the world it was not a surprise that um you know after the biden and putin uh meeting suddenly it was a quiet it was no ransomware for six weeks and after something changing the politics suddenly we can see a a groin kind of attack when it's come to ransomware that we know that was directed from russia in order to create pressure on the u.s economy sunil wrap us up what are your f what are what are your final thoughts and uh what's what's the what's the big takeaway here no i think you know i i think the key thing for everyone to know is look i think we are going into an era of state-sponsored uh not espionage as much as threat vectors that affect every business and so in many ways the chiefs the chief information security officer the chief risk officer in many ways the ceo and the board now have to pay attention to this topic much like they paid attention to mobile 15 years ago as a transformation thing or maybe cloud 10 years ago i think cyber has been one of those it's sort of like the wireless error david like it existed in the 90s but didn't really break around until iphone hit or the world of consumerization really took off right and i think we're at the tip of the spear of that cyber really becoming like the era of mobile for 15 years ago and so i think that's the if there's like a big takeaway i think yes there's lots of solutions the good news is great innovations are coming through companies like cyber reason working with you know proven providers like google and so forth and so there's a lot of like support in the ecosystem but i think if there was one takeaway that was that everybody should just be ready internalized we don't have to be paranoid about it but we anticipate that this is going to be a long game that we'll have to play together well with that uh taking off my journalist hat for a moment and putting on my citizen hat uh it's reassuring to know that we have really smart people working on this uh because when we talk about critical infrastructure control systems and things like that being under threat um that's more significant than simply having your social security number stolen in a in a data breach so um with that uh i'd like to thank you sunil leor thank you so much for joining us on this special cube conversation this is dave nicholson signing off from our continuing coverage of google cloud next 2021 [Music] you

Published Date : Oct 29 2021

SUMMARY :

attack so the ability to be able to say

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
October 2021DATE

0.99+

five computersQUANTITY

0.99+

sunilPERSON

0.99+

dave nicholsonPERSON

0.99+

davidPERSON

0.99+

five waysQUANTITY

0.99+

six weeksQUANTITY

0.99+

sunil pottiPERSON

0.99+

fiveQUANTITY

0.99+

russiaLOCATION

0.99+

threeQUANTITY

0.99+

five thousandQUANTITY

0.99+

fourQUANTITY

0.99+

early 2022DATE

0.99+

two examplesQUANTITY

0.99+

five timesQUANTITY

0.99+

liorPERSON

0.99+

one exampleQUANTITY

0.99+

yesterdayDATE

0.99+

first oneQUANTITY

0.98+

five bucketsQUANTITY

0.98+

iphoneCOMMERCIAL_ITEM

0.98+

todayDATE

0.98+

next decadeDATE

0.98+

15 years agoDATE

0.98+

12 monthsQUANTITY

0.98+

oneQUANTITY

0.98+

bothQUANTITY

0.98+

one takeawayQUANTITY

0.98+

googleORGANIZATION

0.97+

three different waysQUANTITY

0.97+

10 years agoDATE

0.97+

google cloudORGANIZATION

0.97+

6 monthsQUANTITY

0.97+

twoQUANTITY

0.97+

two very special guestsQUANTITY

0.97+

more than two folksQUANTITY

0.97+

next yearDATE

0.96+

sunil leorPERSON

0.96+

sunil liorPERSON

0.96+

next 2022DATE

0.96+

thousands of customersQUANTITY

0.96+

14 year oldQUANTITY

0.95+

firstQUANTITY

0.95+

more than 27 trillion events a weekQUANTITY

0.95+

this yearDATE

0.95+

every piece of informationQUANTITY

0.95+

first stepQUANTITY

0.94+

next 2021DATE

0.94+

three different wayQUANTITY

0.93+

stanfordORGANIZATION

0.93+

every piece of dataQUANTITY

0.92+

google cloudTITLE

0.91+

a lot of eventsQUANTITY

0.91+

israeliORGANIZATION

0.9+

zero trustQUANTITY

0.9+

darkseidORGANIZATION

0.9+

about a decade agoDATE

0.9+

a decade agoDATE

0.88+

past few yearsDATE

0.87+

russiaORGANIZATION

0.87+

90sDATE

0.87+

last few yearsDATE

0.85+

this morningDATE

0.84+

google plusTITLE

0.84+

two decades agoDATE

0.83+

cyber reason andTITLE

0.82+

a half a dozenQUANTITY

0.81+

single dayQUANTITY

0.8+

nutanix andORGANIZATION

0.79+

a lot of the dataQUANTITY

0.79+

Suni PottiPERSON

0.77+

lot ofQUANTITY

0.76+

couple of thingsQUANTITY

0.74+

next 2021DATE

0.74+

day oneQUANTITY

0.73+

russianOTHER

0.71+

u.sORGANIZATION

0.7+

John Sankovich, Smartronix & John Brigden, AWS | AWS Summit 2021


 

>>Hi everyone. Welcome to the cubes coverage of eight of his public sector summit live in Washington D. C, where it's a face to face real event. I'm johN for a year host but virtual events. Hybrid events were hybrid event as well. We've got a great remote interview. Got a guest here in person, Jon Stankovic, president of cloud solutions. Smartronix and Britain was the VP of eight of his managed services, also known as A M. S with amazon web services, jOHN and jOHN and three johns here. Welcome to the cube remote >>in person. >>Hybrid. >>Thanks. Thank you. Great to be on the cube longtime viewer and I really appreciate what you >>do for fun to be here remotely but I feel like it right there. >>Yeah, I love the hybrid if it's only gonna get better next time will be in the metaverse soon. But uh, jOHn on the line there, I want to ask you with AWS managed services, take us through what you guys are doing with Smart Trust because this is an interesting service you guys are working together. How's that relates at the table for us. >>Yeah, well, you know, we're really excited about this announcement, We've been working with Smartronix since we launched A. M S 4.5 years ago. So we've been able to build up working with them, you know, a huge library of automation capabilities and this really just formalised as that in an offer for our joint customers where we can bring the expertise from AWS and Smartronix and offer a full solution that's highly integrated to help help our customers jointly accelerate their cloud adoption as well as their operating model transformation as they start to move to a more devops motion and they need help. We're there together to provide our expertise and make that simple for them. >>Well I appreciate the call. You john b john s over here. Js john Stankevich. Um tell me about Smart trust because you heard what's going on with devoPS to point a whole revolutions going on in devops, you're starting to see a highly accelerated modern application development environment which means that the software developers are setting the pace there, the pace car of the innovation, right? And so other teams like security or I. T. Become blockers. Blockers a drag and anchor. So the shift left on security for instance is causing a lot of problems on the security team. So all this is going on like right now so still the speed is the game. What's your take? >>Sure so absolutely. I think that's where this partnership really really excels. You know, we want customers to focus on their mission, you know, national security, health care outcomes. Um we want them to kind of take the rest off their plate. So when you say some of the quote unquote blockers around security uh Smartronix has invested heavily in a federally authorized platform that sits on top of what a WS has done from a Fed ramp and so right off the bat speed agility. We don't want our customers spending time replicating things that we've done at scale and leveraging what AWS has and so by kind of utilizing this, this joint offer all of a sudden a big part of that compliance is taken care of. Uh, and then things like devoPS, things like SRE models that you hear a lot about, we fold all that into this uh, combined service offering. >>I know a little about what you guys are doing. You mentioned SRE is very cool, but let's take a minute to explain what you guys are doing because you guys are on the cutting edge of solving a lot of problems from infrastructure fools around the deVOPS stack. What are you guys doing in the cloud services? >>Sure. So I think jOHN hit a little bit on it. But you know, we look at AMS as best in breed at scale managing core parts of the U. S. Infrastructure. What Smartronix does is many times customers have some unique requirements and we take that core kind of powered by aims and we try and fill in those kind of complementary skill sets and complementary requirements. And so something like the devops, which is basically making sure that those people developing that software, they have also the ability to manage it and on an ongoing basis. Kind of run it. We develop all the frameworks and that's part of this offering to enable that. >>What's the solution jOHN B because I think you guys don't, this is people have challenges. I want to understand those challenges. And then when they go to the external managed service, what's involved, you walk us through that? Because I think that's important. >>Yeah, sure. You know, it turns out jOHN nailed this one. That moving to the cloud can be, can be a big transformation for many, many enterprises and government teams. Right. They worked for many years and have an ecosystem in their traditional data center. But when they move to the cloud, there's a lot of moving pieces and so what we like to focus on is helping them with the undifferentiated aspects of safely and automating cloud operations. So working with, with Smartronix allows us to take what we're doing across the infrastructure services, around security, around automation, around patching instance management, container management, all of those uh, undifferentiated, heavy lifting passed by now with Smartronix and expertise across the application layer across customers, unique environments across federal and moderate the various government standards and compliance is, and we think we're able to get, take a customer um, from kind of really early stage cloud experience and rapidly deploy configure and get them into a very stable scalable posture operationally on the cloud so that they can start to invest in their people, their skills and their differentiated application on the cloud that really drive the differentiation in their business and not have to worry about best practice configurations and operational run books and, and and automation is and and and the latest dep sec ops capabilities that will pick up for them while they're training and getting, they're getting their emotions in place, >>jOHn is on the Smartronix side. Talk about the difference between scale okay. Which is a big issue with cloud these customers want to have with AMS but then you also have some scale, maybe some scale to but highly compliant environments, regulated industries, for instance, this is the hot areas because scale is unwieldy, but if you don't want get rain it in, it can be chaotic. Right? So also regulations and compliance is a huge issue. >>Yeah. What what we found is um, at times customers look at it and they just get frustrated because it can be kind of intimidating and we as a combined team really have spent a lot of time we have accelerators to walk customers through that process and a really flexible model. If they feel that they have a lot of domain expertise in it, then we'll just kind of be almost a supporter other customers look at it and say, you know, we'd like you to take the entire patch of that compliance and so highly regulated environments. Both commercial D. O. D. National Security, um federal civilian agencies, state and local, they're all looking to this and saying we really want someone that's been through things like the U. S. Audited managed service provider, things like they're managed security service provider, things like fed ramp or D. O. D. Ill four and five. And I think to be honest Smartronix has just invested heavily in that with the goal of reducing all that complexity and it's it's really been taken off and we really appreciate the partnership specifically with jOHn and uh the A. W. S. A. M. S. Team. >>All right so you guys were going together, what's the ultimate benefit to the customer? >>I can I'll give my thing right off the bat all this innovation coming out of A. W. S. Um It's fantastic but only if you have the ability to take advantage of it. And so thousands of new services being rolled out. We really want customers to be able to take advantage of that and let at times us do what we do best and let them focus on their mission. And I think that's what really AWS is all about and we just feel very fortunate to be an enabler of that >>john be talking about talking about the staffing issues too because one of the problems that we have been reporting and this has come up at every reinvest on the max. Peterson about this as well. He's promised last year was gonna train 29 million people. See how that comes out of reinvent when the report card comes back. I was kinda busting his chops a little bit there but he had a smile on his face I think is gonna hit the numbers a lot of times, Maybe people don't have an SRE they don't have a devout person or they have some staff that they're in transition or transforming this is a huge factor. What's your take on this, >>you know, that that is so important, you know, as john mentioned, it's all about helping the customers focused and and their their cloud talent is scarce and it's a scarce resource and you you want to make sure that your cloud talent is working on the cool stuff or they're going to leave and and as you train and skill, these folks, they want to focus on what really impacts the business, what's really differentiating doing, you know, doing the cloud and the necessities on operations and operational tasks and sec ops and things like that, sometimes, that's not the sexiest part of the work that the customer really wants to focus their team on. So again, I think together we're able to help drive high levels of automation and really do that day in and day out work that is not necessarily the differentiator of their business and that's going to attract and keep the best and brightest minds in these in these customers um which allows us to help them with the undifferentiated aspects of of the heavy lifting. >>Not only is availability of people, it's keeping the people, I love that great call out there, Okay, where does this go? Where's the relationship. So you guys are partnering, you have the M. S. Is going on? Strong managed services not gonna go away mormon people were using managed services. It's part of the ecosystem within the ecosystem. What's next in the relationship? >>Well, I think, you know, I'll speak first, john, I'm sure you've got some thoughts to, but you know, we've got so many things on our plate around predictive operations and the predictive capabilities that we're excited about tackling together. Obviously there's all sorts of unique applications that require even deeper capabilities and working with Smartronix to help us, you know, provide even greater insight into the application layer. So I kind of see us expanding um both horizontally as well as well as vertically and horizontally. We've got customers looking at the edge with the outpost solutions and we can snap into those capabilities as well. So there's a tremendous amount of kind of, I'd say vertical and horizontal opportunity that we can continue to expand it together, >>john your reaction, That's >>pretty right on Absolutely. I think john Berger really hit it and I think really machine learning, you know, that's a big area of focus, if you look at all this data is being collected, predictive modeling and so we have this kind of transition from a model where people were basically watching screens reacting and what the AWS MSP offer and what you know, AmS offers is really predicting, so you you're not doing that, you're not reacting, you're proactively ahead of things. And that's the honest truth is AWS is such a well run service. It just doesn't break, you know, it doesn't break like what you see in the traditional kind of legacy infrastructure. And so at times we're just continuing to climb that stack. As, as john mentioned, >>it's really interesting as you guys are, as you're talking, I'm thinking myself just go back a couple of years ago, eight years ago or so. DevoPS is a bad word. Dev's dominate up. So I was through them now, operational leverage is a huge part of this ai operations, um, the entire I. T service management being disrupted heavily by cloud operations that also facilitate rapid development models. Right? So, again, this is like under reported, but it's a really nuanced point hardened operations for security and not holding back the developers is the cloud scale. What's your guys reaction to that? >>Yeah, I completely agree. I think, you know, the automation piece of things and I think customers are still going through transitions. You know, traditionally managed services means a big staff and it's like I said, sitting there watching screens and you flip that model where you have developers actually deploying code and infrastructure to support it. It's, you know, it's very transitional and very transformative and I think that's where an offering, like what we've really partnered on really, really helps because at times it can be overwhelming for customers and we just want to simplify that. And as I've said, let them focus on their mission. >>Amen one last question before we break, because I was talking to another partner, a big part of AWS. Um, and we're talking about SAS versus solutions and sometimes if you're too Sassy, you're not really building a custom solution, but you can have the best of both worlds. A little professional services, maybe some headroom on the stack, if you will your building solutions. So the next question is, as you guys put this cutting edge innovative innovative solution together, how are your customers consuming it? Like what's the consumption? I'm assuming there must be happy because a lot of heavy lifting being taken away, they don't have to deal with house the contract process. >>Well, you know, I think, you know, we have the opportunity, we support customers and kind of all modes of their application stack. So, you know, a full stacks solution. You know, even a legacy architecture moving to the cloud requires a high degree of automation to support it. And then as those applications become modernized over time, they become much more cloud native at some point, they might even become a full stack Starzz offer. So many of our customers actually run their SAAS platform leveraging our capability as well. So, you know, I think it gives the customer a lot of optionality uh, and future kind of growth as they modernize their application stack. >>Yeah, john your reaction. Absolutely. >>I think one of the greatest benefits is it's freeing up funds to do mission work. And so instead of spending time procuring hardware and managing it and leasing data center space, they literally have more funding. And so we've seen customers literally transform their business because this piece of it's done more efficiently and they have really excess and really additional funding to do their mission. >>We love the business model innovation, faster um, higher quality, easy and inexpensive. That's the flywheel gentlemen, Thank you for coming on and get the three. John john thank you. Vice President Cloud Solutions. That Smartronix, thank you for coming on. John Barrington BP of amazon websites managed. There is a also known as AWS and A M. S. A W. S got upside down. W. M. Looks the same. Thank you guys for coming. I appreciate it. Thank you. We appreciate great great Cube covers here. eight of us summit we're live on the ground and were remote. It's a hybrid event. I'm John for your host. Thanks for watching. Mhm

Published Date : Sep 29 2021

SUMMARY :

Welcome to the cube remote Great to be on the cube longtime viewer and I really appreciate what you take us through what you guys are doing with Smart Trust because this is an interesting service you guys are working working with them, you know, a huge library of automation capabilities and this really Um tell me about Smart trust because you heard what's going on with devoPS to point a whole revolutions we want customers to focus on their mission, you know, national security, health care outcomes. what you guys are doing because you guys are on the cutting edge of solving a lot of problems from infrastructure fools around We develop all the frameworks and that's part of this offering to enable that. What's the solution jOHN B because I think you guys don't, this is people have challenges. on the cloud so that they can start to invest in their people, their skills and their then you also have some scale, maybe some scale to but highly compliant environments, you know, we'd like you to take the entire patch of that compliance and so highly regulated W. S. Um It's fantastic but only if you have the ability to take advantage john be talking about talking about the staffing issues too because one of the problems that we have been reporting the business, what's really differentiating doing, you know, doing the cloud and the necessities So you guys are partnering, you have the M. deeper capabilities and working with Smartronix to help us, you know, provide even greater insight into you know, it doesn't break like what you see in the traditional kind of legacy infrastructure. it's really interesting as you guys are, as you're talking, I'm thinking myself just go back a couple of years ago, I think, you know, the automation piece of things and I think So the next question is, as you guys put this cutting Well, you know, I think, you know, we have the opportunity, we support customers and kind of all modes of their application Yeah, john your reaction. and they have really excess and really additional funding to Thank you guys for coming.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jon StankovicPERSON

0.99+

AWSORGANIZATION

0.99+

Washington D. CLOCATION

0.99+

WSORGANIZATION

0.99+

johnPERSON

0.99+

john BergerPERSON

0.99+

amazonORGANIZATION

0.99+

jOHnPERSON

0.99+

JohnPERSON

0.99+

John BarringtonPERSON

0.99+

John johnPERSON

0.99+

John SankovichPERSON

0.99+

last yearDATE

0.99+

johNPERSON

0.99+

BothQUANTITY

0.99+

eightQUANTITY

0.99+

SmartronixORGANIZATION

0.99+

John BrigdenPERSON

0.99+

SRETITLE

0.98+

eight years agoDATE

0.98+

threeQUANTITY

0.98+

fed rampORGANIZATION

0.97+

bothQUANTITY

0.97+

jOHNPERSON

0.97+

oneQUANTITY

0.97+

jOHN BPERSON

0.97+

D. O. D. National SecurityORGANIZATION

0.96+

both worldsQUANTITY

0.95+

29 million peopleQUANTITY

0.95+

firstQUANTITY

0.95+

4.5 years agoDATE

0.94+

W. M.PERSON

0.93+

couple of years agoDATE

0.92+

U. S. AuditedORGANIZATION

0.91+

PetersonPERSON

0.91+

a yearQUANTITY

0.91+

john b john sPERSON

0.9+

A. W. S. A. M. S.ORGANIZATION

0.9+

johnsPERSON

0.88+

john StankevichPERSON

0.87+

thousands of new servicesQUANTITY

0.86+

Smart TrustORGANIZATION

0.84+

amazon web servicesORGANIZATION

0.82+

Cloud SolutionsORGANIZATION

0.81+

SASORGANIZATION

0.79+

U. S.LOCATION

0.78+

one last questionQUANTITY

0.72+

BPORGANIZATION

0.72+

AWS Summit 2021EVENT

0.72+

O. D. Ill fourORGANIZATION

0.71+

sectorEVENT

0.71+

devoPSTITLE

0.71+

VicePERSON

0.69+

SAASTITLE

0.66+

fiveQUANTITY

0.65+

D.LOCATION

0.65+

AmSTITLE

0.64+

SmartronixPERSON

0.61+

CubeCOMMERCIAL_ITEM

0.59+

A M. SPERSON

0.56+

A. M STITLE

0.53+

BritainORGANIZATION

0.52+

deVOPSTITLE

0.5+

M.PERSON

0.45+

W. SPERSON

0.43+

SassyORGANIZATION

0.41+

AMSORGANIZATION

0.38+

Glenn Katz, Comcast | Fortinet Security Summit 2021


 

>> It's The Cube covering Fortinet Security Summit brought to you by Fortinet. >> Hey and welcome back to the cubes coverage of Fortinets championship series. Cybersecurity summit here in Napa valley Fortinet is sponsoring the PGA tour event, kicking off the season here, and the cubes here as part of the coverage. And today is cybersecurity day where they bring their top customers in. We got Glenn Katz SVP, general manager, Comcast Enterprise Solutions. Glenn, thanks for coming on The Cube. Thanks for taking time out of your day. - Thank you no This is great. This is great. >> Interviewer: Tell me to explain what you guys do in the Comcast business enterprise group. >> That's our Comcast business. We're a part of Comcast overall. I always like to explain what Comcast really is. If you look at Comcast, it's a technology innovation company by itself that happens to focus on communications and media type of, of markets, right? And if you look at the Comcast side there on the communication side, it's really everything residential with customers. Then there's the us Comcast business and we're the fastest growing entity over the last 15 years within Comcast. And we started in small business, voice, video, and data to small businesses. Then we moved up to provide fiber ethernet type of a transport to mid-market. And then my group started in 2014. And what we do is focus on managed services. It doesn't matter who the transport layer is for enterprise Fortune 1000 type companies. And then when you layer in all these managed wider network services. So that's my business unit. >> Interviewer: Well, we appreciate it we're a customer by the way in Palo Alto >> Glen: Oh great >> So give a shout out to you guys. Let's get into the talk you're giving here about cybersecurity, because I mean, right now with the pandemic, people are working at home. Obviously everyone knows the future of work is hybrid now you're going to see more decentralized defy and or virtual spaces where people are going to want to work anywhere and businesses want to have that extension, right? What people are talking about, and it's not new, but it's kind of new in the sense of reality, right? You've got to execute. This is a big challenge. >> Glen: It is - What's your thoughts on that, >> Well it's a big challenge. And one of the things that I'll try to, I'll speak to this afternoon here, which is at least from the enterprise perspective, which includes the headquarters, the enterprise, the branch locations, the digital commerce, everywhere else, commerce is being done. It's not just at a store anymore. It's everywhere. Even if you only have a store and then you have the remote worker aspect. I mean, they do that to your point earlier. We're not in that fortress sort of security mentality anymore. There's no more DMZs it's done. And so you've got to get down to the zero trust type of network architecture. And how do you put that together? And how does that work? Not just for remote workers that have to access the enterprise applications, but also for simple, you know, consumers or the business customers of these, of these enterprises that have to do business from over the phone or in the store. >> Interviewer: What are the some of the challenges you hear from your customers, obviously, business of the defend themselves now the, the, the attacks are there. There's no parameters. You mentioned no fortress. There's more edge happening, right? Like I said, people at home, what are the top challenges that you're hearing from customers? >> So the biggest challenge, and this is, I would think this is, this is mostly focused on the enterprise side of it is that the is two interesting phenomenons going on. This is sort of beginnings before the pandemic. And then of course the pandemic, the role of the CIO has been elevated to now, they have a real seat at the table. Budgets are increasing to a point, but the expertise needed in these, in these it departments for these large enterprises, it's, it's impossible to do what you were just talking about, which is create a staff of people that can do everything from enterprise applications, e-commerce analytics, the network. How do you secure that network all the way down to the end users? Right? So it's that middle portion. That's the biggest challenge because that takes a lot of work and a lot of effort. And that's where folks like Comcast can come in and help them out. That's their biggest challenge. They can handle the enterprise, they can handle the remote workers. They can handle their own applications, which are continually trying to be, you know, have to be it's competitive out there. It's that middle area, that communications layer that their challenged with. >> Interviewer: Yeah. And John Madison's EVP, CMO Ford. It's always talking about negative unemployment in cybersecurity. Nevermind just the staff that do cyber >> Glen: That's exactly right, that's given. If you're a business, you can't hire people fast enough and you might not have the budget for you want to manage service. So how do you get cyber as a service? >> Glen: Well, so it's even bigger than that. It's not just the cyber as a service because it's now a big package. That's what SASE really is SASE is Secure Access Service Edge. But think of it where I think of it is you've got remote users, remote workers, mobile apps on one side, you've got applications, enterprise or commercial that are now moved into different cloud locations. And in the middle, you've got two real fundamental layers, the network. And, and that includes uh, the actual transport, the software defined wide area, networking components, everything that goes with that, that's the network as a service. And then you've got the secure web gateway portion, which includes everything to secure all the data, going back and forth between your remote laptop, the point of sales. And let's say the cloud based applications, right? So that's really the center stage right there. >> Interviewer: And the cloud has brought more service at the top of the stack. I mean, people thought down stack up stack is kind of like a geeky terms. You're talking about innovation. If you're down stack with network and transport, those are problems that you have to solve on behalf of your customers And make that almost invisible. And that's your job >> That's our job. That's our job is to service provider What's interesting is though back in the day, I mean, when, I mean, back in the day, it could have been 10 years ago in 20. You really, you know, you had stable networks, they were ubiquitous, they were expensive and they were slow. That's kind of the MPLS legacy TDM. Yeah. So you just put them in and you walked away and you still did all your enterprise. You still did all of your applications, but you had your own private data centers. Everything was nicer. It was that fortress mentality right now. It's different. Now everybody needs broadband. Well guess what? Comcast is a big company, but we don't have broadband everywhere. ATT doesn't have it. Verizon doesn't have it Charter doesn't have it. Right. So you need, so now to think about that from enterprise, I'm going to go, I'll give you an example. All of our customers to fulfill a nationwide network, just for the broadband infrastructure, that's, you know, redundant. If you want to think of it that way we, we source probably 200 to 300 different providers to provide an ubiquitous network nationwide for broadband. Then we wrap a layer of the SD wan infrastructure for that, as an example, over the top of that, right? You can't do that by yourself. I mean, people try and they fail. And that's the role of a managed service provider like us is to pull all that together. Take that away. We have that expertise. >> Interviewer: I think this is a really interesting point. Let's just unpack that just for a second. Yeah. In the old days, we want to do an interconnect. You had an agreement. You did, you have your own stuff, do an interconnected connect. >> Glen: Yep. >> Now this, all this mishmash, you got to traverse multiple hops, different networks. >> Glen: That's right >> Different owners, different don't know what's on that. So you guys have to basically stitch this together, hang it together and make it work. And you guys put software on the top and make sure it's cool is that how it works? >> Glen: Yeah. Software and different technology components for the SD wan. And then we would deliver the shore and manager all that. And that's, that's where I really like what's happening in the industry, at least in terminology, which is they try, you have to try to simplify that because it's very, very complicated, but I'm going to give you the network as a service mean, I'm going to give you all the transport and you have to don't have to worry about it. I'm going to rent you the, the SD wan technology. And then I'm going to have in my gateways all these security components for a firewall as a service, zero trust network access, cloud brokerage services. So I will secure all of your data as you go to the cloud and do all of that for you. That's really what we, that's what we bring to the table. And that's what is really, really hard for enterprises to do today. Just because they can't, the expertise needed to do that is just not there. >> Interviewer: Well, what's interesting is that first you have to do it now because the reality of your business now is you don't do it. You won't have customers, but you're making it easier for them. So they don't have to think about it. - [Glen] That's right. >> But now you bring in hybrid networking hybrid cloud, they call it or multi-cloud right. It's essentially a distributed computing and essentially what you're doing, but with multiple typologies, >> Glen: that's right. >> Interviewer: I got an edge device. - [Glen] That's right. If I'm a business. - [Glen] That's right. >> That's where it could be someone working at home >> Glen: That's right. - Or it could be my retail >> Or whatever it could be. So edge is just an extension of what you guys already do. And is that right? Am I getting that right? >> Glen: Yeah that's exactly right. And, and, but the point is, is to make it economic and to make it really work for the end user. If you're a branch, you may have a, a application that's still being run via VPN, but you also need wifi internet for your customers because you want to use your mobile device. They've entered into your store and you want to be able to track that right. And push something to them. And then you've got the actual store applications could be point of sales could be back of house comparing that's going up to AWS. Azura whatever. Right. And that all has to be, it all has to come from one particular branch and someone has to be able to manage that capability. >> Interviewer: It's funny, - Its so different >> Interviewer: just as you're talking, I'm just thinking, okay. Facial recognition, high, high bandwidth requirements, >> Glen: Huge high bandwidth requirements >> Processing at the edge becomes huge. >> Glen: It does. >> So that becomes a new dynamic. >> Glen: It does. It's got to be more dynamic. It's not a static IP end point. >> Glen: Well, I'll give you another an example. Let's say it's, it seems silly, but it's so important from a business perspective, your quick service restaurant, the amount of digital sales from applications are just skyrocketing. And if you yourself, and particularly in the pandemic, you order something, or that goes up to the cloud, comes back through, goes to the point of sales. And then the, the back of house network in a particular restaurant, if that doesn't get there, because one line of you only have one internet connection and it's down, which sometimes happens, right? You lose business, you lose that customer. It's so important. So what's being pushed down to the edge is, you know, reliable broadband hybrid networks, where you have a primary wire line and a secondary wire line, maybe a tertiary wireless or whatever. And then a box, a device that can manage between those two so that you can keep that 99.9, 9% availability at your branch, just for those simple types of applications. >> Interviewer: You know Glenn, you as you're talking most people, when we talk tech, like this is mostly inside the ropes, Hey, I can get it. But most people can relate with the pandemic because they've ordered with their phone on - [Glen] Exactly right >> With the QR code. - [Glen] That's exactly right >> They see the menu - [Glen] That's right >> They get now what's happening - [Glen] That's right that their phone is now connected to the service. >> Glen: That's right >> This is not going away. The new normal. >> Glen: No, it's absolutely here. And what I've seen are there are many, many companies that already knew this and understood this pre pandemic. And they were, they had already changed their infrastructure to really fit what I was calling that network as a service in the SASE model, in different ways. Then there were a bunch that didn't, and I'm not going to name names, but you can look at those companies and you can see how they're, they're struggling terribly. But then there was this. Now there's a, a much bigger push and privatization again, see, I was sending, Hey, I asked for this before. It's not like the CIO didn't know, but management said, well, maybe it wasn't important. Now it is. And so you're seeing this actual amazing surge in business requests and requirements to go to the model that we're all talking about here, which is that SASE type of implementation high-speed broadband. That's not going away for the same reason. And you need a resilient network, right? Yes. >> Interesting. Best practice. Let's just take that advice to the, to the audience. I want to get your thoughts because people who didn't do any R and D or experimentation prior to the pandemic, didn't have cloud. Wasn't thinking about this new architecture got caught flat-footed. -Exactly. >> And they're hurting and or out of business. >> Correct. >> If people who were on the right side of that took advantage as a tailwind and they got lifts. >> That's exactly right. >> So what is the best practice? How should a business think about putting their toe in the water a little bit or jumping in and getting immersed in the new, new architecture? What advice would you give? Because people don't want to be in the wrong side of history. >> No, they don't. >> What's your guy's best practice? >> I may sound biased, but I'm really not trying to be biased. And this'll be some of the I'll speak about here later today. You have to try it. You, as the end user, the enterprise customer, to, to fulfill these types of needs, you've got to really probe your managed service providers. You've got to understand which ones, not just can give you a nice technology presentation and maybe a POC, but who's going to be there for the longterm who has the economic wherewithal to be able to give the resources needed to do what I was talking about, which is you're going to outsource your entire network to me and your sh, and a good portion of your security for the network to a service provider. that service provider has to be able to provide all that has to be able to have the financial capabilities, to be able to provide you with an operating type of model, not you have to buying equipment all the time. That service provider has to be able to have teams that can deliver all of that 200 to 300 different types of providers aggregate all that, and then be there for day two. Simple thing. Like if you know, most companies, if you're not a really large location, you can't afford to, you know, double types of routers that are connected. And if one fails you have fail over, right, most of them will have one router and they'll have, but they'll have two backup paths. Well, what happens is that router or switch, single switch fails? You need to have a meantime to repair a four hours. I mean, that's kind of basic and well do that. How do you do that? You've got to have depots around the entire country. These are the types of questions that any enterprise customers should be probing their managed service provider, right? It's not just about the technology. It's about how can you deliver this and assure this going forward. >> And agility too cause when, if, if things do change rapidly, being agile... >> Exactly >> means shifting and being flexible with your business. >> That's exactly right. And that's important. That's a really important question. And the agility comes from this financial agility, right? Like new threat, new box. I want, I want this old one. I'm going to upgrade to a different type of service. The service providers should be able to do that without me having to force you to go get some more CapEx and buy some more stuff. Cause that's number one. But the other agility is every enterprise is different. Every enterprise believes that its network is the only network in the world and they have opinions and they've tested different technologies. And you're going to have to adapt a little bit to that. And if you don't, you're not going to get out of this. >> It's funny. The old days non-disruptive operations was like a benefit, we have non-disrupt- now it's a table stakes. You can't disrupt businesses. - You can't. You can't at the branch at the remote worker. If you're on a zoom call or whatever, or you're on a teams call, we've all been there. We're still doing it. If it breaks in the middle of a presentation to a customer that's problem. >> Glenn thanks for coming on the cube with great insight. >> Oh great. This was fun. >> Are you exciting and plays golf? You're going to get out there on the range? >> I played, I played golf a lot when I was younger, but I haven't. And so I have a few other things I do, but I guess I'm going to have to learn now that we're also a sponsor of PGA, so yeah, for sure. >> Great. Well, great to have you on - All right thank you and great talk. Thanks for coming on and sharing your insight. >> This was great. I appreciate okay. >> Keep coverage here. Napa valley with Fortinet's Cybersecurity Summit as part of their PGA tour event, that's happening this weekend. I'm John for the Cube. Thanks for watching.

Published Date : Sep 14 2021

SUMMARY :

brought to you by Fortinet. and the cubes here as in the Comcast business enterprise group. And if you look at the So give a shout out to you guys. do that to your point earlier. you hear from your customers, is that the is two interesting just the staff that do cyber So how do you get cyber as a service? And in the middle, those are problems that you have to solve And that's the role of a managed did, you have your own stuff, you got to traverse multiple And you guys put software on the top but I'm going to give you the that first you have to do it now But now you bring in hybrid - [Glen] That's right. Glen: That's right. of what you guys already do. And that all has to be, Interviewer: just as you're talking, It's got to be more dynamic. to the edge is, you know, is mostly inside the ropes, With the QR code. connected to the service. This is not going away. And you need a resilient network, right? prior to the pandemic, And they're hurting the right side of that took to be in the wrong side of for the network to a service provider. And agility too cause when, flexible with your business. having to force you to go get You can't at the branch the cube with great insight. This was fun. but I guess I'm going to Well, great to have I appreciate okay. I'm John for the Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
ComcastORGANIZATION

0.99+

GlennPERSON

0.99+

2014DATE

0.99+

GlenPERSON

0.99+

VerizonORGANIZATION

0.99+

Glenn KatzPERSON

0.99+

Glenn KatzPERSON

0.99+

John MadisonPERSON

0.99+

Palo AltoLOCATION

0.99+

JohnPERSON

0.99+

200QUANTITY

0.99+

AWSORGANIZATION

0.99+

ATTORGANIZATION

0.99+

Comcast Enterprise SolutionsORGANIZATION

0.99+

99.9, 9%QUANTITY

0.99+

Napa valleyLOCATION

0.99+

twoQUANTITY

0.99+

CharterORGANIZATION

0.99+

10 years agoDATE

0.98+

two interesting phenomenonsQUANTITY

0.98+

four hoursQUANTITY

0.98+

Fortinet Security SummitEVENT

0.98+

pandemicEVENT

0.97+

one lineQUANTITY

0.97+

SASETITLE

0.97+

firstQUANTITY

0.97+

one sideQUANTITY

0.97+

oneQUANTITY

0.96+

CapExORGANIZATION

0.96+

one routerQUANTITY

0.96+

todayDATE

0.96+

300 different providersQUANTITY

0.95+

PGAEVENT

0.94+

two real fundamental layersQUANTITY

0.94+

FortinetORGANIZATION

0.94+

day twoQUANTITY

0.94+

one internet connectionQUANTITY

0.93+

PGAORGANIZATION

0.92+

this afternoonDATE

0.92+

zeroQUANTITY

0.91+

Fortinet Security Summit 2021EVENT

0.89+

AzuraORGANIZATION

0.88+

FortinetEVENT

0.87+

later todayDATE

0.86+

20QUANTITY

0.85+

one particular branchQUANTITY

0.85+

Cybersecurity SummitEVENT

0.84+

SVPPERSON

0.84+

two backupQUANTITY

0.84+

last 15 yearsDATE

0.82+

a secondQUANTITY

0.82+

300 different typesQUANTITY

0.76+

single switchQUANTITY

0.75+

KC Choi, Samsung | Cloud City Live 2021


 

(upbeat music) >> Okay, I'm back. I'm John Furrier with theCube. We're here in the middle of the action at Mobile World Congress at Cloud City is where the action is. Danielle Royston and Telco DR. Digital disruption here happening. This next interview I did with Casey Choi, the Executive Vice President at Samsung. I did this remotely. He couldn't be here in person. We wanted to bring him in for a conversation. I had a chance to record this with him. He talks about the intelligent Human Edge or Industry 4.0. It was about Edge computing, Samsung as a leader. Obviously we know what they do. They're part of this IOT revolution, Casey Choi, brilliant executive I really enjoyed my conversation. Take a listen. (upbeat music) Welcome to theCube's coverage of Mobile World Congress, 2021. I'm John Furrier host of theCube. We're here with Cube alumni, Casey Choi's Executive Vice President and GM of the Global Mobile B2B Team, Communications Team at Samsung. Casey, great to see you. Thank you for coming off for the special Remote Mobile World Congress. We're here in person, but also hybrid event. We got a lot of remote interviews. Thank you for taking the time to speak with me. >> John. Great to see you. Great as always to be with you and great to be at least here, virtually with the team and in Barcelona from WC. >> You know, in Samsung, we think about the edge. You are leading a team that's driving this innovation. We've talked in the past about Industry 4.0, but the innovation at the intelligent edge, human edge is a big part of it, with 5G. It's just another G, but it's not just another G you got to have a backbone. You got to have a back haul. You got to have an interconnection. You have commercial, not just consumer technology. So the edge is becoming both this human and device commercial environment. So the industry is quickly moving to this. You call it the 4.0 trend. What do you see happening? This is a clear change over the Telco is not what it used to be. Change is coming fast. A lot of disruption, what's your view? >> Yeah, I think we see a number of things done. And certainly from our perspective, which is, I think we've got somewhat of a unique view on this because of our huge focus really in consumer use and attitudes. And certainly it's been informed by what we've seen, what we've all collectively seen over the last year and a half or so, and are still seeing today. And I think one of the things that we're certainly experiencing is I think the edge is it's expanding further out. I think it's also getting more tightly coupled in many respects to the human factor. And it's not just a set of billions of discrete sensors anymore. And I think the evolution of our thinking around this has changed quite a bit from the IOT Version One variant of this. We put more of what I would call billions of these things, communicating all kinds of information, either to the cloud or the data centers and doing it in a very voluminous way. And what we're saying is with the advent of more the human to machine interface, and certainly the capabilities that we're saying both on the network and the device side, it's really redefining how we're thinking about edge. And certainly here at Samsung and with some of our partners, and we're starting to call this more of the intelligent human edge, where the human factor really begins to play a big role in how we're defining the Internet Of Things. And those things include really people. And this is how we're looking at it. >> I love the theme, the human edge, I think that's very relevant. I want to get a human aspect of here tied into the industry side, because as we emerge from the pandemic and move to a broader economic recovery, you see the psychology of the industry where cloud is one of the shining examples of what the pandemic highlighted cloud speed, cloud agility. And now you're seeing with openness in the Teleco industry, that cloud is coming in, open cloud interoperability. So coming out of the pandemic, cloud is the theme is driving an economic recovery, which is driving the psychology of we're back to real life, we're back to business, but it's not business as usual. The fashion is changing. The attitudes are changing. You mentioned that, and now the disruption of how cloud will be implemented. And it seems to be Telco is where these edge and cloud are just completely radically changing, what was once a kind of a slow moving Telco space. So how do you see the partnerships and coming out of the pandemic, some of the response of cloud impact, cloud technology, public cloud impact on this new Telcom? >> Yeah. Let me try to unpack that a little bit. I think we see two dimensions on this, certainly on the carrier side, the operator's side of the equation, we're certainly partnered with everybody across the globe on that. Certainly there's been a definitive impact around software defined everything, right? So, and this has been accelerated really by the standards that have started to develop around 5G. And even now there's a lot of discussion and I'm sure there'll be a lot of it around WMC about 6G and what is happening there. But I think with the advent of things like O-RAN for example, and some of the activity that we're seeing really around NEC type solutions and opportunities, the traditional role of the carrier and the operator is evolving and has to evolve, right? It is now much more aligned with the provision of these types of services that are very different from the type of data or voice services that we've seen in the past. So certainly we're seeing that transition. The second big transition is really around the notion of hybridity. Now we've been talking about this now in the industry for a while, but I think it's really starting to take firm root the idea of not only multiple clouds, but clouds that are deployed either on prem or certainly, available as a service in its various forms. So I think that combination along with the advances that we're seeing in the technology, and this was both on the connectivity side. So certainly around the ultra reliable, low latency communications, what we're seeing with things like slicing, for example, starting to take root as well as frankly, the devices themselves are getting that much more powerful and compact. This is what we're saying with SOC technologies is what we're seeing with the functions being moved more and more to on device capability. So I think about hybrid, I mean, in my past to think about it more as a small data center. How do you compact it, move it out to somewhere else. Now we're thinking about it more in terms of the type of processing capability that you can put really in the hands of the human or hands of the device. And at that point, you really start to get different use cases, start to emerge from that. So this is how we're thinking about this extension and what I'm talking about more as, an expansion on the edge, further out. >> I love is it splicing or slicing, what's the term? Slicing is the technology? >> Slicing, network slicing. >> Slicing, not splicing cable. >> Yeah. >> Slicing. >> Not splicing cable, no. >> Okay so this come up a lot, so splicing kind of points to this end to end, workflows. You look at some of the modern development, the frameworks of successful, you're seeing these multifunctional teams kind of having an end to end visibility into the modern application workflow from CIC pipeline, whatever. Now, if you take the concept of O-RAN you mentioned Open Radio Access Networks, this kind of brings up this idea of interoperability, because if you're going to have end to end and you add edge to it, you have to have the ability to watch something go end to end, but it's never been like that in the past because you had to traverse multiple networks. So this becomes kind of this hybrid a little bit deeper. Can you share how you see that and how Samsung's working with folks and how you guys are addressing this because you can be at the edge, but ultimately you've got to integrate. So you've got openness, you've got the idea of interoperability issues, and you ultimately have to move around and work with other networks, other clouds and other systems. This is not, it's not always like that. So can you share how this is evolving and how real this is and what is your view on it. >> Yeah, our thinking on this. I mean, let me start by maybe tackling this in a little bit of a different angle. One of the things that we see as one of the barriers around interoperability has really been more on the application side of the equation. And this is actually the third component in making all of this work. And let me just be very clear in what I'm saying here, I think in terms of mobile architectures and really Edge architectures, it has been one of the last bastions, if you will of closed architectures, there've been very much what I would call purpose-built architectures at the edge. Certainly that's been driven by things like the industrial side coming together with more of the commercial side of the equation, but we think it's time really to extend the interoperability of what we are seeing really on the IT side of the equation and really driven by cloud native. This was really in the area of containers. It's in the area of microservices, it's in the area of cloud native development. And if we're really talking about this, we really need to extend that interoperability from the application point of view on the data point of view, really to the end point. And this is where some of the work that we're doing, and we really embarked on in earnest last year with Red Hat and IBM, and with VMware for example, in really opening up that edge architecture to really the open source community, as well as really to the microservices architectures that we have now seen propagate down from the cloud into hybrid architecture. So this has been really one of the key focus areas for us. The network interoperability has really been driven by the standards that we've seen and that have been really adopted by the industry. And when it comes to, for example 5G standards. what we've been more focused on quite honestly, is the interoperability on the application and data side. And we think that by extending, if you will, that write once run many type concepts down into the edge and into the device, that this is going to open up really a wealth of opportunity for us on the application and on the data side. >> That's awesome, I love the openness, love the innovation you guys are doing. I think that's where the action is and that's where the growth is going to be. I do have to ask you how you see edge computing in the IOT era in terms of security. Are we more vulnerable because of it now? And how are you guys addressing the issue of security and data privacy at the edge? What's your opinion on that? What's Samsung doing? >> I mean, we just have to look at the news today, it's obvious that we are more vulnerable, right? There's no doubt that points of vulnerability are being exposed and they're probably being exposed in now industrial areas, right? Certainly with what we've seen, just even recently with some of the attacks that, that have occurred. So a couple of things there, number one, we are relying very heavily on our long history around establishing root of trust in kind of zero trust environments. We've had our Knox platform as an example, we just celebrated, in fact, our 10th year of the product. In fact, it was announced at MWC back about 10 years ago. So this is something that, that we're celebrating, it's an anniversary. Our belief on this is that we really need to ensure that we maintain a hardware-based route across when it comes to the edge. We can't only rely upon software protection at that layer. We can't naturally rely upon some of the network protections that are there. So, we've shipped about 3 billion devices with our Knox Security Suite over the last 10 years. And this is something that we're relying very heavily on. Not only for again, that hardware based root of process. So one of the key solutions, there's our Knox Vault product, which we just released a few months back. This is really a safe within a safe concept, really ensuring that the biometric password and other user data is protected. It's really what drives some of our strategy around making sure that we rely upon something that protects all of the back doors that are resident, not only at the software layer, but at the hardware layer as well. And then management is the other key piece of this, security without the ability of managing these thousands to millions of devices is really somewhat compromised. So we've extended a lot of our Knox management capability at our device level really to address some of those particular attributes, as well as these fleets become more prominent. And they start to take on workloads that are more critical to IOT type workloads. >> Casey, great to have you on. Your insight's awesome. Love what you're doing at Samsung. And again, you're a leader, you've been there, you've seen those cycles of innovation. I have to ask you my final question for you is a personal one and a professional one. The last Mobile World Congress was 2019. In person, last year was canceled a lot's happened in the industry since 20 something months ago. Now we're going to be in person, a lot of hybrid still remotely, but there'll be people in person. The world's changed. What is the big change in the Telco, Telco Cloud, Telco Edge, what's happened in these 20 plus months since the last Mobile World Congress that people should pay attention to? What's the most important thing in your mind? >> Most important? Thank God John. You're putting me on the spot here, right? I think it's wisdom to be quite honest with you. I mean, we've certainly all collectively learned a lot in terms of user patterns and what people need and want. And I hope to think that collective wisdom is going to be a key part of how we drive this going forward. And then if I can just pick one more, I would say re-invention, I think what we're starting to see is that coming out of, again from 2019 to what we're seeing now, we do see this opportunity reinventing and rethinking. And I think that's the difference. And the pace of that is going to really dictate how we look at this and how we collectively solve these challenges. So I hope to think we're wiser and that we're more imaginative coming out of this. And again after being in this industry for 30 years, we've not seen the types of things that we've seen over the last couple. So I hope to think that this is a pivot point for all of us. >> Well, Samsung is certainly a leader in many areas and great to see you on theCube here and the theme in your talks around intelligence, human edge innovation, open. This is a force that's happening. And I think the big change, as you said, the wisdom combined with a reinvention is happening and it's going to be very interesting ride, should be fun to work on. >> It will be John and I thank you for our friendship and our relationship over the years. It's always great to see you and to be with you. And again, we're very optimistic as we always have, coming out of this And again, thanks for the time and have a great MWC. >> You too, Casey Choi, Executive Vice President General Manager of the Global Mobile Business to Business Unit Commercial Unit at Samsung. This is theCube's coverage of Mobile World Congress. I'm John Furrier. Thanks for watching. Okay. We're back here. That was Casey Choi. Talk about wisdom, collective wisdom coming out of the pandemic. Great friend of theCube, great friend of the industry doing great work there. Casey Choi. Like we are doing here on the ground at Mobile World Congress in Cloud City, as well as Adam and the team in the studio. So back to you, Adam and team.

Published Date : Jul 6 2021

SUMMARY :

and GM of the Global Mobile B2B Team, Great as always to be with you and great So the industry is quickly moving to this. and certainly the capabilities and coming out of the pandemic, and some of the activity but it's never been like that in the past One of the things that we see and data privacy at the edge? that protects all of the in the industry since And the pace of that is going and the theme in your and our relationship over the years. great friend of the industry

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

IBMORGANIZATION

0.99+

TelcoORGANIZATION

0.99+

SamsungORGANIZATION

0.99+

Casey ChoiPERSON

0.99+

John FurrierPERSON

0.99+

AdamPERSON

0.99+

CaseyPERSON

0.99+

2019DATE

0.99+

thousandsQUANTITY

0.99+

last yearDATE

0.99+

30 yearsQUANTITY

0.99+

BarcelonaLOCATION

0.99+

10th yearQUANTITY

0.99+

Cloud CityLOCATION

0.99+

todayDATE

0.99+

Cloud CityLOCATION

0.99+

Red HatORGANIZATION

0.99+

2021DATE

0.99+

TelecoORGANIZATION

0.99+

Mobile World CongressEVENT

0.99+

OneQUANTITY

0.99+

20 plus monthsQUANTITY

0.99+

Telco CloudORGANIZATION

0.99+

third componentQUANTITY

0.98+

Telco EdgeORGANIZATION

0.98+

two dimensionsQUANTITY

0.98+

KC ChoiPERSON

0.98+

bothQUANTITY

0.98+

oneQUANTITY

0.98+

20 something months agoDATE

0.97+

about 3 billion devicesQUANTITY

0.97+

Global Mobile B2B TeamORGANIZATION

0.97+

CubeORGANIZATION

0.96+

billionsQUANTITY

0.96+

pandemicEVENT

0.96+

Danielle RoystonPERSON

0.96+

WCLOCATION

0.95+

TelcomORGANIZATION

0.95+

millions of devicesQUANTITY

0.94+

NECORGANIZATION

0.93+

Executive Vice PresidentPERSON

0.92+

about 10 years agoDATE

0.92+

last year and a halfDATE

0.91+

billions of discrete sensorsQUANTITY

0.88+

4.0QUANTITY

0.88+

last 10 yearsDATE

0.88+

Knox Security SuiteTITLE

0.87+

Global Mobile Business toORGANIZATION

0.84+

coupleQUANTITY

0.8+

Knox VaultORGANIZATION

0.8+

KnoxTITLE

0.8+

Compute Session 03


 

>>Hello and welcome to this session on experiencing secure agile hybrid cloud for your absent data. My name is Andrew labor. I'm a worldwide business unit product manager, Hc I Solutions with HP and I'm joined by my teammate Jeff Corcoran, who was go to market program Solutions or HP as well. And with that let's just dive right into it. Well, everybody has absent data. They're all over the place. They're both live on your phones, your computers and the cloud and servers are everywhere, absent data are all over the place. Well, what can we really do about that from moving forward modernization of that? Well, we have expectations for personalized, instant and engaging experiences that are the benchmark of your experience, more speed and agility or more paramount than ever. You see a world where apps and data like I mentioned our live and all over the place and that data explosion is happening at the edge where 75 of data is now created in moving us from a data center too many locations and many centers of that data. We have a digital transformation that has reached only a fraction of that. And we have modern cloud experiences for speed and agility and we want to really push that into an on premise reality where data has gravity security formats and compliance that you require. You really want that data transformation that somehow remains elusive for most outside of the public cloud. We want that true private premised on premise cloud infrastructure that translates to your hybrid cloud where you already have your apps and data live in the public cloud. And so as I mentioned, 70 of the public of the apps are outside in the public cloud and we really want that to be able to be brought into the local as well. And the on premise give you more flexibility, more agility and only H P E brings the cloud experience absent data everywhere. We define that right mix for you to move your data to the local and with that we have an approach that's any cloud anywhere and we have the expertise to help you define that right mix of cloud for your enterprise. We also create modern casual platforms for innovation where we bring your non native traditional apps that are slowing you down. We bring that into a modern enabled cloud experience together with cloud data of apps to achieve that speed and agility that I mentioned, being able to create a consistent strategy for you and your infrastructure. We also consume everything as a service everywhere. We bring the modern cloud experience to you and your apps and data self service ease being able to scale up or down depending on usage and flexibility. And we also have to pay for use and all managed for you with HP. Green Lake services the market leading infrastructure as a service platform for well over a decade. We also unify that hybrid cloud estate being able to move operations to a cloud native Cloud ops process manage for you with one unified management platform. Hp Green Lake Central. This helps you manage and unify your applications across cloud native and non cloud native workloads, drive insights and control for operational excellence and we do that by defining the right mix of cloud for you with HPD Point Next services, we're able to assess applications to determine the right mix for your business objectives. Hp Point Next services, we have cloud in technology experts on hand and ready to task for you to assess your existing IT infrastructure strategy, identify trapped capital that you might not even notice is there as well as help you assess your people and teams to identify critical gaps in your cloud journey. Finally, HP Point next services capital experts can determine the right mix of cloud strategy for you. Help you move and migrate your data into that optimized for every workload. And we do that by creating modern agile platform for innovation and we achieve the speed and agility you want report folio of software defined rack optimized HP keep Reliant and H. P. S. Energy infrastructure. Using that compose Herbal cloud compose double infrastructure platform that we support through our intellectual property and through leading partner Cloud solutions and who is that? That's BM wear with cloud foundation. I am a cloud foundation is the perfect blend for HP synergy and HP. Reliant to create that universal hybrid cloud platform, both modern and traditional applications. The Cloud foundation is characterized by many tenants such as develop Already Infrastructure, which creates that automated full stack experience. To help you get ready to do your development through a PS and infrastructure. Universal platforms, a single platform virtual machines and containers as well as application focused management. To simplify your management, being able to have multiple application resources and foundation for that hybrid cloud that I described being able to extend that same software stack to the public cloud. You connect to your flavor of choice for public cloud consume. And together with HB solutions and BMR Cloud Foundation, we create that perfect platform for a consistent hybrid cloud experience from the mid market to the large enterprise customers. We are transforming that traditional I. T. To a virtualized data center. Our goal is to help you move quickly and be agile to digitally transform software defined data center supporting that hybrid infrastructure. Hp envy m where have been working together for years and we are providing a simple experience for hybrid cloud that you can create and deliver to show value instantly and continuously achieve faster innovation, consistent operation and reducing costs. And how do we do that together? Well with HB solutions from being more cloud foundation, we've revolutionized that data centre by building a single consistent hybrid cloud experience that you can see that delivers greater agility and simplicity with five times faster automation tools for building out your infrastructure in getting time to market quicker, invalidating that solution stack. Where we have end to end fully tested and validated solutions that reduce your complexity and allow you to consolidate your VMS and your containers into one environment. Seamlessly, we also integrate management. We have unique the upper management integration and automation through firmer lifecycle management. Vis a vis L C M on the VM ware side, simplify I. T and deliver more agility to your infrastructure as well as your software defined data center. And then we also have services with HB Point Next they accelerate that time to deployment using HP Green Lake and providing as a service experience that we bring that cloud to you. And we bring that with an enhanced ballistic 360° view of security that begins in the manufacturing supply chain of our servers and concludes with safeguarded end of life Decommissioning. We power that by the recently announced Gen 10 plus servers uhh peep Reliant NHP synergy and integrate that Silicon Root of Trust technology offering protection detection and recovery from attacks industry leading encryption and firmware protection. And finally all of that is brought together. Hp one view We take HP one view as the management solution which transforms all of the compute storage networking into one software defined infrastructure Through HP one View we offer a template driven approach for deploying provisioning, updating, integrating compute storage networking All together in one infrastructure. and HP one View uses those software templates single line of code. We can deploy and manage and compose all of your physical resources, require for that application or virtual host or container infrastructure. We deliver the flexibility to compose different tiers of storage as well as types of provisioning by HP One View through direct or attach fabric using cloud foundation and HPV Premera. And now I'd like to ask my coworker Jeff to dive into some customer experiences around the hybrid cloud Jeff. Take it away. >>Thanks. Andrew. I think a great way to follow up and talk about our solutions is to really look at how one of our customers is enabling this transformation. So Wedbush Security is one of the leading financial services firms in the US, providing private and institutional clients, securities brokerage wealth management, in investment banking services. The company is headquartered in los Angeles California and has about 100 offices across the United States to meet increasingly rigorous financial regulations for more resilient operations and mitigate the threat of earthquakes in the Los Angeles area and increase operational efficiencies. Wedbush was looking for transformation is looking for a change to what the way they are currently operating. And to do this, Wedbush partnered with lumen and HP to develop a new private, cloud based data center using bloomin Private cloud on VM ware Cloud foundation. This was located in lumens Dallas hosting center using HP Keep Reliant dl 33 60 jen tens to create a hyper converged, high performance infrastructure using integrated software defined networking and security. To date, Wedbush has migrated its entire production facility to this private cloud. The virtual machines support a range of business applications, including Refinitiv, Thompson, Reuters and if I ask financial systems, they're also hosting Web Bush's in house broker management tool and Microsoft, sequel server and Mongo DB. Now, how did this impact them? They were able to impact Their financial reporting by cutting that from five hours down to 58 minutes. At the same time, they are able to reduce the time that it takes to deploy these Infrastructure resources by 50%. So this allows them to deploy a modern IT infrastructure for performance, reliability and efficiency improvement. The net impact on their business Was that it reduces the analytic costs by 27%. It increases their business agility and it developed, allows them to develop new lines of business faster and increases their compliance for the new Finra financial regulations with HP Green Lake, the cloud that comes to you. Hp Green like brings that cloud experience, self serve paper use scale up and down and manage for you by HP and our partners to absent data everywhere, whether they're in the edges co locations or data centers, enabling you to free up capital most operational and financial flexibility and free up talent to accelerate what's next for you and your business with HP Green Lake customers get cloud services that our production ready, elastic for any scale With a simple experience delivered to customer locations and as little as 14 days. Now, let's take a look at how some of our customers are experiencing the benefit of HP Green Lake as the voice of Austrian business. The Austrian economic chamber delivers advocacy and support to over 500,000 companies and trade groups, thereby helping to foster the country's robust economic growth. However, a policy of fiscal prudence Led to a mandated 30 cost reduction and the chambers it service provider needed to cut costs without compromising service levels. So to do this, they turn to HP to pair a future proof compose herbal infrastructure with a consumption based support model and HP Green Lake. Now, both the internal and regional chambers offices are getting better performance and faster access to I. T. Services enabled them to focus more than ever on boosting critical Austrian economic forces in sectors. Hp is here to help you accelerate your transformation. We just talked about Green Lake. So this enables you to deploy any workload as a service and with HP Green Lake services, you can bring that cloud like speed, agility and as a service model to where your data, data and apps live today, it enables you to transform the way you do business with one experience in one operating model across your distributed clouds for apps and data at the edge in co locations and in data centers with HP Point Next services. They have conducted over 11,000. IT. projects in over 1.4 million customer interactions each and every year. HB Point Next services 15,000 plus experts and its vast ecosystem of solution partners and channel partners are uniquely able to help you at every stage of your digital transformation journey because we address some of the biggest areas of concern that can slow you down. We bring together technology and expertise to help you drive your business forward. Lastly, with HP financial services, flexibility and investment capacity are key considerations for business to drive digital transformation initiatives. In order to forge a path forward, you need access to flexible payment options that allow you to match your IT costs to usage, from helping release capital from existing infrastructures to deferring payments and providing pre owned technology to relieve capital strain. Hp financial services unlocks the value of your entire estate from edge to cloud to end user with multi vendor solutions consistently and sustainably around the world. H P E F s helps you create the financial capacity to transform your business, Y H P E. We have the experience to get you there Over 1000 successful cloud migrations. We have the expertise to help you at any stage to accelerate adoption of any cloud or financial model to help you deploy the like cloud experience for your apps and data. We're open to any cloud strategy with deep expertise across Azure AWS and google cloud. We have unbiased expertise and I p to accelerate your right mix of clouds for your enterprise and we can tie that all together with I. T. As a service from our market leading platform of HP Green Lake. After you viewed this session, we have a lot of resources that you can now use to help you continue your digital transformation and educate yourself. You'll find links here on the slide to a lot of different products and solution areas as well as social media interactions that we have to engage with you. Thank you for joining. We hope you find the sexual useful. Have a great day.

Published Date : Apr 9 2021

SUMMARY :

modern cloud experience to you and your apps and data self service ease We have the expertise to help you at any stage to accelerate adoption of any cloud

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff CorcoranPERSON

0.99+

AndrewPERSON

0.99+

HPORGANIZATION

0.99+

JeffPERSON

0.99+

USLOCATION

0.99+

50%QUANTITY

0.99+

lumenORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

70QUANTITY

0.99+

five hoursQUANTITY

0.99+

WedbushORGANIZATION

0.99+

14 daysQUANTITY

0.99+

27%QUANTITY

0.99+

United StatesLOCATION

0.99+

Los AngelesLOCATION

0.99+

58 minutesQUANTITY

0.99+

30 costQUANTITY

0.99+

HP Green LakeORGANIZATION

0.99+

los Angeles CaliforniaLOCATION

0.99+

Wedbush SecurityORGANIZATION

0.99+

Green LakeORGANIZATION

0.99+

over 500,000 companiesQUANTITY

0.99+

Hp GreenORGANIZATION

0.98+

bothQUANTITY

0.98+

HP Green LakeORGANIZATION

0.98+

75 of dataQUANTITY

0.98+

one experienceQUANTITY

0.98+

Hc I SolutionsORGANIZATION

0.98+

ReutersORGANIZATION

0.98+

BMR Cloud FoundationORGANIZATION

0.98+

about 100 officesQUANTITY

0.97+

oneQUANTITY

0.97+

Andrew laborPERSON

0.97+

Hp PointORGANIZATION

0.97+

one environmentQUANTITY

0.95+

15,000 plus expertsQUANTITY

0.95+

Over 1000 successful cloud migrationsQUANTITY

0.95+

HPD PointORGANIZATION

0.95+

over 1.4 million customerQUANTITY

0.95+

HP PointORGANIZATION

0.95+

Hp Green Lake CentralORGANIZATION

0.94+

FinraORGANIZATION

0.94+

AustrianOTHER

0.94+

eachQUANTITY

0.93+

singleQUANTITY

0.93+

five timesQUANTITY

0.92+

ReliantORGANIZATION

0.92+

H. P. S. EnergyORGANIZATION

0.91+

single platformQUANTITY

0.9+

one softwareQUANTITY

0.89+

360°QUANTITY

0.89+

ThompsonORGANIZATION

0.89+

HP keepORGANIZATION

0.88+

HBORGANIZATION

0.88+

todayDATE

0.88+

Green LakeCOMMERCIAL_ITEM

0.86+

NextCOMMERCIAL_ITEM

0.85+

NHPORGANIZATION

0.85+

AzureTITLE

0.82+

single lineQUANTITY

0.8+

I. T. ServicesORGANIZATION

0.79+

Gen 10QUANTITY

0.79+

Point NextCOMMERCIAL_ITEM

0.79+

over 11,000.QUANTITY

0.78+

LakeORGANIZATION

0.78+

Web BushORGANIZATION

0.76+

GreenCOMMERCIAL_ITEM

0.73+

Sanjay Uppal and Craig Connors, VMware | VMworld 2020


 

>>from around the globe. It's the Cube with digital coverage of VM World 2020 brought to you by VM Ware and its ecosystem partners. >>Welcome back. I'm stew Minuteman. And this is the Cube coverage of VM World 2020 our 11th year covering the show. And of course, networking has been a big growth story. Four vm where for a number years, going back to the Neisseria acquisition for over billion dollars. Really leveraging all of the virtual networking and SD wins been another hot topic. A couple years ago, it was the Velo Cloud acquisition. And now happy to welcome to the program two of the Velo Cloud business executives. First of all, we have Sanjay you Paul. He is the senior vice president and general manager of that mentioned division of VM Ware. Enjoining him is Craig Connors, whose the vice president and chief technology officer for that same division he was the chief architect of fellow Cloud Craig Sanjay. Thank you for joining us. >>Thank you. >>Thank you. >>Alright, So, Sanjay, first of all nice, you know, call outs and a lot of news that we're gonna get to dig into in the morning Keynote you know Pat Sanjay the team. Uh, you know, a couple of years ago, Pat talked about, you know, the next billion dollar businesses networking your team helping toe add to that. And, ah, a new term thrown out that we're gonna get to talk a little bit about. Our friends at Gartner termed it sassy. So I'll let you, you know, explain a little bit the news that this wonderful new four letter acronym that the Gartner spots that us. Um, why don't you start us there? >>Yeah. I couldn't be more excited to be here at VM World announcing this expansion of what's going on in Ste. Van. So I see Van was all about bringing branch office users to their applications and doing that in a really efficient manner, throwing out all those complex hardware appliances and simplifying everything with software, increasing the quality of experience for the user. But now what has happened is, you know they want security to be dealt off in the same way. Same simplicity and automation, same great user experience. And at the same time, you know, blocking all these attacks that are coming in from various places and covert has just driven that even more meaning that you need to get to networking and network security to be brought together in this simple and automated way while keeping the end user experience be great on while giving I t what they need, which is high security and good manageability. So this acronym sassy, secure access Service edge It really is the bringing together off net networking and network security both as a service. That service angle is really important. And the exciting part about what we're announcing at the at we'd be involved. Here is the expansion off the S, Stephen Pops and Gateways into becoming Sassy pops. And now customers can get a whole slew of services both networking and network security services from the anyway. So that's the announcement. >>Wonderful, Craig. You know, since since since you've helped with so much of the architecture here, I wanna kick out a little bit. When? When it comes to the security stuff that Sandy was talking about. I remember dealing back with land optimization solutions, trying to remember. Okay, wait. When can I compress? When can I encrypt? You know what do I lay on top of it? Um, SD when you know fits into this story, help us understand. What does you Novello Cloud do? What is it from the partner ecosystem? You know, So you know there's there's some good partners that you have helping us. Help us understand. You know what exactly we mean because security is such a broad term. >>Yeah, thanks. So there's four components in the sassy pop that we're bringing together. Obviously, VM Ware Ston is one of those Sanjay mentioned the changing workforce. We have off net users that aren't coming from behind Stu and Branch Mawr and Mawr today. So we also have secure access powered by our workspace. One solution that's bringing those remote users into the sassy pop and then two different security solutions. Secure Web gateway functionality. And that is the next generation secure Web gateway that includes things like DLP and remote browser isolation. And as you saw in the news today that's powered through ROM agreement with Menlo Security. And then we have next Gen firewall ing for securing corporate traffic. And that's powered by our own VM Ware NSX firewall, which has been recently augmented with our last line acquisition. So those are the four key components coming together within our sassy pop. And of course, we also have our continued partnership with the scaler for our our large joint via Mersey Scaler customer base to facilitate that security solution as well. >>Yeah. So, Sanjay, maybe it would make sense. As you said, you've got ah, portfolio now in this market, Uh, got v d I You've got edge walk us. Or if you could, some of the most important use cases for your business. >>Yeah. So you know the use case that has taken off in the last several years since the advent of SD. When is to get sites? So these would be branch offices and a branch office could be an agricultural field. It could be a plane. It could be an oil rig. You know, it could be any one of these. This is a branch office. So these sites how to get them connected to the applications that they need to get access to so telemedicine example. So how do you get doctors, diagnosticians and all that that are sitting in their clinics and hospitals? You get great access to the applications on the applications can be anywhere they don't have to be back in your data centers. You know, after data center consolidation happened, some of the apse you know, we're in the data centers. But then, after the cloud advent came, then the apse were everywhere there in the public cloud, both in I s as well as in SAS. And then now they're moving back towards the edge because of the advent of edge computing. So that's really the primary use case that s Stephen has been all about. And that's where you know, we have staked a claim to be the leader in that space. Now, with Covic, the use cases are expanding and obviously with work from home, you take the same telemedicine example. The doctors and diagnosticians who used to work from hospitals and clinics now have to get it done when they're working from the home. And, of course, this is a business critical app. And so what do you do? How do you get these folks who are at home to get the same quality of experience, the same security, the same manageability, but at the same time, you cannot disturb the other people who are working from home because that is an entire ecosystem. You serve the business user, but you also serve the needs off the home users keeping privacy in mind. So these two cases branch access and then remote access, which great talked about these are the primary use cases, and then they break down by vertical. So depending on whether it's health or it's federal or its manufacturing or its finance, then you have sub use cases underneath that. But this is how we from a from a V C n standpoint, you know, claimed to have 17,000 customers that have deployed our networking solutions. Ah, large fraction of those being our stu and solutions today. >>Yeah. Okay, Craig, one of those terms that gets thrown around a lot in the industry iss scale. I look at certain parts of the market, you know, say kubernetes kubernetes was about, you know, bringing together lots of sites. But now we're spending a lot of time talking about edge, which is a whole different scale. Same thing if you talk about devices and I o t can you speak to us a little bit about, you know, fundamentally, You know that branch architecture, I think, set you up well, but when I start thinking about EJ, it probably is. You know, uh, you know, larger number and some different challenges. So So maybe maybe some differences that happen to happen in the code to make that happen? >>Yeah, absolutely. I mean, I think you know, we've been fortunate in the success that we've had in RST ran deployments. More than 280,000 branches deployed with RST ran solution. So scale is something that's been near and dear to our heart from the beginning. How do you build a multi tenant service in the cloud? How do you build cloud scale? And we brought that aspect into all of these components through container ization, as you mentioned through horizontal scalability, bringing them into our own dedicated pops. Where we control the hardware we control the hyper visor, obviously built on top of the m r E. S s. I that allows us to deliver scale in a way that other competitors may not be able to achieve. >>Yeah, son Sanjay, it's been a couple of years since the acquisition by VM Ware. Give us a little bit of an update, if you would as to, you know, what I'm sure. Obviously, customer reach on adoption greatly increased by by the channel and go to market. But, you know, directionally And you know, any difference in use cases that that you've seen now being part of the M R. >>Yeah, absolutely. No. There's there's been an expansion in the use cases, which is why this fit was very good, meaning Vela Cloud being a part of VM way. So if you look at it, what the wider network does, where the place where you know ties, we tie it all together and tie walk together. If you look at the end User computing, which Greg was mentioning, the clients are digital workspace, workspace. One client. Well, those clients now will connect to our sassy pop. So that's one tie in that obviously we couldn't have and we were an independent company. The other side of it, when you go from the sassy pop into the data center, then we tie into NSX. Not just that the Cloud firewall, but in the data center itself so we can extend micro segmentation. So that's another kid use case that is becoming prevalent. Then the third aspect of this is really when you run inside telecom operators and VM Ware has a very robust business as it goes after telcos with the software stack and so running our gateways running our sassy pops at the telco environment, then gets us to integrate with what's going on with our telecom business unit. We also have what we're doing on our visibility and Tellem entry perspective. So we had acquired a company called Neons A, which were crafting into on edge network intelligence product that then fits into VM Ware's overall. For in the space we have, ah, product suite called We Realize Network Insight. And so that network inside, combined with what we're doing from from a business unit standpoint, gives customers an end to end view from from an individual client through the cloud, even up to an individual container. And so we call this client to cloud to container. All of this is possible because we're part of VM Ware. In the last piece of this is something that's gonna happen. We believe next year, which is edge computing when edge computing comes in. You know, I jokingly say to my team this acronym of Sassy, which is s a s e you gotta insert of sea in the middle. So it becomes s a CSE and out of that pronounced that says sacks E. So I know it sounds a little bit awkward, but that c stands for the compute. So as you put compute in the computer is going to run in the edge, the computer that's going to run in the pop and the sassy is gonna become, you know, sexy. And who better to give that to you than VM Ware? Because, you know, we have that management stack that controls compute for customers today. >>Well, definitely. I think you're you're you're drawing from the Elon Musk school of You know how to name acronyms in products Do so sometimes It's really interesting. Uh, Craig, talk us a little a little bit about that vision to get there, you know? What do we need to do as an industry? How's the product mature? Give us a little bit of that. That that roadmap forward, if you would >>Yeah, I think you know Sassy is really the convergence of five key things. One is this distributed pop architecture. Er So how do you deliver this? Compute and these services near to the customers premise. And that's something that companies like us have have had years of experience and building out. And then the four key components of sassy that we have, you know, zero trust access S t u N next generation firewall ing and secure Web Gateway. We're fortunate, as Sanjay said, to be part of the M where where we don't have to invent some of these components because we already have a works based one and we already have the NSX distributed firewall. And we already have the m r s d when and so ah, lot of companies you'll see are trying to to put all of these parts together. We already had them in house. We're putting them under one umbrella, the one place where we didn't have a technology within VM Ware. That's where we're leveraging these partnerships with memo and see scaler to get it done. >>Sanjay e think the telco use case that you talked about is really important One we've definitely seen, you know, really good adoption from from VM Ware working in those spaces. One place I I wanna understand, though, if you look at vcf and how that moves. Thio ws toe Azure, even toe Oracle's talked about in the keynote this morning. How does SD win fit into just that kind of traditional hybrid cloud deployment we've been talking about for the last couple of years? >>Yeah, that's a great question. So, you know, when you look at Ste Van, that name can notes software defined, but it doesn't. It's not specific to branch office access at all. And when you look at DCF, what VCF is doing is really modernizing your compute stack. And now you can run this modern compute stack of your own data centers. You can run it in the private cloud. You can run it on the public cloud as well, right? So you can put these tax on Amazon, azure, Google and and then run them. So what an STV in architecture allows you to do is not just get your branch and secure users to access the applications that are running on those computes tax. But you can also intermediate between them. So when customers come in and they say that they want simplified networking and security between two public cloud providers, this is the multi cloud use case, then getting that networking toe work in a seamless fashion with high security can be done by an S Stephen architectures. And our sassy pop is perfectly situated to do that. And all you would need to do is add virtual services at the sassy pop. An enterprise customer would come in and they say they want some peanuts here and some VP CS there they want to look at them in an automated fashion. They want to set it up, you know, with the point and click architectures and not have to do all this manual work, and we can get that done. So there's a there's a really good fit between Sassy s Stephen and where VCF is going to solve the multi cloud problem that people are having right now. >>Excellent. I really appreciate that. That that explanation last thing, I guess I'll ask is, you know, here at VM World, I'm sure you've got a lot of breakouts. You've probably got some good customers sharing some of their stories. So anonymous if it has to be. But we would love if you've got either views of some examples, uh, to help bring home that the value that your solutions are delivering. >>Great. When I start with one and then creek and fill in the other one, eso let me start off with the telemedicine example. So we have, you know, customer called M. D. Anderson Cancer Center. And these are the folks in in Texas, and they provide a really, really important service. And that service is, you know, providing patients who are critically ill to give them all the kinds of services, whether they come into the clinic or whether they're across a network connection. And they're radiologists and doctors air sitting at home. So I think it's very important use case and, you know, we started off by deploying in the hospitals and the clinics. But when Cove, it hit there to send a lot of these folks to work from home, and then when they work from home, it's really this device that goes in which you can see here. This is our Belo cloud edge. And this, um, has said in one of the my my favorite song says, There's nothing this box can't do. All right, so this box goes home into the, you know, doctors home, and then they are talking to their patient, getting telemedicine done because it solves the problem off performance. Um, you know that some of those folks have literally said that this thing was a God sent. That's not very often that networking people, you know, have been told that their products are like godsend. So I'll take that to the limit of grain of salt. But we are solving a very important problems increasing the performance were also this is a secure device, so it's not gonna be hacked into and then makes things much more manageable from a nightie standpoint. So this is one of those use cases, and there's plenty of them. But Craig has his favorites all turn it over to him. >>There's so many I could bore you. I think you know one really interesting. One is a new investment banking company that we have is a customer, and they used to go work in the office five days a week, and everything that they did was on their computer in the office and with this pivot to work from home post Kobe, did they think their future is a flexible work workforce where sometimes there in the office and sometimes they're remote. And when the remote there are deep peeing into their desktop, that is sting in their office and with their like to remote access VPN solution, they had to connect, Say, I'm a user sitting in Southern California. I'm connecting my VPN to Chicago to then come across the network back to Los Angeles to get to my desktop so that I can work from home. And now with Sassy, my secure access client from workspace one connects to the closest asi pop I get to my desktop in my office. Tremendously lower, Leighton see tremendously higher quality to experience for the users, whether they're, you know, at home, on the road anywhere they need to access that device. >>Craig Sanjay, thank you so much. Love the customer example. Sanjay. Good job bringing out the box. Uh, show people It's a software world. But the sassy hardware is still needed at times, too. Thanks for joining us. All >>right. Thank you, Stew. Thanks. Great. Cheers. All >>right. Stay with us for more coverage of VM World 2020. I'm still minimum. Thanks. As always for watching the cube

Published Date : Sep 29 2020

SUMMARY :

World 2020 brought to you by VM Ware and its ecosystem partners. First of all, we have Sanjay you Paul. that we're gonna get to dig into in the morning Keynote you know Pat Sanjay the team. And at the same time, you know, You know, So you know there's there's some good partners that you have helping us. And as you saw in the Or if you could, some of the most important use cases for your business. And that's where you know, we have staked a claim to be the leader in that space. I look at certain parts of the market, you know, say kubernetes kubernetes was about, I mean, I think you know, we've been fortunate in the success But, you know, directionally And you know, any difference in use Then the third aspect of this is really when you run inside telecom That that roadmap forward, if you would And then the four key components of sassy that we have, you know, we've definitely seen, you know, really good adoption from from VM Ware working in those spaces. So what an STV in architecture allows you to do is not just get your branch and I guess I'll ask is, you know, here at VM World, I'm sure you've got a lot of breakouts. And that service is, you know, providing patients who are critically ill the users, whether they're, you know, at home, on the road anywhere they need Craig Sanjay, thank you so much. All Stay with us for more coverage of VM World 2020.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
SanjayPERSON

0.99+

GartnerORGANIZATION

0.99+

CraigPERSON

0.99+

VM WareORGANIZATION

0.99+

ChicagoLOCATION

0.99+

AmazonORGANIZATION

0.99+

OracleORGANIZATION

0.99+

Southern CaliforniaLOCATION

0.99+

GregPERSON

0.99+

TexasLOCATION

0.99+

Los AngelesLOCATION

0.99+

StewPERSON

0.99+

GoogleORGANIZATION

0.99+

PatPERSON

0.99+

Craig ConnorsPERSON

0.99+

Neons AORGANIZATION

0.99+

next yearDATE

0.99+

Velo CloudORGANIZATION

0.99+

VM WorldORGANIZATION

0.99+

Menlo SecurityORGANIZATION

0.99+

More than 280,000 branchesQUANTITY

0.99+

Craig SanjayPERSON

0.99+

Sassy s StephenORGANIZATION

0.99+

One solutionQUANTITY

0.99+

two casesQUANTITY

0.99+

azureORGANIZATION

0.99+

17,000 customersQUANTITY

0.99+

M. D. Anderson Cancer CenterORGANIZATION

0.99+

Mersey ScalerORGANIZATION

0.99+

PaulPERSON

0.99+

NSXORGANIZATION

0.99+

todayDATE

0.99+

StephenPERSON

0.98+

WorldORGANIZATION

0.98+

11th yearQUANTITY

0.98+

bothQUANTITY

0.98+

third aspectQUANTITY

0.98+

SandyPERSON

0.98+

Pat SanjayPERSON

0.98+

NeisseriaORGANIZATION

0.98+

OneQUANTITY

0.98+

VMwareORGANIZATION

0.98+

oneQUANTITY

0.98+

VCFORGANIZATION

0.98+

One clientQUANTITY

0.97+

five keyQUANTITY

0.97+

over billion dollarsQUANTITY

0.97+

Sanjay UppalPERSON

0.97+

CloudORGANIZATION

0.96+

StuORGANIZATION

0.96+

telcoORGANIZATION

0.96+

VM WareTITLE

0.96+

FirstQUANTITY

0.96+

two different security solutionsQUANTITY

0.96+

five days a weekQUANTITY

0.95+

four letterQUANTITY

0.93+

Branch MawrORGANIZATION

0.91+

MawrORGANIZATION

0.91+

CovicORGANIZATION

0.91+

CubeORGANIZATION

0.91+

Novello CloudORGANIZATION

0.9+

this morningDATE

0.87+

billion dollarQUANTITY

0.87+

four componentsQUANTITY

0.85+

couple of years agoDATE

0.84+

one tieQUANTITY

0.83+

stew MinutemanPERSON

0.82+

BJ Jenkins, Barracuda Networks | Microsoft Ignite 2019


 

>>Live from Orlando, Florida. It's the cube covering Microsoft ignite brought to you by Cohesity. >>Good afternoon everyone and welcome back to the cubes live coverage of Microsoft ignite. We are wrapping up three days of wall to wall coverage. Back to back interviews. I'm your host Rebecca Knight, alongside my cohost Stu Miniman. We have saved the best for last. We have BJ Jenkins, president and CEO of Barracuda networks. Thank you so much for coming on the cube. Feel a lot of pressure on internet. It's going to be great. Why don't you start by Barracuda. I think of that heartsong tell our viewers a little bit about, about your business, what you do. >>Yeah. Um, Barracuda is a company focused in the security industry, primarily on email security and network and application security. Uh, we have over 220,000 customers, uh, since we were founded a little over 15 years ago. And um, you know, we have a passion for making our customers secure and safe and being able to run their business. And we're a great partner in Microsoft, so, uh, they really help us drive our business. >>Yeah. So, so much to catch up, PJ, since it's been many years since you've been on the program, you were new in the role, but let's start with that Microsoft relationship here. We've been spending all week talking through all of the various environments. Talk about a little bit about your joint customers, the relationship and what's happening there. >>Yeah. I joined Barracuda seven years ago. Yesterday was my anniversary. And um, when I came into Barracuda, it was primarily at the time focused on a kind of small and midsize businesses. And most of those businesses ran Microsoft exchange or ran some form of Microsoft applications. And really that was the start of our partnership, realizing how important Microsoft was and it's grown. We were the first, uh, security company to put our firewalls in Azure. And that was over five years ago. And I think being first with a partner like Microsoft who is really at that point trying to catch up with Amazon and you know, Satya was, we're starting to drive the business in that direction. Uh, it gave us a unique vantage point in the partnership and it's grown from there. We were, uh, the Azure partner the year in 2016, uh, across their business. Um, we do joint development with them. We do joint go to market activities. And when you look around and you see 30,000 customers here, it's a, it's a good, good place to focus for a company like ourselves. >>Yeah. Well the, the, the changes in Microsoft business has had a ripple effect in the ecosystem, not only the launch of Azure, but I mean a big push office three 65 you talk about there's gotta be a difference between I'm rolling out exchange servers and well, it's all in the cloud. We know that customers still need to think sick as strong about security when they go to SAS Deere. If your customers figured that out yet. >>Yeah. I think, um, the trends that played out on prom play out in the cloud, um, how am I gonna secure my applications? How am I going to secure my data, my network? Um, and then the individuals that are using that cause at the end of the day, the individuals tend to be the weakest link in the security chain. And, um, you know, Mike, what I like is Microsoft has done a really good job improving their security posture, the base level that they provide to their customers every single day improves. And our job is to innovate on top of that and make them even safer. And, um, Microsoft's position in the industry too has been one where they want to be a ecosystem. They want to partner with third parties to help their customers move from on prem into Azure. And they know they're not gonna be able to do it on their own. >>So they've upped their game. We've got to up our game and we do it jointly, which is the nice thing. I, I joke with people. When I was at EMC and I used to go to Redmond, I'd go with battle armor on because there was not gonna be a fun meeting, uh, who's going to be, how Microsoft was going to hurt our business. And now I go to Redmond and you're embraced as a partner. They want to understand what customers and partners are thinking. They jointly plan with you. It's a completely different tone and tenor, which has been nice for us. >>So it is a scary world out there. And as we know that the threat environment is changing, hackers are becoming more sophisticated. I wonder if you could just set the scene for our viewers and just talk about security challenges in general and then we'll get into the specifics of the new solutions that you've announced here. >>Yeah, it's, threats come from everywhere and I think it's hard to boil it down and make it simple at times. But one of the stories I tell, uh, investors and customers about how fast the world is changing, uh, when I came on board, CEO's are obviously targets for hackers and the types of phishing mails I would get at that point. Um, and they would be very obvious. I've gone by BJ my entire life. On the website it says William Jenkins. And so the phishing emails would come in and say, you know, today fog, no, Hey, can you wire money here, William? Right. And so there was just base level intelligence. Nowadays they use LinkedIn, they use fee, they create social graphs. They study your communication forms, they look, they know how you're organized and they target the people. It will have, I always signed my emails past comma, BJ, the best fishing males have that in there. >>They've discovered that they've incorporated that they, so the, just the level of intelligence, the sophistication of what hackers do today, uh, has exponentially changed. And, you know, we're fortunate you can, we have more computing power. We have more artificial intelligence that we can apply to stop them. But the game just keeps getting escalated. And it's a, it's why the security industry has been strong. It's why there's so many companies out there. We've got to keep getting better. Um, but it's, it's a scary world. It's, it's, you know, you can never, never rest and never think you're ahead. You always gotta keep attacking it. >>So BJ, you had a number of announcements. Barracuda did, not nearly as many as Microsoft did, but give us the highlights if you would. >>Yeah. Um, so a number number of things announced here. Uh, first we're part of, uh, Misa, the Microsoft intelligence security association. So we're proud, proud to be a part of that. At launch. Um, we announced, uh, the cloud application platform security platform and the big announcement for us around that was our launch of as a service, uh, that's run on Azure. And, uh, we've always had a strong application approach. We've got integrated, um, detection, DDoSs uh, the O OS top 20 are all in Kurt corporate into our platform. What we've done is really leveraged Microsoft scale to run a very easy, simple to deploy a web application security platform, uh, that takes advantage of Microsoft scale and resiliency and brings that to our customers. Uh, we did a study, you know, only 10% of the websites in the world today are protected. So 90% of the web sites and web applications in the world today run on protected. >>We think this is a great way to go out and, um, help protect more of those. And then finally, um, you know, we announced Microsoft announced their V land solution and we have done joint development with them. We'll continue to innovate here, but we announced obviously our solution that we'll run, uh, with Microsoft's B when we're the only ones who can provide a customer really with multiple lengths run on Microsoft backbone, they can really run their data center. Now the corporate data center out of Azure, uh, we give them traffic prioritization, fail over resiliency that customers need when they're making those types of decisions. So there was more than that, but that was a lot of good stuff for us. We're excited about it. >>What does the recent announcement that Microsoft has won the Jetta contract, does that have any impact on Barracuda's business? Is that, >>well, I think anytime Microsoft wins business, it's a good thing because we're partnering with them. That contract is so big and, uh, has a lot of different elements and, and certainly security is a part of it. So we think there's aspects where we can play. I did hear, I think, um, Oracle was suing and I think AWS, so this may have a lot of legs before it becomes real. But it, I, you know, I think it continues to show that customers want to utilize, um, the scale breadth and depth of solutions that the cloud companies are bringing. And, you know, we view that as opportunity because security is an important element to making that work for those customers. >>So PJ, one to put aside the Microsoft stuff for a second here, since last we talk barracudas gone private and the security industry feels like it just growing so fast. You know, every week we're getting approached by new startups, heavy investment and the like, give us a little bit about your position has a CIO and CEO in this space. Uh, and you know, the love, a little bit of a note. We know it happened a few years back now, but going private when so many companies have, >>yeah, they're, you know, obviously there's a lot of funded companies in the security market. You know, we were in, uh, we had been public for, for four years. Um, a company that's been around 15 years where we were a profitable security company to, we were unique. We weren't, uh, the high flyer growth, but we were growing, you know, kind of, uh, low double digits with profitability, but there were investments that needed to be made in the business. Uh, we were running our transaction system on code, the founder wrote. Um, so there were investments we really needed to make to go from, you know, the 400, 500 million Mark to 1 billion mark. And so going private with a partner like Thoma Bravo, um, who really understands this industry has allowed us to reset the strategy and focus on, uh, the highest growth areas for us, which are email and network and application security. >>Um, they've helped us, we've invested over 20 million in internal systems, um, modern systems, Salesforce, NetSuite, uh, that we think give us the foundational elements to scale to $1 billion. And, um, you know, they combine that with operational expertise that they bring in to help us get more customers to the 220,000. Uh, one of the other interesting things for us too is, um, well we have 220,000 customers. We have 50 of the fortune 100. We have 250 of the fortune 1000 and as the movement, as, as customers have move to cloud, our solutions have become more relevant for customers of scale. And so they've given us the backing really to make that transition into that. So I liked not having to go on public conference calls every quarter. That's been a really nice thing. Um, but they've been a great partner for us. So we've, I think what you can think of us as we focused on areas that we think are the highest priority to our customers. >>Yeah, PJ, it also, we talked about there's so many startups in this space out there. The profile security keeps getting raised. Pat Gelsinger, VMware, you know, pounding the table saying that security needs to do over the, he just purchased black Boston based company that was public. You know, I talked to my friends that had been deep in the security industry and they scoff a little bit about, you know, we've been doing this for a long time. Barracuda is a company that has been around for quite a number of years. How's the industry doing? What do we need to do better? And how do you look at that landscape? >>Yeah, I, you know, I love pats energy and vigor, but there's no silver bullet that's gonna solve every problem out there. I do think, uh, where the industry is getting better is one on sharing information. You can see alliances, associations that have been formed. Um, you know, even with the cloud providers, we're actively sharing information and sharing of that information. We'll make more robust solutions first. Um, second you're seeing vendors go more towards platform where they're offering a larger, so the, the quality of solutions are getting better. And I do think there's consolidation happening where there, there are going to be certain segments of the market where you don't need 15 solutions. You really need, you know, one not from a particular player. So I think you'll see more, uh, consolidation occur around that. And you know, certainly that's been a trend we've been on in terms of integrating our solutions, making them easier to deploy and use for the customers. And then, you know, I think the last part of this is regulation is really a, it's still behind, but it's finally catching up and there's an interest in it. And I think in partnership with the industry, we can get our customers in a better position, a better security posture. So, you know, I, um, there will be consolidation over over time. Uh, you know, I've seen a map, I think there's 3000 security companies in all different segments that won't last forever. And, uh, it'll get easier for customers over time, is my belief. >>So with regulation, do you want to work in partnership with regulators? I mean, how do you, to help them understand the industry first of all and understand the dangers and the risks? I mean, how do you see the future of regulation for this industry? >>First of all, there's a large education process for legislators in general. You have to look no further than when Mark Zuckerberg got questioned by Congress. And the questions he were getting asked were not the best questions. Um, but you do have people who understand this industry and you can look at regulations like GDPR. You know, California's coming out data privacy law now and they're never perfect, but they're good foundational elements to start. And they're helping customers, um, get more aware of what they have to do to be secure and they're helping us explain to customers the things you can do to be in a better security posture. And so there's a continuum around this. We're in the early days, I, there's still a lot of education that has to go on, but when you see, >>start getting passed, it's a good step in the right direction. And by my estimation, BJ, we did save the best for last. Thank you so much for coming on the cube. That was terrific. Sorry it took so long. I'm Rebecca and I first two minutes and that wraps up three days of coverage at Microsoft ignite at the cube. Thank you so much for tuning in and we will see you next time.

Published Date : Nov 6 2019

SUMMARY :

Microsoft ignite brought to you by Cohesity. Thank you so much for coming on the cube. And um, you know, we have a passion for you were new in the role, but let's start with that Microsoft relationship here. like Microsoft who is really at that point trying to catch up with Amazon and you know, not only the launch of Azure, but I mean a big push office three 65 you talk about there's gotta And, um, you know, Mike, what I like is Microsoft And now I go to Redmond and you're embraced as a partner. I wonder if you could just set the scene for our viewers and just talk And so the phishing emails would come in and say, you know, today fog, And, you know, we're fortunate you can, So BJ, you had a number of announcements. Uh, we did a study, you know, only 10% of the websites in the world today are protected. And then finally, um, you know, we announced Microsoft announced their V land solution And, you know, we view that as opportunity Uh, and you know, the love, needed to make to go from, you know, the 400, 500 million Mark And, um, you know, in the security industry and they scoff a little bit about, you know, we've been doing this for a long time. And then, you know, I think the last part of this is regulation is really a, there's still a lot of education that has to go on, but when you see, Thank you so much for coming on the cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Rebecca KnightPERSON

0.99+

MicrosoftORGANIZATION

0.99+

BJ JenkinsPERSON

0.99+

AmazonORGANIZATION

0.99+

RebeccaPERSON

0.99+

Mark ZuckerbergPERSON

0.99+

AWSORGANIZATION

0.99+

2016DATE

0.99+

$1 billionQUANTITY

0.99+

50QUANTITY

0.99+

Pat GelsingerPERSON

0.99+

CongressORGANIZATION

0.99+

OracleORGANIZATION

0.99+

90%QUANTITY

0.99+

MikePERSON

0.99+

WilliamPERSON

0.99+

BJPERSON

0.99+

15 solutionsQUANTITY

0.99+

30,000 customersQUANTITY

0.99+

Orlando, FloridaLOCATION

0.99+

250QUANTITY

0.99+

firstQUANTITY

0.99+

Stu MinimanPERSON

0.99+

four yearsQUANTITY

0.99+

BarracudaORGANIZATION

0.99+

VMwareORGANIZATION

0.99+

over 220,000 customersQUANTITY

0.99+

10%QUANTITY

0.99+

three daysQUANTITY

0.99+

YesterdayDATE

0.99+

GDPRTITLE

0.99+

220,000 customersQUANTITY

0.99+

1 billionQUANTITY

0.99+

LinkedInORGANIZATION

0.98+

seven years agoDATE

0.98+

todayDATE

0.98+

Barracuda NetworksORGANIZATION

0.98+

William JenkinsPERSON

0.98+

RedmondLOCATION

0.98+

over 20 millionQUANTITY

0.98+

MisaORGANIZATION

0.97+

oneQUANTITY

0.97+

first two minutesQUANTITY

0.96+

SatyaPERSON

0.96+

220,000QUANTITY

0.96+

FirstQUANTITY

0.96+

BostonLOCATION

0.95+

around 15 yearsQUANTITY

0.94+

over 15 years agoDATE

0.94+

AzureTITLE

0.93+

BravoPERSON

0.93+

3000 security companiesQUANTITY

0.92+

JettaORGANIZATION

0.9+

Microsoft intelligenceORGANIZATION

0.9+

NetSuiteORGANIZATION

0.88+

PJPERSON

0.87+

over five years agoDATE

0.87+

EMCORGANIZATION

0.87+

20QUANTITY

0.86+

400, 500 million MarkQUANTITY

0.84+

William Toll, Acronis | Acronis Global Cyber Summit 2019


 

>>from Miami Beach, Florida It's the key. You covering a Cronus Global Cyber Summit 2019. Brought to you by a Cronus. >>Hello, everyone. Welcome to the Cube coverage here in Miami Beach Front and Blue Hotel with Cronus Global Cyber Summit 2019 2 days of coverage. Where here, Getting all the action. What's going on in cyber tools and platforms are developing a new model of cybersecurity. Cronus Leader, Fast growing, rapidly growing back in here in the United States and globally. We're here. William Toll, head of product marketing Cronus. Thanks for coming. I appreciate it. >>Thanks, John. I'm excited. You're >>here so way were briefed on kind of the news. But you guys had more news here. First great key notes on then special guest Shark tank on as well. That's a great, great event. But you had some news slip by me. You guys were holding it back. >>So we've opened our A p I, and that's enabling a whole ecosystem to build on top of our cyber protection solutions. >>You guys have a platform infrastructure platform and sweet asserts from backup all the way through protection. All that good stuff as well. Partners. That's not a channel action platforms are the MoD has been rapidly growing. That's 19 plus years. >>And now, with the opening of our AP, eyes were opening the possibility for even Maur innovation from third parties from Eyes V's from managed service providers from developers that want to build on our platform and deliver their solutions to our ecosystem. >>You guys were very technical company and very impressed with people. Actually, cyber, you gotta have the chops, you can't fake it. Cyber. You guys do a great job, have a track record, get the P I. C B Also sdk variety, different layers. So the FBI is gonna bring out more goodness for developers. You guys, I heard a rumor. Is it true that you guys were launching a developer network? >>That's right. So the Cronus developer network actually launches today here in the show, and we're inviting developed officials. That's official. Okay. And they can go to developers that Cronus dot com and when they go in there, they will find a whole platform where they can gain access to forums, documentation and logs, and all of our software development kids as well as a sandbox, so developers can get access to the platform. Start developing within minutes. >>So what's the attraction for Iess fees and developers? I mean, you guys are here again. Technical. What is your pitch developers? Why would they be attracted to your AP eyes? And developer Resource is >>sure it's simple. Our ecosystem way have over 50,000 I t channel partners and they're active in small businesses. Over 500,000 business customers and five million and customers all benefit from solutions that they bring to our cyber cloud solutions >>portal. What type of solutions are available in the platform today? >>So their solutions that integrate P s a tools professional service is automation are mm tools tools for managing cloud tools for managing SAS applications. For example, one of our partners manages office 3 65 accounts. And if you put yourselves in the shoes of a system administrator who's managing multiple SAS applications now, they can all be managed in the Cronus platform. Leverage our user experience. You I s t k and have a seamless experience for that administrator to manage everything to have the same group policies across all of this >>depression. That success with these channel a channel on Channel General, but I s freeze and managed service ROMs. Peace. What's the dynamic between Iess, freeze and peace? You unpack that? >>Sure. So a lot of m s peace depend on certain solutions. One of our partners is Connectwise Connectwise here they're exhibiting one sponsors at at this show and their leader in providing managed to lose management solutions for M s. He's to manage all of their customers, right? And then all the end points. >>So if I participate in the developer network, is that where I get my the FBI's someone get the access to these AP eyes? >>So you visits developer data cronies dot com. You come in, you gain access to all the AP eyes. Documentation way Have libraries that'll be supporting six languages, including C sharp Python, java. Come in, gain access to those documentation and start building. There's a sandbox where they could test their code. There's SD K's. There's examples that are pre built and documentation and guides on how to use those s >>So customer the end. You're in customers or your channel customers customer. Do they get the benefits of the highest stuff in there? So in other words, that was the developer network have a marketplace where speed push their their solutions in there. >>Also launching. Today we have the Cronus Cyber Cloud Solutions portal and inside there there's already 30 integrations that we worked over the years to build using that same set of AP eyes and SD case. >>Okay, so just get this hard news straight. Opening up the AP eyes. That's right. Cronus Developer Network launched today and Cloud Solutions Portal. >>That's right, Cyber Cloud Solutions Portal Inside there there's documentation on all the different solutions that are available today. >>What's been the feedback so far? Those >>It's been great. You know, if we think about all the solutions that we've already integrated, we have hundreds of manage service providers using just one solution that we've already integrated. >>William, we're talking before we came on camera about the old days in this business for a long time just a cube. We've been documenting the i t transformation with clouds in 10 years. I've been in this in 30 years. Ways have come and gone and we talked to see cells all the time now and number one constant pattern that emerges is they don't want another tour. They want a solid date looking for Jules. Don't get me wrong, the exact work fit. But they're looking for a cohesive platform, one that's horizontally scaled that enables them to either take advantage of a suite of service. Is boy a few? That's right. This is a trend. Do you agree with that? What you're saying? I totally agree >>with that, right? It makes it much easier to deal with provisioning, user management and billing, right? Think about a man of service provider and all of their customers. They need that one tool makes their lives so much easier. >>And, of course, on event would not be the same. We didn't have some sort of machine learning involved. How much his machine learning been focused for you guys and what's been some of the the innovations that come from from the machine. I mean, you guys have done >>artificial intelligence is critical today, right? It's, uh, how we're able to offer some really top rated ransomware protection anti malware protection. We could not do that without artificial intelligence. >>Final question for you. What's the top story shows week If you have to kind of boil it down high order bit for the folks that couldn't make it. Watching the show. What's the top story they should pay attention to? >>Top story is that Cronus is leading the effort in cyber protection. And it's a revolution, right? We're taking data protection with cyber security to create cyber protection. Bring that all together. Really? Democratize is a lot of enterprise. I t. And makes it accessible to a wider market. >>You know, we've always said on the Q. Go back and look at the tapes. It's a date. A problem that's right. Needed protection. Cyber protection. Working him, >>Cronus. Everything we do is about data. We protect data from loss. We protect data from theft and we protect data from manipulation. It's so critical >>how many customers you guys have you? I saw some stats out there. Founded in 2003 in Singapore. Second headquarters Whistle in 2000 a global company, 1400 employees of 32 offices. Nice nice origination story. They're not a Johnny come lately has been around for a while. What's the number? >>So five million? Any customers? 500,000 business customers. 50,000 channel partners. >>Congratulations. Thanks. Thanks for having us here in Miami Beach. Thanks. Not a bad venue. As I said on Twitter just a minute ago place. Thanks for Thanks. All right, John. Just a cube coverage here. Miami Beach at the front in Blue Hotel for the Cyber Global Cyber Security Summit here with Cronus on John Kerry back with more coverage after this short break.

Published Date : Oct 14 2019

SUMMARY :

Brought to you by a Cronus. Welcome to the Cube coverage here in Miami Beach Front and Blue Hotel with Cronus Global You're But you guys had more news here. to build on top of our cyber protection solutions. You guys have a platform infrastructure platform and sweet asserts from backup all the way through from developers that want to build on our platform and deliver their solutions to So the FBI is gonna bring out more So the Cronus developer network actually launches today here in the show, I mean, you guys are here again. and customers all benefit from solutions that they bring to What type of solutions are available in the platform today? experience for that administrator to manage everything to have the same group policies What's the dynamic between One of our partners is Connectwise Connectwise here they're exhibiting one So you visits developer data cronies dot com. So customer the end. Today we have the Cronus Cyber Cloud Solutions portal and inside there That's right. documentation on all the different solutions that are available today. You know, if we think about all the solutions that we've already integrated, We've been documenting the i t transformation with clouds in 10 years. It makes it much easier to deal with provisioning, user management that come from from the machine. We could not do that without artificial intelligence. What's the top story shows week If you have to kind of boil it down high order bit for the folks Top story is that Cronus is leading the effort in cyber protection. You know, we've always said on the Q. Go back and look at the tapes. and we protect data from manipulation. What's the number? So five million? Miami Beach at the front in Blue Hotel for the Cyber

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

William TollPERSON

0.99+

SingaporeLOCATION

0.99+

2003DATE

0.99+

Miami BeachLOCATION

0.99+

32 officesQUANTITY

0.99+

WilliamPERSON

0.99+

five millionQUANTITY

0.99+

2000DATE

0.99+

FBIORGANIZATION

0.99+

John KerryPERSON

0.99+

30 integrationsQUANTITY

0.99+

Miami Beach, FloridaLOCATION

0.99+

United StatesLOCATION

0.99+

CronusORGANIZATION

0.99+

OneQUANTITY

0.99+

1400 employeesQUANTITY

0.99+

Cyber Global Cyber Security SummitEVENT

0.99+

TodayDATE

0.99+

FirstQUANTITY

0.99+

oneQUANTITY

0.99+

over 50,000QUANTITY

0.99+

Cronus Developer NetworkORGANIZATION

0.99+

2 daysQUANTITY

0.99+

30 yearsQUANTITY

0.99+

javaTITLE

0.99+

JulesPERSON

0.99+

hundredsQUANTITY

0.99+

six languagesQUANTITY

0.99+

AcronisORGANIZATION

0.99+

10 yearsQUANTITY

0.98+

todayDATE

0.98+

one solutionQUANTITY

0.98+

Cronus Global Cyber Summit 2019EVENT

0.98+

Cloud Solutions PortalTITLE

0.98+

19 plus yearsQUANTITY

0.98+

Cronus Global Cyber Summit 2019EVENT

0.97+

JohnnyPERSON

0.97+

Over 500,000 business customersQUANTITY

0.96+

500,000 business customersQUANTITY

0.95+

one toolQUANTITY

0.95+

Blue HotelLOCATION

0.95+

Eyes VORGANIZATION

0.95+

one sponsorsQUANTITY

0.95+

50,000 channel partnersQUANTITY

0.92+

Acronis Global Cyber Summit 2019EVENT

0.9+

3 65 accountsQUANTITY

0.9+

Connectwise ConnectwiseORGANIZATION

0.9+

Cloud Solutions PortalTITLE

0.89+

C sharp PythonTITLE

0.88+

a minute agoDATE

0.88+

Second headquartersQUANTITY

0.87+

Cronus dot comORGANIZATION

0.85+

CronusPERSON

0.83+

CubeORGANIZATION

0.82+

WhistleORGANIZATION

0.76+

Channel GeneralORGANIZATION

0.76+

TwitterORGANIZATION

0.74+

P I.TITLE

0.72+

Cyber Cloud SolutionsTITLE

0.69+

CronusTITLE

0.65+

CyberORGANIZATION

0.62+

tQUANTITY

0.52+

Shark tankORGANIZATION

0.44+

BlueORGANIZATION

0.44+

SASTITLE

0.43+

Kamal Shah, StackRox | Sumo Logic Illuminate 2019


 

>> Narrator: From Burlingame, California, it's the Cube, covering Sumo Logic Illuminate 2019. Brought to you by Sumo Logic. >> Hey welcome back everybody! Jeff Frick here with the Cube, we're at the Sumo Logic Illuminate conference, it's at the Hyatt San Francisco Airport. About 700, 800 people, full house in the keynote earlier today, all about operational process monitoring, all this crazy data is being kicked out of the Cloud and IoT and all these crazy next-gen applications. We're excited to have a very close friend of mine, CEO of a very hot company, Kamal Shah, the CEO of StackRox. Kamal, great to see you! >> Thank you, and great to be here, Jeff! >> Absolutely! So for folks that aren't familiar with StackRox, give us the overview. >> Sure, so in a nutshell, we do Kubernetes Security, and so as we've heard all day today, enterprises are deploying microservices, containers, Kubernetes, and we do security for your cloud data infrastructure. >> So how does security work for Kubernetes versus security for other things? >> Yeah, so the use cases for security, or the mission for the security team is the same, right? You got to harden your environment to prevent the bad guys from getting in. >> And, you have to make sure, despite your best efforts, if somebody does break in, then you catch them before they do any damage, right? But the how you do security has to evolve for the cloud data stack, right? It has to understand the containers are immutable affirm all infrastructure, you have to understand that it's not just about the container, but it's also about the orchestrator, and specifically Kubernetes, and it's also about making sure that you seamlessly integrate with dev ops processes, automation and workflow. So it requires a fundamentally different approach to security than traditional security tools. >> So you know, we talk a lot about the increasing attack area that's offered by IoT, right? And increasing attack area that's offered by all those API's and all these interconnected applications, but I've never heard anyone really talk about containers or orchestration as kind of a new attack surface. Did we just stop paying attention? Is that something you're seeing happen? >> Yeah it's something that is starting to emerge, and we've seen some high-profile breachers at a large next generation electric car company, and a large shopping site where misconfigurations led to security breaches in the Kubernetes' environment, and Kubernetes' ecosystem also did a Cube security audit, and so I think we're going to start to hear a lot more, because there's more and more applications are being deployed in production. It's creating a new attack area, and as the old saying goes, the predators go where there's food in the system. >> And so if you're not proactive about it, I think it's going to really hurt as you deploy containers in Kubernetes. >> Right, so we hear over and over and over again about breaches because people misconfigure stuff. That just seems to happen, whether it's a database or this, that, and the other. And I think we can pretty much safely assume everyone's going to get breached if they haven't got breached already, 'cause we hear about it all the time. How do you catch them fast, limit the damage and try not to have too much vulnerabilities? >> Exactly, so the use cases for what we do at Kubernetes are the same. Right? Its vulnerability management, it's configuration management, and we just did a study around the state of container in Kubernetes security and misconfigeration was the number one concern. Because the reality is that Kubernetes, there are a lot of knobs. And each knob has multiple options, so if you're not careful you can really misconfigure your environment and make it so much easier for attackers. >> Right, right. >> And it's precisely what happened at the two examples I sighted earlier. So a misconfigerations is important, runtime security is important, and also compliance. Let's not forget about compliance, right. You have to make sure that you meet your PCI, HIPAA, NIST, and CIS benchmark standards for this cloud native stock. >> So what we're seeing is that these are all becoming very, very important and as a result, it's increasing awareness as Kubernetes gets more prominent. >> Right, and then they are creating and tearing down hundreds, thousands, millions of these things at a nidicolous pace. >> I mean exactly. Kubernetes came out of Google, they open sourced it, and it's really what allows you to deploy, manage, containers at scale. Apparently, they manage hundreds of millions of container a day using Kubernetes, it's incredible. >> Jeff: Oh yeah, I saw a statistic that Google launches 4 billion containers per week. That was from a presentation, actually from a 451 analyst from like 2 years ago. So one can only imagine the scale. >> We are also seeing not quite 4 billion containers per week, but we are seeing thousands, and tens of thousands of containers at scale at companies everywhere. They are all deployed in production, and now they are waking up to security. The good news here is that they are waiting for breaches to happen before they solve the problem. There's still a lack of awareness, and what Sumo Logic has done today with the announcement around continued intelligence for Kubernetes just increases the awareness around, hey we have to solve observability, which is logs, metrics, and tracing, which is what Sumo does, and security for your cloud native infrastructures. >> Yeah, I mean the automation is so important, right? You can't do any of this stuff with this exponential growth of data, exponential growth of pushes, of new code releases. There's so many pieces in this, so automation is a huge piece of the puzzle. >> Automation is paramount and with this new infrastructure there aren't enough security people to solve this. So security has to become everybody's responsibility. And the only way we are going to solve this is to automate it. It also has to integrate with your DebOps processes and automation and work flows. If you don't, then the DebOps body is going to reject the security organ, right? So it has to be seamless in the way you deploy it. >> It's interesting you say that because we go to RSA, forty thousand people, more vendor than you can count, it bulges Moscone to the absolute edges. Everyone says over and over that security has to be baked in the entire process from beginning to end, it's not a bolt on and can never be successful as a bolt on. So it surprises me to hear you say that still a lot of people are kind of behind the curve. >> Well I mean if you think about I, even though they say that, right? In a traditional model of the application you go to spend 6 months building it and then you can go spend a couple of weeks or month hardening and putting security around it. But when you are launching applications every 6 hours, you can spend 6 days addressing security, so it has to be built in. And speaking of RSA, if you recall, last year the big talk at RSA was around AI, right. Everything was AI driven security. My prediction, my bold prediction for this RSA is it's going to be all around Kubernetes security. >> Yeah, well it's applied AI. Applied AI for Kubernetes. >> Exactly. >> And that's what you need. I always feel for the SISO just walking the floor at RSA going, "Where do I begin? I mean where do I spend my money, how do I prioritize?" It's kind of like an insurance problem. You can't insure to the nth degree. You got to have a budget, but how do you deploy your assets? It's got to be super, super confusing. >> It really is. I think what your seeing is that SISO's are relying on their DEV and IT ops teams, right? They are partnering with the VP of platform, the VP of infrastructure, the VP engineering, because when you think about this new world security is really, the ownership of security is now shifting from the information's security teams to DevOps teams. So security teams still drive policy, and they still want to make sure they do the trust and verify, but the implementation of the security is now being owned by DevOps teams. So its a big cultural shift that's going on in organizations today. SISO's have to realize that it's no longer just them, but they have to partner with their DevOps counterparts to effectively address security for this cloud native stock. >> Right, so tell us a little bit about the relationship with Sumo. How do the applications work together? What's the solution look like when the 2 solutions are brought together. >> So Sumo has been a great partner. We have several joint customers. The simplest way to think about this is that Sumo does observability for Kubernetes, so that's logs, metrics, and tracing, and we do security from Kubernetes. We are the yin to their yang. What we do is we have taken all the intelligence we get from security and we feed it into the Sumo dashboard. Sumo customers get a single pane of glass, not just for the observability data, but also for their security violations, weather its for vulnerability, weathers it's for configuration or if it's for runtime threats, right? You get it all in one single place. >> Right. So I just want to get your take on kind of this rise of the momentum behind Hybrid Cloud that we've seen recently. Big announcement at Google Cloud show, with Anthos. Big announcement between VMware and Amazon. It always kind of swings back and forth. It was all in to public cloud and now there's a little bit of a pullback in Hybrid, but that's terrific for you. The fact of the matter is workload should run where they should run, they don't really care it's what's appropriate. Horses for courses, right? >> Precisely so, we see the shift from public cloud to Multi-cloud, and then from Multi-cloud to Hybrid cloud. The underlying infrastructure that makes that a reality are containers and Kubernetes, right? And that's why we've seen this tremendous momentum on Kubernetes. What we are seeing is customers that want to give their Dev teams that flexibility to pick their favorite cloud, or to do it on premises, their private clouds. But they want to make it in a single security solution that gets integrated no matter where you run your infrastructure and that's integrated back to your Sumo dashboard. So you have visibility across all Dev teams, all your application infrastructure, regardless of where they are running. There is one security standard that gets implemented. That is really, that's the future. You don't want to be beholden to a one claw provider, you want flexibility, you want choice. Kubernetes allows you to do that. >> Well and the whole thing becomes more autotomized, right, with autonomic memory, autonomic compute, autonomic store, throw that on an IoT and Edges and now you're starting to distribute all those pieces all over the place, which is going to happen. >> Kamal: It is going to happen for sure. >> All right, looking forward I can't believe we're almost through 2019, it still shocks me everyday I look at the calendar, but what are some of your priorities looking forward? What are you guys working on? What do you see coming down the pipe? >> Yes, so you touches on a couple of these. So today, is a lot of talk around Kubernete. We are seeing Kubernetes also get deployed in IoT and edge devices, we are also seeing they are being used to manage serve-less infrastructure. So we are going to continue to evolve as Kubernetes evolves. The other big trend that we are seeing in the market today is around service mesh. People talk a lot about Istio and Linkerd and using service mesh as your policy framework to drive consistent policies across applications, so that's another area where we are innovating very rapidly and that will become, I think, more and more real in enterprise deployments over 2020. >> Well, congratulations Kamal to you and the team. I think you picked a good horse to ride on, I should say ship, right, with Kubernetes. Thanks for taking a few minutes. >> No, thank you for having me. I can officially say now that I've checked off one of my professional bucket-list items, which is to be on the Cube with an old friend. So thank you for having me. >> Check that box man. All right, he's Kamal, I'm Jeff, you're watching the Cube. Were at Sumo Logic Illuminate from the Hyatt San Francisco Airport. Thanks for watching, see you next time.

Published Date : Sep 11 2019

SUMMARY :

Brought to you by Sumo Logic. it's at the Hyatt San Francisco Airport. So for folks that aren't familiar Kubernetes, and we do security for You got to harden your environment But the how you do security has to evolve So you know, we talk a lot about Yeah it's something that is starting to emerge, I think it's going to really hurt as you deploy How do you catch them fast, limit the damage Exactly, so the use cases for what we do You have to make sure that you meet your PCI, HIPAA, So what we're seeing is that these are all becoming Right, and then they are creating and tearing down they open sourced it, and it's really what allows you to So one can only imagine the scale. and what Sumo Logic has done today with the announcement so automation is a huge piece of the puzzle. So it has to be seamless in the way you deploy it. So it surprises me to hear you say that still a lot and then you can go spend a couple of weeks or month Applied AI for Kubernetes. You got to have a budget, but how do you deploy your assets? of infrastructure, the VP engineering, because when you the relationship with Sumo. We are the yin to their yang. The fact of the matter is workload should run where they Multi-cloud, and then from Multi-cloud to Hybrid cloud. Well and the whole thing becomes more autotomized, right, Yes, so you touches on a couple of these. Well, congratulations Kamal to you and the team. So thank you for having me. Thanks for watching, see you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

AmazonORGANIZATION

0.99+

6 daysQUANTITY

0.99+

2 solutionsQUANTITY

0.99+

Kamal ShahPERSON

0.99+

thousandsQUANTITY

0.99+

Jeff FrickPERSON

0.99+

6 monthsQUANTITY

0.99+

GoogleORGANIZATION

0.99+

2019DATE

0.99+

KamalPERSON

0.99+

StackRoxPERSON

0.99+

forty thousand peopleQUANTITY

0.99+

Sumo LogicORGANIZATION

0.99+

last yearDATE

0.99+

SumoORGANIZATION

0.99+

two examplesQUANTITY

0.99+

Burlingame, CaliforniaLOCATION

0.99+

IstioORGANIZATION

0.99+

SISOORGANIZATION

0.99+

LinkerdORGANIZATION

0.99+

StackRoxORGANIZATION

0.99+

VMwareORGANIZATION

0.99+

each knobQUANTITY

0.98+

2 years agoDATE

0.98+

About 700, 800 peopleQUANTITY

0.98+

todayDATE

0.97+

Sumo Logic IlluminateEVENT

0.97+

single security solutionQUANTITY

0.96+

Hyatt San Francisco AirportLOCATION

0.96+

one security standardQUANTITY

0.96+

oneQUANTITY

0.96+

451 analystQUANTITY

0.95+

KubernetesTITLE

0.94+

millionsQUANTITY

0.94+

4 billion containers per weekQUANTITY

0.94+

2020DATE

0.93+

hundreds of millions of container a dayQUANTITY

0.93+

tens of thousands of containersQUANTITY

0.93+

CloudTITLE

0.92+

KuberneteTITLE

0.91+

4 billion containers per weekQUANTITY

0.91+

single paneQUANTITY

0.9+

DebOpsORGANIZATION

0.87+

Kubernetes SecurityTITLE

0.85+

RSAORGANIZATION

0.85+

hundreds, thousandsQUANTITY

0.83+

Sumo Logic IlluminateORGANIZATION

0.82+

Kubernetes'TITLE

0.81+

KubernetesORGANIZATION

0.8+

IlluminateTITLE

0.79+

earlier todayDATE

0.76+

DevOpsORGANIZATION

0.76+

one claw providerQUANTITY

0.75+

6 hoursQUANTITY

0.75+

CubeORGANIZATION

0.73+

RSATITLE

0.73+

single placeQUANTITY

0.71+

Hybrid CloudTITLE

0.71+

nth degreeQUANTITY

0.71+

one concernQUANTITY

0.71+

Kent Christensen, Insight | Cisco Live US 2019


 

(upbeat music) >> Male Voiceover: Live, from San Diego, California it's theCUBE covering Cisco Live US 2019 brought to you by Cisco and its ecosystem partners. >> Hey welcome back to theCUBE Lisa Martin with Stu Miniman. We are day one of our coverage of Cisco Live from San Diego. We're going to be here for three days of coverage but a great day so far and we're pleased to welcome back one of our CUBE alumni Kent Christensen the Practice Director from Insight with the Cloud & Data Center at Transformation Group. Kent, welcome back! >> Thank you. It's been a little while. >> It has been a little while. So give our audience a little overview of Insight your partnership with Cisco and some of the history of how you got to Insight. >> Yeah so you remember us as Data Link we were a smaller company than we are now. Focusing on Cloud and data center transformation. We've talked at Dell events, CFC events things like that. But we were a Cisco partner for about 10 years and recently we were acquired and we did what the name sounds like, Cloud and data center transformation. We've talked about Cloud on the channel and all these other things. Insight acquired us. Insight has kind of four major service solution sets if you would. Some people look at them as a supply chain company and it's a great, large supply chain company. Microsoft's largest global partner. Some people understand it for the device and use the devices that's called Connective Workforce. Each of these are pretty big businesses you know, compared to where we are. What was Data Link is now what's called Cloud and Data Center Transformation. So we're helping people with the journey to the Cloud and the Hybrid Cloud and all that other stuff. And Cisco is right dead center in the middle of that and then the fourth one is really exciting. It's called Data and Digital Innovation and that's a couple of companies. Blue Metal, Cardinal etc. Again, a thousand people. Microsoft ILT and AI partner of the year. So all of that is a pretty large channel organization if you would. >> That's great stuff Kent. We love to talk to the channel as the folks in Wall Street do. It like you know, we do a channel check. Okay, You know, Cisco's got a few areas that have you know, stronger growth in the market over all. Security's doing well, a few other spaces on that are you know growing faster over all than the market and helping >> Kent: Absolutely >> grow where Cisco's going, so give us the reality. What's happening with your customers? What's driving you know the most growth in your business and you know, where is Cisco kind of leading the pack? >> So we're doing really well with Cisco and I don't know if it's because we're helping clients build solutions that truly lead to business outcomes. We're not order takers. So we're actually moving up we're now Cisco's fourth largest partner. We're growing well high single digits growth which is pretty phenomenal on such a big number. We're talking a billion dollars now in growing that level and there's a number of reasons. You know, some of it is there's a lot of great technology we can get into some of those. We see the economy as being pretty good not bad yet. You know everybody's worried about what might happen. You mentioned security, we can get into a little bit of that. That's driving a lot of network refresh and stuff like that. You know and a little bit of intra-company you know that word getting our stuff together so this large company with 15000 customers acquires a company with 2000 customers and now we're getting introduced into the 15000 with less friction. So that's helping us and that's helping our Cisco Business. >> Lisa: See here we are at Cisco Live. The thirtieth time that they had done a customer partner event. The network has not only changed dramatically since their first event in '89 which was called Networkers I believe. >> KENT: Yeah. >> But networking technology has also massively changed you mentioned security. And now in this multi-cloud world no longer can you just put a firewall around a data center right? Obviously that doesn't work. We have this core Cloud edge very amorphous environments. Proliferation of mobile, of mobile data traversing the networks. Talk to us about when you're talking with customers who need to transform their data centers where do you start from a networking conversation perspective? Where automation comes in, where security comes in? >> You know, a lot of the Cloud native transformation tends to be the edge of the network. You know conversion, infrastructure, stuff like that that's on the edge. The network security guys which I'm not, you know, I work with them very closely but we almost separate ourselves out from a data center networking and security. But security's end to end to your point, right? I've got software to find access. I've got mobile access points. I've got you know, Tetration. I've got all of these products that are helping people that in the past they were just patching holes in the dyke. You know, hey this happened let's put this software product in. This happened, let's put this in. We actually built a security practice like the last 3 or 4 years ago, it's growing. You know the number of people that are, whether it's regulation, compliance, you know. "I got some real problem. I think I've got a problem and I don't know what it is." Our ability to come back and sit down and say let's evaluate what your situation is. So I was talking to the networking guys and said wow. Enterprise networking's up, way up. What's driving that, the need to transform or is that, you know what is it? And they're like a lot of times it's something along security that's making them step back and re-evaluate and then sometimes that translates into an entire network refresh. >> Stu: So Kent you mentioned Cisco Tetration and that's one I've heard a number of times having some growth. What else, what are some of the you know hot products out there in your customer base? >> ISE, Software to Find, SD Wan, SD Access. >> Stu: Yeah, so one of the things I just want to understand Cisco actually has a few solutions in some of those areas. Any specific products that you call out or you know or that'd be mentioned? >> Kent: In the enterprise networking I wouldn't go through each and every individual one. I think, this is my view as the laymen right? 'Cause I'm the data center guy and here's the security guy and here's the networking guy. I think when Cisco started acquiring all these security companies 3 years ago and you know watched it and it looked like a patchwork quilt and said this stuff doesn't fit together? Now it fits together that story is really solid. And so we've got clients that had the luxury of either saying I'm going to do a refresh because I don't want to keep plugging holes and maybe my technology was ready for it anyway. And there's a lot of reasons to refresh right? My technology's due. Digital transformation, I need to get my network ready for IoT etc. But I keep hearing security over and over right? I've got compliance and regulations and all of this other stuff. >> Yeah but in your core space the data center world and any products that are kind of leading the charge right now? >> You know one of the things that's happening in data center from a Cisco perspective 'cause they're babies right? Ten years old in data center. They didn't really have data center before that. And we were there at the beginning and that's really how CDCT built our data center practice so you know when you talk multi-cloud at the end of the day even if I'm Cloud first I'm going to end up with some of these mission-critical workloads. They might be boring but they're running the company. They're not the innovative Dev-Ops, IoT, AI thing that seems cool. They're running the company and that's still a converged or a hyper-converged play. And some of those you know there's a lot of opportunities we've been talking about all day with the Cisco BU's. Some of those are ready for refresh right so there's a great opportunity to just to go in and say okay what's next? You know, we've added you know the latest server technology. We've added all these things in the server technology. Obviously all flash and the storage technologies and all of that so that's huge. And then you know Cisco continues to innovate in data center solutions with things like HyperFlex which we've talked a little bit about. And it started off a little slow because again just like they were in servers why are they here? Why are they in hyper-converge? So I get it. And now that product is fully improved and improved and improved and we're seeing tremendous growth there and I think the luxury they have on a data center solution is that some of the other guys have to do a or. "Hey, I'm the leading hyper-converge technology but it's me or everybody else." Right? And then Cisco's an end that I can connect those things together. >> So let's talk about some customer examples you can feel free to anonymize these. I'm seeing a smile on your face. When you come into an organization whether it's a 100 year old bank or it's a born of the Cloud or maybe a smaller more nimble organization that needs to undergo transformation data center transformation. What is the conversation like with respect to helping them take all of these disparate presumably disparate solutions? Whether they're 10-15 different security solutions. How does Insight come in and help them I don't want to say integrate but almost plug these things in together to extract value and help them make sure that what they're implementing from a technology perspective is necessary and also an accelerator of their business? >> Yeah, there's a lot there. So we have this... A year ago everybody wanted to talk about Cloud and then you had the security guys but now you have a lot of change agents with transformation in their title right? And so we have this belief. You're not going to digitally transform. Now there are people that are born digital but companies that were buying Cisco 10 years ago need to go through a digital transformation and you can't go through a digital transformation until you have a data center transformation or an IT transformation. So we've done studies. What slows people down? What makes these fail? Legacy stuff, security concerns I mean these are the top 3 things right. Budget. I was just running the company. And so we start there. Where do you want to get to? And then most of it is let's understand what you have. What your objectives are as an organization. "I want to get to this. I want to get to that." Well before we start talking about technologies. It's very, it's very services oriented. I can't just go in there and throw you a bomb and say this is going to fix your problem 'cause everybody's different. So it is very custom and very services oriented. >> Lisa: But you're saying... >> Stu: I was just going to say it's a pattern I've seen quite a bit for the last couple of years. Step 1 is modernize the platform and then step 2 you can worry about your data and application story on top of that in that multi-cloud world that you live in. >> And step 1 admit you have a problem. >> Yeah. >> (Lisa laughs) >> So we actually did a study you know we do this and we're like. Why does everybody keep stalling why have we been stuck in this nobody's refreshing things and stuff like that? Well there's a lot of new technology they don't get it. But you know do you want to digitally transform? Understand what you need to do. But we ask questions like rate your IT infrastructure just rate it B-minus. Across a lot of large companies that was the grade they gave themselves. So there's a lot of opportunity to say: Okay where do you want to be and where do we start? >> Yeah, 90 percent of people think they are above average drivers. So... >> Drivers? But they think they have a B-Minus in IT infrastructure and it's like Do you consider that a problem? >> Yeah. >> So once you as we wrap here in the next minute or so. Once you get them to admit yeah there's problems here that Insight and other partners come in and improve. Data center transformation, modernizing that infrastructure but it's got to be concurrent with starting to modernize and transform other areas right? >> Absolutely. So you know there's so many places you could start. Sometimes you just go and say well what's your appetite? Every once in a while you get somebody who's ready to go through an entire transformational process. You know 20 million dollars or more of whatever and we get those opportunities those are awesome. Now we get to start back and figure out where you want to be and how to get there most efficiently. A lot of people have to pick and choose. You know, what's your concern right now? And so we'll help them figure that out and again it could be security it could be you know how many people... We have over a thousand enterprise customers running Sequel 2008. That's a problem right? Because that's end of support within a year. That's a problem that's an opportunity. You know so they are still trying to figure out these things. And then a picture of where I want to get to. Which we've kind of always said and that's where that Digital Innovation Group they've got all these AI projects and as we sit here and talk about those things that are kind of born in the Cloud but they're coming towards the infrastructure. It was easy to get a GPU in the Cloud but I'm going to have to start... And so we have actually have all the latest Cisco technology and storage technology of AI stuff in our labs and stuff like that so there's a lot going on. Our CEO would say "It's a really exciting time to be in this business." >> It sounds like it! I wish we had more time to start digging through that but you'll have to come back Kent. >> Okay. >> Alright thanks for joining us. >> Yeah. Thank you. >> With Stu Miniman, I'm Lisa Martin. You're watching theCUBE live. Day 1 of our coverage of Cisco Live from San Diego. Thanks for watching.

Published Date : Jun 11 2019

SUMMARY :

brought to you by Cisco and its ecosystem partners. the Practice Director from Insight with It's been a little while. history of how you got to Insight. you know, compared to where we are. you know growing faster over all than the market and helping What's driving you know the most growth in your business you know that word getting our stuff together so Lisa: See here we are at Cisco Live. where do you start from a You know, a lot of the Cloud native transformation What else, what are some of the you know hot products Any specific products that you call out or you know security companies 3 years ago and you know watched it And some of those you know there's a lot of opportunities you can feel free to anonymize these. And then most of it is let's understand what you have. that you live in. So we actually did a study you know we do this Yeah, 90 percent of people think they are So once you as we wrap here in the next minute or so. So you know there's so many places you could start. I wish we had more time to start digging through that but Day 1 of our coverage of Cisco Live from San Diego.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

CiscoORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

Stu MinimanPERSON

0.99+

LisaPERSON

0.99+

Kent ChristensenPERSON

0.99+

Blue MetalORGANIZATION

0.99+

San DiegoLOCATION

0.99+

15000 customersQUANTITY

0.99+

KentPERSON

0.99+

three daysQUANTITY

0.99+

20 million dollarsQUANTITY

0.99+

90 percentQUANTITY

0.99+

San Diego, CaliforniaLOCATION

0.99+

CDCTORGANIZATION

0.99+

A year agoDATE

0.99+

2000 customersQUANTITY

0.99+

Wall StreetLOCATION

0.99+

EachQUANTITY

0.99+

StuPERSON

0.99+

about 10 yearsQUANTITY

0.99+

3 years agoDATE

0.99+

10 years agoDATE

0.98+

Data LinkORGANIZATION

0.98+

CardinalORGANIZATION

0.98+

thirtieth timeQUANTITY

0.98+

'89DATE

0.98+

InsightORGANIZATION

0.98+

Day 1QUANTITY

0.97+

first eventQUANTITY

0.97+

fourth largest partnerQUANTITY

0.96+

2008DATE

0.96+

4 years agoDATE

0.96+

CUBEORGANIZATION

0.96+

fourth oneQUANTITY

0.95+

100 year oldQUANTITY

0.95+

15000QUANTITY

0.92+

USLOCATION

0.92+

Cisco LiveTITLE

0.89+

over a thousand enterpriseQUANTITY

0.89+

a yearQUANTITY

0.89+

last couple of yearsDATE

0.87+

Digital Innovation GroupORGANIZATION

0.87+

Cisco LiveEVENT

0.87+

oneQUANTITY

0.87+

10-15 different security solutionsQUANTITY

0.85+

Ten years oldQUANTITY

0.85+

eachQUANTITY

0.82+

Cisco TetrationORGANIZATION

0.81+

KENTPERSON

0.79+

billion dollarsQUANTITY

0.78+

DataORGANIZATION

0.77+

LiveTITLE

0.75+

Cisco Live US 2019EVENT

0.73+

thousand peopleQUANTITY

0.73+

LiveEVENT

0.69+

coupleQUANTITY

0.69+

last 3DATE

0.69+

singleQUANTITY

0.69+

DellORGANIZATION

0.67+

step 1QUANTITY

0.66+

NEEDS L3 FIX - Kent Christensen, Insight | Cisco Live US 2019


 

>> Live from San Diego, California It's the queue covering Sisqo live US 2019 Tio by Cisco and its ecosystem, Barker's >> Hey, welcome back to the Cube. Lisa Martin with steam in a man's way are Day one of our coverage of Cisco lie from San Diego. We're gonna be here for three days of coverage, but a great day so far. And we're pleased to welcome back one of our Cube alumni, Kenny Christiansen, the practice director from Insight with the Cloud and Data Center transformation group. Kitt, welcome back. >> Thank you for a little while. >> It has been a little while. So give our audience a little overview of inside your partnership with Cisco and some of the history of how you got to Insite. >> Um, yeah, so you remember US. Data like way were smaller company than we are now. Focus on Cloud Davidson transformation. We've talked it della vincey and see events. Things like that way We're Cisco partner for about 10 years and recently we were acquired and we did with name sounds like cloud and Data Center transformation. We've talked about cloud in the channel and all these other things um inside acquired us Insight has kind of four major service solution sets, if you would. Some people look at them is a supply chain company, and it's a great large supply chain company, Microsoft Largest global partner. Some people understand it for the device in use devices that's called connected workforce. Each of these air pretty big businesses, you know, compared to what we are. What was Data link is now what's called Cloud David Senate transformation. Um, so we're helping people with the journey to the cloud and the hybrid cloud and all that other stuff. Francisco right, Dead center in the middle of that and then the 4th 1 is really excited to go diddle diddle innovation. And that's a couple of companies Blue Metal, Cardinal, etcetera again 1,000 people. Microsoft I'll Tee and aye, aye, partner of the year. So all of that is a pretty large channel organization. If you want. >> That's great stuff can. And we always. We love to talk to the channel as the folks on Wall Street to It's like you know we do. A channel check is okay. You know, Cisco's got a few areas that have, you know, stronger growth in the market overall, security's doing well. A few other spaces that are, you know, growing faster overall than the market helping grow where we're Cisco's going. So give us the reality. What's happening with your customers? What's driving, you know, since the most growth in your business. And you know where is where is Cisco kind of leading the pack? >> So we're doing really well a system, and I don't know if it's because we're helping clients build solutions that truly lied to business outcomes. We're not order takers, so we're actually moving up. We're now 54th largest partner. We're growing well, high single digits growth, which is pretty phenomenal and such a big number. We're talking $1,000,000,000 now and growing that level on DH. There's a number of reasons, you know, some of it is there's a lot of great technology and get into some of those way. See, the economy is being pretty good. Not bad. Yet you know everybody for it. Worried about what might happen. You mentioned security. We could get into a little bit of that. That's driving a lot of network refreshed and stuff like that. Um, you know, a little bit of Inter company, you know that we're getting our stuff together. So this large company with 15,000 customers, you know, acquires a company with 2,000 customers, and now we're getting introduced into the 15,000 with less friction. So that's helping us. And that's helping Francisco business. >> So here we are at Cisco Live, 30th time that they've done a customer partner. Event network has not only changed dramatically since their first event in 89 which was called networkers, I believe. But networking technology has also massively changed. You mentioned security, and now in this multi cloud world, no longer can you just put a firewall around Data Senate, right? Obviously, that the work we have, this core cloud edge very a Morpheus environments proliferation of mobile of mobile data traversing the network's talk to us about when you're talking with customers who need to transform their data centers. Where do you start from? A networking conversation perspective, where automation comes in where security comes in, >> you know, a lot of the cloud names. Their transformation says to me the edge of the network, you know, converts, infrastructure, stuff of that that's on the edge. The network security guys, which I'm not. You know, I work with them very closely, but there we almost separated, sells out from the data center. Networking security. But security's in the end to your point, right? I've got software to find access. I've got mobile access points I've got, you know, te Trae Shin. I've got you know, all of these products that are helping people that in the past they were just patching holes in the dyke, you know? Hey, this happened. Let's put this off for product. This happened. Let's put this in. We actually built a security practice like the last three or four years ago. It's growing. You know, the number of people that are, whether it's regulation compliance. You know, I got some real problem. I think I've got a problem and I don't know what it is. Our ability to come back and sit down and say, Let's evaluate what your situation is. So I was talking to the networking guys, so wow, enterprise network is up way up. What's driving that I need to transform or is that you know what isn't there like a lot of times it's something our long security that's making them step back and reevaluate. And then sometimes that draft transfer translates into entire network refresh. >> So you mess in Cisco te Trae Shin? That's one I've heard a number of times having some growth. What? What else? What are some of the, you know, hot products out there in your >> eyes based software to find FT. When hefty access. >> So one of the things I just don't understand Cisco actually has a few solutions and some of those areas any specific products that you call out or, uh, you know, the >> enterprising, that working I wouldn't go through each and every individual one. I think this is my view of the layman, right, Because I'm the data center guy and here's the security guy hears them working. Got I think Francisco started acquiring all these security companies three years ago and you watched it. It looked like a patchwork quilt and said, This doesn't fit together now. It fits together. That story is really solid. And so we've got clients that have had the luxury of either salmon. I'm going to do a refresh because I don't want to keep plugging hole, and maybe my technology was ready for it anyway because there's a lot of reasons to refresh right. My technology do digital transformation. I need to get my network ready for Io ti etcetera. But I keep hearing security over and over, right. I've got compliance and regulation and all of this other stuff. >> But in your core space, the data center world, you know, and any products that are kind of leading the leading the charge right now, >> you know, one of the things that's happening in data center from a Cisco perspective because their babies, right, 10 years old in data centers, they didn't really have data center before that we were there at the beginning. And that's really how CDC t built our David Senate practice. So you know, when you talk multi cloud at the end of the day, even if I'm cloud first, I'm going to end up with some of these mission critical work clothes. They might be boring the running the company right there, not the innovative Deva Coyote. I think that seems cool running the company, and that's still a converged or a hyper converse play. And some of those you know, there's a lot of opportunities. We've been talking about all day with the Sisko be used. You know, some of those are ready for refresh, right? So there's a great opportunity that's going and say, OK, what's next? You know, we've added, you know, the latest server technology. We've had all these things in the server technology, obviously all flashing the storage technologies in all of that. So that's you. And then, you know, Cisco continues to innovate in data center solutions with things like Hyper flex, which were, you know, talked a little bit about getting started off a little slow, because again, just like they weren't servers. Why are they here? Why are they in hyper converts like get it? And now that product has slowly improved and improved and improved, and we're seeing tremendous growth there. And I think luxury they have on a data center solution is that some of the other guys have to do. Ah or hey, I'm the leading hyper converts technology. But it's me or everybody else, right? Um, and then this goes in and write that I could connect those things together. >> So let's talk about some customer examples you can feel free to anonymous days. I'm seeing a smile on your face when you come into an organization, whether it's 100 year old bank or it's a one of the cloud orders, maybe a smaller, more nimble organization that needs to undergo transformation did isn't a transformation. What was the conversation like with respect to helping them take all of these disparate, presumably to sprint solutions, whether they're 10 15 different security solutions, how does insight come in and help them? I want to say integrate, but almost plug these things in together to extract value and help them make sure that what they're implementing, much technology perspective is necessary and also an accelerator of their business. >> Yeah, lose a lot there. So we have this, you know. So a year ago, everybody wanted to talk about Cloud, and then they had the security guys. But now you have a lot of change. Agents of transformation, their title right? And so we have this belief you're not going to digitally transform Now. There are people that are born digital, but companies that were buying Cisco 10 years ago need to go through a digital transformation, and you can't go through a digital transformation and tell you have a data center transformation, wherein I transformation. So we've done studies. What slows people down? What makes he failed legacy stuff? Security concerns. I mean, these are the top three things, right? Budget. I was just running the pretty and so we start there that says, Where do you want to get to? And then most of it is Let's understand what you have, what? Your objectives, ours, an organization. I want to get to this. I want to get to that Well, before we start talking about technologies and it's very it's very services or even write. I can't just go in there and throw your bomb and say, This is going to fix your problem because everybody's different. So it is very custom and very services, or >> you're saying >> I was just going to say It's a pattern I've seen quite a bit for the last couple of years is step one is modernized the platform and then step two. You can worry about your data and application story on top of that in that multi cloud world. >> Step one, admit you have a problem. Yeah. So we actually did a study? Yeah. You know, we do this All right? Well, why does everybody keep stalling? Why we've been stuck in this. Nobody's refreshing things and stuff like that. Well, there's a lot of new technology. They don't get it. But, you know, do you want a digitally transform? Understand what you need to do, but we ask questions like rate your infrastructure just raided B minus across a lot of large companies. That was what the grade they gave themselves. So there's a lot of opportunities. Say, Okay, where do you wanna be? Yeah, and where do we >> start? 90% of people think they are above average drivers, so >> drivers, but they think they have a B minus in infrastructure and is like to consider that a problem. >> So once you as we wrap here in the next minute or so, once you get them to admit, yeah, there's there's problems here that incite other partners come and come in and improve data center transformation, modernizing that infrastructure, but it's got to be concurrent, was starting to modernize and transform other areas, right? >> Absolutely so you know, there's so many places you could start. Sometimes you just go and say, Well, what's your appetite Every once in a while, you get somebody who's ready to go through an entire transformational process, you know, $20,000,000 arm or whatever, and we get those opportunities. Those are awesome. Now we get to start back and figure out where you want to be and how to get there most efficiently. A lot of people have to pick up juice. You know? What's your concern right now on DH? So we'll help them figure that out again. It could be security. It could be. You know how many people we have over 1,000 enterprise customers around X equal two thousand eight? That's a problem, right? Because that's in the support within a year, right? That's a problem. That's, you know, opportunity. So they are still trying to figure out these things and then, ah, picture on where I want to get to what you kind of always said. And that's where that digital innovation group they've got all these Aye aye projects. And as we sit here and talk about those things that kind of born in the cloud, but they're common part of the infrastructure. It was easy to give the GPO in the cloud, but I'm going to have to start. So we actually have all the latest Cisco technology and storage technology of A I stuff in our labs and stuff like that. So there's a lot going on is our CEO said would say, It's a really exciting time to be in this business. >> It sounds like it. I wish we had more time to start digging through there, but you'll have to come back. Okay. All right. Thanks for joining us. >> Thank you >> for student a man. I'm Lisa Martin. You're watching the Cube live day one of our coverage of Sisqo live from San Diego. Thanks for watching.

Published Date : Jun 11 2019

SUMMARY :

the practice director from Insight with the Cloud and Data Center transformation group. Cisco and some of the history of how you got to Insite. Each of these air pretty big businesses, you know, compared to what we are. you know, since the most growth in your business. So this large company with 15,000 customers, you know, You mentioned security, and now in this multi cloud world, no longer can you just put a firewall What's driving that I need to transform or is that you know what isn't there like a What are some of the, you know, hot products out there in your eyes based software to find FT. three years ago and you watched it. And some of those you know, there's a lot of opportunities. So let's talk about some customer examples you can feel free to anonymous days. to go through a digital transformation, and you can't go through a digital transformation and tell you have a data center I was just going to say It's a pattern I've seen quite a bit for the last couple of years is step one is modernized the platform But, you know, do you want a digitally transform? drivers, but they think they have a B minus in infrastructure and is like to consider Absolutely so you know, there's so many places you could start. I wish we had more time to start digging through there, but you'll have to come back. I'm Lisa Martin.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

Kenny ChristiansenPERSON

0.99+

CiscoORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

$20,000,000QUANTITY

0.99+

Blue MetalORGANIZATION

0.99+

90%QUANTITY

0.99+

San DiegoLOCATION

0.99+

$1,000,000,000QUANTITY

0.99+

Kent ChristensenPERSON

0.99+

CDCORGANIZATION

0.99+

San Diego, CaliforniaLOCATION

0.99+

CardinalORGANIZATION

0.99+

2,000 customersQUANTITY

0.99+

15,000 customersQUANTITY

0.99+

KittPERSON

0.99+

three daysQUANTITY

0.99+

1,000 peopleQUANTITY

0.99+

10 years agoDATE

0.99+

Data SenateORGANIZATION

0.99+

a year agoDATE

0.98+

about 10 yearsQUANTITY

0.98+

USLOCATION

0.98+

three years agoDATE

0.98+

30th timeQUANTITY

0.98+

15,000QUANTITY

0.97+

EachQUANTITY

0.97+

Trae ShinPERSON

0.97+

Wall StreetLOCATION

0.96+

four years agoDATE

0.95+

first eventQUANTITY

0.95+

10 15 different security solutionsQUANTITY

0.95+

step twoQUANTITY

0.94+

CubeORGANIZATION

0.94+

over 1,000 enterprise customersQUANTITY

0.93+

FranciscoPERSON

0.93+

Cloud David SenateORGANIZATION

0.93+

Step oneQUANTITY

0.92+

SisqoTITLE

0.91+

oneQUANTITY

0.91+

54th largest partnerQUANTITY

0.91+

Cloud DavidsonORGANIZATION

0.91+

step oneQUANTITY

0.91+

100 year oldQUANTITY

0.9+

2019DATE

0.9+

two thousand eightQUANTITY

0.89+

firstQUANTITY

0.88+

SenateORGANIZATION

0.86+

three thingsQUANTITY

0.86+

4th 1QUANTITY

0.85+

10 years oldQUANTITY

0.84+

FranciscoLOCATION

0.84+

last couple of yearsDATE

0.84+

SiskoORGANIZATION

0.83+

BarkerORGANIZATION

0.81+

89DATE

0.81+

a yearQUANTITY

0.81+

Cisco LiveEVENT

0.79+

CubeTITLE

0.77+

InsightORGANIZATION

0.76+

Hyper flexORGANIZATION

0.73+

Day oneQUANTITY

0.7+

coupleQUANTITY

0.7+

day oneQUANTITY

0.69+

aroundQUANTITY

0.68+

eachQUANTITY

0.68+

CenterORGANIZATION

0.64+

last threeDATE

0.64+

Deva CoyoteORGANIZATION

0.63+

DavidPERSON

0.59+

MorpheusPERSON

0.48+

LiveEVENT

0.45+

TeePERSON

0.45+

L3PERSON

0.4+

Trae ShinORGANIZATION

0.39+

Day One Afternoon Keynote | Red Hat Summit 2018


 

[Music] [Music] [Music] [Music] ladies and gentlemen please welcome Red Hat senior vice president of engineering Matt Hicks [Music] welcome back I hope you're enjoying your first day of summit you know for us it is a lot of work throughout the year to get ready to get here but I love the energy walking into someone on that first opening day now this morning we kick off with Paul's keynote and you saw this morning just how evolved every aspect of open hybrid cloud has become based on an open source innovation model that opens source the power and potential of open source so we really brought me to Red Hat but at the end of the day the real value comes when were able to make customers like yourself successful with open source and as much passion and pride as we put into the open source community that requires more than just Red Hat given the complexity of your various businesses the solution set you're building that requires an entire technology ecosystem from system integrators that can provide the skills your domain expertise to software vendors that are going to provide the capabilities for your solutions even to the public cloud providers whether it's on the hosting side or consuming their services you need an entire technological ecosystem to be able to support you and your goals and that is exactly what we are gonna talk about this afternoon the technology ecosystem we work with that's ready to help you on your journey now you know this year's summit we talked about earlier it is about ideas worth exploring and we want to make sure you have all of the expertise you need to make those ideas a reality so with that let's talk about our first partner we have him today and that first partner is IBM when I talk about IBM I have a little bit of a nostalgia and that's because 16 years ago I was at IBM it was during my tenure at IBM where I deployed my first copy of Red Hat Enterprise Linux for a customer it's actually where I did my first professional Linux development as well you and that work on Linux it really was the spark that I had that showed me the potential that open source could have for enterprise customers now iBM has always been a steadfast supporter of Linux and a great Red Hat partner in fact this year we are celebrating 20 years of partnership with IBM but even after 20 years two decades I think we're working on some of the most innovative work that we ever have before so please give a warm welcome to Arvind Krishna from IBM to talk with us about what we are working on Arvind [Applause] hey my pleasure to be here thank you so two decades huh that's uh you know I think anything in this industry to going for two decades is special what would you say that that link is made right Hatton IBM so successful look I got to begin by first seeing something that I've been waiting to say for years it's a long strange trip it's been and for the San Francisco folks they'll get they'll get the connection you know what I was just thinking you said 16 it is strange because I probably met RedHat 20 years ago and so that's a little bit longer than you but that was out in Raleigh it was a much smaller company and when I think about the connection I think look IBM's had a long long investment and a long being a long fan of open source and when I think of Linux Linux really lights up our hardware and I think of the power box that you were showing this morning as well as the mainframe as well as all other hardware Linux really brings that to life and I think that's been at the root of our relationship yeah absolutely now I alluded to a little bit earlier we're working on some new stuff and this time it's a little bit higher in the software stack and we have before so what do you what would you say spearheaded that right so we think of software many people know about some people don't realize a lot of the words are called critical systems you know like reservation systems ATM systems retail banking a lot of the systems run on IBM software and when I say IBM software names such as WebSphere and MQ and db2 all sort of come to mind as being some of that software stack and really when I combine that with some of what you were talking about this morning along hybrid and I think this thing called containers you guys know a little about combining the two we think is going to make magic yeah and I certainly know containers and I think for myself seeing the rise of containers from just the introduction of the technology to customers consuming at mission-critical capacities it's been probably one of the fastest technology cycles I've ever seen before look we completely agree with that when you think back to what Paul talks about this morning on hybrid and we think about it we are made of firm commitment to containers all of our software will run on containers and all of our software runs Rell and you put those two together and this belief on hybrid and containers giving you their hybrid motion so that you can pick where you want to run all the software is really I think what has brought us together now even more than before yeah and the best part I think I've liked we haven't just done the product in downstream alignment we've been so tied in our technology approach we've been aligned all the way to the upstream communities absolutely look participating upstream participating in these projects really bringing all the innovation to bear you know when I hear all of you talk about you can't just be in a single company you got to tap into the world of innovation and everybody should contribute we firmly believe that instead of helping to do that is kind of why we're here yeah absolutely now the best part we're not just going to tell you about what we're doing together we're actually going to show you so how every once you tell the audience a little bit more about what we're doing I will go get the demo team ready in the back so you good okay so look we're doing a lot here together we're taking our software and we are begging to put it on top of Red Hat and openshift and really that's what I'm here to talk about for a few minutes and then we go to show it to you live and the demo guard should be with us so it'll hopefully go go well so when we look at extending our partnership it's really based on three fundamental principles and those principles are the following one it's a hybrid world every enterprise wants the ability to span across public private and their own premise world and we got to go there number two containers are strategic to both of us enterprise needs the agility you need a way to easily port things from place to place to place and containers is more than just wrapping something up containers give you all of the security the automation the deploy ability and we really firmly believe that and innovation is the path forward I mean you got to bring all the innovation to bear whether it's around security whether it's around all of the things we heard this morning around going across multiple infrastructures right the public or private and those are three firm beliefs that both of us have together so then explicitly what I'll be doing here number one all the IBM middleware is going to be certified on top of openshift and rel and through cloud private from IBM so that's number one all the middleware is going to run in rental containers on OpenShift on rail with all the cloud private automation and deployability in there number two we are going to make it so that this is the complete stack when you think about from hardware to hypervisor to os/2 the container platform to all of the middleware it's going to be certified up and down all the way so that you can get comfort that this is certified against all the cyber security attacks that come your way three because we do the certification that means a complete stack can be deployed wherever OpenShift runs so that way you give the complete flexibility and you no longer have to worry about that the development lifecycle is extended all the way from inception to production and the management plane then gives you all of the delivery and operation support needed to lower that cost and lastly professional services through the IBM garages as well as the Red Hat innovation labs and I think that this combination is really speaks to the power of both companies coming together and both of us working together to give all of you that flexibility and deployment capabilities across one can't can't help it one architecture chart and that's the only architecture chart I promise you so if you look at it right from the bottom this speaks to what I'm talking about you begin at the bottom and you have a choice of infrastructure the IBM cloud as well as other infrastructure as a service virtual machines as well as IBM power and IBM mainframe as is the infrastructure choices underneath so you choose what what is best suited for the workload well with the container service with the open shift platform managing all of that environment as well as giving the orchestration that kubernetes gives you up to the platform services from IBM cloud private so it contains the catalog of all middle we're both IBM's as well as open-source it contains all the deployment capability to go deploy that and it contains all the operational management so things like come back up if things go down worry about auto scaling all those features that you want come to you from there and that is why that combination is so so powerful but rather than just hear me talk about it I'm also going to now bring up a couple of people to talk about it and what all are they going to show you they're going to show you how you can deploy an application on this environment so you can think of that as either a cloud native application but you can also think about it as how do you modernize an application using micro services but you don't want to just keep your application always within its walls you also many times want to access different cloud services from this and how do you do that and I'm not going to tell you which ones they're going to come and tell you and how do you tackle the complexity of both hybrid data data that crosses both from the private world to the public world and as well as target the extra workloads that you want so that's kind of the sense of what you're going to see through through the demonstrations but with that I'm going to invite Chris and Michael to come up I'm not going to tell you which one's from IBM which runs from Red Hat hopefully you'll be able to make the right guess so with that Chris and Michael [Music] so so thank you Arvind hopefully people can guess which ones from Red Hat based on the shoes I you know it's some really exciting stuff that we just heard there what I believe that I'm I'm most excited about when I look out upon the audience and the opportunity for customers is with this announcement there are quite literally millions of applications now that can be modernized and made available on any cloud anywhere with the combination of IBM cloud private and OpenShift and I'm most thrilled to have mr. Michael elder a distinguished engineer from IBM here with us today and you know Michael would you maybe describe for the folks what we're actually going to go over today absolutely so when you think about how do I carry forward existing applications how do I build new applications as well you're creating micro services that always need a mixture of data and messaging and caching so this example application shows java-based micro services running on WebSphere Liberty each of which are then leveraging things like IBM MQ for messaging IBM db2 for data operational decision manager all of which is fully containerized and running on top of the Red Hat open chip container platform and in fact we're even gonna enhance stock trader to help it understand how you feel but okay hang on so I'm a little slow to the draw sometimes you said we're gonna have an application tell me how I feel exactly exactly you think about your enterprise apps you want to improve customer service understanding how your clients feel can't help you do that okay well this I'd like to see that in action all right let's do it okay so the first thing we'll do is we'll actually take a look at the catalog and here in the IBM cloud private catalog this is all of the content that's available to deploy now into this hybrid solution so we see workloads for IBM will see workloads for other open source packages etc each of these are packaged up as helm charts that are deploying a set of images that will be certified for Red Hat Linux and in this case we're going to go through and start with a simple example with a node out well click a few actions here we'll give it a name now do you have your console up over there I certainly do all right perfect so we'll deploy this into the new old namespace and will deploy notate okay alright anything happening of course it's come right up and so you know what what I really like about this is regardless of if I'm used to using IBM clout private or if I'm used to working with open shift yeah the experience is well with the tool of whatever I'm you know used to dealing with on a daily basis but I mean you know I got to tell you we we deployed node ourselves all the time what about and what about when was the last time you deployed MQ on open shift you never I maybe never all right let's fix that so MQ obviously is a critical component for messaging for lots of highly transactional systems here we'll deploy this as a container on the platform now I'm going to deploy this one again into new worlds I'm gonna disable persistence and for my application I'm going to need a queue manager so I'm going to have it automatically setup my queue manager as well now this will deploy a couple of things what do you see I see IBM in cube all right so there's your stateful set running MQ and of course there's a couple of other components that get stood up as needed here including things like credentials and secrets and the service etc but all of this is they're out of the box ok so impressive right but that's the what I think you know what I'm really looking at is maybe how a well is this running you know what else does this partnership bring when I look at IBM cloud private windows inches well so that's a key reason about why it's not just about IBM middleware running on open shift but also IBM cloud private because ultimately you need that common management plane when you deploy a container the next thing you have to worry about is how do I get its logs how do I manage its help how do I manage license consumption how do I have a common security plan right so cloud private is that enveloping wrapper around IBM middleware to provide those capabilities in a common way and so here we'll switch over to our dashboard this is our Griffin and Prometheus stack that's deployed also now on cloud private running on OpenShift and we're looking at a different namespace we're looking at the stock trader namespace we'll go back to this app here momentarily and we can see all the different pieces what if you switch over to the stock trader workspace on open shipped yeah I think we might be able to do that here hey there it is alright and so what you're gonna see here all the different pieces of this op right there's d b2 over here I see the portfolio Java microservice running on Webster Liberty I see my Redis cash I see MQ all of these are the components we saw in the architecture picture a minute ago ya know so this is really great I mean so maybe let's take a look at the actual application I see we have a fine stock trader app here now we mentioned understanding how I feel exactly you know well I feel good that this is you know a brand new stock trader app versus the one from ten years ago that don't feel like we used forever so the key thing is this app is actually all of those micro services in addition to things like business rules etc to help understand the loyalty program so one of the things we could do here is actually enhance it with a a AI service from Watson this is tone analyzer it helps me understand how that user actually feels and will be able to go through and submit some feedback to understand that user ok well let's see if we can take a look at that so I tried to click on youth clearly you're not very happy right now here I'll do one quick thing over here go for it we'll clear a cache for our sample lab so look you guys don't actually know as Michael and I just wrote this no js' front end backstage while Arvin was actually talking with Matt and we deployed it real-time using continuous integration and continuous delivery that we have available with openshift well the great thing is it's a live demo right so we're gonna do it all live all the time all right so you mentioned it'll tell me how I'm feeling right so if we look at so right there it looks like they're pretty angry probably because our cache hadn't been cleared before we started the demo maybe well that would make me angry but I should be happy because I mean I have a lot of money well it's it's more than I get today for sure so but you know again I don't want to remain angry so does Watson actually understand southern I know it speaks like eighty different languages but well you know I'm from South Carolina to understand South Carolina southern but I don't know about your North Carolina southern alright well let's give it a go here y'all done a real real know no profanity now this is live I've done a real real nice job on this here fancy demo all right hey all right likes me now all right cool and the key thing is just a quick note right it's showing you've got a free trade so we can integrate those business rules and then decide to I do put one trade if you're angry give me more it's all bringing it together into one platform all running on open show yeah and I can see the possibilities right of we've not only deployed services but getting that feedback from our customers to understand well how well the services are being used and are people really happy with what they have hey listen Michael this was amazing I read you joining us today I hope you guys enjoyed this demo as well so all of you know who this next company is as I look out through the crowd based on what I can actually see with the sun shining down on me right now I can see their influence everywhere you know Sports is in our everyday lives and these guys are equally innovative in that space as they are with hybrid cloud computing and they use that to help maintain and spread their message throughout the world of course I'm talking about Nike I think you'll enjoy this next video about Nike and their brand and then we're going to hear directly from my twitting about what they're doing with Red Hat technology new developments in the top story of the day the world has stopped turning on its axis top scientists are currently racing to come up with a solution everybody going this way [Music] the wrong way [Music] please welcome Nike vice president of infrastructure engineering Mike witig [Music] hi everybody over the last five years at Nike we have transformed our technology landscape to allow us to connect more directly to our consumers through our retail stores through Nike comm and our mobile apps the first step in doing that was redesigning our global network to allow us to have direct connectivity into both Asia and AWS in Europe in Asia and in the Americas having that proximity to those cloud providers allows us to make decisions about application workload placement based on our strategy instead of having design around latency concerns now some of those workloads are very elastic things like our sneakers app for example that needs to burst out during certain hours of the week there's certain moments of the year when we have our high heat product launches and for those type of workloads we write that code ourselves and we use native cloud services but being hybrid has allowed us to not have to write everything that would go into that app but rather just the parts that are in that application consumer facing experience and there are other back-end systems certain core functionalities like order management warehouse management finance ERP and those are workloads that are third-party applications that we host on relevent over the last 18 months we have started to deploy certain elements of those core applications into both Azure and AWS hosted on rel and at first we were pretty cautious that we started with development environments and what we realized after those first successful deployments is that are the impact of those cloud migrations on our operating model was very small and that's because the tools that we use for monitoring for security for performance tuning didn't change even though we moved those core applications into Azure in AWS because of rel under the covers and getting to the point where we have that flexibility is a real enabler as an infrastructure team that allows us to just be in the yes business and really doesn't matter where we want to deploy different workload if either cloud provider or on-prem anywhere on the planet it allows us to move much more quickly and stay much more directed to our consumers and so having rel at the core of our strategy is a huge enabler for that flexibility and allowing us to operate in this hybrid model thanks very much [Applause] what a great example it's really nice to hear an IQ story of using sort of relish that foundation to enable their hybrid clout enable their infrastructure and there's a lot that's the story we spent over ten years making that possible for rel to be that foundation and we've learned a lot in that but let's circle back for a minute to the software vendors and what kicked off the day today with IBM IBM s one of the largest software portfolios on the planet but we learned through our journey on rel that you need thousands of vendors to be able to sport you across all of your different industries solve any challenge that you might have and you need those vendors aligned with your technology direction this is doubly important when the technology direction is changing like with containers we saw that two years ago bread had introduced our container certification program now this program was focused on allowing you to identify vendors that had those shared technology goals but identification by itself wasn't enough in this fast-paced world so last year we introduced trusted content we introduced our container health index publicly grading red hats images that form the foundation for those vendor images and that was great because those of you that are familiar with containers know that you're taking software from vendors you're combining that with software from companies like Red Hat and you are putting those into a single container and for you to run those in a mission-critical capacity you have to know that we can both stand by and support those deployments but even trusted content wasn't enough so this year I'm excited that we are extending once again to introduce trusted operations now last week we announced that cube con kubernetes conference the kubernetes operator SDK the goal of the kubernetes operators is to allow any software provider on kubernetes to encode how that software should run this is a critical part of a container ecosystem not just being able to find the vendors that you want to work with not just knowing that you can trust what's inside the container but knowing that you can efficiently run that software now the exciting part is because this is so closely aligned with the upstream technology that today we already have four partners that have functioning operators specifically Couchbase dynaTrace crunchy and black dot so right out of the gate you have security monitoring data store options available to you these partners are really leading the charge in terms of what it means to run their software on OpenShift but behind these four we have many more in fact this morning we announced over 60 partners that are committed to building operators they're taking their domain expertise and the software that they wrote that they know and extending that into how you are going to run that on containers in environments like OpenShift this really brings the power of being able to find the vendors being able to trust what's inside and know that you can run their software as efficiently as anyone else on the planet but instead of just telling you about this we actually want to show you this in action so why don't we bring back up the demo team to give you a little tour of what's possible with it guys thanks Matt so Matt talked about the concept of operators and when when I think about operators and what they do it's taking OpenShift based services and making them even smarter giving you insight into how they do things for example have we had an operator for the nodejs service that I was running earlier it would have detected the problem and fixed itself but when we look at it what really operators do when I look at it from an ecosystem perspective is for ISVs it's going to be a catalyst that's going to allow them to make their services as manageable and it's flexible and as you know maintainable as any public cloud service no matter where OpenShift is running and to help demonstrate this I've got my buddy Rob here Rob are we ready on the demo front we're ready awesome now I notice this screen looks really familiar to me but you know I think we want to give folks here a dev preview of a couple of things well we want to show you is the first substantial integration of the core OS tectonic technology with OpenShift and then the other thing is we are going to dive in a little bit more into operators and their usefulness so Rob yeah so what we're looking at here is the service catalog that you know and love and openshift and we've got a few new things in here we've actually integrated operators into the Service Catalog and I'm going to take this filter and give you a look at some of them that we have today so you can see we've got a list of operators exposed and this is the same way that your developers are already used to integrating with products they're right in your catalog and so now these are actually smarter services but how can we maybe look at that I mentioned that there's maybe a new view I'm used to seeing this as a developer but I hear we've got some really cool stuff if I'm the administrator of the console yeah so we've got a whole new side of the console for cluster administrators to get a look at under the infrastructure versus this dev focused view that we're looking at today today so let's go take a look at it so the first thing you see here is we've got a really rich set of monitoring and health status so we can see that we've got some alerts firing our control plane is up and we can even do capacity planning anything that you need to do to maintenance your cluster okay so it's it's not only for the the services in the cluster and doing things that you know I may be normally as a human operator would have to do but this this console view also gives me insight into the infrastructure itself right like maybe the nodes and maybe handling the security context is that true yes so these are new capabilities that we're bringing to open shift is the ability to do node management things like drain and unscheduled nodes to do day-to-day maintenance and then as well as having security constraints and things like role bindings for example and the exciting thing about this is this is a view that you've never been able to see before it's cross-cutting across namespaces so here we've got a number of admin bindings and we can see that they're connected to a number of namespaces and these would represent our engineering teams all the groups that are using the cluster and we've never had this view before this is a perfect way to audit your security you know it actually is is pretty exciting I mean I've been fortunate enough to be on the up and shift team since day one and I know that operations view is is something that we've you know strived for and so it's really exciting to see that we can offer that now but you know really this was a we want to get into what operators do and what they can do for us and so maybe you show us what the operator console looks like yeah so let's jump on over and see all the operators that we have installed on the cluster you can see that these mirror what we saw on the Service Catalog earlier now what we care about though is this Couchbase operator and we're gonna jump into the demo namespace as I said you can share a number of different teams on a cluster so it's gonna jump into this namespace okay cool so now what we want to show you guys when we think about operators you know we're gonna have a scenario here where there's going to be multiple replicas of a Couchbase service running in the cluster and then we're going to have a stateful set and what's interesting is those two things are not enough if I'm really trying to run this as a true service where it's highly available in persistent there's things that you know as a DBA that I'm normally going to have to do if there's some sort of node failure and so what we want to demonstrate to you is where operators combined with the power that was already within OpenShift are now coming together to keep this you know particular database service highly available and something that we can continue using so Rob what have you got there yeah so as you can see we've got our couch based demo cluster running here and we can see that it's up and running we've got three members we've got an off secret this is what's controlling access to a UI that we're gonna look at in a second but what really shows the power of the operator is looking at this view of the resources that it's managing you can see that we've got a service that's doing load balancing into the cluster and then like you said we've got our pods that are actually running the software itself okay so that's cool so maybe for everyone's benefit so we can show that this is happening live could we bring up the the Couchbase console please and keep up the openshift console both sides so what we see there we go so what we see on the on the right hand side is obviously the same console Rob was working in on the left-hand side as you can see by the the actual names of the pods that are there the the couch based services that are available and so Rob maybe um let's let's kill something that's always fun to do on stage yeah this is the power of the operator it's going to recover it so let's browse on over here and kill node number two so we're gonna forcefully kill this and kick off the recovery and I see right away that because of the integration that we have with operators the Couchbase console immediately picked up that something has changed in the environment now why is that important normally a human being would have to get that alert right and so with operators now we've taken that capability and we've realized that there has been a new event within the environment this is not something that you know kubernetes or open shipped by itself would be able to understand now I'm presuming we're gonna end up doing something else it's not just seeing that it failed and sure enough there we go remember when you have a stateful application rebalancing that data and making it available is just as important as ensuring that the disk is attached so I mean Rob thank you so much for you know driving this for us today and being here I mean you know not only Couchbase but as was mentioned by matt we also have you know crunchy dynaTrace and black duck I would encourage you all to go visit their booths out on the floor today and understand what they have available which are all you know here with a dev preview and then talk to the many other partners that we have that are also looking at operators so again rub thank you for joining us today Matt come on out okay this is gonna make for an exciting year of just what it means to consume container base content I think containers change how customers can get that I believe operators are gonna change how much they can trust running that content let's circle back to one more partner this next partner we have has changed the landscape of computing specifically with their work on hardware design work on core Linux itself you know in fact I think they've become so ubiquitous with computing that we often overlook the technological marvels that they've been able to overcome now for myself I studied computer engineering so in the late 90s I had the chance to study processor design I actually got to build one of my own processors now in my case it was the most trivial processor that you could imagine it was an 8-bit subtractor which means it can subtract two numbers 256 or smaller but in that process I learned the sheer complexity that goes into processor design things like wire placements that are so close that electrons can cut through the insulation in short and then doing those wire placements across three dimensions to multiple layers jamming in as many logic components as you possibly can and again in my case this was to make a processor that could subtract two numbers but once I was done with this the second part of the course was studying the Pentium processor now remember that moment forever because looking at what the Pentium processor was able to accomplish it was like looking at alien technology and the incredible thing is that Intel our next partner has been able to keep up that alien like pace of innovation twenty years later so we're excited have Doug Fisher here let's hear a little bit more from Intel for business wide open skies an open mind no matter the context the idea of being open almost only suggests the potential of infinite possibilities and that's exactly the power of open source whether it's expanding what's possible in business the science and technology or for the greater good which is why-- open source requires the involvement of a truly diverse community of contributors to scale and succeed creating infinite possibilities for technology and more importantly what we do with it [Music] you know what Intel one of our core values is risk-taking and I'm gonna go just a bit off script for a second and say I was just backstage and I saw a gentleman that looked a lot like Scott Guthrie who runs all of Microsoft's cloud enterprise efforts wearing a red shirt talking to Cormier I'm just saying I don't know maybe I need some more sleep but that's what I saw as we approach Intel's 50th anniversary these words spoken by our co-founder Robert Noyce are as relevant today as they were decades ago don't be encumbered by history this is about breaking boundaries in technology and then go off and do something wonderful is about innovation and driving innovation in our industry and Intel we're constantly looking to break boundaries to advance our technology in the cloud in enterprise space that is no different so I'm going to talk a bit about some of the boundaries we've been breaking and innovations we've been driving at Intel starting with our Intel Xeon platform Orion Xeon scalable platform we launched several months ago which was the biggest and mark the most advanced movement in this technology in over a decade we were able to drive critical performance capabilities unmatched agility and added necessary and sufficient security to that platform I couldn't be happier with the work we do with Red Hat and ensuring that those hero features that we drive into our platform they fully expose to all of you to drive that innovation to go off and do something wonderful well there's taking advantage of the performance features or agility features like our advanced vector extensions or avx-512 or Intel quick exist those technologies are fully embraced by Red Hat Enterprise Linux or whether it's security technologies like txt or trusted execution technology are fully incorporated and we look forward to working with Red Hat on their next release to ensure that our advancements continue to be exposed and their platform and all these workloads that are driving the need for us to break boundaries and our technology are driving more and more need for flexibility and computing and that's why we're excited about Intel's family of FPGAs to help deliver that additional flexibility for you to build those capabilities in your environment we have a broad set of FPGA capabilities from our power fish at Mac's product line all the way to our performance product line on the 6/10 strat exten we have a broad set of bets FPGAs what i've been talking to customers what's really exciting is to see the combination of using our Intel Xeon scalable platform in combination with FPGAs in addition to the acceleration development capabilities we've given to software developers combining all that together to deliver better and better solutions whether it's helping to accelerate data compression well there's pattern recognition or data encryption and decryption one of the things I saw in a data center recently was taking our Intel Xeon scalable platform utilizing the capabilities of FPGA to do data encryption between servers behind the firewall all the while using the FPGA to do that they preserve those precious CPU cycles to ensure they delivered the SLA to the customer yet provided more security for their data in the data center one of the edges in cyber security is innovation and route of trust starts at the hardware we recently renewed our commitment to security with our security first pledge has really three elements to our security first pledge first is customer first urgency we have now completed the release of the micro code updates for protection on our Intel platforms nine plus years since launch to protect against things like the side channel exploits transparent and timely communication we are going to communicate timely and openly on our Intel comm website whether it's about our patches performance or other relevant information and then ongoing security assurance we drive security into every one of our products we redesigned a portion of our processor to add these partition capability which is adding additional walls between applications and user level privileges to further secure that environment from bad actors I want to pause for a second and think everyone in this room involved in helping us work through our security first pledge this isn't something we do on our own it takes everyone in this room to help us do that the partnership and collaboration was next to none it's the most amazing thing I've seen since I've been in this industry so thank you we don't stop there we continue to advance our security capabilities cross-platform solutions we recently had a conference discussion at RSA where we talked about Intel Security Essentials where we deliver a framework of capabilities and the end that are in our silicon available for those to innovate our customers and the security ecosystem to innovate on a platform in a consistent way delivering that assurance that those capabilities will be on that platform we also talked about things like our security threat technology threat detection technology is something that we believe in and we launched that at RSA incorporates several elements one is ability to utilize our internal graphics to accelerate some of the memory scanning capabilities we call this an accelerated memory scanning it allows you to use the integrated graphics to scan memory again preserving those precious cycles on the core processor Microsoft adopted this and are now incorporated into their defender product and are shipping it today we also launched our threat SDK which allows partners like Cisco to utilize telemetry information to further secure their environments for cloud workloads so we'll continue to drive differential experiences into our platform for our ecosystem to innovate and deliver more and more capabilities one of the key aspects you have to protect is data by 2020 the projection is 44 zettabytes of data will be available 44 zettabytes of data by 2025 they project that will grow to a hundred and eighty s data bytes of data massive amount of data and what all you want to do is you want to drive value from that data drive and value from that data is absolutely critical and to do that you need to have that data closer and closer to your computation this is why we've been working Intel to break the boundaries in memory technology with our investment in 3d NAND we're reducing costs and driving up density in that form factor to ensure we get warm data closer to the computing we're also innovating on form factors we have here what we call our ruler form factor this ruler form factor is designed to drive as much dense as you can in a 1u rack we're going to continue to advance the capabilities to drive one petabyte of data at low power consumption into this ruler form factor SSD form factor so our innovation continues the biggest breakthrough and memory technology in the last 25 years in memory media technology was done by Intel we call this our 3d crosspoint technology and our 3d crosspoint technology is now going to be driven into SSDs as well as in a persistent memory form factor to be on the memory bus giving you the speed of memory characteristics of memory as well as the characteristics of storage given a new tier of memory for developers to take full advantage of and as you can see Red Hat is fully committed to integrating this capability into their platform to take full advantage of that new capability so I want to thank Paul and team for engaging with us to make sure that that's available for all of you to innovate on and so we're breaking boundaries and technology across a broad set of elements that we deliver that's what we're about we're going to continue to do that not be encumbered by the past your role is to go off and doing something wonderful with that technology all ecosystems are embracing this and driving it including open source technology open source is a hub of innovation it's been that way for many many years that innovation that's being driven an open source is starting to transform many many businesses it's driving business transformation we're seeing this coming to light in the transformation of 5g driving 5g into the networked environment is a transformational moment an open source is playing a pivotal role in that with OpenStack own out and opie NFV and other open source projects were contributing to and participating in are helping drive that transformation in 5g as you do software-defined networks on our barrier breaking technology we're also seeing this transformation rapidly occurring in the cloud enterprise cloud enterprise are growing rapidly and innovation continues our work with virtualization and KVM continues to be aggressive to adopt technologies to advance and deliver more capabilities in virtualization as we look at this with Red Hat we're now working on Cube vert to help move virtualized workloads onto these platforms so that we can now have them managed at an open platform environment and Cube vert provides that so between Intel and Red Hat and the community we're investing resources to make certain that comes to product as containers a critical feature in Linux becomes more and more prevalent across the industry the growth of container elements continues at a rapid rapid pace one of the things that we wanted to bring to that is the ability to provide isolation without impairing the flexibility the speed and the footprint of a container with our clear container efforts along with hyper run v we were able to combine that and create we call cotta containers we launched this at the end of last year cotta containers is designed to have that container element available and adding elements like isolation both of these events need to have an orchestration and management capability Red Hat's OpenShift provides that capability for these workloads whether containerized or cube vert capabilities with virtual environments Red Hat openshift is designed to take that commercial capability to market and we've been working with Red Hat for several years now to develop what we call our Intel select solution Intel select solutions our Intel technology optimized for downstream workloads as we see a growth in a workload will work with a partner to optimize a solution on Intel technology to deliver the best solution that could be deployed quickly our effort here is to accelerate the adoption of these type of workloads in the market working with Red Hat's so now we're going to be deploying an Intel select solution design and optimized around Red Hat OpenShift we expect the industry's start deploying this capability very rapidly I'm excited to announce today that Lenovo is committed to be the first platform company to deliver this solution to market the Intel select solution to market will be delivered by Lenovo now I talked about what we're doing in industry and how we're transforming businesses our technology is also utilized for greater good there's no better example of this than the worked by dr. Stephen Hawking it was a sad day on March 14th of this year when dr. Stephen Hawking passed away but not before Intel had a 20-year relationship with dr. Hawking driving breakthrough capabilities innovating with him driving those robust capabilities to the rest of the world one of our Intel engineers an Intel fellow which is the highest technical achievement you can reach at Intel got to spend 10 years with dr. Hawking looking at innovative things they could do together with our technology and his breakthrough innovative thinking so I thought it'd be great to bring up our Intel fellow Lema notch Minh to talk about her work with dr. Hawking and what she learned in that experience come on up Elina [Music] great to see you Thanks something going on about the breakthrough breaking boundaries and Intel technology talk about how you use that in your work with dr. Hawking absolutely so the most important part was to really make that technology contextually aware because for people with disability every single interaction takes a long time so whether it was adapting for example the language model of his work predictor to understand whether he's gonna talk to people or whether he's writing a book on black holes or to even understand what specific application he might be using and then making sure that we're surfacing only enough actions that were relevant to reduce that amount of interaction so the tricky part is really to make all of that contextual awareness happen without totally confusing the user because it's constantly changing underneath it so how is that your work involving any open source so you know the problem with assistive technology in general is that it needs to be tailored to the specific disability which really makes it very hard and very expensive because it can't utilize the economies of scale so basically with the system that we built what we wanted to do is really enable unleashing innovation in the world right so you could take that framework you could tailor to a specific sensor for example a brain computer interface or something like that where you could actually then support a different set of users so that makes open-source a perfect fit because you could actually build and tailor and we you spoke with dr. Hawking what was this view of open source is it relevant to him so yeah so Stephen was adamant from the beginning that he wanted a system to benefit the world and not just himself so he spent a lot of time with us to actually build this system and he was adamant from day one that he would only engage with us if we were commit to actually open sourcing the technology that's fantastic and you had the privilege of working with them in 10 years I know you have some amazing stories to share so thank you so much for being here thank you so much in order for us to scale and that's what we're about at Intel is really scaling our capabilities it takes this community it takes this community of diverse capabilities it takes two births thought diverse thought of dr. Hawking couldn't be more relevant but we also are proud at Intel about leading efforts of diverse thought like women and Linux women in big data other areas like that where Intel feels that that diversity of thinking and engagement is critical for our success so as we look at Intel not to be encumbered by the past but break boundaries to deliver the technology that you all will go off and do something wonderful with we're going to remain committed to that and I look forward to continue working with you thank you and have a great conference [Applause] thank God now we have one more customer story for you today when you think about customers challenges in the technology landscape it is hard to ignore the public cloud these days public cloud is introducing capabilities that are driving the fastest rate of innovation that we've ever seen in our industry and our next customer they actually had that same challenge they wanted to tap into that innovation but they were also making bets for the long term they wanted flexibility and providers and they had to integrate to the systems that they already have and they have done a phenomenal job in executing to this so please give a warm welcome to Kerry Pierce from Cathay Pacific Kerry come on thanks very much Matt hi everyone thank you for giving me the opportunity to share a little bit about our our cloud journey let me start by telling you a little bit about Cathay Pacific we're an international airline based in Hong Kong and we serve a passenger and a cargo network to over 200 destinations in 52 countries and territories in the last seventy years and years seventy years we've made substantial investments to develop Hong Kong as one of the world's leading transportation hubs we invest in what matters most to our customers to you focusing on our exemplary service and our great product and it's both on the ground and in the air we're also investing and expanding our network beyond our multiple frequencies to the financial districts such as Tokyo New York and London and we're connecting Asia and Hong Kong with key tech hubs like San Francisco where we have multiple flights daily we're also connecting Asia in Hong Kong to places like Tel Aviv and our upcoming destination of Dublin in fact 2018 is actually going to be one of our biggest years in terms of network expansion and capacity growth and we will be launching in September our longest flight from Hong Kong direct to Washington DC and that'll be using a state-of-the-art Airbus a350 1000 aircraft so that's a little bit about Cathay Pacific let me tell you about our journey through the cloud I'm not going to go into technical details there's far smarter people out in the audience who will be able to do that for you just focus a little bit about what we were trying to achieve and the people side of it that helped us get there we had a couple of years ago no doubt the same issues that many of you do I don't think we're unique we had a traditional on-premise non-standardized fragile infrastructure it didn't meet our infrastructure needs and it didn't meet our development needs it was costly to maintain it was costly to grow and it really inhibited innovation most importantly it slowed the delivery of value to our customers at the same time you had the hype of cloud over the last few years cloud this cloud that clouds going to fix the world we were really keen on making sure we didn't get wound up and that so we focused on what we needed we started bottom up with a strategy we knew we wanted to be clouded Gnostic we wanted to have active active on-premise data centers with a single network and fabric and we wanted public clouds that were trusted and acted as an extension of that environment not independently we wanted to avoid single points of failure and we wanted to reduce inter dependencies by having loosely coupled designs and finally we wanted to be scalable we wanted to be able to cater for sudden surges of demand in a nutshell we kind of just wanted to make everything easier and a management level we wanted to be a broker of services so not one size fits all because that doesn't work but also not one of everything we want to standardize but a pragmatic range of services that met our development and support needs and worked in harmony with our public cloud not against it so we started on a journey with red hat we implemented Red Hat cloud forms and ansible to manage our hybrid cloud we also met implemented Red Hat satellite to maintain a manager environment we built a Red Hat OpenStack on crimson vironment to give us an alternative and at the same time we migrated a number of customer applications to a production public cloud open shift environment but it wasn't all Red Hat you love heard today that the Red Hat fits within an overall ecosystem we looked at a number of third-party tools and services and looked at developing those into our core solution I think at last count we had tried and tested somewhere past eight different tools and at the moment we still have around 62 in our environment that help us through that journey but let me put the technical solution aside a little bit because it doesn't matter how good your technical solution is if you don't have the culture and the people to get it right as a group we needed to be aligned for delivery and we focused on three core behaviors we focused on accountability agility and collaboration now I was really lucky we've got a pretty fantastic team for whom that was actually pretty easy but but again don't underestimate the importance of getting the culture and the people right because all the technology in the world doesn't matter if you don't have that right I asked the team what did we do differently because in our situation we didn't go out and hire a bunch of new people we didn't go out and hire a bunch of consultants we had the staff that had been with us for 10 20 and in some cases 30 years so what did we do differently it was really simple we just empowered and supported our staff we knew they were the smart ones they were the ones that were dealing with a legacy environment and they had the passion to make the change so as a team we encouraged suggestions and contributions from our overall IT community from the bottom up we started small we proved the case we told the story and then we got by him and only did did we implement wider the benefits the benefit through our staff were a huge increase in staff satisfaction reduction and application and platform outage support incidents risk free and failsafe application releases work-life balance no more midnight deployments and our application and infrastructure people could really focus on delivering customer value not on firefighting and for our end customers the people that travel with us it was really really simple we could provide a stable service that allowed for faster releases which meant we could deliver value faster in terms of stats we migrated 16 production b2c applications to a public cloud OpenShift environment in 12 months we decreased provisioning time from weeks or occasionally months we were waiting for hardware two minutes and we had a hundred percent availability of our key customer facing systems but most importantly it was about people we'd built a culture a culture of innovation that was built on a foundation of collaboration agility and accountability and that permeated throughout the IT organization not those just those people that were involved in the project everyone with an IT could see what good looked like and to see what it worked what it looked like in terms of working together and that was a key foundation for us the future for us you will have heard today everything's changing so we're going to continue to develop our open hybrid cloud onboard more public cloud service providers continue to build more modern applications and leverage the emerging technology integrate and automate everything we possibly can and leverage more open source products with the great support from the open source community so there you have it that's our journey I think we succeeded by not being over awed and by starting with the basics the technology was key obviously it's a cool component but most importantly it was a way we approached our transition we had a clear strategy that was actually developed bottom-up by the people that were involved day to day and we empowered those people to deliver and that provided benefits to both our staff and to our customers so thank you for giving the opportunity to share and I hope you enjoy the rest of the summer [Applause] I got one thanks what a great story would a great customer story to close on and we have one more partner to come up and this is a partner that all of you know that's Microsoft Microsoft has gone through an amazing transformation they've we've built an incredibly meaningful partnership with them all the way from our open source collaboration to what we do in the business side we started with support for Red Hat Enterprise Linux on hyper-v and that was truly just the beginning today we're announcing one of the most exciting joint product offerings on the market today let's please give a warm welcome to Paul correr and Scott Scott Guthrie to tell us about it guys come on out you know Scot welcome welcome to the Red Hat summer thanks for coming really appreciate it great to be here you know many surprises a lot of people when we you know published a list of speakers and then you rock you were on it and you and I are on stage here it's really really important and exciting to us exciting new partnership we've worked together a long time from the hypervisor up to common support and now around hybrid hybrid cloud maybe from your perspective a little bit of of what led us here well you know I think the thing that's really led us here is customers and you know Microsoft we've been on kind of a transformation journey the last several years where you know we really try to put customers at the center of everything that we do and you know as part of that you quickly learned from customers in terms of I'm including everyone here just you know you've got a hybrid of state you know both in terms of what you run on premises where it has a lot of Red Hat software a lot of Microsoft software and then really is they take the journey to the cloud looking at a hybrid of state in terms of how do you run that now between on-premises and a public cloud provider and so I think the thing that both of us are recognized and certainly you know our focus here at Microsoft has been you know how do we really meet customers with where they're at and where they want to go and make them successful in that journey and you know it's been fantastic working with Paul and the Red Hat team over the last two years in particular we spend a lot of time together and you know really excited about the journey ahead so um maybe you can share a bit more about the announcement where we're about to make today yeah so it's it's it's a really exciting announcement it's and really kind of I think first of its kind in that we're delivering a Red Hat openshift on Azure service that we're jointly developing and jointly managing together so this is different than sort of traditional offering where it's just running inside VMs and it's sort of two vendors working this is really a jointly managed service that we're providing with full enterprise support with a full SLA where the you know single throat to choke if you will although it's collectively both are choke the throats in terms of making sure that it works well and it's really uniquely designed around this hybrid world and in that it supports will support both Windows and Linux containers and it role you know it's the same open ship that runs both in the public cloud on Azure and on-premises and you know it's something that we hear a lot from customers I know there's a lot of people here that have asked both of us for this and super excited to be able to talk about it today and we're gonna show off the first demo of it just a bit okay well I'm gonna ask you to elaborate a bit more about this how this fits into the bigger Microsoft picture and I'll get out of your way and so thanks again thank you for coming here we go thanks Paul so I thought I'd spend just a few minutes talking about wouldn't you know that some of the work that we're doing with Microsoft Asher and the overall Microsoft cloud I didn't go deeper in terms of the new offering that we're announcing today together with red hat and show demo of it actually in action in a few minutes you know the high level in terms of you know some of the work that we've been doing at Microsoft the last couple years you know it's really been around this this journey to the cloud that we see every organization going on today and specifically the Microsoft Azure we've been providing really a cloud platform that delivers the infrastructure the application and kind of the core computing needs that organizations have as they want to be able to take advantage of what the cloud has to offer and in terms of our focus with Azure you know we've really focused we deliver lots and lots of different services and features but we focused really in particular on kind of four key themes and we see these four key themes aligning very well with the journey Red Hat it's been on and it's partly why you know we think the partnership between the two companies makes so much sense and you know for us the thing that we've been really focused on has been with a or in terms of how do we deliver a really productive cloud meaning how do we enable you to take advantage of cutting-edge technology and how do we kind of accelerate the successful adoption of it whether it's around the integration of managed services that we provide both in terms of the application space in the data space the analytic and AI space but also in terms of just the end-to-end management and development tools and how all those services work together so that teams can basically adopt them and be super successful yeah we deeply believe in hybrid and believe that the world is going to be a multi cloud and a multi distributed world and how do we enable organizations to be able to take the existing investments that they already have and be able to easily integrate them in a public cloud and with a public cloud environment and get immediate ROI on day one without how to rip and replace tons of solutions you know we're moving very aggressively in the AI space and are looking to provide a rich set of AI services both finished AI models things like speech detection vision detection object motion etc that any developer even at non data scientists can integrate to make application smarter and then we provide a rich set of AI tooling that enables organizations to build custom models and be able to integrate them also as part of their applications and with their data and then we invest very very heavily on trust Trust is sort of at the core of a sure and we now have more compliant certifications than any other cloud provider we run in more countries than any other cloud provider and we really focus around unique promises around data residency data sovereignty and privacy that are really differentiated across the industry and terms of where Iser runs today we're in 50 regions around the world so our region for us is typically a cluster of multiple data centers that are grouped together and you can see we're pretty much on every continent with the exception of Antarctica today and the beauty is you're going to be able to take the Red Hat open shift service and run it on ashore in each of these different locations and really have a truly global footprint as you look to build and deploy solutions and you know we've seen kind of this focus on productivity hybrid intelligence and Trust really resonate in the market and about 90 percent of Fortune 500 companies today are deployed on Azure and you heard Nike talked a little bit earlier this afternoon about some of their journeys as they've moved to a dot public cloud this is a small logo of just a couple of the companies that are on ashore today and what I do is actually even before we dive into the open ship demo is actually just show a quick video you know one of the companies thing there are actually several people from that organization here today Deutsche Bank who have been working with both Microsoft and Red Hat for many years Microsoft on the other side Red Hat both on the rel side and then on the OpenShift side and it's just one of these customers that have helped bring the two companies together to deliver this managed openshift service on Azure and so I'm just going to play a quick video of some of the folks that Deutsche Bank talking about their experiences and what they're trying to get out of it so we could roll the video that'd be great technology is at the absolute heart of Deutsche Bank we've recognized that the cost of running our infrastructure was particularly high there was a enormous amount of under utilization we needed a platform which was open to polyglot architecture supporting any kind of application workload across the various business lines of the third we analyzed over 60 different vendor products and we ended up with Red Hat openshift I'm super excited Microsoft or supporting Linux so strongly to adopting a hybrid approach we chose as here because Microsoft was the ideal partner to work with on constructs around security compliance business continuity as you as in all the places geographically that we need to be we have applications now able to go from a proof of concept to production in three weeks that is already breaking records openshift gives us given entities and containers allows us to apply the same sets of processes automation across a wide range of our application landscape on any given day we run between seven and twelve thousand containers across three regions we start see huge levels of cost reduction because of the level of multi-tenancy that we can achieve through containers open ship gives us an abstraction layer which is allows us to move our applications between providers without having to reconfigure or recode those applications what's really exciting for me about this journey is the way they're both Red Hat and Microsoft have embraced not just what we're doing but what each other are doing and have worked together to build open shift as a first-class citizen with Microsoft [Applause] in terms of what we're announcing today is a new fully managed OpenShift service on Azure and it's really the first fully managed service provided end-to-end across any of the cloud providers and it's jointly engineer operated and supported by both Microsoft and Red Hat and that means again sort of one service one SLA and both companies standing for a link firmly behind it really again focusing around how do we make customers successful and as part of that really providing the enterprise-grade not just isolates but also support and integration testing so you can also take advantage of all your rel and linux-based containers and all of your Windows server based containers and how can you run them in a joint way with a common management stack taking the advantage of one service and get maximum density get maximum code reuse and be able to take advantage of a containerized world in a better way than ever before and make this customer focus is very much at the center of what both companies are really centered around and so what if I do be fun is rather than just talk about openshift as actually kind of show off a little bit of a journey in terms of what this move to take advantage of it looks like and so I'd like to invite Brendan and Chris onstage who are actually going to show off a live demo of openshift on Azure in action and really walk through how to provision the service and basically how to start taking advantage of it using the full open ship ecosystem so please welcome Brendan and Chris we're going to join us on stage for a demo thanks God thanks man it's been a good afternoon so you know what we want to get into right now first I'd like to think Brandon burns for joining us from Microsoft build it's a busy week for you I'm sure your own stage there a few times as well you know what I like most about what we just announced is not only the business and technical aspects but it's that operational aspect the uniqueness the expertise that RedHat has for running OpenShift combined with the expertise that Microsoft has within Azure and customers are going to get this joint offering if you will with you know Red Hat OpenShift on Microsoft Azure and so you know kind of with that again Brendan I really appreciate you being here maybe talk to the folks about what we're going to show yeah so we're going to take a look at what it looks like to deploy OpenShift on to Azure via the new OpenShift service and the real selling point the really great part of this is the the deep integration with a cloud native app API so the same tooling that you would use to create virtual machines to create disks trade databases is now the tooling that you're going to use to create an open chip cluster so to show you this first we're going to create a resource group here so we're going to create that resource group in East us using the AZ tool that's the the azure command-line tooling a resource group is sort of a folder on Azure that holds all of your stuff so that's gonna come back into the second I've created my resource group in East us and now we're gonna use that exact same tool calling into into Azure api's to provision an open shift cluster so here we go we have AZ open shift that's our new command line tool putting it into that resource group I'm gonna get into East us alright so it's gonna take a little bit of time to deploy that open shift cluster it's doing a bunch of work behind the scenes provisioning all kinds of resources as well as credentials to access a bunch of different as your API so are we actually able to see this to you yeah so we can cut over to in just a second we can cut over to that resource group in a reload so Brendan while relating the beauty of what you know the teams have been doing together already is the fact that now open shift is a first-class citizen as it were yeah absolutely within the agent so I presume not only can I do a deployment but I can do things like scale and check my credentials and pretty much everything that I could do with any other service with that that's exactly right so we can anything that you you were used to doing via the my computer has locked up there we go the demo gods are totally with me oh there we go oh no I hit reload yeah that was that was just evil timing on the house this is another use for operators as we talked about earlier today that's right my dashboard should be coming up do I do I dare click on something that's awesome that was totally it was there there we go good job so what's really interesting about this I've also heard that it deploys you know in as little as five to six minutes which is really good for customers they want to get up and running with it but all right there we go there it is who managed to make it see that shows that it's real right you see the sweat coming off of me there but there you can see the I feel it you can see the various resources that are being created in order to create this openshift cluster virtual machines disks all of the pieces provision for you automatically via that one single command line call now of course it takes a few minutes to to create the cluster so in order to show the other side of that integration the integration between openshift and Azure I'm going to cut over to an open shipped cluster that I already have created alright so here you can see my open shift cluster that's running on Microsoft Azure I'm gonna actually log in over here and the first sign you're gonna see of the integration is it's actually using my credentials my login and going through Active Directory and any corporate policies that I may have around smart cards two-factor off anything like that authenticate myself to that open chef cluster so I'll accept that it can access my and now we're gonna load up the OpenShift web console so now this looks familiar to me oh yeah so if anybody's used OpenShift out there this is the exact same console and what we're going to show though is how this console via the open service broker and the open service broker implementation for Azure integrates natively with OpenShift all right so we can go down here and we can actually see I want to deploy a database I'm gonna deploy Mongo as my key value store that I'm going to use but you know like as we talk about management and having a OpenShift cluster that's managed for you I don't really want to have to manage my database either so I'm actually going to use cosmos DB it's a native Azure service it's a multilingual database that offers me the ability to access my data in a variety of different formats including MongoDB fully managed replicated around the world a pretty incredible service so I'm going to go ahead and create that so now Brendan what's interesting I think to me is you know we talked about the operational aspects and clearly it's not you and I running the clusters but you do need that way to interface with it and so when customers are able to deploy this all of this is out of the box there's no additional contemporary like this is what you get when you create when you use that tool to create that open chef cluster this is what you get with all of that integration ok great step through here and go ahead don't have any IP ranges there we go all right and we create that binding all right and so now behind the scenes openshift is integrated with the azure api's with all of my credentials to go ahead and create that distributed database once it's done provisioning actually all of the credentials necessary to access the database are going to be automatically populated into kubernetes available for me inside of OpenShift via service discovery to access from my application without any further work so I think that really shows not only the power of integrating openshift with an azure based API but actually the power of integrating a Druze API is inside of OpenShift to make a truly seamless experience for managing and deploying your containers across a variety of different platforms yeah hey you know Brendan this is great I know you've got a flight to catch because I think you're back onstage in a few hours but you know really appreciate you joining us today absolutely I look forward to seeing what else we do yeah absolutely thank you so much thanks guys Matt you want to come back on up thanks a lot guys if you have never had the opportunity to do a live demo in front of 8,000 people it'll give you a new appreciation for standing up there and doing it and that was really good you know every time I get the chance just to take a step back and think about the technology that we have at our command today I'm in awe just the progress over the last 10 or 20 years is incredible on to think about what might come in the next 10 or 20 years really is unthinkable you even forget 10 years what might come in the next five years even the next two years but this can create a lot of uncertainty in the environment of what's going to be to come but I believe I am certain about one thing and that is if ever there was a time when any idea is achievable it is now just think about what you've seen today every aspect of open hybrid cloud you have the world's infrastructure at your fingertips and it's not stopping you've heard about this the innovation of open source how fast that's evolving and improving this capability you've heard this afternoon from an entire technology ecosystem that's ready to help you on this journey and you've heard from customer after customer that's already started their journey in the successes that they've had you're one of the neat parts about this afternoon you will aren't later this week you will actually get to put your hands on all of this technology together in our live audience demo you know this is what some it's all about for us it's a chance to bring together the technology experts that you can work with to help formulate how to pull off those ideas we have the chance to bring together technology experts our customers and our partners and really create an environment where everyone can experience the power of open source that same spark that I talked about when I was at IBM where I understood the but intial that open-source had for enterprise customers we want to create the environment where you can have your own spark you can have that same inspiration let's make this you know in tomorrow's keynote actually you will hear a story about how open-source is changing medicine as we know it and literally saving lives it is a great example of expanding the ideas it might be possible that we came into this event with so let's make this the best summit ever thank you very much for being here let's kick things off right head down to the Welcome Reception in the expo hall and please enjoy the summit thank you all so much [Music] [Music]

Published Date : May 9 2018

SUMMARY :

from the bottom this speaks to what I'm

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Doug FisherPERSON

0.99+

StephenPERSON

0.99+

BrendanPERSON

0.99+

ChrisPERSON

0.99+

Deutsche BankORGANIZATION

0.99+

Robert NoycePERSON

0.99+

Deutsche BankORGANIZATION

0.99+

IBMORGANIZATION

0.99+

MichaelPERSON

0.99+

ArvindPERSON

0.99+

20-yearQUANTITY

0.99+

March 14thDATE

0.99+

MattPERSON

0.99+

San FranciscoLOCATION

0.99+

NikeORGANIZATION

0.99+

PaulPERSON

0.99+

Hong KongLOCATION

0.99+

AntarcticaLOCATION

0.99+

Scott GuthriePERSON

0.99+

2018DATE

0.99+

AsiaLOCATION

0.99+

Washington DCLOCATION

0.99+

LondonLOCATION

0.99+

MicrosoftORGANIZATION

0.99+

10 yearsQUANTITY

0.99+

two minutesQUANTITY

0.99+

ArvinPERSON

0.99+

Tel AvivLOCATION

0.99+

two numbersQUANTITY

0.99+

two companiesQUANTITY

0.99+

2020DATE

0.99+

Paul correrPERSON

0.99+

SeptemberDATE

0.99+

Kerry PiercePERSON

0.99+

30 yearsQUANTITY

0.99+

20 yearsQUANTITY

0.99+

8-bitQUANTITY

0.99+

Mike witigPERSON

0.99+

Red HatORGANIZATION

0.99+

2025DATE

0.99+

fiveQUANTITY

0.99+

dr. HawkingPERSON

0.99+

LinuxTITLE

0.99+

Arvind KrishnaPERSON

0.99+

DublinLOCATION

0.99+

first partnerQUANTITY

0.99+

RobPERSON

0.99+

first platformQUANTITY

0.99+

Matt HicksPERSON

0.99+

todayDATE

0.99+

CiscoORGANIZATION

0.99+

last yearDATE

0.99+

OpenShiftTITLE

0.99+

last weekDATE

0.99+

Phil Quade, Fortinet | Fortinet Accelerate 2018


 

(computerized music) >> Announcer: Live from Las Vegas, it's theCUBE. Covering Fortinet Accelerate 18. Brought to you by Fortinet. (computerized music) >> Hi, welcome back to Fortinet Accelerate 2018. I'm Lisa Martin with theCUBE. Excited to be back here for our second year. I'm joined by my esteemed cohost Peter Burris. Peter and I are excited to be joined by the chief information security officer of Fortinet, Phil Quade. Phil, welcome back to theCUBE >> Thanks of having me today. >> Great to have you here. So you had this interesting keynote this morning talking about cyber security fundamentals in the age of digital transformation. So we'll kind of peel apart that. But, something that I'm really curious about is, as a CISO, you are probably looked at as a trusted advisor to your peers, at Fortinet customers, at perspective customers. Tell us about, as we're in this evolution of security that Kenzie talked about, what are some of the things that you're hearing? What are they looking to you to help them understand and help from strategic perspective to enable in their environments? >> I often hear people say, "I recognize that my security's inadequate, what can I do about it?" Or, "I think my security's good enough, but I'm not evolving commensurably with the risk." And they say, "What do I do about that? How do I get to a better spot?" And I typically talk about them modernizing their strategy, and then based on their modernized strategy, that leads to specific technical solutions. And I'll have to talk to you more about what some of those might be. >> Yeah, on the strategy side of things, I find that very interesting. Peter and I were talking with Kenzie earlier, and with the 20 to 30 different security solutions that an organization has in place today that are disparate, not connected, where does the strategy discussion start? >> Well it starts to me with, I say, the adversary's comin at you at speed and scale, so how do you address the problems of speed and scale? It's through automation and integration. And fortunately, I believe in that strategy, but it plays directly into Fortinet's strengths, right? We have speed baked into our solution set. We have speed at the edge for our custom ASICs. And we're fundamentally are an integrated company where our products are designed to work together as a team because what you want to do strategy wise, is you want to, I think, you want to defend at your place of strength. And at a time and place of strength as opposed if your adversaries, where he's probing at your weak point. So, that's this integration thing's not only strategic, but it's essential to address the problems with speed and scale. >> So, Phil, technology's being applied to a lot of IT and other business disciplines. So, for example, when I was seeing machine learning, and related types of technologies actually being applied to improve programmer productivity through what we call augmented programming. And that may open the aperture on the number of people that actually can participate in the process of creating digital value. But it still requires a developer mindset. You still have to approach your problem from a developer perspective. What is the security mindset? That as security technology becomes more automated, that more people can participate, more people can be cognizant of the challenges. What is that constant security mindset that has to be sustained in an enterprise to continue to drive better and superior security. >> Got it. I think that some companies get too hyped about artificial intelligence, and I think it's important to remember that you need to use computer science to get to science fiction. So, a very disciplined way you need to say, well in order to achieve high degrees of automation, or perhaps machine learning, or artificial intelligence, what are the building blocks of that? Well, the building blocks are speed, because if you have a decision that's too late, who cares. Integration. If you have a decision that can't be communicated effectively, who cares. And then, of course, access to all the right types of data. In order to get smart to do machine learning, you need access to lots of different data sources, so you need to have lots of disparate centers sending in data for you to analyze. Back in my old job, we used to do some centralized processing, say back in the data center. We would precompute a result, we'd push that precomputed result back to the edge, and then you would do that last bit of analysis right at the point of need. And I think, again, the Fortinet architecture supports that in that we have a back end called Fortiguard Labs, if you know what that is. It does deep analysis and research, pushes their results forward, then we use speed at the edge inside customer premises to sort of compute, I'm mixing metaphors, but do the last mile of computing. So I think it's, back to your question, what's the mentality? It's about leveraging technology to our advantage, rather than people being the slaves of machines, we need to have machines serving more man. And we need computer science to do that, rather than, like I say, creating busy work for humans. >> Peter: Got it. >> You talked about speed and scale a minute ago. And as we look at, I'm curious of your perspective as the CISO, how do you get that balance between enabling digital business transformation, which is essential for growth, profitability, competition, and managing, or really balancing that with security risk management. So, if a business can't evolve digitally at speed and scale, and apply security protocols at every point they need to, is digital transformation meaningless? How do they get that-- >> Great question. Cause you don't want to feel like it's going to be a haves and have nots. The good news is that, for example, for those who seek to move to the cloud for whatever reason, convenience or agility or business efficiencies, you don't have to go all cloud or no cloud, right. And the security solutions of Fortinet allows you to do each. You can have some cloud, some non-cloud, and get them both to work together simultaneously under what we call a single pane of glass. So, as a user, you don't care if your firewall is a physical appliance or a virtual one, you want to establish a security policy and have that pushed out no matter what your firewall looks like. So to answer your question, I think that hybrid solutions are the way to go, and we need to let people know that it's not an all or nothing solution. >> That visibility that you kind of mentioned seems to have been kind of a bane of security folk's existence before. How do we get that broad visibility? >> Yeah, I think right, it's visibility and complexity I'd say are the bane of cyber security, right? Visibility, what you can't see, you can't defend against, and complexity is the enemy of security, right? So we need to address the problems. You asked me what CISOs say. We have to reduce complexity, and we have to improve visibility. And again, I think Fortinet's well postured to offer those types of solutions. >> So as you increase, we talk about the edge, you mentioned the edge. As more processing power goes to the edge, and more data's being collected, and more data's being acted upon at the edge, often independent of any essential resource, the threat of exposure goes up. Cause you're putting more processing power, or more data out there. How is securing the edge going to be different than securing other resources within the enterprise? >> Well encryptions will remain a part, right. Encryption to create confidentiality between the two computing entities is always a part. And then of course encryption can be used to authenticate local processes at the edge. So even though encryption might not be perceived as the silver bullet that it used to be, in the age of pending quantum computing, I can talk more about that in a second. In fact encryption is a fantastic tool for creating trust among entities and within an entity. So I think the applications of smart, strong encryption among and within the entities can create that web of trust we're talking to. If I could just briefly go back to quantum computing, right. So most commercial entities today, or most think tanks think that a quantum computer, a usable one, will be invented within 15ish or so years or so. Fortinet is actually already implementing quantum resistant cryptography in our products. >> Peter: Quantum what? >> It's called quantum resistant cryptography. And a quantum computer-- >> I understand. >> Will be able to break asymmetric encryption, so we're making sure we're implementing the algorithms today to future-proof our products against a future quantum computer. >> That's a major statement. Cause as you said, we're probably not looking at a more broad base utilization of quantum computing for many many many many years. And we'll know when they're being used by bad guys. We'll know who has one. How fast is that going to become a real issue. I mean as people think about it. >> The problem is that private sector doesn't know what the bad guy countries, when they will indeed have a computer, so Fortinet is being forward leaning, making sure we're starting to get familiar with the technology now. And also encryption's the type of thing that sometimes it requires special hardware requirements, special power-- >> Peter: Quantum computing does. >> No. Any encryption technology. The more computation you have to do, sometimes it might require more memory, or a faster processor. Well that takes months, if not years, if you're putting that into a custom chip. So we're planning and doing these things now, so we can make sure that we're ready, and aren't surprised by the actual compute power that's required of quantum resistant cryptography, or, and of course, aren't surprised when an adversary does in fact have one. >> Peter: Interesting. >> Good stuff. >> One of the things that you're doing later today is a panel, right? Between IT and OT folks. And I wanted to explore with you some of the evolution in the risks on the operational technology side. Tell us a little bit about what that panel today is going to discuss and maybe and example of, Triton for example, and how these types of attacks are now very prevalent from a physical stand point. >> Favorite topic of mine. Thanks for bringing it up. So one of the first things I'll do is I'll make the distinction between OT, operational technology, and IOT. So what I'll say is operational technology's designed primarily to work to protect the safety and reliability of physical processes and things. Things that move electricity, move oil and gas inside industrial automation plants. So operational technology. And then I'll talk a little bit more about IOT, the internet of things, which are primarily, and I'm cartooning a little bit, more about enabling consumer friendly things to happen. To increase the friendliness, the convenience, of our everyday lives. And so, once I make that distinction, I'll talk about the security solutions that are different between those. So, the OT community has done just fine for years, thank you very much, without the IT folks coming in saying I'll save your day. But that's because they've had the luxury of relying on the air gap. But unfortunately-- Meaning to attack an OT system you had to physically touch it. But unfortunately the air gap is dead or dying in the OT space as well. So we need to bring in new strategies and technologies to help secure OT. The IT side, that's a different story, because IOT is fundamentally lightweight, inexpensive devices without security built in. So we're not as a community going to automatically be able to secure IOT. What we're going to need to do is implement a strategy we call earned trust. So a two part strategy. Number one, rather than pretend we're going to be able to secure the IOT devices at the device level, that are currently unsecurable, we're going to move security to a different part of the architecture. Cause remember I talked about that's what you can do with security fabric, if you do defense as a team, you want to defend at the time and place you're choosing. So with IOT, we'll move the defense to a different part of the architecture. And what we'll implement is a strategy we call earned trust. We'll assign a level of trust to the IOT appliances, and then evaluate how they actually behave. And if they do in fact behave over time according to their advertised type of trust, we'll allow more, or in some cases, less access. So that's our IOT solution. And both of them are really important to the community, but they're very different IOT and OT. But unfortunately they share two letters and people are mixing them up to much. >> But at the same time, as you said, the air gap's going away, but also we're seeing an increasing number of the protocols and the technologies and other types of things start to populate into the OT world. So is there going to be a-- There's likely to be some type of convergence, some type of flattening of some of those devices, but it would be nice to see some of those as you said, hardened, disciplined, deep understanding of what it means to do OT security also start to influence the way IT thinks about security as well. >> Love it. Great point. Not only can the OT folks perhaps borrow some strategies and technologies from the IT folks, but the opposite's true as well. Because on the OT side, I know you're making this point, they've been securing their industrial internet of things for decades, and doing just fine. And so there's plenty that each community can learn from each other. You brought up a recent type of malware effecting OT systems Triton or Trisis. And the memory brings me back to about nine years ago, you might be familiar there was just a catastrophic incident in Russia at their-- It was a failure of operational technology. Specifically it was the largest electricity generation, hydroelectric plant, ninth biggest in the whole world, they took it offline to do some maintenance, loaded some parameters that were out of range, cause vibration in the machinery, and next thing you know, a major cover flew off, a 900 ton motor came off its bearings, water flooded the engine compartment, and it caused a catastrophic explosion. With I think, I'll just say, well over 50 people dying and billions of dollars of economic loss. So, what I'm trying to say is not, you know, get excited over a catastrophe, but to say that the intersection between physical and cyber is happening. There's not just the stuff of spy novels anymore. Countries have demonstrated the will and the ability to attack physical infrastructures with cyber capabilities. But back to Triton and Trisis. This is just a couple months ago. That sort of rocked the operational community because it was a very sophisticated piece of malware. And not only could it affect what are called control systems, but the safety systems themselves. And that is considered the untouchable part of operational technologies. You never want to affect the safety system. So the time is here. The opportunity and need is here for us to do a better job as a community to protecting the OT systems. >> So the speed, the scale, all the other things that you mentioned, suggests that we're moving beyond, and Kenzie has talked about this as well, the third generation of security. That we're moving beyond just securing a perimeter and securing a piece of hardware. We're now thinking about a boundary that has to be porous, where sharing is fundamentally the good that is being provided. How is a CISO thinking differently about the arrangement of hardware, virtuals, services, virtual capabilities, and, in fact, intellectual property services, to help businesses sustain their profile? >> I think you're spot on. The boundary as we know it is dead. You know, dying, if not dead. Right so, the new strategy is doing agile segmentation, both at the macro level and the micro level. And because you might want to form a coalition today that might break apart tomorrow, and that's why you need this agile segmentation. Back you your point about having some stuff in the cloud and some stuff perhaps in your own data center. Again, we don't want to make people choose between those two things. We need to create a virtual security perimeter around the data, whether part of it's existing in the data center or part of it exists in the cloud. And that again gets back to that strategy of agile segmentation at both macro and micro levels. And of course we need to do that with great simplicity so we don't overwhelm the managers of these systems with complexity that causes the human brain to fail on us. I'll often times say it's not the hardware or the software that fails us, it's the wetware. It's the brain that we have that we get overwhelmed by complexity and it causes us to do silly or sloppy things. >> So let me build on that thought one second, and come back to the role that you play within Fortinet, but also the CISO is starting to evolve into. As a guy who used to run not a big business, but a publicly traded company, I learned that when you wanted to go into a partnership with another firm, you got a whole bunch of lawyers involved, you spent a long time negotiating it, you set the parameters in place, and then you had a set of operating models with people that made sure that the partnership worked together. When we're talking about digital, we're talking about that partnership happening at much faster speeds, potentially much greater scale, and the issue of securing that partnership is not just making sure that the people are doing the right things, but the actual systems are doing the right things. Talk about the evolving role of the CISO as a manager of digital partnerships. >> I think you're right, it used to be the case where if you're entering a partnership, you're partner might say tell me a little bit more about how you secure your systems. And that company might say that's none of your business, thank you very much. But today, for the reasons you so well said, your risk is my risk. As soon as we start operating collaboratively, that risk becomes a shared situation. So, in fact, it becomes a responsibility of the CISOs to make sure the risks are appropriately understood and co-managed. Don't get me wrong, each company still needs to manage their own risk. But once you start richly collaborating, you have to make sure that your interfacing doesn't create new risks. So it used to be the day that only a couple of people in a company could say no. Of course the CEO, maybe the general council, maybe the CFO. But increasingly the CISO can say no too, because the exposure to a company is just too broad to take risks that you can't understand. >> And it's not a financial problem. It's not a legal problem. It's an operational problem >> That's right. That's right. And so the good news that CISOs I think are stepping up to the plate for that. The CISOs of today are not the CISOs of five, seven years ago. They're not insecure folks fighting for their posture C suite. They are valued members to the C suite. >> I wish we had more time guys, cause I would love to dig into that shared responsibility conversation. We've got to wrap up. Phil, thank you so much for stopping by theCUBE again, and sharing your insights on the strategic side, not only the evolution of Fortinet and security, but also the evolution that you guys are leading in at 2018 with your partners. We wish you a great time at the event, and we think you're having us back. >> Thanks for having me very much. I enjoyed talking to you both. >> And for my cohost Peter Burris, I'm Lisa Martin. We are live on theCUBE at Fortinet Accelerate 2018. Stick around and we'll be right back. (computerized music)

Published Date : Feb 27 2018

SUMMARY :

Brought to you by Fortinet. Peter and I are excited to be joined Great to have you here. And I'll have to talk to you more about Yeah, on the strategy side of things, We have speed at the edge And that may open the aperture to remember that you need as the CISO, how do you And the security solutions of Fortinet seems to have been kind of a bane and complexity is the How is securing the edge in the age of pending quantum computing, And a quantum computer-- the algorithms today to Cause as you said, we're the type of thing that the actual compute power One of the things that So one of the first things I'll do is But at the same time, as you said, And the memory brings me all the other things that you mentioned, the human brain to fail on us. just making sure that the people because the exposure to a And it's not a financial problem. And so the good news but also the evolution that you guys I enjoyed talking to you both. And for my cohost Peter

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

Peter BurrisPERSON

0.99+

FortinetORGANIZATION

0.99+

Peter BurrisPERSON

0.99+

PeterPERSON

0.99+

20QUANTITY

0.99+

Phil QuadePERSON

0.99+

PhilPERSON

0.99+

RussiaLOCATION

0.99+

2018DATE

0.99+

one secondQUANTITY

0.99+

two lettersQUANTITY

0.99+

KenziePERSON

0.99+

900 tonQUANTITY

0.99+

bothQUANTITY

0.99+

two partQUANTITY

0.99+

second yearQUANTITY

0.99+

Las VegasLOCATION

0.99+

Fortiguard LabsORGANIZATION

0.99+

tomorrowDATE

0.99+

two thingsQUANTITY

0.99+

each companyQUANTITY

0.98+

todayDATE

0.98+

third generationQUANTITY

0.98+

TritonPERSON

0.97+

oneQUANTITY

0.97+

eachQUANTITY

0.97+

two computing entitiesQUANTITY

0.96+

each communityQUANTITY

0.96+

seven years agoDATE

0.95+

billions of dollarsQUANTITY

0.94+

couple months agoDATE

0.94+

decadesQUANTITY

0.94+

this morningDATE

0.94+

over 50 peopleQUANTITY

0.92+

single paneQUANTITY

0.91+

theCUBEORGANIZATION

0.9+

15ishQUANTITY

0.88+

Fortinet Accelerate 2018EVENT

0.83+

Fortinet AccelerateORGANIZATION

0.83+

later todayDATE

0.82+

OneQUANTITY

0.81+

30 different security solutionsQUANTITY

0.8+

about nine years agoDATE

0.78+

ninth biggestQUANTITY

0.77+

a minuteDATE

0.76+

first thingsQUANTITY

0.76+

secondQUANTITY

0.72+

wellQUANTITY

0.7+

agileTITLE

0.61+

yearsQUANTITY

0.61+

fiveDATE

0.58+

coupleQUANTITY

0.5+

TritonTITLE

0.46+

TrisisORGANIZATION

0.46+

TritonLOCATION

0.46+

18TITLE

0.37+

Josh Rogers, Syncsort | Splunk .conf2017


 

>> Narrator: Live from Washington D.C., it's theCUBE. Covering Dotcom 2017. Brought to you by Splunk. >> And welcome back to the nation's capital. The Cube, continuing our coverage of Dotcom 2017. At Splunk's annual get together and coming to Washington D.C. for the first time. Huge success, 7,000 plus attendees, 65 countries. I forget the millions of miles. Was it three million miles traveling? >> Let's see, was it three million? It was 30 million. >> Maybe 30 million. >> Yeah. It's a big number. >> 30 million miles. Dave Vellante and John Walls here on theCUBE. I'd say off to a roaring start here, to say the least. Josh Rogers joins us, he's the CEO of Syncsort. And Josh, good to have you on theCUBE. Good to you see sir. >> Thanks sir. Thanks for having me. >> Good week for you, big week for you. Couple of announcements that you made here recently. Go ahead and share with us a little bit about those. >> Sure, so we made two announcements yesterday. The first is a new product, it's called Transaction Tracing, it's an add on to our Ironstream product. Ironstream is a solution that delivers mainframe machine data to Splunk Enterprise, and has integration points on the security and on the IT service intelligence components within Splunk. What Transaction Tracing does, the new product introduction, is it adds additional capabilities to understand and trace a transaction that could begin on a mobile device and follow it all the way through the multiple hops it will take to ultimately transact against a mainframe. And when that transaction hits the mainframe, there's several things that you want to understand. One is, you want to understand how is is performing, how is it affecting my mainframe environment. Is it causing problems in other places? And you want to be able to look at that transaction, or that application, as a service. And so you want to be able to track that whole service end to end. And so what we've done with Transaction Tracing is created an ability for Splunk customers to be able to surface all of that data, collate it together, and get a unified view of both how the service is behaving, the performance that characteristics it's delivering to the customers that are utilizing the service, and then the impacts that it's having on the mainframe. All of which are, core components of understanding how you're IT operations are performing. And kind of all about what Splunk is supporting. We're just adding on additional capabilities for Splunk customers. >> So I wonder if I could follow up on Transaction Tracing. So I remember about 20 years ago, David Floyer did a piece of research, when we were working together at a former company, and I was struck at the time by the number of subsequent transactions that had to occur just to get an outcome of a check process. >> Right, right, right. >> I mean it was like some orders of magnitude >> Right. >> greater. Add to that mobile transactions, I can't imagine with all the internet traffic and other activities going on, now add to that big data, and security, and fraud detection, and all the other things that we're doing with the data. The number of ancillary transactions >> Right. >> has got to be enormous. Hence the need presumably for Transaction Tracing. >> Absolutely. >> So maybe talk about the market need, and why Syncsort? You would think doesn't the mainframe have all this stuff integrated into it? Maybe talk about that. >> Yeah sure, so I think one of the things to understand is that the mainframe compute volumes continue to go up. I think people just tend to think about mainframes as a environment that perhaps isn't growing, but in fact, it is growing. And one of the key drivers is this new transaction workload that is driven in part my mobile, and other devices. And so what you have if you're running a mainframe is I'm experiencing increase in my transaction workloads, I need to figure out how to kind of support that. But I also have a lot more characteristics I care about, security, performance, et cetera. And so I need deeper analytics. And of course, they are difficult systems. You need to understand the mainframe, you need to understand how KICKS and DB2 interact and support a transaction. But you also need to understand kind of this next generation analytic environment, how can I leverage that to actually get the insight I want. And that's really what we call, it's an example of, a big iron to big data challenge. And so what Syncsort's been incredibly focused on is helping customers understand the very specific use cases that are included in that big iron to big data space, and providing very differentiated solutions with very deep differentiation to solve those specific use cases. And Transaction Tracing is a good example of that. It sounds fairly narrow, but it's incredibly important if you're a bank and you want to give your customers an ability to kind of check account balances, interact with you in a way that they haven't in the past. >> Well, it's one of those things that we talk about you know depth apps, in depth apps, this is a depth app. >> Right. >> Alright, okay. And then in terms of the Splunk relationship, where does that fit in, and what are the swim lanes between you and Splunk? >> Well we view Splunk as a key platform in the world today for kind of understanding IT operations and security. We view them as incredibly powerful from a platform perspective. And we also view them as a partner that we can add value to. That we can provide access to data that enrich their platform and allows their customers to get more value of it, and that we can do that in a unique way. And so we have a very close relationship with Splunk. And that's not just at a go to market level, it's also at a product management and engineering level. We work very closely to make sure that our products integrate well with Splunk. So we've got deep integration with IT service intelligence, we've got deep integration with enterprise security, and we'll continue to drive deeper integration into the Splunk platform. So when a customer comes across a scenario where they want to ingest mainframe data, they can be assured that they will get no better product on the marketplace than Syncsort Ironstream and associated modules, in terms of both how it will perform on its own, but also how it will integrate with Splunk. >> So that deep integration something that's always interesting to us on theCUBE. Lot of times you see Barney deals. Barney, I love you, you love me, let's do a press release. And so one of the ways in which we measure, or try to measure, the intensity of the integration is the engineering that's involved. So I wonder if you could, sort of double click on that. >> Sure. >> Is it kind of just making sure you're familiar with the APIs? Are you actually doing integration and engineering on both sides? Maybe you could talk about that. >> Well, so I'll talk about our integration with enterprise, security, and IT service intelligence. >> Dave: Great. >> And those are, you can think of those as specific applications to support deep analytics. And these are Splunk offerings. Deep analytics around those two areas of confidence. Such that a user can rapidly build a set of dashboards that would allow them to answer the questions you want to answer if you're focused on IT service intelligence or understanding security. Fundamentally they're data models. They've gone out and mapped what are all the data elements that you need, what's the structure that you need of that data model, to be able to answer the questions that a security minded analyst would want to answer. That allows you to, if you map the data sources into those data models, that would allow you to rapidly build those to that dashboards that support those types of roles on the enterprise. What we've done is taken the very large amount of mainframe machine data that gets produced, generally it's an SMF record, so there's 260 types of SMF records, each one has its subtype. We've mapped it into those two data models that Splunk has created. Nobody else has done that. And what that does is it allows those customers to get a complete end to end view of how can I rapidly enhance my IT service intelligence application, or my enterprise security application with mainframe data. Which just happens to run my most sensitive applications and most voluminous applications, from a transaction perspective in my enterprise. So we thing that deep integration is a really powerful capability, and it's just an example of where we like to go deeper with our partners than what we see other companies doing. >> You know when you talked about the mobile environment a little while ago, and complexities and that, I'm always just kind of curious. With everybody talk about what that does in terms of when you're harvesting data and now you're in a non-stationary environment. And that comes with it a whole different set of characteristics and challenges. I mean, what layer of complexity do you take on when you all of a sudden you can be anywhere and feeding data at any time from any machine. >> Sure, well I mean what it creates is a lot more interaction points. So I probably interact with my bank a lot more today than I did 10 years ago, 'cause I don't have to find an ATM, or go by a branch, >> John: You never walk into a branch. >> And I did this over the weekend. I had to kind of transfer some money, right. So I just transferred it and I was in Colorado hiking, and I transferred funds between accounts. And then later on the golf course I did a wire, literally. >> John: You didn't have to transfer money on the golf course for a reason, did you? >> No, no, no, those were unrelated events. >> Just making sure. >> Lost a few, Josh? >> But that type of interaction. So you get more frequent interaction, which creates an operational challenge. Particularly when you think about the mainframe and how customers pay for that, right. They pay for it based on how much CPU they use on a monthly basis. And so what we want to do is help customers run that system as efficiently as possible. It also creates a massive analytic opportunity, because now I have a lot more data that I can start to analyze to understand trends, because I have more touchpoints. But the trick is I've got to get that data into a repository and into an analytic environment that can handle that data. And that's where I think Splunk creates such an interesting opportunity. And what we're trying to do is just add value to that, make it easy for customers to leverage all of their data. Does that make sense? >> Yeah. >> It does. How 'about the government marketplace? We're here in the District. You guys have an announcement around new partners. >> Yes. >> Maybe talk about the importance of government, and what you do in there. >> Sure, so we signed a distribution relationship with Carahsoft, also a big Splunk partner. And that is going to allow government customers to more easily take advantage of Ironstream and Transaction Tracing in these used cases. The federal government is a enormous market opportunity, it's also a big mainframe environment. There's a lot of government core, government applications, that still run on mainframe environments. In fact, I would tell you most do. IRS, Social Security, CIA, and other agencies. And so we think giving ourselves an easy route to market for these customers is a great opportunity for us, it's also a good opportunity for Splunk's customers who are in the government, 'cause they can go and buy additional capabilities that are relevant to their environment through the same partners that they've been working with Splunk. >> But is there a difference with how you deal with public and private sector then? I mean, governance and compliance, and all those things. I would assume you have different hurdles. >> They're different contract vehicles, which have different kind of requirements in them. And that's one of the values that we get with the Carahsoft relationship, is just giving us access to those various contract vehicles. Yeah. >> Talk to me a little bit about life. I mean, you've always been a private company. But you're you don't have the 90 day shot clock, you have new owners, what's the objective, maybe talk about that sort of the patience of the capital, what your priorities are with regard to these owners. Maybe discuss that a little bit. >> Yeah, sure. So just to give a little background in early July we announced and in mid August we closed a transaction whereby Centerbridge Partners acquired Syncsort and another company, Vision Solutions, from our previous owner, Clearlake Capital. And we combined the companies under the Syncsort umbrella, and myself and our leadership team is going to take the company forward. So the 90 day shot clock, I would say definitely we still care about the 90 day shot clock. We are very focused on growing this business and doing that in a consistent way on a quarterly basis. I guess the difference is I get to talk to my investors every day rather than once a quarter. But they've been great partners. The Centerbridge guys have a lot of resources, they've been incredibly helpful in helping us start to think through kind of the strategies, some of the integration work we're doing with Vision. But we think there's an opportunity to build a big business. We employed a dual strategy of organic growth focused largely in the big iron to big data spaces, as described earlier, combined with MNA. And you know, over the last 24 months we've tripled the size of Syncsort. So it's grown 3X-- >> So you are growing, that was one of my questions, were you growing. >> And in revenue, >> Substantially. >> we've doubled in employees. >> So, say that again. >> We've tripled revenue. >> You've tripled revenue. Double head count. >> And double head count. >> Okay, so you've increased profitability in theory then. >> So, and we will continue to run the same play. We're seeing acceleration in our organic place, but focus on the big iron to big data market. And we also believe there are additional data management capabilities that are relevant to our customers, that we can acquire and help point towards that big iron to big data play. And so we'll continue to look at various spaces that are interesting adjacencies that are relevant to our customers. >> And some of that revenue growth obviously is through acquisition. >> Josh: Right. >> Right, and so when you think about, you know it used to be the classic private equity play was to suck all the money out of the company, leave the carcass for somebody else to deal with. It seems like there's a new thinking. Not seems like, there is a new thinking here. Invest, acquire, increase the value, the money guys are realizing wow this, there's a lot more money to be made. >> Absolutely. I definitely-- >> The technology business. >> We have an eye towards profitable growth. But we are absolutely making investments. And as you get larger scale you can make meaningful investments in these specific areas that can help deliver really great innovation to customers. And Transaction Tracing is an example of that. And certainly I can give you others. But for sure, we are trying to build value. This is not a traditional kind of private equity play. And I also think that private equity is generally understanding there's an opportunity to create value after the catch, if you will, in the tech industry. And I was looking at an analysis last week that financial investors, private equity, for the first time ever will do more deals in technology than strategics, in 2017. And so I think that's a statement that says that there's certainly an opportunity to create long term sustained value in a private equity backed kind of model. And I think to some extent, Syncsort's been pioneering that. With a dual approach on organic growth, and on additional acquisitions. >> Well, and you've seen it, coming out of the down turn, or sort of in the down turn, a lot of these public companies were struggling. >> Right. >> I mean you certainly saw with Dell, BMC, Riverbed, Infor, all examples of private equity where there's investment going on and I think a longer term vision. >> Right. >> With some, as a I call, patient capital. Syncsort is obviously part of that. Syncsort, actually interesting, when it spun out its storage business, you know as a successful company. Catalogic is doing its thing. So Syncsort was able to monetize that. And then really focus on the core knitting. >> Yeah. >> And then figure out where in the big data space that you can make money. Which, not a lot of people were making money in the big data space. So, that's good, congratulations on that. >> I like to tell folks that we've had a really good run, but it's really the first couple of innings. The Centerbridge team is going to be incredibly supportive, and I can't wait to get started on the next leg of the journey. I think there's going to be a lot more innovation to come and I'm looking forward to it. >> Dave: Great. >> So, you're in the middle of the game. We appreciate the time here. Good luck with that, the long term plan down the road. I hope the show's going well for you. >> It's going great. >> And it's good seeing you. >> Great, thanks John. >> Thanks, Josh. >> See you Dave. >> Josh Rogers from Syncsort with us today here. Syncsort, rather, here on theCUBE. Back with more Washington D.C., theCUBE live at Dotcom 2017, right after this. (upbeat music)

Published Date : Sep 26 2017

SUMMARY :

Brought to you by Splunk. and coming to Washington D.C. for the first time. It was 30 million. It's a big number. And Josh, good to have you on theCUBE. Thanks for having me. Couple of announcements that you made here recently. And so you want to be able to track that whole service that had to occur just to get an outcome of a and fraud detection, and all the other things has got to be enormous. So maybe talk about the market need, and why Syncsort? And so what you have if you're running a mainframe you know depth apps, in depth apps, and what are the swim lanes between you and Splunk? And that's not just at a go to market level, And so one of the ways in which we measure, Maybe you could talk about that. Well, so I'll talk about our integration And those are, you can think of those And that comes with it a whole different set 'cause I don't have to find an ATM, or go by a branch, I had to kind of transfer some money, right. that I can start to analyze to understand trends, We're here in the District. and what you do in there. And that is going to allow government customers I would assume you have And that's one of the values that we get maybe talk about that sort of the patience of the capital, I guess the difference is I get to talk to my investors So you are growing, that was one of my questions, You've tripled revenue. but focus on the big iron to big data market. And some of that revenue growth Right, and so when you think about, I definitely-- And I think to some extent, Syncsort's been pioneering that. coming out of the down turn, or sort of in the down turn, I mean you certainly saw And then really focus on the core knitting. that you can make money. I think there's going to be a lot more innovation to come I hope the show's going well for you. from Syncsort with us today here.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JoshPERSON

0.99+

JohnPERSON

0.99+

John WallsPERSON

0.99+

2017DATE

0.99+

Dave VellantePERSON

0.99+

David FloyerPERSON

0.99+

DellORGANIZATION

0.99+

BMCORGANIZATION

0.99+

DavePERSON

0.99+

Josh RogersPERSON

0.99+

CIAORGANIZATION

0.99+

Clearlake CapitalORGANIZATION

0.99+

SplunkORGANIZATION

0.99+

IRSORGANIZATION

0.99+

CenterbridgeORGANIZATION

0.99+

mid AugustDATE

0.99+

ColoradoLOCATION

0.99+

CarahsoftORGANIZATION

0.99+

RiverbedORGANIZATION

0.99+

three million milesQUANTITY

0.99+

oneQUANTITY

0.99+

3XQUANTITY

0.99+

SyncsortORGANIZATION

0.99+

three millionQUANTITY

0.99+

Washington D.C.LOCATION

0.99+

early JulyDATE

0.99+

90 dayQUANTITY

0.99+

30 millionQUANTITY

0.99+

260 typesQUANTITY

0.99+

last weekDATE

0.99+

MNAORGANIZATION

0.99+

Centerbridge PartnersORGANIZATION

0.99+

millions of milesQUANTITY

0.99+

Social SecurityORGANIZATION

0.99+

65 countriesQUANTITY

0.99+

CatalogicORGANIZATION

0.99+

InforORGANIZATION

0.99+

30 million milesQUANTITY

0.99+

firstQUANTITY

0.99+

10 years agoDATE

0.99+

two data modelsQUANTITY

0.99+

yesterdayDATE

0.99+

Vision SolutionsORGANIZATION

0.99+

both sidesQUANTITY

0.98+

todayDATE

0.98+

first timeQUANTITY

0.98+

two announcementsQUANTITY

0.98+

each oneQUANTITY

0.98+

bothQUANTITY

0.98+

IronstreamORGANIZATION

0.97+

OneQUANTITY

0.96+

Dotcom 2017EVENT

0.95+