Image Title

Search Results for Alex Amir Shenko:

Alex Miroshichenko, Acronis | Acronis Global Cyber Summit 2019


 

>>From Miami beach, Florida. It's the cube covering a Chronis global cyber summit 2019 brought to you by Acronis Kabran. >>Welcome back to the cube coverage here in Miami beach at the Fontainebleau hotel four Kronos is global cyber summit 2019 I'm John 42 days of coverage. We're on J to learning a lot about the global security, cybersecurity and protection marketplace and solutions. Our next guest is Alex Amir Shenko, also known as Alex Miro. Great to have you on and great chatting with you prior to coming on camera. Thanks for coming on. So vice president of cyber infrastructure at Krones. Essentially looking at your platform, that's essentially the hyperconverged stack underneath the platform software. You're enabling kind of the critical infrastructure for it. >>Yeah, that's the one we did a lot of way to describe it. It is infrastructure. We provide the complete stack all the way, whatever you run on top of the standard commodity get hardware, including the virtualization layer to keep that bit different around this, the standard container workloads and essentially optimized for, you know, they all work for the cyber platform. >>You know, your interesting background, we were talking before we came on camera about your, your background. Certainly you've seen waves of innovation, you've been a high performance storage enterprise infrastructure, um, you know engineer and developer and a executive and lot's changed in the past couple of years and certainly the past decade if you're on the V San wave, you saw that storage wave. Now we're in a cloud wave, now we're on premise with hybrid. So hybrid certainly now a big part of the operating model. So the operating system is not just storage anymore, it's, it's a system view. What's your personal opinion on where storage is now? I've heard software defined data center from VMware for years we've been joked about software defined storage, software defined compute, I mean everything software defined but but software is the game scales a game. High performance is a requirement. What's changing storage right now? >>Well and like everything and nothing at the same time. As I said, like, you remember going back to like 30 years ago, I was like, Oh gosh, you know, if the storage is exploding, you know, sooner we're going to have like two gigabytes, you know, company server. Oh my God. You know, and uh, was like, Oh, or you know, where's it going to come in through all like imagining when people started recording music or you know, like they seeing this MP3 thing coming up. So, uh, it's the same game different year, but it's just like, it's, >> it's like this exponential curve. It's like the shape of the curve stays the same. And to be honest, like I like part of me, like never believes that I was like, Oh, come on, how much bigger can it get? And now everybody's like, Oh, we've got IUT line. >>We've got like those cameras streaming things 24, seven, every possible thing you can think of. And of course we've got to store everything. Well, I'm not certain know what to do with it. But um, so from that point of view of the demand keeps growing and you need to have technologists, your handle that appropriate plan. And again, it just not a matter of of kind of throwing the bid somewhere and forgetting about them, it's just keeping them in the predefined water and actually being able to process that. And says in the business of a Cypress perfection and some people say, Oh, you guys just like a up got pain. Yeah. That's the fundamental part of that. But as you pointed out again in our pre game chat is, is uh, the traditional data protection guys be the backup, you know, you can think about as the various, like a raid as a way to protect your data. >>They are all about defending against like physical disruption as a cold. Right? Okay. My DS guy, you know, it was like my data center die like my followup in towels. So, so what do I do? I was the day dependent defendant does not protect it, what I call a logical destruction. I mean back in the, like the classic law school disruption, >> disruption, logic to say destruction, disruption disrupt the same thing. I mean ransomware is pretty much destructive. I mean it's hostage at that point. But I mean you are logical, meaning nonphysical, not like an event like as hurricane or outage or something like that. You removed the wrong file, the right file and you didn't notice that and then you answered several backup cycles and then you realize, Oh I want my file back. But then you like the backup that it had, that file is gone. >>I mean, you know, what are you going to do? Right? Nothing got disrupted and destroyed. Then you files gone. That's a logical disruptions or destructions that happen that's happening. Certainly security points that out. But the secret is, the big thing though is what did, people didn't think about it back. Definitely not like me. Like, like 20 years ago is like the, so what happens if your system got hacked or like people, you know, you know like ransomware, right? It's specifically the product designed to like, you know, knock Vizio storage and I'll lay encrypted, deleted or whatever they want to do there. Um, and again, next thing you know, you like Becking up junk that Villa kid by rest somewhere and then you go to your backups and it's like, Oh my God, where w where does everything, because it's all, it's all that and people have a really strong backup and recovery, but they're recovering malware that they stored. >>Exactly. Yeah. Yeah. Basically it's like, that seems like an office problem, but um, like nobody, but a Chronos is actually provides an integrated solutions to build as that, I mean there are different, I mean, people know what the problem is and the, there are companies out there where like, will scanning your backup archives, you'll find them all the way back. Fine. Great. But then anybody could try to like really deal was the restore in a critical situation knows that even it was out. The malware, it concerns, it's, uh, it's stressful. yeah. And it's not always predictable and as old as predictable. Right. Uh, that if the malware isn't wold it's, you know, it becomes an extremely expensive and sometimes, uh, you know, impossible operation that chronic state takes care of that because, you know, weight can actually monetary backups, you know, we can uh, find out where was the last time your, you know, you're clean, it gets into post hoc in a wearable sleeve practical suit gun, that real time scanning for viruses. >>It's a multilevel cyber protection and which is terribly, you know, I think it, I think it's unique in the industry. >> Well I think it's interesting how you guys have brought data protection, uh, concepts and paradigm and practice by the way into cyber was much more holistic view. Right? And I think that's like an operating system kind of thinking and thinking holistically is about systems and systems has consequences. Something goes wrong over here. It's affecting it hopefully to write software for that. And you know, we have a very strong system background photo DNA as they sometimes like to say that. And then in fact they first virtualizer a virtualization solution and containers for that matter were build by the Chronos engineering team. A building 15 years ago, way before, like anybody in the Linux roles knew how to spell container and what they hoped with the name. >>Um, so that's like our storage layer, software defined storage. It's fully blown the HCI product completely around understanding how to build that. That's, it gives us a unique advantage in the security companies. You know, I've gotta ask you a question. I'm, I'm a, I'm fascinating. I'm a student of history and also student of competitive advantage when it comes to technology platforms. And the one thing I always say is, and see it as entrepreneurs, whether they're young or old, is that there's two types of entrepreneurs. There's a systems thinker and a coder, right? And I think with platforms you can't shortcut a platform because there's trajectory benefits of condoms of scale for putting the work in. You can't put a platform out there overnight. You gotta have a, you gotta gotta build it and it takes time. So people try and accelerate platforms. Some, I've done the work, you guys have done it for a long time. What's your view on that whole, well, I'm gonna throw a platform out there. What are some of the things that get exposed when I try to, you know, push a platform too fast? Uh, well the platform presumes that you have an ecosystem, people actually using it and building stuff on top of that. >>Like everybody have you talked about the coders, right? So everybody program or a software developer are, you must have them, at least they dream of two things. They're right. You are like at creating a new programming language. Finally, the one that gets goes for the other guy and guys like, I'm going to write any operating the system. I went through that phase most elaborate in the system long time ago. And it's, you know, it's a process. I mean, whatever you build has to actually serve the purpose. If you would like. There are lots of platforms in all areas of technology and then people's like, Oh, we can a greatest set of API APIs and anybody can plug in into us. It's like, unless you solve a real problem and really simplify life, people, uh, they're not gonna do that happen. I mean, right. They not going to do like you as a platform for the sake of using the platform. >>Our cyber platform is different because we essentially expose, uh, our API to our technology that's out there and people have been using, I mean, I don't know if you saw the keynote, uh, yesterday, there was the demos the way how to write let's go with a plug in for the sake of a better term for purpose of this interview when people can add, uh, you know, their own policies to a cyber protect workflow, which could be specific to what they're doing, you know, you know, they notarized and things like that, that kind of platform makes sense because it's already out there and that's a respond to customer demands. Like, you know, look, uh, will love, what do you guys do? But we have the specialist is specific set of requirements and uh, keep it general enough, incorporated into the product. But there was also a lot of things which would have been specific to a vertical or even to a specific company. We just want to enable them to do this stuff. >>Of course the platforms are there, enabling enables some capabilities that provides value to that right use case. And that could be custom designed domain specific, but I'm sorry, letting that, that could be domain specific. So the platform is enabled capabilities for someone to do something. >>Yes. But again, the key point to the platform is he, it has to kind of solve a real problem, not be there for the sake of elegance or solution or API and things of that nature. >>Final question for you, Alex. So I'm, I'm a CIO or CSO or I'm out there with decision making. I'm like, man, you know what I gotta get up. I gotta rethink my enterprise architecture. I've got to think about, I got IOT coming, I've got industrial IOT and just an regular IOT. I want to have a comprehensive platform. Um, why Chronis what's the pitch and how do you, and what's different than the traditional Sans and storage and other solutions out there? What's the, what's the, what's that pitch to that enterprise decision maker? >>he kinda like to say as you say, I mean you have a tremendous growth in your, in your, in your data flows, the number of data sources, uh, exploding. It's actually going back to a previous question. I think that's what one of the differences that it's not just a volume of data, it's the like the breadth of the data sources are getting better. So you've got to, to manage that gets a little somehow or it's not an Academy. I don't know. I don't know what they're writing and all. I was like, who all the analogy for that so you can like how do you guys get into manage that? Do you have to protect it please? You have to know what your exposure is of what the things there and just throwing out a bunch of, you know, like standard nuts, technologists when product is not going to solve it. >>I mean, yes, you can hire lots of people. You can build your own thing. You would be effectively reinventing the wheel. Lots of wheels in the process of why have we already have that solution for you? I like the platform idea because it makes data more addressable, horizontally scalable. It's not just a siloed right slot product out there. You can actually work and enabled with data. Data is moving around. You've gotta be acted on yes. And software to do that. Yes, exactly. Exactly. So that's, that's another thing cause it's not, uh, it keeps like in a structured day tourism's unstructured data. There's dispatch discussion's been going on for many years. Uh, you know, they've, the reality is you will always have both types into Google. All of us have, they need to process them in both ways. Um, and let's have one more final question that just popped in my head so I can, final final question. >>What's in the infrastructure platform that you're involved in that people should know about that they might not know about that is important to, to investigate? What, is there a killer feature? Is there a killer thing in there that that is like notable that they should know about? What's the, what's under the hood on the infrastructure side for Kronos? Well, lots of things they don't understand. What's your favorite feature about that? What's your favorite feature? What's the one thing? Gosh, you knows like I have lots of babies. I love them all. I mean hard counting sides. A lot of size. I mean like let's say like, okay, I've been writing storage all my most of my career. I like storage, but that does mean it's more important or less important than other things. You know, unless you have a comprehensive compute layer on top of that, this storage is just then become a storage vendor, a niche for the them. >>So that's not who we are. I'm really fascinated by actually the integration was the like cyber feature in the security because that's on one hand it's not something that I've been doing in my previous carrier for most of the time, but I do have a lot of Ghana understanding how they work flow way. She has an integration points and that's excites me. Something I, that's one of the reasons I integrated platforms is I think the key thing. Thanks for coming on, Alex. Thanks for sharing your insight. Appreciate it. First first thing in the morning here in afternoon. Now you never know them and it's like everybody's so busy. It's the Chronis inaugural global cyber summit 2019 about cyber protection, not data protection, cyber protection. They both work hand in hand. This is the cube coverage here in Miami beach. I'm John furrier. We'll be back with more after the short break.

Published Date : Oct 15 2019

SUMMARY :

global cyber summit 2019 brought to you by Acronis Kabran. Great to have you on and great chatting with you prior to coming on camera. all the way, whatever you run on top of the standard commodity get hardware, including the virtualization um, you know engineer and developer and a executive and lot's changed in the past couple of years like 30 years ago, I was like, Oh gosh, you know, if the storage is exploding, It's like the shape of the curve stays the same. guys be the backup, you know, you can think about as the various, like a raid as a way to protect My DS guy, you know, it was like my data center die like my followup You removed the wrong file, the right file and you didn't notice that and I mean, you know, what are you going to do? you know, weight can actually monetary backups, you know, we can uh, find out where was the last you know, I think it, I think it's unique in the industry. And you know, we have a very strong system Some, I've done the work, you guys have done it for a long time. They not going to do like you as a platform for the sake of using the platform. Like, you know, look, uh, will love, what do you guys do? So the platform is enabled capabilities for someone to do something. a real problem, not be there for the sake of elegance or solution I'm like, man, you know what I gotta get up. I was like, who all the analogy for that so you can like how do you guys Uh, you know, they've, the reality is you will always have both types into Google. You know, unless you have a comprehensive compute layer on top of that, something that I've been doing in my previous carrier for most of the time, but I do

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

AmazonORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

DavePERSON

0.99+

Robin MatlockPERSON

0.99+

GoogleORGANIZATION

0.99+

Alex Amir ShenkoPERSON

0.99+

PatPERSON

0.99+

DavidPERSON

0.99+

Alex MiroPERSON

0.99+

AWSORGANIZATION

0.99+

Sam RamjiPERSON

0.99+

JohnPERSON

0.99+

VMworldORGANIZATION

0.99+

VMwareORGANIZATION

0.99+

Alex MiroshichenkoPERSON

0.99+

RobinPERSON

0.99+

Andy JassyPERSON

0.99+

Amazon Web ServicesORGANIZATION

0.99+

SanjayPERSON

0.99+

AlexPERSON

0.99+

Las VegasLOCATION

0.99+

yesterdayDATE

0.99+

42 daysQUANTITY

0.99+

WednesdayDATE

0.99+

ThursdayDATE

0.99+

FirstQUANTITY

0.99+

three dayQUANTITY

0.99+

AcronisORGANIZATION

0.99+

two thingsQUANTITY

0.99+

three years agoDATE

0.99+

V San waveEVENT

0.99+

two factorsQUANTITY

0.99+

OneQUANTITY

0.99+

two gigabytesQUANTITY

0.99+

oneQUANTITY

0.99+

both waysQUANTITY

0.98+

KronosORGANIZATION

0.98+

both typesQUANTITY

0.98+

VMworld 2017EVENT

0.98+

ReinventORGANIZATION

0.98+

15 years agoDATE

0.98+

Miami beachLOCATION

0.98+

VmwareORGANIZATION

0.98+

30 years agoDATE

0.98+

LinuxTITLE

0.98+

Day threeQUANTITY

0.97+

20 years agoDATE

0.97+

Day twoQUANTITY

0.97+

bothQUANTITY

0.97+

Chronis global cyber summit 2019EVENT

0.97+

this yearDATE

0.97+

Acronis KabranPERSON

0.97+

CypressORGANIZATION

0.97+