Image Title

Search Results for America:

Jaime Valles, AWS Latin America | AWS re:Invent 2021


 

>>Hello. And welcome back to the cubes coverage here. Live in Las Vegas for 80 bucks. Re-invent 2021. We're in person been two years since the cube has been on the ground here at a live event, it's a hybrid event. Check them out online. AWS has got to reinvent site as well as cube online. I'm Jennifer, your host got a great guest here from Latin America. Honeywell is VP of Latin America for AWS, a lot of global change, but the regions, a lot of great stuff, cultural integration. If you will, a skills people all around the world using cloud compute. Jaime's great, but coming on the cube. Thanks for coming on. >>Thank you, John. Thank you. It's a pleasure to be >>Here with you. Um, I wish I could speak in the native tongue, but I can't. I ended it, but I know online there's some special rooms that people have on the cube sites. So a lot of tech, a lot of cloud native in the world, I'm seeing Latin America and all the events we've done had great participation in the cloud ecosystem in Latin America, a lot of young talent, a lot of things happening. What's what's going on. >>Well, as you can see around us today, a lot of things are happening in the cloud. We are in this inflection point in the industry of technology that is accelerating innovation, accelerating transformation all over the world. And obviously Latin America is not an exception. We're seeing this momentum. We're seeing large enterprise companies leveraging the cloud to transform their customer experiences, to drive innovation. We're seeing startups to drive competitiveness and try to compete with the world. And that's also enabling a lot of younger generations to move faster, to innovate, to dream big and drive new ideas. So you're seeing that same momentum in Latin America, all across the region. But this is the one John and we, and we are seeing this happening for many years ahead. >>You know, I love inflection points and I've been saying this and just wrote a blog post about it on siliconangle.com that we are now at another inflection point where cloud is going next gen, where in any kind of revolution, every inflection point, this cultural revolution starts with the young people. And I've never seen an impact with Kubernetes and microservices and the modern approach of the younger generation. It's like if I was 20, that'd be a kid in the candy store. What I don't have to build land is there for me. I got to don't have to provision any servers. So the I'm seeing an impact for the younger generation around cloud and it's global phenomenon. What's what's going on in the younger talent in Latin America. Well, >>Let's just say, I mean, generations see inflection as opportunity, opportunity to make new things happen to, as I said to dream big and actually enabled their ideas to become a reality. And that's where you're seeing all across the region. You see this in Brazil, you see these in Argentina, you see this Columbia, Mexico, largest startup communities that are competing with the world. And you have, you know, we have an example like Newman that was here this morning, like started seven years ago, 2014 with a view transforming the financial services experience. That's where we're seeing all across Latin America, because >>The young kids slinging APIs around with containers. Now you've got the container movement. We had a great showing from Brazil and our DockerCon event. Um, net, very notable, um, intelligence coming out of that area. Amazing young talent. I'm just blown away by the, by the work, but in the region itself is still transformation. So I know you're, you're well known for doing really big deals at AWS. Uh, I can say that big banks, multimillion dollar deals. So there's growth there there's existing business transforming while new entrepreneurs are coming in. It's kind of a best of both worlds. What's the, what's the growth look like. >>Uh, as you mentioned, very large enterprises understand that the cloud and a transformation of culture is going to allow them to innovate them, to have loyal customers, every large enterprise customer. We're thinking about different ways to contact their customers, transforming the experience you're seeing customers like like Bancolombia that are migrating their legacy systems into the cloud in order to make faster decisions, to increase agility, to increase innovation and lead their people. Because at the end journey is all about the people that their people build on behalf of their customers and transform their experiences. >>You know, one of the things I noticed during the pandemic, and I'd love to get your reaction to this because I know you're living that as well every day, even before the pandemic, but since everything went virtual now hybrid, you're seeing a very low friction point to get in and collaborate. There's almost a new social construct, connective tissue between no boundaries. So you can have an event like here at reinvent, we're in person, but yet there's an online community digitally engaging. So we're starting to see cell formation where people around the world are getting together. How has it impacted how you manage and how you engage with your customers in your region? >>Well, as I said, it's a combination of many things. Our customers are still like people in person. That's why we have our business in Brazil. We have obviously in Argentina, Colombia, Mexico, Costa Rica, Peru, we still have presses. There we are where we work very close with our customers. We understand they need and what they want to do. But now, for example, during the last two years, I've had the opportunity to leverage in technology, be present in what we call virtual trips in most of our countries full day experiences. And I have to tell you at the beginning, I was concerned. I didn't have the opportunity to meet some of these people before today. When I see them in person here in re-invent this like, as if we had met from four. So as you say is the hybrid experience that allows us to be in-person with our customers, with our partners across the region, but also in a remote base, having the opportunity to build the same relations. And that's what technology is enabling better experience, faster innovation and moral agility and growth all across Latin America. >>So it's one of the things I talked to Adams Leschi about before reinvent a week ago, um, on a bank exclusive interview with him was he was very adamant about the clouds expanding everywhere. Honestly, you've got the edge in manufacturing, ADP percent everywhere, but he mentioned the regions, the continued growth of regions. It's been 10 years since Latin America. How's that impacted what you got going on there. And what's next from a region perspective. And how has that changed the landscape >>While you're touching? John is probably the most important thing we're seeing. You're absolutely right. We started 10 years ago, December 14 in Brazil with an office and a region there Caesar will launch offices in most of our countries. Now the important thing here is how our technology is enabling our companies, Latin American companies. We have 17 million companies in Latin America be more competitive. You know, some examples, I just mentioned Nubank, but we have that is competing with very large companies. You have Bancolombia you have GBM in Mexico. So what we're seeing is our companies be able by leveraging the latest and best technology to compete with the world and to drive that competitiveness that we need. The other thing about talent. If we enable and empower our Latin American talent or builders to build these new experiences, that's, what's going to allow the region to accelerate their growth, their competitiveness, and their social benefits. >>It was interesting too, is that you can see from the trends to do that. You can do it really fast now instantly. So it's, it's an amazing opportunity. Um, I gotta ask you while you're here, cause I'm really curious. I'm sure the viewers will be as well. What's what's going on in Latin America from a trend stamp. What's the vibe like? What's the, what's the environment like what's the, what's the mindset like there in those regions, from an entrepreneurship perspective, from a cloud enablement perspective, a cultural perspective, what's your report? How would you report on that? >>First of all, we're seeing the cloud accelerate all across Latin America. And I, and as I said, it's really day one for all of us. The other thing is that our customers are understanding that digital transformation is not a technology transformation. It's a cultural transformation leverage by leveraging technology for that to happen. It's about people. It's about mechanisms in the company. It's about the way companies make decisions. And that's why, why the power of the cloud is so important in impact to empower these people, to make things happen. In fact, what we're seeing in Latin America is CEOs of some of these companies like Bancolombia CEO is very engaged in this transformation where he's reviewing technology, he's understanding the cloud because that's how they realize or how they understand the importance of, you know, changing their companies, focused on their customers. The other thing is Latin American companies understand that they need to understand their customer needs work backwards from that and leverage that their technology, the cloud in order to improve the experiences of the >>Costumes. So I had to put you on the spot on a question. I gotta ask you, you know, if this is 10 years of re-invent, we've been here for nine. And I remember the first one we went with the second one. Wasn't many people here were like getting guests from the hallway. Hey, come on up on the cube. And now we can't, there's no open spots. Um, 15 years is how old Amazon is Amazon web services. So, so as Adam takes over and you have Amazon going in the next 15 years, what's your vision on how that evolves? Because you know, you're looking at the pandemic ending and pandemic has proven to a lot of people that digital works here, but as exposed what doesn't work, you can't hide the ball anymore if your business, but you're exposed. If you're in the cloud or you've got modern software, if no one's using it, it's not working change it. You can do it fast. So the whole hiding behind, you know, I bought this project, what this software, old guard, new guard, I mean, you can't hide the volume where, so that changes things, but also the creativity of refactoring business is also there. So you got, you got fear. I don't can't hide the ball and you're exposed to opportunity. >>What's your reaction to that? In fact, what I was going to say is where we see some opportunity. I mean, if you see 15 years side where you see, first of all, is all customers in Latin America or everywhere else leveraging the cloud. That's the most important thing. Number two, people leveraging technology to make things happen. It's about building. It's about me. And we talk about this before is when you realize that people are looking for better ways to improve their experience, launching the startups. And this is in finance, in the financial services. This is in manufacturing. This is in all the different industries across Latin America. We see opportunity. The other one, John is a region like Latin America understands that with people you need to enable them. It's about talent. And in order to enable talent, you need to educate them. So in AWS, we're actually investing a lot of time and effort to what to give them the best training content in their local language to launch programs that allow them to innovate like activate that enables to start off to launch. So what we're doing is giving Vilders younger generation tools to be more successful and again, dream big and make things happen now. So the next 15 years, Saba opportunity transforming faster decision-making agility in the way companies move and also driving competitiveness in Latin America to be able to compete in a globalized environment because everything is interconnected and it's about global reach today. And that's why we need our talent to invest, educate, to drive the transformation of the region. >>The global connectedness is a real point there. Great insight. I think the cultural revolutions here, the younger generations engaged existing businesses transforming, which means if they don't do it right, they're going to lose it to the other guy, other people. So I have, okay. Final question for you. Thanks for coming on. Appreciate your time. I know you're busy looking at the pandemic ending. What's the major patterns that you're seeing in Latin America, around companies strategies to transform out of the pandemic, a growth strategy, because everyone I talked to was like, we're going to come out with a tailwind and we're going to be on the upward slope. Obviously they're using cloud of course, but is there a pattern of that coming out of the pandemic with an upward growth? So >>We're seeing all across Latin America companies looking for better ways to reach our customers. That is the fact traditional touch points are not enough. Now they are building on top of that. So we are seeing Latin American companies invested, transform their legacy systems in order to look for different ways to approach the customers. Number two, we're seeing Latin American companies to leverage data in order to make better, more informed and faster decisions and to scale their business and accelerate and empower their teams. We're seeing companies in Latin America, investing in tools to let their people make things happen. As I said before, cultural transformation, digital transformation is about people. It's about fast decision making and it's about leveraging the technology to make it happen. We're seeing a lot of startup communities across our countries, new ideas, taking place. And as you know, AWS has always been focused on let known supporting startups and those new ideas. So we're seeing a lot of things happen in the region. A lot of momentum, a lot of growth. And what we're seeing is the cloud enabling that growth, that opportunity that you were talking about with our view that 15 years out, a lot of new business models are going to be late making hat. They can have >>Great point. I think just to highlight that one key thing, talent, you just add talent to the cloud capabilities. You can get there faster, you do it with a team, even better. Um, collaborations changing. Just the ability to capture opportunities are now faster than when we were growing up. They have a better don't think literally that you wish you were 20. Again, I do with all this code out there. >>And that's where we say it's about the people. And I can tell you from one of our biggest investments, my biggest investments is given the talent that opportunity, given our best training content in local language so they can learn new and better ways of making things happen. So again, as I said, leveraging supporting startups to grow. So all the problems around talent for Latin American cities, for our customers and our partners, because at the end, we understand that our partners expand our solutions to the market. And these are partners that allow us to be present in the many countries that are part of Latin America. >>Well, we'd love your vision, love your, love, your, your insight. And we will have a cube region in your area, and we're going to contact you. The cube will open their doors for the Latin America community. So look for that this year. Thanks for coming on. Now, >>joining you and hosting you in our countries. You're going to see a lot of enthusiasm, passion, and growth and opportunity Latina, >>A lot of great action. The younger generations engaged the older generations transforming the business models. The cloud is going next, gen. This is the cube bringing all the live action. You're watching the queue, the leader in global tech coverage. I'm John Farrow, your host. Thanks for watching.

Published Date : Dec 1 2021

SUMMARY :

Jaime's great, but coming on the cube. It's a pleasure to be So a lot of tech, a lot of cloud native in the world, We're seeing large enterprise companies leveraging the cloud to transform So the I'm seeing an impact You see this in Brazil, you see these in Argentina, you see this Columbia, Mexico, So I know you're, you're well known for doing really big deals at AWS. in order to make faster decisions, to increase agility, to increase innovation You know, one of the things I noticed during the pandemic, and I'd love to get your reaction to this because I know you're living that as well every day, And I have to tell you at the beginning, I was concerned. So it's one of the things I talked to Adams Leschi about before reinvent a week ago, um, be able by leveraging the latest and best technology to compete with the world I'm sure the viewers will be as well. It's about the way companies make decisions. And I remember the first one we went with the second one. And in order to enable talent, out of the pandemic, a growth strategy, because everyone I talked to was like, we're going to come out with a tailwind and it's about leveraging the technology to make it happen. Just the ability to capture And I can tell you from one of our biggest investments, And we will have a cube region in your area, You're going to see a lot of enthusiasm, passion, This is the cube bringing all the live action.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
John FarrowPERSON

0.99+

JohnPERSON

0.99+

BrazilLOCATION

0.99+

AWSORGANIZATION

0.99+

ArgentinaLOCATION

0.99+

Jaime VallesPERSON

0.99+

ColombiaLOCATION

0.99+

MexicoLOCATION

0.99+

AmazonORGANIZATION

0.99+

PeruLOCATION

0.99+

Latin AmericaLOCATION

0.99+

NubankORGANIZATION

0.99+

JenniferPERSON

0.99+

JaimePERSON

0.99+

80 bucksQUANTITY

0.99+

20QUANTITY

0.99+

Latin AmericaLOCATION

0.99+

Las VegasLOCATION

0.99+

10 yearsQUANTITY

0.99+

nineQUANTITY

0.99+

two yearsQUANTITY

0.99+

DockerConEVENT

0.99+

15 yearsQUANTITY

0.99+

December 14DATE

0.99+

Costa RicaLOCATION

0.99+

a week agoDATE

0.99+

BancolombiaORGANIZATION

0.99+

seven years agoDATE

0.99+

AdamPERSON

0.99+

one keyQUANTITY

0.98+

10 years agoDATE

0.98+

both worldsQUANTITY

0.98+

Adams LeschiPERSON

0.98+

oneQUANTITY

0.98+

todayDATE

0.98+

first oneQUANTITY

0.98+

pandemicEVENT

0.97+

LatinaLOCATION

0.97+

HoneywellORGANIZATION

0.97+

2021DATE

0.97+

second oneQUANTITY

0.97+

FirstQUANTITY

0.97+

fourQUANTITY

0.96+

siliconangle.comOTHER

0.96+

VildersORGANIZATION

0.96+

2014DATE

0.95+

this yearDATE

0.95+

GBMORGANIZATION

0.94+

17 million companiesQUANTITY

0.93+

next 15 yearsDATE

0.88+

Latin AmericanOTHER

0.88+

Jacklyn Osborne, Bank Of America | Collibra Data Citizens'21


 

>>from >>around the globe. >>It's the cube >>covering Data Citizens >>21 brought to you by culebra. >>Well how everybody john Wallace here as we continue our coverage here on the cube of Data Citizens 21 it is a pleasure of ours to welcome in an award winner here at Data Citizens 21 were with Jacqueline Osborne who is the Managing Director and risk and Finance technology executive at Bank of America and she is also the data citizen of the Year, one of the culebra Excellence Award winners. And Jacqueline congratulations on the honor. Well deserved, I'm sure. >>Thank you so much. It is a true honor and I am so happy to be here and I'm looking forward to our conversation today. Yeah, what is it? >>It's all about just the concept of being a data citizen um in your mind um what is all that about? What are those pillars in terms of being a good data sets? And that gets to the point that you are the data citizen of the year? >>I think that's such a good question and actually is something that I don't even know if I know everything because it's constantly evolving. Being a data citizen yesterday is not what it is today and it's not what it means tomorrow because this field is evolving but with that said I think to me being a data citizen is being is having that awareness that data matters is driving to that data as an asset and really trying to lay the foundation to ensure its the right data in the right place at the right time. >>Yeah, let's talk about that high wire act because it's becoming increasingly more complex as you know, you've been in This realm if you will for what 15 years now? I believe it has evolved dramatically right in terms of capabilities but also complexity. So let's talk about that, about making finding the relevance of data and delivering it on time to the right people within your organization. >>How much >>More challenging is that now than it was maybe five or just you know, 10 years ago? >>I mean it's kind of crazy. There are some areas that make it so much easier and then for your question in some areas that make it so much harder. But if I can, let's start with the easier because I think this is something that really is important is when I started this, I've been in data my entire professional career, I've been achieved data officer since 2013. Um and when I started, I used to joke that I was a used car salesman. I was selling selling something this idea of data quality, data governance that nobody wanted. But now, so the shift of your question is the good if I am now a luxury car salesman selling a product that everybody wants, but shift to the bad nobody wants to pay for. So the complexity of it as data becomes bigger as we talk about big data and unstructured data and social media and facebook feeds. That is hard. It is complex. And the ability to truly manage and govern data to the degree of that perfection is really hard. So the more data we get, the more complexity, the more challenge, the more there is a need to really prioritize align with business strategy and ensure that you are embedding into the culture and the DNA of the corporate and not do it in the silos. >>You know, delivering that data to in the secure environment obviously, critically important for any enterprise, but even more so to put a finer point on financial services in terms of your work in that regard. So, so let's add that layer into this to not only internal, all the communication you have to do in the collaboration, you have to have but you have these external stakeholders to write, you have me, you know, a boa client if you will um that you've got to be aware of and have to communicate with. So so let's talk about that, that kind of merger if you will of not only having to work internally but also externally and making sure that with all the data you've got now that it works >>indeed. And you're kind of moving towards this new one of the newer dimensions, which is privacy, I mean G D p R was the first regulation in the UK, but now you have the C C P A and the California and it's coming and that that right to be forgotten or more importantly, as you said, as a customer of financial issues, that right to understand where your data is is very important because customers do want to know that their information is understood, trusted protected and going to be taken care of. So that ability to really transform back that you have a solid basis and that you are taking the measures and the necessary steps to ensure that that data is air quotes govern is so important. And it really again that shift from that used car salesman to a luxury car salesman. Your question is another example of how that shift is happening. It's no longer a should do or could do. Data governance is really becoming a must do and why you are seeing so many more. Chief data officers. Chief analytics officers, data management professionals. The profession is growing. I mean, incrementally every single day. >>What about the balancing act that you do? Let's just do with the internal audiences that you have to contend with. I shouldn't say content, content has that pejorative term to that you that you that you deal with, you collaborate with. Um you know, governance is also critically important because you want to make data available to the right people at the right time, but only the right people. Right. So what kind of practices or procedures are you putting in a place at B. O. A to make sure that that data is delivered to the right folks, but only to the right people and trying I guess to educate people within your organization as to the need for these strict governance processes. >>Sure. I tend to refer to them as the foundational pillars and if I was to take a step back and say what they are and how we use them. So the first one is metadata management and it is really around that. What data do you have? It's that understanding the information. So I used to refer to it or I still refer to it as when we were going to the library and you used to have to look at the card catalog That metadata manages very similar to the card catalogue for books. It tells you all the information. What's the genre? Who's the author, what the section is, where it is in the library and that is a core pieces. If you don't understand your data you can govern it. So that's kind of Pillar one. Metadata management. Pillar two is what's often referred to his data lineage. But I do think the new buzzword is that a providence? It's really that access low. It's understanding where data comes from the movement along the journey and where it's going. If you don't understand that horizontal front to back you can't govern the information as well because it can be changing hands, it can be altering and so it's that that end to end look at things. This pillar to pillar three is data quality and that's really that measurement of is it the right data and it is made up of a series of data quality dimensions, accuracy, completeness, validity, timeliness, conformity, reasonable nous etcetera. And it's really that fit freezes the data that I have the right data as I said earlier and then last but not least is issue management. At the end of the day there will be problems, there is too much data. It is in too many hands. So it's not we're not trying to remove all data issues but having a process where you can actually log prioritized and ultimately remediate is that that last and final pillar of the data management I would call circle because it has to all come back together and it's rinse and repeat. >>Yeah. And and so you you raise a point, a great point about things are going to go wrong. You know, eventually something happens. We know nothing is foolproof, nothing is bulletproof. Uh and we're certainly seeing that in terms of security now right with breaches pretty well publicized with invasions, ransom, where you name it, right, all kinds of flavors of that. Unfortunately. So from your perspective in terms of being that this data data guardian, if you will um how much of your concerns now have been amplified in terms of security and privacy and and that kind of internal uh communication you have to have or or I guess by in you know to understand the need to make this data ultra secure and ultra private, especially in this environment where the bad actors you know are are prolific, so kind of talk about that it's a struggle but maybe that challenge That you have in this environment here in 2021. >>Yeah, I think what you know the way I would do it is the struggle is again that that need or the desire to to protect everything and at the end of the day that's hard. And so the struggle right now that I have ri faces the prioritization. How do we differentiate what we call the critical few some call it cds chris critical data elements that they call it Katie key dad elements there, there's there's a term but really as that need and that demand grows whether it's for security or privacy or even data democratization, which hopefully we do talk about at some point, all these things are reliance on the right data because like statistics garbage in garbage out. So whether it's because you need the right information because of your analytics and your models or as you talked about its prevention and defensive security reasons that defensive and offensive isn't going away. So the real struggle is not around the driver, but the prioritization. How do you focus to ensure you're spending your time on the right areas and more importantly in alignment with the business priorities? Because one of the things that's critically important for me is ensuring that it's not metadata or data governance or data quality for the sake of it, it is in alignment with that business priority. >>And and and a big part of that is is strategy for the future, right strategy going forward. you know, where you're going to go in the next 18, 24 months and so from uh without, you know, revealing state secrets here. How do you how do you see this playing out in terms of this continual digital transformation? If you will from the B O a side of the fence? Um, you know, what what do you see as being important or in terms of what you would like to accomplish over the next year and a half, two years >>for me? I think it's that and I'm glad you asked that question, cause I wanted to mention that that data democratization I think. And if we if we debunk that or look into that, what do I mean by democratization? It's that real time access, but it's not real time access to the wrong information or to the wrong people as we talked about, it really is ensuring almost like an amazon model that I can simply search for the information I need, I can put it in my shopping cart and I can check out and I am able to that's that data driven, I'm able to use that information knowing it's the right data in the right hands for the right reasons and that's really my future mind where I'm getting to is how do I enable that? How do I democratize it? So data is truly and does become that enterprise asset that everybody and anybody can access, but they can do so in a way that has all of those defensive controls in place, going back to that right data, right place the right time because the shiny toys of ai machine learning all those things is if you're building models off of the wrong data from the wrong place or in the wrong hands, it's going to bite you in about whether it's today, tomorrow, the future. >>Well, exactly. I love that analogy and on that I'm going to thank you for the time. So I'm gonna call you a luxury data salesperson, not a car car salesman. But uh it certainly has paid off and we certainly congratulate you as well on the award that you wanna hear from calabria. >>Thank you so much and thank you for the time. Hopefully you've enjoyed our conversations as much as I have. >>I certainly have. Thank you very much Jacqueline Osborn, joining us on the Bank of America, the data citizen of the Year. Her data citizens 2021. I'm john walls and you've been watching the cube >>mm

Published Date : Jun 17 2021

SUMMARY :

data citizen of the Year, one of the culebra Excellence Award winners. Thank you so much. that data matters is driving to that data as an asset and about making finding the relevance of data and delivering it on time to the right people within your that you are embedding into the culture and the DNA of the corporate and not so let's add that layer into this to not only internal, all the communication back that you have a solid basis and that you are taking the measures I shouldn't say content, content has that pejorative term to that you that you that you deal with, And it's really that fit freezes the data that I have the right data as I said earlier in terms of being that this data data guardian, if you will um So whether it's because you need the right information because of your analytics and your models or as you talked about And and and a big part of that is is strategy for the future, right strategy going forward. or in the wrong hands, it's going to bite you in about whether it's today, I love that analogy and on that I'm going to thank you for the time. Thank you so much and thank you for the time. Thank you very much Jacqueline Osborn, joining us on the Bank of America, the data citizen

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JacquelinePERSON

0.99+

Jacqueline OsbornePERSON

0.99+

Jacqueline OsbornPERSON

0.99+

Jacklyn OsbornePERSON

0.99+

john WallacePERSON

0.99+

2021DATE

0.99+

amazonORGANIZATION

0.99+

UKLOCATION

0.99+

15 yearsQUANTITY

0.99+

Bank of AmericaORGANIZATION

0.99+

tomorrowDATE

0.99+

todayDATE

0.99+

2013DATE

0.99+

yesterdayDATE

0.99+

facebookORGANIZATION

0.98+

john wallsPERSON

0.98+

Bank Of AmericaORGANIZATION

0.98+

first oneQUANTITY

0.98+

oneQUANTITY

0.98+

10 years agoDATE

0.97+

KatiePERSON

0.97+

18QUANTITY

0.91+

24 monthsQUANTITY

0.89+

culebraTITLE

0.88+

CaliforniaLOCATION

0.88+

C C P ATITLE

0.87+

next year and a halfDATE

0.87+

Data Citizens 21ORGANIZATION

0.85+

first regulationQUANTITY

0.85+

Excellence AwardTITLE

0.78+

two yearsQUANTITY

0.78+

Collibra DataORGANIZATION

0.76+

single dayQUANTITY

0.73+

chrisPERSON

0.69+

pillar threeOTHER

0.68+

fiveQUANTITY

0.59+

Pillar twoOTHER

0.5+

handsQUANTITY

0.49+

21QUANTITY

0.45+

PillarPERSON

0.3+

Bipin Jayaraj, Make-A-Wish® America | VeeamON 2019


 

>> live from Miami Beach, Florida It's the que covering demon 2019. Brought to you, by the way, >> Welcome back to Vima on 2019 in Miami. Everybody, we're here at the Fountain Blue Hotel. This is Day two of our coverage of the Cube, the leader in live Tech. And I'm David Dante with Peter Bors. Pippen. Jay Raj is here. He's the vice president and CEO of Make A Wish America. Just that awesome foundation nonprofit people. Thanks for coming on the Cube. >> Thank you for having me appreciate it. >> So make a wish. Children with wishes and have terminal illnesses. You guys make them come true. It's just a great organizations. Been around for a long time, I think, since the early eighties, right, >> 39 years and going >> years and hundreds of thousands of wishes made. So just how did you get Teo make a wish that all come about >> it? It wasn't interesting journey. I was consulting in I t for multiple big companies. And, you know, two years back, it was through a recruiting channel that I got an opportunity to start some conversations as the CIA and make a wish. Uh, the thing that got me in the opportunity was predominately about enterprises and just to give you a little bit off, make official operations. Make a Wish was Founded and Phoenix, Arizona. And but we also operate a 60 chapters across the United States that it is 60 chapters each of the chapter there 501 C three companies themselves with the CEO and abort. Essentially, it is 60 plus one. The national team kind of managing. All of the chapters are helping the chapters. National does not do any wish. Granting all the wish planning happens to the chapters. But National helps the chapters with the distribution of funding models brand. And thanks for That's a couple of years back in the national board talked about in our dream and mission, which is granting every eligible child the notion ofthe enterprise. You know, working as an enterprise came into four and it being a great piece off providing shared services and thanks for that. So I was brought on board and we took on I would call as the leader today said and dashes dream off. Bringing together all the 60 chapters and the city chapter's essentially are split across 120 locations. So Wade took on a project off. You know, combining our integrating all of their infrastructure needs into one place. And Phoenix without ada, sent a provider. You know, we worked with a partner. Phoenix. Now fantastic partners >> there. We had them on the other day. >> Yep, yep. Yeah, MacLaren. I mean, and the team, they did a great job. And, you know, when we had to move all of the data, everything from the 60 chapters applications everything into a centralized data center, locations that we managed right now from Make a Wish National office and provide a service back to the chapters That gives you a little bit off. You know, from behind the scenes. What happened? >> You provide the technical overview framework for all the 60 chapters. >> It almost sounds like a franchise model. >> It's what we call a Federated model back in the nonprofit. >> But but but but because make a wish is so driven by information. Yep. Both in the application as well as the programs to deliver thie brand promise. And the brand execution has got to be very, very closely tied to the quality of a shared services you provide >> exactly. Exactly. And like I said, the reason I talked about them being a separate companies themselves is you know, as I always say to my 60 CEOs, Ah, I should be able to provide the services because they wanted, because they have a choice to go outside and have their own partner. Another thing for that which they can. But they would want to work with the national team and get my, you know, work through our services rather than having have to because of the very it's A. It's a big difference when it comes to, but I've been lucky on privileged to you have these conversations with the CEO's. When I start talking to them about the need for centralization, the enterprise society assed much, there are questions when he start leading with the mission and the business notion of why we need to do that, it's It's fantastic. Everybody is in line with that. I mean, there's no question, then, as toe Hey, guys, uh, let me do all the Operation Manisha fight and leave it to me and I'll in a handler for you, and I let you guys go to what you do best. which is granting wishes. So then it becomes it doesn't become a question off, you know, should be a shouldn't way. And of course, to back that up. But I was talking to the dean, folks, It just solutions. Like VMware, Veeam. It makes it much simpler even from a cost prospect. You not for me to manage a bigger team s so that I can take those dollars and give it back to the business to grant another wish. So it's it's pretty exciting that >> way. So you set the standards. Okay, here's what you know, we recommend and then you're you're saying that adoption has been quite strong. Yeah, I remember Peter. Don't say easy. I used to run Kitty Sports in my local town in which is small town. And there was, you know, a lot of five or six or seven sports, and I was the sort of central organization I couldn't get six sports to agree that high man is 60 different CEO's. But that's okay. So not easy. But so how were you able to talk leadership or leading as we heard from Gino Speaker today? How were you able to get those guys, you know, aligned with your vision. >> Uh, it's it's been fantastic. I've had a lot ofthe good support from our executive came from a leadership team because leadership is always very important to these big initiatives are National board, which comprises off some of the that stuff best leaders in America and I have the fortune toe be mentored by Randy Sloan, who used to be the CEO of Southwest. And before that, you see a global CEO for, uh, you know, Popsicle. You know, he always told me, but but I mean CIA job. One thing is to no the technology, but completely another thing. Toe building relationships and lead with the business conversation. And so a typical conversation with the CEO about Hey, I need to take the data that you have all the I t things that you have and then me doing it. And then there are questions about what about my staff and the's conversations. Because you know, it's a nonprofit is a very noble, nice feeling, and you wouldn't want the conversations about, you know, being rift and things like that are being reduced producing the staff and thinks of that. But you know as he walked through that and show the benefits of why we doing it. They get it. And they've been able to repurpose many off the I. D functions back in tow, revenue generation model or ofhis granting in our team. And in many cases, I've been ableto absolve some off their folks from different places, which has worked out fine for me, too, because now I have kind of a power user model across the United States through which I can manage all these 120 locations. It's very interesting, >> you know, site Reliable and Engineering Dev Ops talks about thie error budget or which is this notion of doo. You're going tohave errors. You're going to have challenges. Do you want it in the infrastructure you wanted the functions actually generating value for the business? I don't know much about Make a wish. I presume, however, that the mission of helping really sick kids achieve make achieve a wish is both very rewarding, very stressful. He's gotta be in a very emotional undertaking, and I imagine it part of your message them has got to be let's have the stress or that emotional budget be dedicated to the kids and not to the technology >> completely agree. That's that. That's been one of my subjects, as you asked about How is it going about? It's about having the conversation within the context of what we talked about business and true business. Availability of data. You know, before this enterprise project data was probably not secure enough, which is a big undertaking that we're going down the path with cyber security. And you know, that is a big notion, misplaced notion out there that in a non profits are less vulnerable. Nobody. But that's completely untrue, because people have found out that nonprofits do not probably have the securing of walls and were much more weight being targeted nonprofits as a whole, targeted for cyber security crimes and so on and so forth. So some of these that I used to, you know, quote unquote help or help the business leaders understand it, And once they understand they get it, they ableto, you know, appreciate why we doing it and it becomes the conversation gets much more easier. Other What's >> the scope of the size of the chapters is that is a highly variable or there is. >> It is highly variable, and I should probably said, That's Thesixty chapters. We look at it as four categories, so the cat ones are what we call the Big Ice, the Metro New Yorkers and Francisco Bay Area. They're called Category one chapters anywhere between 4 1 60 to 70 staff. Grant's close to around 700 wishes you so as Make a Wish America, we ran close toe 15,600 wishes a year, and cat ones do kind of close to 700 15,600 400 to 700. And then you get into care to scare threes and cat for scat force are anywhere between, you know, given example Puerto Rico or Guam territory there. Cat Force New Mexico is a cat for three staff members Gammas operated by two staff members and 20 volunteers. They grant about 3 2 20 12 to 15 which is a year, so it's kind of highly variable. And then, you know, we talk about Hawaii chapter. It's a great example. They cat once predominate because of the fact that you know, they they do. There's not a lot ofthe wishes getting originated from how I but you know, Florida, California and how your three big chapters with a grand are a vicious ist with a lot of grant, you know, wish granting. So there's a lot off, you know, traffic through those chapters >> so so very distributed on diverse. What's the relationship between data and the granting of wishes? Talk about the role of data. >> Should I? I was say this that in a and I probably race a lot of fibrosis and my first introductory session a couple of years back when I John make a wish with the CEO's uh, when we had the CEO meeting and talk to them about I leaders the days off making decisions based on guts are gone. It has to be a data driven decision because that's where the world is leading to be. Take anything for that matter. So when we talk about that, it was very imperative going back to my project that the hall we had all of the data in one place or a semblance off one single place, as opposed to 60 different places to make decisions based on wish forecast, for example, how many wishes are we going to do? How many wishes are coming in? How's the demand? Was the supply matching up one of the things that we need to do. Budget purposes, going after revenue. And thanks for that. So data becomes very important for us. The other thing, we use data for the wish journeys. Essentially, that's a storytelling. You know, when I you know, it was my first foray into for profit Sorry, nonprofit. And me coming from a full profit is definitely a big culture shock. And one of the things they ask us, what are we selling? Its emotions and story. And that's our data. That is what you know. That's huge for us if we use it for branding and marketing purposes. So having a good semblance off data being ableto access it quickly and being available all the time is huge for us. >> Yeah, and you've got videos on the site, and that's another form of data. Obviously, as we as we know here, okay. And then, from a data protection standpoint, how do you approach that? Presume you're trying to standardize on V maybe is way >> are actually invested in veeam with them for a couple of years right now, as we did the consolidation of infrastructure pieces Veeam supporters with all of the backup and stories replication models. Uh, we're thinking, like Ratmir talked about act one wi be a part of the journey right now, and we're looking at active. What that brings to us. One of the things that you know, dream does for us is we have close to 60 terabytes of data in production and close to another 400 terabytes in the back of things. And, uh, it's interesting when they look about look at me equation, you think about disaster recovery back up. Why do you need it? What? The business use cases case in point. This classic case where we recently celebrated the 10th anniversary ofthe back wish bad kid in San Francisco, we have to go back and get all the archives you know, in a quick fashion, because they're always often requests from the media folks to access some of those. They don't necessarily come in a planned manner. We do a lot of things, a lot of planning around it, but still there are, you know, how How did that come about? What's the story behind? So you know, there are times we have to quickly go back. That's one second thing is having having to replicate our data immediately. Another classic case was in Puerto Rico. There was a natural disaster happened completely. Shut off. All the officers work down. We had to replicate everything what they had into a completely different place so that they could in a vpn, into an access that other chapters and our pulled in to help. They were close to 10 wish families close to 10 which families were stranded because of that. So, you know, gaining that data knowledge of where the family is because the minute of his journey starts. Everything is on us till the witch's journey ends. So we need to make sure everything is proper. Everything goes so data becomes very crucial from those pants >> you're tracking us. I mean, if you haven't been on the make a Wish site is some amazing stories. There I went on the other day. There's a story of ah, of 13 year old girl who's got a heart condition. Who wanted to be a ballerina. A kid with leukemia five years old wants to be a You want to be a chef. My two favorites, I'll share What? It was this kid Brandon a 15 year old with cystic fibrosis. I wanted to be a Navy seal. You guys made that happen. And then there was this child. Colby was 12 years old and a spinal muscular issue. You want to be a secret agent so very creative, you know, wishes that you ran >> way had another wish a couple of years last year in Georgia, where they wish kid wanted to go to Saturn. Yes, yes, it was huge. I mean, and you know the best part about us once we start creating those ideas, it's amazing how much public support we get. The community comes together to make them wish granting process. Great. Now. So I got involved in that. They gave the wish Kato training sessions to make sure that he is equipped when he goes into. And we had a bushel reality company create the entire scene. It was fabulous. So, you know, the way you talk about data and the technology is now some of the things I'm very excited about us usage off thes next Gen technology is like our winter reality to grant a wish. I mean, how cool would that be for granting a wish kid who is not able to get out of the bed. But having able to experience a the Hawaii is swimming. Are being in Disney World enough a couple of days? That's That's another use case that we talked about. That other one is to put the donors who pay the money in that moment off granting, you know, they are big major gift, uh, donors for make a wish. Sometimes we were not able to be part of a fish, but that would be pretty cool if you can bring the technology back to them and you know not going for them. You know pretty much everybody and make the ass through that rather than a PowerPoint or a storytelling, when the storytelling has to evolve to incorporate all of that so pretty excited >> and potentially make a participatory like, say, the virtual reality and then even getting in more into the senses and the that the smells. And I mean this is the world that we're entering the machine intelligence, >> which you still have to have, But you still have to be a functioning, competent, operationally sound organization. There've been a number of charities, make a wish is often at the top of the list of good charities. But there were a number of charities where the amount of money that's dedicated to the mission is a lot less an amount of money, dedicated administration of fundraising, and they always blame it. Systems were not being able to track things. So no, it's become part of the mission to stay on top of how information's flowing because it's not your normal business model. But the services you provide is really useful. Important. >> Sure, let me percent you the business conundrum that I have personally as a 90 leader. It takes close to $10,400 on an average to grant a wish. Uh, and, uh, partly because of me. But being part of the mission, plus me as a 90 leader wanting to understand the business more, I signed up. I'm a volunteer at the local Arizona chapter. I've done couple of expanding myself, and, uh, the condom is, if asked, if you want to go, uh, you know, do the latest and greatest network upgrade for $10,400 are what do you want to, uh, you know and make the network more resilient cyber security and all that stuff. What do you want to go grant? Another wish as a 90 leader probably picked the former. But as a volunteer, I would be like, No, it needs to go to the kid. It's Ah, it's It's an interesting kind of number, you know? You have to find the right balance. I mean, you cannot be left behind in that journey because at many points of time s I talked about it being a cost center. It being a back office. I think those days have clearly gone. I mean, we we evolved to the point where it is making you steps to be a participant b A b a enabler for the top line to bring in more revenues, tow no augment solutions for revenue and things. For that sofa >> rattles the experience or exact role citizens. And in your case, it's the experience is what's being delivered to the degree that you can improve the experience administratively field by making operations cheaper. Great. But as you said, new digital technologies, they're going to make it possible to do things with the experience that we could even conceive of. Five >> wears a classic example. Williams and Beam. I couldn't have taken the data from 60 chapters 120 locations into one single location manageable, and it reduced the cost literally reduce the cost of the 60 instances in one place without technology is like, you know what Sharia virtual machines. And and then to have a backup robust backup solution in a replication off it. It's fantastic. It's amazing >> there. And that's against here. You could give back to the dash chapters and backing, But thanks so much for sharing your story. You Thank you. Thank you. You're welcome. Alright, keep it right there. Buddy. Peter and I were back with our next guest. You watching the Cube live from V mon from Miami? 2019. We're right back. Thank you.

Published Date : May 22 2019

SUMMARY :

live from Miami Beach, Florida It's the que covering of the Cube, the leader in live Tech. since the early eighties, right, you get Teo make a wish that all come about And, you know, two We had them on the other day. And, you know, And the brand execution has got to be very, But they would want to work with the national team and get my, you know, And there was, you know, a lot of five or six or seven CEO for, uh, you know, Popsicle. you know, site Reliable and Engineering Dev Ops talks about thie error budget or And you know, They cat once predominate because of the fact that you know, Talk about the role of data. You know, when I you know, it was my first foray into for from a data protection standpoint, how do you approach that? One of the things that you know, dream does for us is we have close to 60 You want to be a secret agent so very creative, you know, wishes that you ran the way you talk about data and the technology is now some of the things I'm very excited about us usage and the that the smells. But the services you provide I mean, you cannot be left behind it's the experience is what's being delivered to the degree that you And and then to have a backup You could give back to the dash chapters and backing, But thanks so much for

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
PeterPERSON

0.99+

GeorgiaLOCATION

0.99+

Puerto RicoLOCATION

0.99+

Randy SloanPERSON

0.99+

David DantePERSON

0.99+

2019DATE

0.99+

Jay RajPERSON

0.99+

RatmirPERSON

0.99+

Peter BorsPERSON

0.99+

MiamiLOCATION

0.99+

GuamLOCATION

0.99+

San FranciscoLOCATION

0.99+

Bipin JayarajPERSON

0.99+

BrandonPERSON

0.99+

ColbyPERSON

0.99+

$10,400QUANTITY

0.99+

AmericaLOCATION

0.99+

United StatesLOCATION

0.99+

sixQUANTITY

0.99+

20 volunteersQUANTITY

0.99+

60 instancesQUANTITY

0.99+

CIAORGANIZATION

0.99+

60QUANTITY

0.99+

CaliforniaLOCATION

0.99+

Miami Beach, FloridaLOCATION

0.99+

oneQUANTITY

0.99+

120 locationsQUANTITY

0.99+

WilliamsPERSON

0.99+

60 chaptersQUANTITY

0.99+

Make A Wish AmericaORGANIZATION

0.99+

one placeQUANTITY

0.99+

BothQUANTITY

0.99+

FloridaLOCATION

0.99+

15QUANTITY

0.99+

400 terabytesQUANTITY

0.99+

HawaiiLOCATION

0.99+

SouthwestORGANIZATION

0.99+

VeeamORGANIZATION

0.99+

90 leaderQUANTITY

0.99+

BeamPERSON

0.99+

60 CEOsQUANTITY

0.99+

ArizonaLOCATION

0.98+

PowerPointTITLE

0.98+

70QUANTITY

0.98+

Kitty SportsORGANIZATION

0.98+

FiveQUANTITY

0.98+

WadePERSON

0.98+

fiveQUANTITY

0.98+

MacLarenPERSON

0.98+

todayDATE

0.98+

two years backDATE

0.98+

last yearDATE

0.98+

six sportsQUANTITY

0.98+

one placeQUANTITY

0.98+

bothQUANTITY

0.98+

15 year oldQUANTITY

0.97+

10th anniversaryQUANTITY

0.97+

eachQUANTITY

0.97+

SaturnLOCATION

0.97+

Day twoQUANTITY

0.97+

Francisco Bay AreaLOCATION

0.97+

early eightiesDATE

0.97+

VMwareORGANIZATION

0.97+

Disney WorldLOCATION

0.97+

a yearQUANTITY

0.97+

two staff membersQUANTITY

0.97+

one second thingQUANTITY

0.96+

around 700 wishesQUANTITY

0.96+

OneQUANTITY

0.96+

PopsicleORGANIZATION

0.96+

60 different placesQUANTITY

0.96+

two favoritesQUANTITY

0.96+

four categoriesQUANTITY

0.96+

Make a Wish NationalORGANIZATION

0.96+

seven sportsQUANTITY

0.96+

Phoenix, ArizonaLOCATION

0.95+

Operation ManishaTITLE

0.95+

PippenPERSON

0.95+

three companiesQUANTITY

0.94+

three big chaptersQUANTITY

0.94+

Brian Kumagai & Scott Beekman, Toshiba Memory America | CUBE Conversation, December 2018


 

>> Pomp YouTubers. Welcome to another cube conversation from ours, the Cube Studios in Palo Alto, California In this conversation, we're going to build upon some other recent conversations we've had which explores this increasingly important relationship between Senate conductor, memory or flash and new classes of applications that are really making life easier and changing the way that human beings in Iraq with each other, both in business as wells and consumer domains. And to explore these crucial issues. We've got two great guests. Brian Kumagai is the director of business development at Kashima Memory America. Scott Beekman is the director of managed flashes to Sheba Memory America's Well, gentlemen, welcome to the Cube. And yet so I'm gonna give you my perspective. I think this is pretty broadly held generally is that as a technology gets more broadly adopted, people get experience with. And as designers, developers, users gain experience with technology, they start to apply their own creativity, and it starts to morph and change and pull and stretch of technology and a lot of different directions. And that leads to increased specialization. That's happening in the flash work I got there, right? Scott? >> Yes, you know the great thing about flashes. Just how you because this it is and how widely it's used. And if you think about any electronic device it needs, it needs a brain processor. Needs to remember what it's doing. Memory and memories, What? What we do. And so we see it used in, you know, so many applications from smartphones, tablets, printers, laptops, you know, streaming media devices. And, uh and so you know, that that technology we see used, for example, like human see memory. It's a low power memory is designed for, for, like, smartphones that aren't plugged in. And, uh, and so when you see smartphones, one point five billion smartphones, it drives that technology and then migrates into all kinds of other applications is well, and then we see new technologies that come and replace that like U F s Universal flash storage. It's intended to be the high performance replacement. Mm. See, And so now that's also mag raiding its way through smartphones and all these other applications. >> So there's a lot of new applications that are requiring new classes of flash. But there's still a fair amount of, AH applications that require traditional flash technology. These air not coming in squashing old flash or traditional flasher other pipe types of parts, but amplifying their use in specialized ways. Brian Possible. But about >> that. So it's interesting that these days no one's really talks about the original in the hand flash that was ever developed back in nineteen eighty seven and that was based on a single of a cell, or SLC technology, which today still offers the highest reliability and fastest before me. Anand device available in the market today. And because of that, designers have found this type of memory to work well for storing boot code and some levels of operating system code. And these are in a wide variety of devices, both and consumer and industrial segments. Anything from set top boxes connecting streaming video. You've got your printers. You, Aye aye. Speakers. Just a numerous breath of product. I >> gotta also believe a lot of AA lot of i o t lot of industrial edge devices they're goingto feature. A lot of these kinds of parts may be disconnected, maybe connected beneath low power, very high speed, low cost, highly reliable. >> That's correct. And because these particular devices air still offered in lower densities. It does offer a very cost effective solutions for designers today. >> Okay, well, let's start with one of the applications. That is very, very popular. Press. When automated driving autonomous funerals on the work, it's it's There's a Thomas vehicles, but there's autonomous robots more broadly, let's start with Autonomous vehicle Scott. What types of flash based technologies are ending up in cars and why? >> Okay, so we've seen a lot of changes within vehicles over the last few years. You know, increasing storage requirements for, like, infotainment systems. You know, more sophisticated navigations of waste recognition. Ah, no instrument clusters more informed of digital displays and then ate ass features. You know, collision avoidance things like like that and all that's driving maur Maureen memory storage and faster performance memory. And in particular, what we've seen for automotive is it's basically adopting the type of memory that you have in your smartphone. So smart phones have a long time have used this political this. Mm. See a memory. And that has made you made my greatest weigh in automotive. And now a CZ smartphones have transition been transitioning do you? A fast, in fact, sushi. But it was the first introduced samples of U F U F S in early two thousand thirteen, and then you started to see it in smartphones in two thousand fifteen. Well, that's now migrating in tow. Automotive as well. They need to take advantage of the higher performance, the higher densities and so and so to Chiba. Zero. We're supporting, you know this, this growth within automotive as well. >> But automotive is a is a market on DH. Again, I think it's a great distinction you made. It's just not autonomous. It's thie even when the human being is still driving. It's the class of services that provided to that driver, both from an entertainment, say and and safety and overall experience standpoint. Is driving a very aggressively forward that volume in and the ability to demonstrate what you can do in a car is having a significant implications on the other classes of applications that we think for some of these high end parts. How is the experience that were incorporating into an automotive application or set of applications starting to impact? How others envision how their consumer products can be made better, Better experience safer, etcetera in other domains >> uh, well, yeah, I mean, we see that all kinds of applications are taking advantage of the these technologies. Like like even air via air, for example. Again, it's all it's all taking advantage of this idea of needing higher, larger density of storage at a lower cost with low power, good performance and all these applications air taking an advantage of that, including automotive. And if you look it automotive, you know, it's it's not just within the vehicle. Actually, it's estimated, you know, projected that autonomous vehicles we need, like one two, three terabytes of storage within the within the vehicle. But then all the data that's collected from cameras and sensors need to be uploaded to the cloud and all that needs to be stored. So that's driving storage to data centers because you basically need to learn from that to improve the software. For the for, Ah, you know, for the time being, Yeah, exactly. So all these things are driving more and more storage, both with within the devices themselves, like a car is like a device, but also in the data centers as >> well. So if we can't Brian take us through some of the decisions that designer has to go through to start to marry some of these different memory technologies together to create, whether it's an autonomous car, perhaps something a little bit more mundane. This might be a computing device. What is the designer? How does is I think about how these fit together to serve the needs of the user in the application. >> Um, I think >> these days, you know a lot of new products. They require a lot of features and capabilities. So I think a lot of input or thought is going into the the memory size itself. You know, I think software guys are always wanting to have more storage, to write more code, that sort of thing. So I think that is one lt's step that they think about the size of the package and then cost is always a factor as well. So you know nothing about the Sheba's. We do offer a broad product breath that producing all types of I'm not about to memory that'll fit everyone's needs. >> So give us some examples of what that product looks like and how it maps to some of these animation needs. >> So we like unmentioned we offered the lower density SLC man that's thought that a one gigabit density and then it max about maximum thirty to get bit dying. And as you get into more multi level cell or triple level cell or cue Elsie type devices, you're been able to use memory that's up to a single diet could be upto one point three three terror bits. So there's such a huge range of memory devices available >> today. And so if we think about where the memories devices are today and we're applications or pulling us, what kind of stuff is on the horizon scarred? >> Well, one is just more and more storage for smartphones. We want more, you know, two fifty six gigabyte fight told Gigabyte, one terabyte and and in particular for a lot of these mobile devices. You know, like convention You f s is really where things were going and continuing to advance that technology continuing to increase their performance, continuing to increase the densities. And so, you know, and that enables a lot of applications that we actually a hardman vision at this point. And when we know autonomous vehicles are important, I'm really excited about that because I'm in need that when I'm ninety, you know can drive anywhere. I want everyone to go, but and then I I you know where I's going, so it's a lot of things. So you know, we have some idea now, but there's things that we can't envision, and this technology enables that and enables other people who can see how do I take advantage of that? The faster performance, the greater density is a lower cost forbid. >> So if we think about, uh, General Computer, especially some of these out cases were talking about where the customer experience is a function of how fast a device starts up or how fast the service starts up, or how rich the service could be in terms of different classes of input, voice or visual or whatever else might be. And we think about these data centers where the closed loop between the processing and the interesting of some of these models and how it affects what that transactions going to do. We're tournament lower late. See, that's driving a lot of designers to think about how they can start moving certain classes of function closer to the memory, both from a security standpoint from an error correction standpoint, talk to us a little bit about the direction that to Sheba imagines, Oh, the differential ability of future memories relative Well, memories today, relative to where they've been, how what kinds of features and functions are being added to some of these parts to make them that much more robust in some of these application. >> I think a >> CZ you meant mentioned the robustness. So the memory itself. And I think that actually some current memory devices will allow you to actually identify the number of bits that are being corrected. And then that kind of gives an indication the integrity or the reliability of a particular block of memory. And I think as users are able to get early detection of this, they could do things to move the data around and then make their overall storage more reliable. >> Things got way. Yeah. I mean, we continue, Teo, figure out how to cram orbits within a given space. You know, moving from S l see them. I'll see the teal seemed. And on cue, Elsie. That's all enabling that Teo enabled greater storage. Lower cost on DH, then, Aziz, we just talked from the beginning. Just that there's all kinds of differentiation in terms of of flash products that are really tailored for certain things. Someone focus for really high performance and give up some power. And others you need a certain balance of that. Were, you know, a mobile device, you know, handheld device. You're not going to play. You know, You give up some performance for less power. And so there's a whole spectrum. It's someone you know. Endurance is incredibly important. So we have a full breast of products that address all those particular needs. >> The designer. It's just whatever I need. I could come to you. >> Yeah, that's right. So she betrays them. The full breath of products available. >> All right, gentlemen. Thank you very much for being on the Cube. Brian Coma Guy, director of business development to Sheba Memory America. Scott Beekman, director of Manage Flash. Achieve a memory. America again. Thanks very much for being on the Q. Thank you. Thank you. And this closes this cube conversation on Peter Burress until next time. Thank you very much for watching

Published Date : Jan 30 2019

SUMMARY :

And that leads to increased specialization. And so we see it used in, you know, so many applications from smartphones, So there's a lot of new applications that are requiring new classes of flash. So it's interesting that these days no one's really talks about the original A lot of these kinds of parts may be disconnected, And because these particular devices air still offered in lower densities. When automated driving autonomous funerals on the work, And that has made you made my greatest weigh in automotive. It's the class of services that provided to that driver, both from an entertainment, And if you look it automotive, you know, it's it's not just within the to serve the needs of the user in the application. So you know nothing about the Sheba's. And as you get into more multi level cell or triple And so if we think about where the memories devices are today and we're And so, you know, the direction that to Sheba imagines, Oh, And I think that actually some current memory devices And others you need a certain balance of that. I could come to you. So she betrays them. Thank you very much for being on the Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Brian KumagaiPERSON

0.99+

Scott BeekmanPERSON

0.99+

Peter BurressPERSON

0.99+

Brian Coma GuyPERSON

0.99+

Brian PossiblePERSON

0.99+

IraqLOCATION

0.99+

December 2018DATE

0.99+

AzizPERSON

0.99+

firstQUANTITY

0.99+

ScottPERSON

0.99+

ninetyQUANTITY

0.99+

Kashima Memory AmericaORGANIZATION

0.99+

BrianPERSON

0.99+

Sheba Memory AmericaORGANIZATION

0.99+

Palo Alto, CaliforniaLOCATION

0.99+

three terabytesQUANTITY

0.99+

SenateORGANIZATION

0.99+

ElsiePERSON

0.99+

one terabyteQUANTITY

0.98+

bothQUANTITY

0.98+

Cube StudiosORGANIZATION

0.98+

GigabyteORGANIZATION

0.97+

TeoPERSON

0.97+

todayDATE

0.97+

two thousand fifteenQUANTITY

0.97+

CubeORGANIZATION

0.96+

Toshiba Memory AmericaORGANIZATION

0.96+

U F U F SCOMMERCIAL_ITEM

0.94+

twoQUANTITY

0.94+

two great guestsQUANTITY

0.94+

five billion smartphonesQUANTITY

0.93+

one gigabitQUANTITY

0.93+

U FORGANIZATION

0.92+

two fifty six gigabyteQUANTITY

0.92+

oneQUANTITY

0.91+

AmericaLOCATION

0.91+

ShebaORGANIZATION

0.9+

singleQUANTITY

0.85+

threeQUANTITY

0.85+

one pointQUANTITY

0.82+

ShebaPERSON

0.74+

eighty sevenQUANTITY

0.74+

FlashTITLE

0.73+

thirtyQUANTITY

0.73+

three terror bitsQUANTITY

0.72+

ScottORGANIZATION

0.72+

AnandORGANIZATION

0.71+

early twoDATE

0.71+

one ofQUANTITY

0.7+

single dietQUANTITY

0.68+

MaureenPERSON

0.67+

thousand thirteenQUANTITY

0.64+

ChibaORGANIZATION

0.63+

ZeroQUANTITY

0.62+

cellQUANTITY

0.61+

last few yearsDATE

0.54+

ThomasPERSON

0.52+

nineteenDATE

0.51+

applicationsQUANTITY

0.47+

Scott Nelson & Doug Wong, Toshiba Memory America | CUBE Conversation, December 2018


 

>> (enchanted music) >> Hi, I'm Peter Burris and welcome to another CUBE Conversation from our awesome Palo Alto Studios. We've got a great conversation today. We're going to be talking about flash memory, other types of memory, classes of applications, future of how computing is going to be made more valuable to people and how it's going to affect us all. And to do that we've got Scott Nelson who's the Senior Vice President and GM of the memory unit at Toshiba Memory America. And Doug Wong who's a member of the technical staff also at Toshiba Memory America. Gentlemen, welcome to the CUBE >> Thank you >> Here's where I want to start. That when you think about where we are today in computing and digital devices, etc., a lot of that has been made possible by new memory technologies, and let me explain what I mean. For a long, time storage was how we persisted data. We wrote transactions to data and we kept it there so we could go back and review it if we wanted to. But something happened in the last dozen years or so, it happened before then but it's really taken off, where we're using semi-conductor memory which allows us to think about how we're going to deliver data to different classes of devices, both the consumer and the enterprise. First off, what do you think about that and what's Toshiba's association with these semi-conductor memories been? Why don't we start with you. >> So, appreciate the observation and I think that you're spot on. So, roughly 35 years ago Toshiba had the vision of a non-volatile storage device. So, we brought to market, we invented NOR flash in 1984. And then later the market wanted something that was higher density, so we developed NAND flash technology, which was invented in 1987. So, that was kind of the genesis of this whole flash revolution that's really been disruptive to the industry as we see it today. >> So, added up, it didn't start off in large data centers. It started off in kind of almost unassuming devices associated with particular classes of file. What were they? >> So, it was very disruptive technology. So the first application for the flash technology was actually replacing audio tape and the phone answering machine. And then it evolved beyond that into replacing digital film. Kept going replacing cassette tapes and then if you look at today it enabled the thin and light that we see with the portability of the notebooks and the laptops. The mobility of content with our pictures, and our videos and our music. And then today, the smart phone, that wouldn't really be without the flash technology that's necessary that gives us all of the high density storage that we see. >> So, this suggests a pretty expansive role of semi-conductive related memory. Give us a little sense of where is the technology today? >> Well, the technology today is evolving. So, originally floating-gate flash was the primary type of flash that we created. It's called two-dimensional, cleaner, floating-gate flash. And that existed from the beginning all the way through maybe to 2015 or so. But, it was not possible to really shrink flash any further to increase the density. >> In the 2D form? >> In the 2D form, exactly. So, we to move to a 3D technology. Now Toshiba presented the world's first research papers on 3D flash back in 2007, but at that time it was not necessary to actually use 3D technology at that time. When it became difficult to increase the density of flash further that's when we actually moved to production of our 3D flash memory which we call BiCS flash. And BiCS stands for bit column stacked flash and that's our trade name for our 3D memory. >> So, we're now in 3D memory technology because we're creating more data and the applications are demanding more data, both for customer experience and new classes of application. So, when we think about those applications Toshiba used to have to go to people and tell them how they could use this technology and now you've got an enormous number of designers coming to you. Doug, what are some of the applications that you're anticipating hearing about that's driving the demand for these technologies? >> Well, beyond the existing applications, such as personal information appliances like laptops and portables, and also in data centers which is actually a large part of our business as well. We also see emerging technologies as becoming eventual large users of flash memory. Things like autonomous vehicles or augmented or virtual reality. Or even the emerging IOT infrastructure and that's necessary to support all these portable devices. So these are devices that currently aren't using large amounts of flash, but are going to be in the future. Especially as the flash memory gets more dense, and less expensive. >> So there's an enormous range of applications on the horizon. Going to drive greater demand for flash, but there's some business challenges of achieving that demand. We've seen periodic challenges of supply, price volatility. Scott, when we think about Toshiba as a leader in sustaining a kind of good flow of technology into these applications, what is Toshiba doing to continue to satisfy customer demand, sustain that leadership in this flash marketplace? >> So, first off as Doug had mentioned the floating-gate technology has reached its ability to scale in a meaningful way. And so the other part of that also, is the limitation on the dye density so the market demand for these applications are asking for a higher density, higher performance, lower latency type of applications. And so because floating-gate has reached the end of its usefulness in terms of being able to scale, that brought about the 3D. And so the 3D, that gives us our higher density and then along with the performance it enables these applications. So, from Toshiba's point, we are seeing that migration that is happening today. So, the floating-gate is migrating over to the 3D. It's not to say that floating-gate demand will go away. There's a lot of applications that require the lower density. But certainly the higher density where you need a dye level 256 512 giga bit even up to terabit of data. That's where the 3D's go into play. Second to that really goes into the cap back. So, obviously that requires a significant amount of cap backs not only on the development but also in terms of capacity. And that, of course, is very important to our customers and to the industry as a whole for the assurance of supply. >> So, we're looking so Toshiba's value to the marketplace is both in creating these new technologies, filling out a product line, but also stepping up and establishing the capacity through significant capital investments in a lot of places around the globe to ensure that the supply is there for the future. >> Exactly right. You know, Toshiba is the most experienced flash vendor out there and so we led the industry in terms of the floating-gate technology and we are technology leaders; industry's migrating into the 3D. And so, with that, we continue with a significant capital investment to maintain our presence in the industry as a leader. >> So, when we think about leadership, we think about leadership both in consumer markets, because volume is crucial to sustaining these investments, generating returns, but I also want to spend just a second talking about the enterprise as well. What types of enterprise relationships do you guys envision? And what types of applications do you think are going to be made possible by the continued exploitation of flash in some of these big applications that we're building? Doug, what do you think? >> Well, I think that new types of flash will be necessary for new, emerging applications such as AI or instant recognition of images. So, we are working on next generation flash technology. So, historically flash was designed for lowest cost per bit. So that's how flash began to take over the market for storage from hard drives. But there are a class of applications that do require very low latencies. In other words, they want faster performance. So we are working on a new flash technology that actually optimizes performance over cost. And that is actually a new change to the flash memory landscape. And as you alluded to earlier there's a lot of differentiation in flash now to address specific market segments. So that's what we are working on, actually. Now, generically, these new non-volatile memory technologies are called storage class memories. And they include things like optimized flash or potentially face change memories resistive memories. But all these memories, even though they're slower than say the volatile memories such as D-ram and S-ram they are, number one they're non-volatiles which means they can learn and they can store data for the future. So we believe that this class of memory is going to become more important in the future to address things like learning systems and AI. >> Because you can't learn what you can't remember. >> Exactly. >> I heard somebody say that once. In fact, I've got to give credit. That came straight from Doug. So, if we think about looking forward the challenges that we face ultimately is have the capital structure necessary to build these things. The right relationships with the designers necessary to provide guidance and suggest about the new cost of applications, and the ability to consistently deliver into this. Especially for some of these new applications as we look forward. Do you guys anticipate that there will be in the next few years, particular moments or particular application forms that are going to just kick a lot of or further kick some of the new designs, some of the new technologies into higher gear? Is there something autonomous vehicles or something that's just going to catalyze a whole new way of thinking about the role that memory plays in computing and in devices? >> Well, I think that building off of a lot of the applications that are utilizing NAND technology that we're going to see now we have the enterprise, we have the data center that's really starting to take off to adopt the value proposition of NAND. And as Doug had mentioned when we get into the autonomous vehicle we get into AI or we get into VR a lot of applications to come will be utilizing the high-density, low-latency that the flash offers for storage. >> Excellent. Gentlemen, thanks very much for being on the CUBE. Great conversation about Toshiba's role in semi-conductor memory, flash memory, and future leadership as well. >> Thank you, Peter. >> Scott Nelson is the Senior Vice President and GM of the memory unit at Toshiba Memory America. Doug Wong is a member of the tactical staff at Toshiba Memory America. I'm Peter Burris. Thanks once again for watching the CUBE. (enchanted music)

Published Date : Jan 4 2019

SUMMARY :

future of how computing is going to be made more valuable both the consumer and the enterprise. disruptive to the industry as we see it today. So, added up, it didn't start off in large data centers. and light that we see with the portability So, this suggests a pretty expansive role And that existed from the beginning all the way In the 2D form, exactly. that's driving the demand for these technologies? but are going to be in the future. on the horizon. So, the floating-gate is migrating over to the 3D. in a lot of places around the globe the floating-gate technology are going to be made possible by the So that's how flash began to take over the market and the ability to consistently deliver into this. a lot of the applications that are utilizing NAND technology being on the CUBE. Doug Wong is a member of the tactical staff

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Peter BurrisPERSON

0.99+

ToshibaORGANIZATION

0.99+

2007DATE

0.99+

Doug WongPERSON

0.99+

1987DATE

0.99+

DougPERSON

0.99+

ScottPERSON

0.99+

2015DATE

0.99+

1984DATE

0.99+

Scott NelsonPERSON

0.99+

December 2018DATE

0.99+

PeterPERSON

0.99+

Toshiba Memory AmericaORGANIZATION

0.99+

bothQUANTITY

0.99+

first applicationQUANTITY

0.99+

todayDATE

0.98+

SecondQUANTITY

0.98+

FirstQUANTITY

0.98+

firstQUANTITY

0.96+

35 years agoDATE

0.94+

first research papersQUANTITY

0.94+

CUBEORGANIZATION

0.92+

Palo Alto StudiosORGANIZATION

0.92+

BiCSTITLE

0.85+

a secondQUANTITY

0.82+

level 256 512 giga bitQUANTITY

0.8+

next few yearsDATE

0.77+

last dozen yearsDATE

0.76+

NAND flashOTHER

0.75+

3DQUANTITY

0.67+

twoQUANTITY

0.62+

onceQUANTITY

0.58+

to terabitQUANTITY

0.56+

2DQUANTITY

0.53+

CUBE ConversationEVENT

0.49+

Jonathan Weinert, Bosch North America | InterBike 2018


 

(techno music) >> Hey, welcome back everybody, Jeff Frick here with theCUBE. We're in Reno, Nevada at the Reno Convention Center. It's InterBike 2018, I think it's like 20,000 people, haven't got the official count yet, but this is an amazing show, it's all about bicycles. We came because we want to learn more about eBikes, and really, this kind of last mile thing that's goin' on, mobility, and right at the center of the eBike revolution is a company that's been around forever, and that's Bosch, and we're happy to have Jonathan Weinert. He's a sales and marketing manager for the Bosch eBikes. Jonathan, great to see you. >> Great to see you, Jeff. >> So, I don't know if everybody knows, you guys power like half of all the eBikes that are out there. You guys are completely in bed with all these manufacturers with really, the industry leading system. >> Thank you, yes, the Bosch eBike system, you'll find it world wide on about 70 different bike brands throughout the world. Here in North America, we're on about 30 different brands, from Trek to Electra to Cannondale. And they power all types of bikes, so commuter bikes, cargo bikes, fat bikes, mountain bikes, any type of bike that you can think of can use the Bosch eBike system to amplify the rider's power and help you go further, higher, farther, less sweat or sweat it out, whatever you want. >> Right, it's like the magic power. >> Exactly, magic carpet ride. >> The main components are you got the drive unit, which is really the heart of the system. >> Yes. >> The battery obviously to provide the power, then the control unit that's up on top of the handlebars, so you can control it. >> Exactly. >> So we were talking before we turned the cameras on, of kind of the history, you guys have been at this for like nine years, I believe you said? >> Exactly, yeah, we invented this system nine years ago, it was a combination of technology from our automotive business. So an electric power steering motor, married with technology from our power tools business, the lithium iron battery pack. And we also had some sensors, torque sensors and electronics and we put these technologies together, and the engineers back then, what they wanted to do is create something to make cycling still feel like cycling but help you conquer hills. >> Right. >> And go farther and use the bike more. >> Right, it's pretty interesting cause there's a whole lot of data that's feeding that software and the algorithms to make those feedback loops smooth, make 'em feel like bicycling, so it's really you're riding on software. >> Exactly, you're riding on software and we have three sensors that are capturing your input. Torque sensor from the pedals, how fast you're pedaling, and wheel speed. And those three sensor measurements go into the electronics and tell the motor how much extra oomph to give you. >> Right, but you have to be pedaling right? >> You always have to be pedaling, yeah. >> That's one of the data inputs. >> Exactly, these are all pedal assist eBikes, and they only assist you when you pedal, no throttle, and they can assist you up to 20 miles per hour, or 28 miles per hour for our speed system. >> Right, we saw that last night in the gazelle, they had one of the 28 mile an hour bikes. >> Yeah, which is great for people that have long distance commutes or they want to do these huge adventure rides, so yeah, both are great. >> Now, what about the maintenance for these types of systems I mean it looks like a pretty closed system. >> It is totally closed, yeah. >> It's totally closed. >> Yeah, the maintenance, they last a long time, they're warrantied for two years, but if you have a problem with anything, you take it to the dealer, the dealer takes the component off, sends it to Bosch and gives you a new one. You don't have to open anything or solder anything. >> Right, right. >> Yeah, no. It's automotive grade, sort of service and diagnostics. >> Right, so the other thing we're seeing all over the show floor here again is all about the data. There's so much more data available to the riders. We were just at the Garmin booth and I don't know how many different data sets that they can track, in terms of your pedal pressure. >> Yes. >> Whether you're tipping back and forth, whether you're even, and you guys are actually pulling some of that external data back into your systems, right? For a unified experience for the rider. I think you said, a heart rate sensor for instance? >> Exactly, that's the newest feature that we're showcasing at InterBike today, the Kiox display. Which connects man and machine, or woman and machine. You can wear a heart rate monitor and as you're riding, you can see your heart rate on your device. Which is great if you want to train on an e-mountain bike. Sometimes you want to keep your heart rate in a certain range. Sometimes you want to make sure it doesn't go above a certain limit. >> Right. Yeah, so it's our first step into connectivity. Many more connectivity features will follow. >> Right, so I'm just curious from your perspective on the bike industry, cause you sit in kind of this, cat bird seat, since you deal with so many different kinds of bikes. And I was amazed at how much of the mountain bike adoption of the eBikes is happening here. Have you seen within your dealers, kind of this new opportunity to leverage electronics and a motor to kind of reinvigorate the brands, reinvigorate the models, and reinvigorate, you know, many of the, just a wide range of cool form factors that we're seeing all over the floor? >> Yeah, so nine years ago, Bosch coupled with Haibike. Haibike sort of created this segment of e-mountain biking by putting the motor in a unique way into the bike, and since then this e-mountain bike trend has really taken off, it's huge in Europe. You'll see e-mountain bikes all over the ski resorts there. They're allowing families to e-mountain bike together, to bike together, just like they ski together in the winter. So it's reinvigorating ski resorts and we see ski resorts here in the US, also embracing e-mountain bikes. Mammoth Mountain just allowed class one e-mountain bikes on all their bike park trails. So e-mountain biking is really spreading through this resort and other resorts, North Star, right up the road. >> Right and I wonder on the city side, again, lessons we can learn from Europe, cause it seems like the regulations are, you know, they're always a little bit behind the technology in terms of, you know, how are eBikes treated. Are they a bike, are they a motor vehicle? And I know there's some laws but it still seems a little bit confused and cities aren't quite ready to realize that an eBike is better than a car, in terms of so many things happening in the city. Are you guys involved in that, kind of industry consortium and how do you see that evolving? >> So we've been involved with several other bike companies and PeopleForBikes to create a framework, how to regulate eBikes. And we've divided eBikes into three classes. Class one, two and three, pedal assist, throttle, anyway. Setting up this definition of the three classes of eBikes, we've created this eBike law in California and nine other states throughout the country. So now they know how to regulate eBikes and these three classes and they can limit where each class can go on the roads. And with this regulation, we're seeing the eBike adoption in these states really start to pick up, now that they're easier to regulate. >> Right, well Jonathan, really a cool story and it's been really fun to watch Bosch, especially as you guys have gone from your long history in the auto parts world to this new exciting space. So thanks for taking a few minutes and congrats. >> Oh, my pleasure, Jeff, thank you. >> Alright, he's Jonathan, I'm Jeff, you're watching theCUBE, we're at InterBike in Reno, Nevada. Thanks for watching, see you next time. (techno music)

Published Date : Sep 21 2018

SUMMARY :

We're in Reno, Nevada at the Reno Convention Center. So, I don't know if everybody knows, you guys power and help you go further, higher, farther, The main components are you got the drive unit, so you can control it. and the engineers back then, what they wanted to do that's feeding that software and the algorithms and tell the motor how much extra oomph to give you. and they can assist you up to 20 miles per hour, Right, we saw that last night in the gazelle, or they want to do these huge adventure rides, I mean it looks like a pretty closed system. sends it to Bosch and gives you a new one. Yeah, no. Right, so the other thing we're seeing and you guys are actually pulling Sometimes you want to keep your heart rate in a certain range. Yeah, so it's our first step into connectivity. on the bike industry, cause you sit in kind of this, and we see ski resorts here in the US, cause it seems like the regulations are, you know, and PeopleForBikes to create a framework, and it's been really fun to watch Bosch, Thanks for watching, see you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MichaelPERSON

0.99+

HowardPERSON

0.99+

MariaPERSON

0.99+

Laura HeismanPERSON

0.99+

LauraPERSON

0.99+

JamaicaLOCATION

0.99+

Mark FaltoPERSON

0.99+

DavidPERSON

0.99+

DavePERSON

0.99+

JeffPERSON

0.99+

JohnPERSON

0.99+

Jeff FrickPERSON

0.99+

Dave ValantePERSON

0.99+

CaliforniaLOCATION

0.99+

2006DATE

0.99+

2012DATE

0.99+

Dan SavaresePERSON

0.99+

CompaqORGANIZATION

0.99+

JoePERSON

0.99+

EMCORGANIZATION

0.99+

Paul GillanPERSON

0.99+

RonPERSON

0.99+

JonathanPERSON

0.99+

DellORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

RhondaPERSON

0.99+

Jonathan WeinertPERSON

0.99+

Steve BamaPERSON

0.99+

twoQUANTITY

0.99+

two yearsQUANTITY

0.99+

VegasLOCATION

0.99+

BangaloreLOCATION

0.99+

2009DATE

0.99+

John TroyerPERSON

0.99+

Amazon Web ServicesORGANIZATION

0.99+

EuropeLOCATION

0.99+

IndiaLOCATION

0.99+

2018DATE

0.99+

FortyQUANTITY

0.99+

MondayDATE

0.99+

MarkPERSON

0.99+

SeptemberDATE

0.99+

San FranciscoLOCATION

0.99+

Dave MatthewsPERSON

0.99+

AdobeORGANIZATION

0.99+

Sanjay PoonenPERSON

0.99+

Trevor DavePERSON

0.99+

BenPERSON

0.99+

1999DATE

0.99+

VMwareORGANIZATION

0.99+

Jonathan SecklerPERSON

0.99+

Howard EliasPERSON

0.99+

16 acreQUANTITY

0.99+

10QUANTITY

0.99+

80 percentQUANTITY

0.99+

JapanLOCATION

0.99+

200 acreQUANTITY

0.99+

BMCORGANIZATION

0.99+

$50 millionQUANTITY

0.99+

Ravi Pendekanti, Dell EMC and Steve Fingerhut, Toshiba Memory America | Dell Technologies World 2018


 

>> Narrator: Live from Las Vegas, it's theCUBE, covering Dell Technologies World 2018. Brought to you by Dell EMC and its ecosystem partners. >> Welcome back to the Sands! We continue here live on theCUBE, our coverage here of Dell Technologies World 2018. 14,000 attendees wrapping up day 3. We are live as I said with Stu Miniman. I'm John Walls, and it is now our pleasure to welcome to the set Steve Fingerhut, who is the SVP and GM of SSD and Cloud Software Business Units at Toshiba Memory Americas. Steve, good to see you, sir. >> Great to be here. >> And Ravi Pendekanti, who is the SVP of Server Solutions Product Management and Marketing at Dell. >> Thank you, John. >> Ravi, good to see you, sir. >> Same here, sir. >> Yeah, let's talk about, first off, show theme. Make it real, right? Digital transformation, but make it real. >> Ravi: Yup. >> So, what does it mean to the two of you? We've heard that theme over and over again, and what do you think that means to your customers as well? How do you make it real for them? >> First and foremost, I think the whole idea of new workloads come in play. People talk about machine learning and deep learning as you, I'm sure, are aware of. People talk about analytics. The fact is, each of us is collecting a lot more data than a year ago. Which is good for my friend Steve and others, and obviously, we like the fact that customers are looking at making more real-time, if not near real-time, analysis. And the whole notion of governmental agencies across the world trying to go into more of a digital world where if you look at a country like India, for example, I mean, they have a billion people who are looking at other cards where they didn't have a form of identification for each individuals. Now if they're gone through a new transformation phase where they want to ensure that every single one of them actually has a way of identification, and it's all done digitally with accounts and everything else that goes on, this is just some of the manifestations of the digital transformation we see, whether it is in your industries, pick your favorite one, whether it's financial sector, the manufacturing, health care, all the way to governmental agencies. I think each of them are looking at how do they look at providing rights out of services. Either for their customers or their communities at large, and, you know, we can't be more excited about what this provides an opportunity for us to go back and provide a way for them to communicate and do some cool takes. >> Steve? >> Yeah, Ravi, you mentioned the workloads that are driving the new campaign or that you're highlighting in the new campaign Make It Real, and, many of those workloads are, they're new architectures, and they were basically built from day one on SSDs, right? Counting on that performance, reliability, etc. And so obviously, that's what we're here to promote at the show. And you can see the new workloads, obviously anything Cloud very much counts on SSDs and Flash. And then as you get into machine learning, different types of artificial intelligence, those are certainly counting on the performance of SSDs. And keep nothing more real than actual products in hands so with Ravi's products and ours, we have a number of demo's, including the new AMD platforms that the Power Edge team is rolling out, running all of these new workloads on Toshiba SSDs. So it's a good way to make it real. >> Yeah, Steve, maybe bring us in a little bit kind of the state of storage, though. We have talked about SSDs, and we're now a decent way into it. Dell's announcement talking a lot about NVMe. Maybe give us the Toshiba viewpoint on memory and storage and some of those transitions we're going through. >> Right, well, I guess the secret's out that SSDs are a great addition. Right? You take pretty much any environment, and you add SSDs, and it will go faster. So it's pretty much the biggest bang for the buck in terms of incremental performance. So what that means is just tremendous growth. And the last couple years have been, really for the industry, keeping up with that really increased demand. So there's inherent efficiencies in the SSDs. We're trying to build as many as we can, and then obviously trying to help our customers use them in the most efficient ways possible. >> Yeah, I agree with Steve. I mean, it is an efficiency equation. The fact of the matter is, you really do need to provide customers with a better way of ensuring that timely information is made available. Again, it's information, and it has to be timely. Because if you really don't provide it at a time when our customers need it, there's really no advantage of being really, having right infrastructure, right? Or lack of it, for that matter. Case in point, if you look at what we just announced, Stu. Yesterday, we had talked about the R840, for example, which is a 4-socket server. And we actually announced it with 44 NVMe drives, believe it or not. That's about two times more than the nearest competitor that just gives you an idea into the amount of data that customers are consuming on the applications, obviously. And more importantly, when we were coming up with this notion, we felt that 12 was probably a good number. Maybe 24 was going to be a stretch. And the number of customers we have talked to even in the last two days, I mean it's been huge. We're hearing them saying, "Wow, we can't wait "to go get this product in our hands." Because that really shows you that there is already a pretty big demand for these kinds of technologies to be brought in. >> Yeah, I like what you were saying there, Ravi, because I'd like both of you to help connect the dots for us a little bit. 'Cause when I think back to, okay, what speed disc did I have? Or was the flash piece in? This was something that, it was traditionally the server admin. Maybe there was some application person that came in. But you're talking about C-level discussions here. The trends that Jeff Clark talked about in his keynote as to, you know, this is what the business is driving things, like AINML and some of those. Steve, how are the conversations changing to get this piece of the infrastructure up at more of the C-level discussion? >> Right, it certainly is part of the transformation where it's been talked about several times this week. IT has moved from being a cost center to the revenue center and then that puts it on the CEO's radar much more squarely. You definitely want to, if you're the CIO, CTO, infrastructure leader, your goal is to try to deliver that agility, right? Don't stand in the way of revenue, while managing security, managing cost. And it's those dynamics and, you know, it's not a new conversation, but it's the public versus private hybrid. What exactly should go where? And those are still top-of-mind for all the customers we're talking to. >> Actually, Steve hit on something else, if I may, which is about security. And I can't tell you, Stu, a good 70% of the customers on average today, do not finish a conversation in the 30-minute chunks we have had without talking about what is it you guys are going to do for security. And that's a huge number or an increase from where we were just even a year or two ago. And imagine having said that, if you really had a longer conversation, security obviously is one of those fundamental pillars that everybody comes down to. Because everybody's worried about data, and the fact that there's leakage of information, if I may, pertaining to this. And more importantly, you know, making it real, if I may, to your point earlier on, Jon, as well. Which is, customers don't want to look at just the buzz words. They're now asking for proof points. Proof points on, "Hey, what does this really mean "in terms of security?" For example, when we talk about zero arrays or, you know, secure arrays, sorry, which is, how do you go retire an old data server or a box without necessarily worrying about the bits and bytes being left on the disc drives? So we have come up with new technologies which enables all the drives to be wiped. Makes it a lot easier, of course, with some of the stuff we do with Toshiba, and some of their technologies as well. But my point, again, being that I think now, our C-level execs are coming in asking us for, not just the major teams, but they're actually more interested in finding out how and what is it we're doing to help some of those major teams. And I think the number of requests we have had for some of the white papers we have come out with, Steve, I think has only grown up now. >> Absolutely. >> Which, I don't think was happening in the past from the C-level execs. So it's absolutely a valid statement. >> Yeah, well, there were Senate hearings last year and some pretty famous data breaches, and you have senators grilling CEO's, and it was shocking. They actually used, there was a senator who used the term, full disc encryption, and taking a CEO to task for not using full disc encryption and so I think that might help, talking about getting on the C-level radar. That helps. >> That was good staff work there. >> Exactly, exactly. That was a good plant. >> Yeah, right. But to the point of security. Obviously with this exponential growth of data, unstructured, blowing up, and then all of a sudden, you become a lot riper, if you will, and you've got a lot more to manage. And so with that, how much more at risk are people, and is that what's raising the awareness now in the C-sweep? Is they realize that they're a much bigger target now than maybe when data wasn't as plentiful you know, back in the old days, if you will. Is that part of this? Or is that it? >> I believe that's a big part of it. And, one of the other things that's obviously going with this is, if you really look at the disclosures that any of us have to go through, even in terms of whether it's a simple credit card you're looking at. I don't know if you've ever seen those. As we were doing some of the analysis, we noticed. You want a simple credit card application, we'd had some security, and, you know, personal information clauses is actually garnered by about 120% in terms of the number of things they ask for. And making sure that the consumer is aware as well. Right? I don't think that happened before. And the fact of the matter is, I don't think there's a single day that we can go through any of the trade press without somebody coming out with a security breach maybe, or a security feature, whether it's hardware or software. And I think there's a whole security encryption device or drives, I think there's a huge demand for that as well, right? >> Absolutely. And you talk about the data growth. It's obviously been phenomenal. In his keynote Monday, Michael Dell talked about the data growth from machine to machine, and it's going to make this look like a little bit of data. So like you said, just that risk, the exposure is much larger, and you have to keep that data secure. So as Ravi mentioned, we work closely with Dell. There's a lot of, it's not an easy problem to solve, right? So there's a lot of engineering to make sure that you have that end-to-end security, and that's why we work with things like the instant system erase, right? So you can, one button, erase the system in minutes, versus in the past, it might take hours and days. And do you really trust that it's gone? Those types of things, so I think that those are enabling a much more robust security, and you basically have to make it easy, right? >> Letting people sleep at night. >> Exactly. >> That's what you're doing. >> It's interesting. In the past, the only way you could do that was you had to write a series of 0's and 1's on their driver. And that would take, you know, hours together. That's how you would erase your data, right? I love when you talk about autonomous vehicles. Imagine there's a whole big, a whole discussion as much as how do you make sure that you have the, that's kind of an edge computing as Jeff, I think, mentioned on stage yesterday. That you want to not have latency come in between making a deterministic turn, right? Or an object appears. You don't want to wait for the breaking system to play because some decision needs to be made in a remote center. Right? Which essentially means now you have got data being collected and analyzed and acted upon. And there are things like that, and you've probably heard of all the insurance companies are working on, you know, what kind of data can we collect it, because when crashes happen, right? How do you make sure that, you know, there are privacy laws in place and what-not, who has access to it, plenty of stuff. >> John: Sure. >> Steve, want to get your viewpoint. We're getting not far from the end of the show. Why don't you give, in general, the partner viewpoint of Dell technology's world in, specifically Toshiba. I know you've got, there's the booze, there's the party, there's demos, there's labs, so a lot of activity your team's doing, for those that haven't been here. And, you know, Toshiba's worked with both Legacy Dell, Legacy MC. Any commentary to close on that coming together? >> Right. I think last year, I used the Jordan/Pippen analogy, but it's only gotten better since then. So it's a great partnership. We're definitely growing strong together, and like you said, that doesn't happen overnight. That's years of hard work and trust that makes that a possibility. But I truly believe we're only getting started. And you know, one of our goals we're working together is how do we make these important capabilities like security more common, more accessible, lower cost, those types of things. So that's a major factor, major focus area for us going forward. But definitely see this is just the beginning. >> Any key highlight from the show or activities that your team's been doing here that you'd like to leave us with? >> Sure. Yeah, we have a significant presence here. We have eight server demos running. I mentioned the AMD servers, multiple workloads across these new emerging workloads. And then the hands-on demo zone. Where actually, the developers can use the systems and software they want to evaluate. They can use them in the Cloud. Those are all being driven by Toshiba, and of course, as part of the Dell Solution. Yeah, we're happy. Honored to be a big part of the show this year. >> Jordan/Pippen, I was thinking more like Curry/Durant. That's where I was going with that. >> Exactly. That might be a little more up-to-date, right? >> I'm good with Jordan. No, he wasn't bad. Pretty good pair like you two are. Thanks for joining us both. We appreciate it, Ravi, Steve. >> Thank you. >> Thank you. >> Good seeing you here. Back with more of a continue, our live coverage here on theCUBE where Dell Technologies World 2018, and we are in Las Vegas.

Published Date : May 2 2018

SUMMARY :

Brought to you by Dell EMC and its ecosystem partners. I'm John Walls, and it is now our pleasure And Ravi Pendekanti, who is the SVP of Yeah, let's talk about, first off, show theme. of the digital transformation we see, And you can see the new workloads, obviously anything Cloud kind of the state of storage, though. and you add SSDs, and it will go faster. And the number of customers we have talked to because I'd like both of you to help connect the dots And it's those dynamics and, you know, And more importantly, you know, making it real, if I may, from the C-level execs. and you have senators grilling CEO's, That was That was a good plant. you know, back in the old days, if you will. And making sure that the consumer is aware as well. and you have to keep that data secure. In the past, the only way you could do that Why don't you give, in general, the partner viewpoint and like you said, that doesn't happen overnight. and of course, as part of the Dell Solution. That's where I was going with that. That might be a little more up-to-date, right? Pretty good pair like you two are. Good seeing you here.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
StevePERSON

0.99+

Jeff ClarkPERSON

0.99+

JordanPERSON

0.99+

Steve FingerhutPERSON

0.99+

Stu MinimanPERSON

0.99+

JohnPERSON

0.99+

CurryPERSON

0.99+

Ravi PendekantiPERSON

0.99+

Michael DellPERSON

0.99+

John WallsPERSON

0.99+

ToshibaORGANIZATION

0.99+

DurantPERSON

0.99+

JonPERSON

0.99+

JeffPERSON

0.99+

RaviPERSON

0.99+

Las VegasLOCATION

0.99+

twoQUANTITY

0.99+

30-minuteQUANTITY

0.99+

MondayDATE

0.99+

PippenPERSON

0.99+

70%QUANTITY

0.99+

DellORGANIZATION

0.99+

last yearDATE

0.99+

eachQUANTITY

0.99+

yesterdayDATE

0.99+

Dell EMCORGANIZATION

0.99+

AMDORGANIZATION

0.99+

Legacy MCORGANIZATION

0.99+

bothQUANTITY

0.99+

todayDATE

0.99+

oneQUANTITY

0.99+

FirstQUANTITY

0.98+

YesterdayDATE

0.98+

Dell Technologies World 2018EVENT

0.98+

one buttonQUANTITY

0.98+

Toshiba Memory AmericasORGANIZATION

0.98+

Toshiba Memory AmericaORGANIZATION

0.97+

this weekDATE

0.97+

this yearDATE

0.97+

about 120%QUANTITY

0.97+

44 NVMeQUANTITY

0.97+

Legacy DellORGANIZATION

0.96+

zero arraysQUANTITY

0.96+

day 3QUANTITY

0.95+

R840COMMERCIAL_ITEM

0.94+

IndiaLOCATION

0.94+

a yearDATE

0.93+

a year agoDATE

0.93+

each individualsQUANTITY

0.93+

4-socketQUANTITY

0.93+

StuPERSON

0.91+

single dayQUANTITY

0.9+

12QUANTITY

0.9+

14,000 attendeesQUANTITY

0.86+

0QUANTITY

0.86+

SenateORGANIZATION

0.86+

Ricardo Villadiego, Cyxtera | RSA North America 2018


 

>> Announcer: From downtown San Francisco, it's theCUBE, covering RSA North America 2018. >> Hey, welcome back everybody, Jeff Frick here with theCUBE. We're at the RSA conference in San Francisco 40,000 plus people talking about security, gets bigger and bigger every year. Soon it's going to eclipse Oracle Open World and Sales Force to be the biggest conference in all of San Francisco. But we've got somebody who's been coming here he said for 16 years, Ricardo Villidiego, the EDP and GM Security and Fraud for Cyxtera. Did I get that right, Cyxtera? >> Cyxtera. >> Jeff: Cyxtera Technologies, great to see you. >> Thank you Jeff, it's glad to be here. >> So you said you've been coming here for 16 years. How has it changed? >> Yeah, that's exactly right. You know it's becoming bigger, and bigger, and bigger I believe this is a representation of the size of the prowling out there. >> But are we getting better at it, or is it just the tax service is getting better? Why are there so many, why is it getting bigger and bigger? Are we going to get this thing solved or? >> I think it is that combination within we have the unique solution that is going to help significantly organizations to get better in the security landscape I think the issue that we have is there's just so many now use in general and I think that now is a representation of the disconnection that exists between the way technologies are deploying security and the way technologies are consuming IT. I think IT is completely, has a evolved significantly and is completely hybrid today and organizations are continuing to deploy security in a way like if we were in the 90s. >> Right. >> And that's the biggest connection that exists between the attacks and the protection. >> But in the 90s we still like, or you can correct me, and we can actually build some big brick walls and a moat and a couple crocodiles and we can keep the bad guys out. That's not the way anymore. >> It is not a way. And look, I believe we're up there every protection creates a reaction on the adversary. And that is absolutely true in security and it is absolutely true in the fraud landscape. Every protection measure will push the adversary to innovate and that innovation is what, for good and for bad, has created this big market which we can't complain. >> Right, right. So for folks that aren't familiar with Cyxtera give them the quick update on what you guys are all about. >> So see, I think Cyxtera is here to conquer the cyber security space. I think what we did is we put together technologies from the companies that we acquire. >> Right. >> With a combination of the call center facilities that we also acquired from Centurylink to build this vision of the secure infrastructure company and what we're launching here at the RSA conference 2018 is AppGate 4.0 which is the flagship offering around secure access. Secure access is that anchor up on which organizations can deploy a secure way to enable their workforce and their party relationships to get access the critical assets within the network in a secure way. >> Okay, and you said 4.0 so that implies that there was a three and a two and probably a one. >> Actually you're right. >> So what are some of the new things in 4.0? >> Well, it's great it gives it an evolution of the current platform we lounge what we call life entitlements which is an innovative concept upon which we can dynamically adjust the permitter of an an end point. And the user that is behind that end point. I think, you know, a permitter that's today doesn't exist as they were in the 90s. >> Right, right. >> That concept of a unique permitter that is protected by the firewall that is implemented by Enact Technology doesn't exist anymore. >> Right. >> Today is about agility, today is about mobility, today is about enabling the end user to securely access their... >> Their applications, >> The inevitable actions, >> They may need, right. >> And what AppGate does is exactly that. Is to identify what the security processor of the end point and the user behind the end point and deploy a security of one that's unique to the specific conditions of an end point and the user behind that end point when they're trying to access critical assets within the network. >> Okay, so if I heard you right, so instead of just a traditional wall it's a combination of identity, >> Ricardo: It's identity. >> The end point how their access is, and then the context within the application. >> That's exactly right. >> Oh, awesome so that's very significant change than probably when you started out years ago. >> Absolutely, and look Jeff, I think you know to some extent the way enterprises are deploying security is delusional. And I say that because there is a reality and it looks like we're ignoring ignoring the reality but the reality is the way organizations are consuming IT is totally different than what it was in the 90s and the early 2000s. >> Right. >> The way organizations are deploying security today doesn't match with the way they're consuming IT today. That's where AppGate SDP can breach that gap and enable organizations to deploy security strategies that match with the reality of IT obstacles today. >> Right. If they don't get it, they better get it quick 'cause else not, you know we see them in the Wall Street Journal tomorrow morning and that's not a happy place to be. >> Absolutely not, absolute not and we're trying to help them to stay aware of that. >> Right. Alright, Ricardo we'll have to leave it there we're crammed for time but thanks for taking a few minutes out of your day. >> Alright Jeff, thank you very much I love to be here. >> Alright. He's Ricardo I'm Jeff you're watching theCUBE from RSAC 2018 San Francisco. (upbeat music)

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's theCUBE, and Sales Force to be the biggest So you said you've been coming here for 16 years. the size of the prowling out there. that now is a representation of the disconnection that And that's the biggest connection that exists But in the 90s we still like, in the fraud landscape. So for folks that aren't familiar with Cyxtera technologies from the With a combination of the call center facilities Okay, and you said 4.0 so that implies And the user that is behind that end point. that is protected by the firewall that is Today is about agility, today is about mobility, and the user behind that end point when and then the context within the application. than probably when you started out years ago. and the early 2000s. and enable organizations to deploy security and that's not a happy place to be. them to stay aware of that. Right. I love to be here. He's Ricardo I'm Jeff

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

RicardoPERSON

0.99+

Ricardo VilladiegoPERSON

0.99+

Ricardo VillidiegoPERSON

0.99+

Jeff FrickPERSON

0.99+

CenturylinkORGANIZATION

0.99+

EDPORGANIZATION

0.99+

CyxteraORGANIZATION

0.99+

tomorrow morningDATE

0.99+

Enact TechnologyORGANIZATION

0.99+

90sDATE

0.99+

todayDATE

0.99+

San FranciscoLOCATION

0.99+

16 yearsQUANTITY

0.99+

TodayDATE

0.99+

early 2000sDATE

0.98+

40,000 plus peopleQUANTITY

0.98+

threeQUANTITY

0.98+

oneQUANTITY

0.98+

Cyxtera TechnologiesORGANIZATION

0.97+

RSA conference 2018EVENT

0.94+

Wall Street JournalTITLE

0.93+

GM Security and FraudORGANIZATION

0.93+

twoQUANTITY

0.93+

2018DATE

0.9+

yearsDATE

0.87+

RSACEVENT

0.87+

Open WorldEVENT

0.86+

RSA North America 2018EVENT

0.85+

AppGateTITLE

0.84+

CyxteraPERSON

0.8+

Sales ForceORGANIZATION

0.77+

RSA conferenceEVENT

0.74+

RSA North AmericaORGANIZATION

0.72+

OracleORGANIZATION

0.7+

AppGate 4.0EVENT

0.7+

4.0OTHER

0.7+

every yearQUANTITY

0.64+

couple crocodilesQUANTITY

0.64+

theCUBEORGANIZATION

0.61+

measureQUANTITY

0.59+

SDPORGANIZATION

0.5+

Matt Cauthorn, ExtraHop | RSA North America 2018


 

>> Announcer: From downtown San Francisco, it's theCUBE, covering RSA North America 2018. >> Hey, welcome back everybody. Jeff Frick here with theCUBE. We're at the RSA Conference in downtown San Francisco. Forty thousand plus security experts really trying to help us all out. Protect our borders not so much, but protects access to these machines, which is harder and harder and harder everyday with bring your own devices and all these devices. So really, it's a different strategy. And we're really excited to have ExtraHop back, we had ExtraHop on last year for the first year, he's Matt Cauthorn, the VP of security at ExtraHop. So Matt, what do you think of the show? >> Oh, amazing. Absolutely amazing. Super packed, been walking like crazy. Got all my steps in, its fantastic. >> Alright, so you guys have been in network security for a long time? >> Yeah so we've been, so we live in the East-West corridor, inside the enterprise, inside the perimeter doing wire data analytics, and network security analytics. Our source of data is the network itself. >> Okay. And the network is increasing exponentially with all the traffic that's going through, the data sources are increasing exponentially with all the traffic going through. >> That's right. >> So how are you guys keeping up with the scale, and what's really the security solution that you guys are implementing? >> So the point you make is really interesting. Yes, it is increasing exponentially, and as a data source the network is the only sort of observational point of truth in the entirety of IT. Everything else is sort of self-reported. Logs, end points, those are very valuable data sources, but as an empirical source of truth, of evidence, the network wins. That assumes you can scale. And that assumes you're fluent with the protocols that are traversing the network, and you're able to actually handle the traffic in the first place. And so for us just this week, we announced a 100gb per second capable appliance, which you know is an unprecedented amount of analytics from the network's perspective. So we're very proud about that. >> So what are you looking for? What are some of the telltale signs that you guys are sniffing for? >> So generally, we auto-classify and auto-discover all of the behaviors on the wire. From the devices themselves, to the services that those devices expose, as well as the transactions that those devices exchange. And so from a context perspective, we're able to go far deeper than almost anyone else in the space, that we know of at least. Far deeper and far more comprehensive sort of analysis as it relates to the network itself. >> And the context is really the key, right? Tag testing what, why, how. System behavior, that's what you're looking for? >> A great example is a user logging into a database, that might be part of a cluster of databases, and understanding what the user's behavior is with the database, which queries are being exchanged, what the database response is in the first place. Is it an error, is it an access denied? And does this behavior look like a denial of service, for example. And we can do all of that in real time, and we have a machine learning layer that sits over top and sort of does a lot of the analytics, and the sort of insights preemptively on your behalf. >> And it's only going to get crazier, right? With IOT and 5g. Just putting that much more data, that many more devices, that much more information on the network. Yeah, so IOT in particular is interesting, because IOT is challenging to instrument in traditional ways, and so you really do have to fall back to the network at some point for your analysis. And so that's where we're very, very strong in the IOT world and industrial controls, SCADA and beyond. Healthcare, HL7 for example. So we're able to actually give you a level of insight that's really, really difficult to get otherwise. >> And we've been hearing a lot of the keynotes and stuff, that those machines, those end points are often the easiest path in for the bad guys. >> Yes they are. >> An enormous security camera or whatever, because they don't have the same OS, they don't have all the ability to configure the protections that you would with say a laptop or a server. >> That's right. There's a surprising number of IOT devices out there that are running very, very old. And vulnerable operating systems are easy to exploit. >> Alright, so Matt I guess we're into Q2 already, hard to believe the years passing by. What's priorities for 2018 for you and ExtraHop? >> So we've announced a first class, purpose-built security solution this year, and really the plan is to continue the sort of momentum that we've accrued. Which is very encouraging, the amount of interest that we've had. It's hard to keep up, frankly. Which is fantastic. We want to continue to build on that, grow out the use cases, grow out the customer base and continue our success. >> Alright Matt, well we'll keep an eye on the story, and thanks for stopping by. >> Great, thank you. Appreciate it. >> Alrighties Matt, I'm Jeff, you're watching theCUBE from RSA Conference, San Francisco. Thanks for watching.

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's theCUBE, he's Matt Cauthorn, the VP of security at ExtraHop. Oh, amazing. Our source of data is the network itself. the data sources are increasing exponentially and as a data source the network is the only all of the behaviors on the wire. And the context is really the key, right? and the sort of insights preemptively on your behalf. that much more information on the network. are often the easiest path in for the bad guys. that you would with say a laptop or a server. that are running very, very old. hard to believe the years passing by. and really the plan is to continue and thanks for stopping by. you're watching theCUBE from RSA Conference, San Francisco.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

Matt CauthornPERSON

0.99+

Jeff FrickPERSON

0.99+

MattPERSON

0.99+

2018DATE

0.99+

San FranciscoLOCATION

0.99+

last yearDATE

0.99+

ExtraHopORGANIZATION

0.99+

this weekDATE

0.98+

Q2DATE

0.97+

firstQUANTITY

0.96+

this yearDATE

0.93+

100gb per secondQUANTITY

0.9+

theCUBEORGANIZATION

0.86+

first yearQUANTITY

0.85+

downtown San FranciscoLOCATION

0.81+

NorthLOCATION

0.79+

Forty thousand plus security expertsQUANTITY

0.78+

first placeQUANTITY

0.76+

SCADAORGANIZATION

0.69+

RSAORGANIZATION

0.68+

ExtraHopCOMMERCIAL_ITEM

0.56+

RSA ConferenceEVENT

0.56+

HealthcareORGANIZATION

0.55+

RSA ConferenceORGANIZATION

0.5+

AmericaLOCATION

0.5+

RSA North America 2018TITLE

0.47+

HL7TITLE

0.39+

5gOTHER

0.35+

Michael Daniel, Cyber Threat Alliance | RSA North America 2018


 

>> Narrator: From downtown San Francisco it's the Cube covering RSA North America 2018. >> Hey, welcome back, everybody. Jeff Frick here with the Cube. We're at the RSA conference in downtown San Francisco, 40,000 plus professionals all about security and one of the big themes is how do we work together? How do we leverage our collective knowledge, look for patterns to help, you know, be better against the bad guys, and one of the really big forces for that is the Cyber Threat Alliance and we're really excited to have Michael Daniel, the president and CEO of Cyber Threat Alliance. Michael, great to see you. >> Thanks for having me. >> So, talk about kind of the genesis of this because it's such an important concept that, yes, we're competitors on this floor but if we work together, we can probably save ourselves a lot of work. >> Absolutely, I mean, part of the idea behind the Cyber Threat Alliance is that no matter how big you are, no matter how broad your coverage is of cyber security company, no one individual company ever sees all of the threats all of the time. >> Jeff: Right. >> And, so that, in order to better protect their customers and clients, sharing that threat intelligence at speed at scale is a very fundamental part of being a much better cyber security company. >> So, how hard of a sell was that a year ago? I think you started it a year ago, announced it, and how's the ecosystem kind of changed over the last year? >> Well, I would say that, you know, it's not like I run into anybody that says, "You know, Michael, that's a really "stupid idea, we shouldn't do that." Right, it's really finding the way for a cyber security company to fit it into their business model. >> Right. >> To be able to consume the threat intelligence at a speed that matters and really be able to bake it into their products. That's usually the hard part. Conceptually, everybody agrees that this is what we need to do. >> Right, and then, how 'about just the nitty gritty nuts and bolts of, you know, how do you share information? How is it picked up, how is it communicated? What are the protocols? I'd imagine that's not too simple. >> That's right, and one of the things that we settled on was we use the STIX format because it's an open format that everybody can translate back and forth. We had to build in a lot of business rules to actually make sure that people were playing fair. You know, for example, we actually require all of our members to share. So, you can't just join the alliance and consume information, you actually have to give in order to receive. >> Right, and you've got some really kind of high-level, lofty goals that you've built this around in terms of doing good for the greater good, kind of beyond the profitability of an individual customer transaction. I wonder if you can speak to a few of those. >> Well, sure, so the part of the idea behind the way that CTA is structured is that we're a 501 C6, so we're a non-profit, right, and the idea is that we function to help raise the level of cyber security across the digital ecosystem and actually enable our member companies to compete more effectively because they have better intelligence that their products and services are based on, but we, ourselves, are not in it to make money. >> Right, right, right, alright, Michael. Unfortunately, we're up against the time. >> Absolutely. >> So, we're going to have to leave it there, but love the work that you guys are doing and it makes so much sense for people to work together. >> Well, thank you very much, thank you for having me. >> Alright, he's Michael from Cyber Threat Alliance. I'm Jeff from the Cube. You're watching us from the RSA conference San Francisco, thanks for watchin'. (soft electronic beat)

Published Date : Apr 18 2018

SUMMARY :

Narrator: From downtown San Francisco it's the Cube and one of the big themes is how do we work together? So, talk about kind of the genesis of this the Cyber Threat Alliance is that no matter And, so that, in order to better protect Right, it's really finding the way To be able to consume the threat intelligence just the nitty gritty nuts and bolts of, That's right, and one of the things of doing good for the greater good, and the idea is that we function to help raise Right, right, right, alright, Michael. so much sense for people to work together. I'm Jeff from the Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

MichaelPERSON

0.99+

Michael DanielPERSON

0.99+

Jeff FrickPERSON

0.99+

Cyber Threat AllianceORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

a year agoDATE

0.99+

40,000 plus professionalsQUANTITY

0.99+

last yearDATE

0.99+

oneQUANTITY

0.98+

RSAEVENT

0.93+

501 C6OTHER

0.93+

CubeORGANIZATION

0.72+

RSAORGANIZATION

0.69+

2018DATE

0.63+

STIXOTHER

0.62+

NorthLOCATION

0.54+

CubeCOMMERCIAL_ITEM

0.53+

AmericaORGANIZATION

0.41+

Derek Manky, Fortinet | RSA North America 2018


 

>> Narrator: From downtown San Francisco it's the Cube covering RSA North America 2018. >> Hey, welcome back, everybody, Jeff Frick here at the Cube. We're at RSA's security conference, about 40,000 plus. I don't know, I got to get the number. The place is packed, it's a mob scene. Really excited to be here and joined by Derek Manky We saw Derek last year from Fortinet. Great to get an update, Derek, what do you think of the show this year? >> It's getting big for sure, as I said. That's an understatement. >> I know. >> This is my tenth year coming to RSA now, yeah. >> It's your tenth? >> And just to see how it's changed over 10 years is phenomenal. >> Alright. So, one of the things you want to talk about that you probably weren't talking about 10 years are swarms of bots. >> Yeah. >> What the heck is going on with swarms of bots? >> There's been a lot of changes on that front too, so the bad guys are clever, of course, right? If we look at 10 years ago, there was a lot of code, you know, crime kits, crime services that were being created for infrastructure. That led up to some more, you know, getting affiliates programs, kind of, business middle men to distribute crime. So, that drove a lot of the numbers up, but, literally, in the last three quarters, if we look at hacking activity, the number has doubled from FortiGuard labs. It's gone from 1.1 million to 2.2 to 4.4 million just over the last three quarters. So, we're looking at a exponential rise to attacks. The reason that's happening is because automation >> Right. >> And artificial intelligence is starting to be put into black cat code, and so the swarm concept, if you think of bees or ants in nature, what do they do? They work together, it's strength in numbers from a black cat's point of view. >> Right, right. >> They work together to achieve a common goal. So, it's intent based attacks, and that's what we're starting to see as precursors as some code, right? These IoT bot nets, we're actually seeing nodes within the bot net that can communicate to each other, say, "Hey, guys, I found this other target in the network. "Let's go launch a DDOS attack "or let's all try to take different "bits of file information from those targets." So, it's that swarm mentality where it takes the attacker more and more out of the loop. That means that the attack surge is also increasing in speed and becoming more agile too. >> So, the bad news, right, is the bad guys have all the same tools that the good guys have in terms of artificial intelligence, machine learning, automation, software to find and they don't have a lot of rules that they're supposed to follow as well. So, it kind of puts you in a tougher situation. >> Yeah, we're always in a tough situation for sure. You know, I would say, for sure, that when it comes to the tools, a lot of the tools are out there, they custom develop some tools. I would have to say on the technology side when it comes to security members especially collaborating together and the amount of infrastructure that we have set up, I think we have a foot up on the attackers there, we're at an advantage, but you're absolutely right, when it comes to rules, there are no rules when it comes to the black cat attackers and we have to be very careful of that, how we proceed, of course, right. >> And that's really the idea behind the alliance, right, so, that you guys are sharing information. >> Yeah. >> So, you're sharing best practices, you're picking up patterns. So, everybody's not out there all by themselves. >> Absolutely, it's strength in numbers concept on our end too. So, we look at Cyber Threat Alliance, Fortinet being out founding member working with all other leading security vendors in this space is how we can team up against the bad guys, share actionable intelligence, deploy that into our security controls which makes it a very effective solution, right. By teaming up, stacking up our security, it makes it much more expensive for cyber criminals to operate. >> Right, that's good. >> Yeah. >> That's a good thing. >> Yeah, yes. >> And then, what about kind of this integration of the knock and the sock? >> Yeah. >> Because security's so much more important for all aspects of the business, right? It's not layered on, it's not stand alone. It's really got to be integrated into the software, into the process and the operations. >> Absolutely, so, the good news is, if you look at things like we're doing with the security fabric, a lot of it is how do we integrate, how do we bring technology and intelligence down to the end user so that they don't have to do day-to-day mundane tasks, right? Talking about the swarm networks, what's happening on the black cats' side, attackers are gettin' much quicker so defense solutions have to be just as quick if not faster, and so that's what the knock sock integration is about, right, how we can take network's security visibility, put it into things like our FortiAnalyzer manager sim appliances, right, be able to bring those solutions so, again, to when it comes to a knock and sock operation, how do you bring visibility into threats? How do you respond to those threats? More importantly, how do you also have automated security defense, so agile defense, put up? >> Right. >> We talk about concepts like agile macrosegmentation, right? That's something we're doing with Fortinet, how we can look at attacks and actively lock down attacks as they're happening is a really concept, right? >> So, really, just to isolate 'em within kind of where they've caused the harm, keep 'em there until you can handle 'em and not let 'em just go bananas all over the orientation. >> Yeah, yeah, so you can think of it as, like, an active quarantine. We've also launched our threat intelligence services. So, this is bringing the why. There's a lot of intelligence out there. There's a lot of logs. We have, now,, threat intelligence services that we bring to security operation centers to show them here are the threats happening on your network. Here is why it is a threat. Here's the capabilities of the threat and here's how you respond to it. So, it helps from a CSOL perspective prioritized response on the incident response model to threats as well. >> Alright, well, Derek, we've got to let it go there. We are at a super crazy time crunch. >> I know. >> We'll get you back into the studio and have a little bit more time when it's not so crazy. >> Okay, I appreciate it. >> Alright, he's Derek Manky, I'm Jeff Frick. You're watching the Cube from RSA 2018, thanks for watchin'. (soft electronic beat)

Published Date : Apr 18 2018

SUMMARY :

Narrator: From downtown San Francisco it's the Cube I don't know, I got to get the number. It's getting big for sure, as I said. to RSA now, yeah. And just to see how it's changed So, one of the things you want to talk about that you So, that drove a lot of the numbers up, and so the swarm concept, if you think it takes the attacker more and more out of the loop. So, the bad news, right, is the bad guys the amount of infrastructure that we have set up, And that's really the idea behind the alliance, right, So, everybody's not out there all by themselves. So, we look at Cyber Threat Alliance, for all aspects of the business, right? So, really, just to isolate 'em within kind of on the incident response model to threats as well. We are at a super crazy We'll get you back into the studio Alright, he's Derek Manky, I'm Jeff Frick.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

DerekPERSON

0.99+

Derek MankyPERSON

0.99+

FortinetORGANIZATION

0.99+

tenth yearQUANTITY

0.99+

1.1 millionQUANTITY

0.99+

tenthQUANTITY

0.99+

Cyber Threat AllianceORGANIZATION

0.99+

last yearDATE

0.99+

4.4 millionQUANTITY

0.99+

FortiGuardORGANIZATION

0.99+

this yearDATE

0.99+

10 years agoDATE

0.97+

2.2QUANTITY

0.97+

over 10 yearsQUANTITY

0.96+

RSAORGANIZATION

0.94+

2018DATE

0.93+

about 40,000 plusQUANTITY

0.91+

oneQUANTITY

0.9+

agileTITLE

0.88+

10 yearsQUANTITY

0.8+

San FranciscoLOCATION

0.79+

CSOLORGANIZATION

0.77+

RSATITLE

0.73+

FortiAnalyzerTITLE

0.69+

CubeTITLE

0.67+

last three quartersDATE

0.62+

NorthLOCATION

0.59+

CubeORGANIZATION

0.58+

numbersQUANTITY

0.51+

RSA NorthTITLE

0.48+

AmericaORGANIZATION

0.41+

AmericaLOCATION

0.29+

Dr. Chase Cunningham, Forrester Research | RSA North America 2018


 

>> Narrator: From downtown San Francisco it's theCUBE covering RSA North America 2018. >> Welcome back everybody, Jeff Frick here with theCUBE. We're at the RSA Conference North America 2018 downtown San Francisco. 40,000 plus people swarming all over Moscone to the north to the south and to the west. We're excited to have our next guest on. He's Chase Cunningham, principal analyst at Forrester. Chase, great to meet you, welcome. >> Thanks for having me. >> Absolutely, so you just had an interesting blog post. Was Zero Trust on a beer budget. >> Yeah. >> What is that all about? >> Well, so Zero Trust is a pretty simple concept about accepting failure, if you will, and focusing on the internal and moving outward. And basically the premise was, I had friend of mine ask me if he could do Zero Trust for his small company. And I said sure, let's go get a beer and we'll figure this out. And literally, in about half an hour we had a Zero Trust strategy in place for less than 40 grand and his infrastructure is way more secure and it's really simple. >> So that's pretty interesting because, you Know it's easy for big companies that have a lot of resources or the big puddle of Cloud companies have a lot of resources to put a lot of implementation into place. But as we look around this conference tons and tons of companies, it's a lot harder for small and medium businesses either to have the expertise or the budgets to really bring in what they need to secure things. So what were some of the insights from your beer exercise? >> Sure, so it was really simple. If you really think about where the majority of the threat comes from, the network is there and everybody uses it but who accesses the network? The users, the individuals, the devices, everything else. So the first thing we did was we're going to lock down identity and access management because I know if I can control that I've made a fundamental shift into power position for myself. And the next thing we did was we said look you guys don't really own intellectual property but you send emails. We're going to put stuff in place to encrypt every email you send whether you like it or not. So between those two simple things, identity access management and sort of data email encryption we put a really strong security platform in place and it didn't break the bank and it wasn't really hard to do and it's something that you can get better as it goes on. >> Right. And I'm curious, had he had an event or he was just trying to get ahead of the curve? >> He had had some weird stuff showing up. He's in esports, right, so he doesn't have actual intellectual property but he's worried because if they get dossed or they get hacked or they get ransomware for every minute they're down they're losing viewers and that's business and money for them. >> Right, so it kind of ties back to this kind of next gen access where it's really important with the identity but the other one is the context. Who is it and where are they trying to get in? Do they usually come in that way? Do they usually have access? So that's another really way to kind of isolate the problems that might come in the front door. >> Yeah, and you know the, years ago the next gen firewall was really the thing to integrate lots of functions across the network and that's all there. It still exists and it's still necessary but really when you break it down and look at historically where the threats have come from and where the compromises have come from, it's access and if you can't control that you don't have the capability of actually stopping bad things from happening. >> Right, right, so as you look around and you've been coming to this probably for a couple years, as this space evolves. You know, kind of what are your general impressions? I mean, on one hand, so many vendors, so many activities. On the other hand, it was like, we've been at this for a while or are we just stuck in this race and we just got to keep running? >> Well I think we're going to continue running the race but interestingly enough there's buses driving by now with Zero Trust all over the side of it. And I'm glad to see that that strategy is starting to take hold because the problem I have is you can Frankenstein technology together all day long but if you don't have a strategic guidepost that everybody understands from the board down to the network engineer you're going to get it wrong. You're going to miss and so I'm a fan of simplicity and force multipliers and to me the Zero Trust strategy sort of drives that forward. >> All right, well Chris thanks for taking a few minutes. Everyone can log onto your site, take a look at the blog. Thanks for stopping by. >> Thanks for having me. >> All right, he's Chris Cunningham from Forrester. I'm Jeff Frick from theCUBE. Thanks for watching from RSAC 2018.

Published Date : Apr 18 2018

SUMMARY :

Narrator: From downtown San Francisco it's theCUBE to the south and to the west. Absolutely, so you just had an interesting blog post. about accepting failure, if you will, and focusing So that's pretty interesting because, you Know and it's something that you can get better as it goes on. And I'm curious, had he had an event or he was He's in esports, right, so he doesn't have actual Right, so it kind of ties back to this kind of Yeah, and you know the, years ago the next gen firewall Right, right, so as you look around and force multipliers and to me the Zero Trust Thanks for stopping by. Thanks for watching from RSAC 2018.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

Chris CunninghamPERSON

0.99+

ChrisPERSON

0.99+

Chase CunninghamPERSON

0.99+

Forrester ResearchORGANIZATION

0.99+

firstQUANTITY

0.99+

MosconeLOCATION

0.99+

40,000 plus peopleQUANTITY

0.99+

Zero TrustORGANIZATION

0.99+

less than 40 grandQUANTITY

0.99+

ChasePERSON

0.98+

about half an hourQUANTITY

0.97+

two simple thingsQUANTITY

0.92+

years agoDATE

0.91+

RSACEVENT

0.9+

2018DATE

0.9+

ForresterORGANIZATION

0.89+

San FranciscoLOCATION

0.89+

theCUBEORGANIZATION

0.89+

RSA North AmericaORGANIZATION

0.89+

RSA Conference North America 2018EVENT

0.86+

oneQUANTITY

0.81+

tons and tons of companiesQUANTITY

0.79+

FrankensteinPERSON

0.78+

Dr.PERSON

0.77+

couple yearsQUANTITY

0.66+

downtown San FranciscoLOCATION

0.66+

ForresterLOCATION

0.55+

2018EVENT

0.5+

RSAORGANIZATION

0.42+

AmericaLOCATION

0.3+

NorthTITLE

0.25+

Bill Mann, Centrify | RSA North America 2018


 

>> Narrator: From downtown San Francisco it's TheCUBE covering RSA North American 2018. >> Hey, welcome back everybody. Jeff Frick from TheCUBE. We're on the floor at the RSA Conference 2018. 40,000 plus people packed in Moscone North, South, West, and we're excited to be here. It's a crazy conference, Security's top of mind obviously and everybody is aware of this. And our next guest, he's Bill Mann, chief product officer from Centrify. Bill, great to see you. >> Great to see you. >> So you guys have a lot of stuff going on but what I think what's interesting to me is you guys have this kind of no trust as your starting foundation. Don't trust anybody, anything, any device. How do you work from there? Why is that the strategy? >> Well that strategy is because we've got a really new environment now. A new environment where we have to appreciate that the bad actors are already within our environment. And if you stop believing that bad actors are already in your environment, you have to start changing the way you think about security. So it's a really different way of thinking about security. So what we call this new way of thinking about security is zero trust security. And you might have heard this from Google with BeyondCorp and so forth. And with that as the overarching kind of way we are thinking about security, we're focusing on something called NextGenAccess. So how do you give people access to applications and services where they're remote. They're not on the network and they're not behind a firewall because who cares about the firewall anymore because it's not secure. >> Right. So there's four tenants of NextGenAccess. One is verify the user, verify the device that they are coming from so they're not coming from a compromised device. Then give them limited access to what they are trying to access or what we call Limit Privilege and Access. And that last one is learn and adapt which is this kind of pragmatic viewpoint which is we're never going to get security right day one, right? To learn and adapt and what we're doing look at auto tune logs and session logs to change your policy and adapt to get a better environment. >> So are you doing that every time they access the system? As they go from app to app? I mean how granular is it? Where you're consistently checking all these factors? >> We're always checking the end factor and where we use an actual machine learning to check what's happening in the environment and that machine learning is able to give that user a better experience when they are logging in. Let's say Bill's logging into Salesforce.com from the same location, from the same laptop all the time. Let's not get in the way right? But if Bill the IT worker is going from a different location and logging into a different server that's prompting for another factor of authentication because you want to make sure that this is really Bill. Because fundamentally you don't trust anybody in the network. >> And that's really what you guys call this NextGenAccess, right? [Bill]- That right, that's right, that's right. >> It's not just I got a VPN. You trust my VPN. I got my machine. Those days are long gone. >> Well VPNs, no no to VPNs as well, right? We do not trust VPNs either. >> So a bit topic ever since the election, right, has been people kind of infiltrating the election. Influencing you know how people think. And you guys are trying to do some proactive stuff even out here today for the 2018 election to try to minimize that. Tell us a little bit more about it. >> Yeah we call it Secure The Vote. And if the audience has looked at the recent 60 Minutes episode that came on. That did a really good that walked everybody through what was really happening with the elections. The way you know the Russians really got onto the servers that are storing our databases for the registration systems and changed data and created chaos in the environment. But the fundamental problem was compromised credentials. I mean 80% of all breaches believe it or not have to do with compromised credentials. They are not around all the things we think are the problem. So what we're doing here with Secure The Vote is giving our technology to state and local governments for eight months for free. And essentially they can then upgrade their systems, right? So they can secure the vote. So fundamentally securing who has access to what and why and when. And if you look at the people who are working on election boards, they're volunteers, there are a lot of temporary staff and so forth. >> Right, right. >> So you can imagine how the bad guys get into the environment. Now we've got a lot of experience on this. We sell to state and local governments. We've seen our technology being used in this kind of environment. So we're really making sure that we can do our part in terms of securing the election by providing our technology for free for eight months so election boards can use our technology and secure the vote. >> So how hard is it though for them to put it in for temporary kind of situation like that? You made it pretty easy for them to put it in if they are not an existing customer? >> Absolutely I mean one of the things, one of the fallacies around this whole NextGenAccess space is the fact that it's complicated. It's all SAS-Space, it's easy to use, and it's all in bite-sized chunks, right? So some customers can focus on the MFA aspects, right? Some customers can focus on making sure the privileged users who have access to the databases, right, are limiting their access right? So there's aspects of this that you can implement based upon where you want to be able to, what problem you want to be able to solve. We do provide a very pragmatic best practices way of implementing zero trust. So we are really providing that zero trust platform for the election boards. [Jeff]- Alright well that's great work Bill and certainly appreciated by everybody. We don't want crazy stuff going on in the elections. >> Absolutely. >> Jeff: So we'll have to leave it there. We'll catch up back in the office. It's a little chaotic here so thanks for taking a few minutes. >> Thank you very much. >> Alright, he's Bill Mann and I'm Jeff Frick. You're watching TheCUBE from RSCA 2018. Thanks for watching. (bright music)

Published Date : Apr 18 2018

SUMMARY :

Narrator: From downtown San Francisco it's TheCUBE We're on the floor at the RSA Conference 2018. So you guys have a lot of stuff going on So how do you give people access to applications And that last one is learn and adapt which is this kind Let's not get in the way right? And that's really what you guys call It's not just I got a VPN. Well VPNs, no no to VPNs as well, right? And you guys are trying to do some proactive stuff And if the audience has looked So you can imagine So there's aspects of this that you can implement Jeff: So we'll have to leave it there. Thanks for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

JeffPERSON

0.99+

Bill MannPERSON

0.99+

eight monthsQUANTITY

0.99+

80%QUANTITY

0.99+

BillPERSON

0.99+

NextGenAccessORGANIZATION

0.99+

CentrifyORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

BeyondCorpORGANIZATION

0.99+

40,000 plus peopleQUANTITY

0.98+

OneQUANTITY

0.98+

oneQUANTITY

0.98+

todayDATE

0.98+

RSA Conference 2018EVENT

0.97+

zero trustQUANTITY

0.97+

four tenantsQUANTITY

0.96+

Moscone NorthLOCATION

0.95+

zeroQUANTITY

0.95+

RSA North AmericaORGANIZATION

0.92+

2018DATE

0.89+

TheCUBEORGANIZATION

0.87+

60TITLE

0.79+

Secure The VoteOTHER

0.76+

Salesforce.comOTHER

0.75+

San FranciscoLOCATION

0.73+

RussiansPERSON

0.71+

TheCUBETITLE

0.71+

Limit PrivilegeOTHER

0.68+

day oneQUANTITY

0.66+

RSA North American 2018EVENT

0.63+

RSCAEVENT

0.6+

electionEVENT

0.57+

SpaceOTHER

0.56+

The VoteTITLE

0.54+

SASORGANIZATION

0.53+

MinutesQUANTITY

0.49+

AccessOTHER

0.48+

SecureOTHER

0.47+

Misha Govshteyn, Alert Logic | RSA North America 2018


 

(upbeat music) >> Announcer: From downtown San Francisco, it's theCUBE covering RSA North America 2018. Hey welcome back everybody, Jeff Frick here with theCUBE. We're at RSA's North American Conference 2018 at downtown San Francisco. 40,000 plus people talking about security. Security continues to be an important topic, an increasingly important topic, and a lot more complex with the, having a public cloud, hybrid cloud, all these API's and connected data sources. So, it's really an interesting topic, it continues to get complex. There is no right answer, but there's a lot of little answers to help you get kind of closer to nirvana. And we're excited to have Misha Govshteyn. He's the co-founder and SVP of Alert Logic, CUBE alumni, it's been a couple years since we've seen you, Misha, great to see you again. >> That's right, I'm glad to be back, thank you. >> Yeah, so since we've seen you last, nothing has happened more than the dominance of public cloud and they continue to eat up-- >> I think I predicted it on my past visits. >> Did you predict it? Wow that's good. >> But I think it happened. >> But it's certainly happening, right. Amazon's AWS' run rate is 20 billion last reported. Google's making moves. >> Their conference is bigger than ours right now. >> Is it? >> That's 45,000 people. >> Yeah, it's 45,000, re:Invent, it's nuts, it's crazy. and then obviously Microsoft's making big moves, as is Google cloud. So, what do you see from the client's perspective as the dominance of public cloud continues to grow, yet they still have stuff they have to keep inside? We have our GDPR regs are going to hit in about a month. >> Well one thing's for sure is, it's not getting any easier, right? Because I think cloud is turning things upside down and it's making things disruptive, right, so there's a lot of people that are sitting there and looking at their security programs, and asking themselves, "Does this stuff still work? "When more and more of my workloads "are going to cloud environments? "Does security have to change?" And the answer is obviously, it does but it always has to change because the adversaries are getting better as well, right. >> Right. >> There's no shortage of things for people to worry about. You know when I talk to security practitioners, the big thing I always hear is, "I'm having a good year if I don't get fired." >> Well it almost feels like it's inevitable, right? It's almost like you're going to, it seems like you're going to get hit. At some way, shape, or form you're going to get hit. So it's almost, you know how fast can you catch it? How do you react? >> That's a huge change from five years ago, right? Five years ago we were still kind of living in denial thinking that we can stop this stuff. Now it's all about detection and response and how does your answer to the response process works? That's the reason why, you know last year, I think we saw a whole bunch of noise about, you know machine learning and anomaly detection, and AI everywhere and a whole lot of next-generation antivirus products. This year, it seems like a lot of it is, a lot of the conversation is, "What do I do with all this stuff? "How do I make use of it?" >> Well then how do you leverage the massive investment that the public cloud people are making? So, you know, love James Hamilton's Tuesday night show and he talks about just the massive investments Amazon is making in networking, in security, and you know, he's got so many resources that he can bring to bear, to the benefit of people on that cloud. So where does the line? How do I take advantage of that as a customer? And then where are the holes that I need to augment with other types of solutions? >> You know here's the way I think about it. We had to go through this process at Alert Logic internally as well. Because we obviously are a fairly large IT organization, so we have 20 petabytes of data that we manage. So at some point we had to sit down and say, "Are we're going to keep managing things the way we have been "or are we going to overhaul the whole thing?" So, I think what I would do is I would watch where my infrastructure goes, right. If my infrastructure is still on-prem, keep investing in what you've been doing before, get it better, right? But if you're seeing more and more of your infrastructure move to the cloud, I think it's a good time to think about blowing it up and starting over again, right? Because when you rebuild it, you can build it right, and you can build it using some of the native platform offerings that AWS and Azure and GCP offer. You can work with somebody like Alert Logic. There's others as well right, to harness those abilities. I'll go out on a limb and say I can build a more secure environment now in a cloud than I ever could on-prem, right. But that requires rethinking a bunch of stuff, right. >> And then the other really important thing is you said the top, the conversation has changed. It's not necessarily about being 100% you know locked down. It's really incident response, and really, it's a business risk trade-off decision. Ultimately it's an investment, and it's kind of like insurance. You can't invest infinite resources in security, and you don't want to just stay at home and not go outside. Now that's not going to get it done. So ultimately, it's trade-offs. It's making very significant trade-off decisions as to where's the investment? How much investment? When is the investment then hit a plateau where the ROI is not there anymore? So how do people think through that? Because, the end of the day there's one person saying, "God, we need more, more, more." You know, anything is bad. At the other hand, you just can't use every nickel you have on security. >> So I'll give you two ends of the spectrum right, and on one end are those companies that are moving a lot of their infrastructure to the cloud and they're rethinking how they're going to do security. For them, the real answer becomes it's not just the investment in technology, and investing into better getting information from my cloud providers, getting a better security layer in place. Some of it is architecture right, and some of the basics right, there's thousands of applications running in most enterprises. Each one of those applications on the cloud, could be in its own virtual private cloud, right. So if it gets broken into, only one domino falls down. You don't have this scenario where the entire network falls down, because you can easily move laterally. If you're doing things right in the cloud, you're solving that problem architecturally, right. Now, aside from the cloud, I think the biggest shift we're seeing now, is towards kind of focusing on outcomes, right. You have your technology stack, but really it's all about people, analytics, data. What do you, how do you make sense of all this stuff? And this is classic I think, with the Target breach and some of the classic breaches we've seen, all the technology in the world, right? They had all the tools they needed. The real thing that broke down is analytics and people. >> Right, and people. And we hear time and time again where people had, like you said, had the architecture in place, had the systems in the place, and somebody mis-configured a switch. Or I interviewed a gal who did a live social hack at Black Hat, just using some Instagram pictures and some information on your browser. No technology, just went in through the front door, said, you know, hey, "I'm trying to get the company picnic "site up, can you please test this URL?" She's got a 100% hit rate! But I think it's really important, because as you said, you guys offer not only software solutions, but also services to help people actually be successful in implementing security. >> And the big question is, if somebody does that to you, can you really block it? And the answer a lot of times is, you can't. So the next battlefront is all about can you identify that kind of breach happening, right? Can you identify abnormal activity that starts to happen? You know, going back to the Equifax breach, right, one of the abnormal things that happened that they should've seen and for some reason didn't, you know, 30 web shells were stood up. Which is the telltale sign of, maybe you don't know how you got broken into, but because there's a web shell in your environment you know somebody's controlling your servers remotely, that should be one of those indicators that, I don't know how it happened, I don't know maybe I missed it and I didn't see the initial attack, but there's definitely somebody on a network poking around. There's still time, right? There's, you know for most companies, it takes about a hundred days on average, to steal the data. I think the latest research is if you can find the breach in less than a day, you eliminate 96% of the impact. That's a pretty big number right? That means that if you, the faster you respond, the better off you are. And most people, I think when you ask 'em, and you ask 'em, "Honestly assess your ability to quickly detect, respond, eradicate the threat." A lot of them will say, "It depends" But really the answer is "Not really." >> Right, 'cause the other, the sad stat that's similar to that one, is usually it takes many, many days, months, weeks, to even know that you've been breached, to figure out the pattern, that you can even start, you know, the investigation and the fixing. >> Somewhat not surprising, right? I don't think there's that many Security Operation Centers out there, right? There's not, you know, not every company has a SOC right? Not every company can afford a SOC. I think the latest number is, for enterprises, right, this is Fortune 2000, right, 15% of them have a SOC. What are the other 85% doing? You know, are they buying a slice of a SOC somewhere else? That's the service that we offer, but I think, suffice to say, there's not enough security people watching all this data to make sense of it right. That's the biggest battle I think going forward. We can't make enough people doing that, that requires a lot of analytics, right. >> Which really then begs, for the standalone single enterprise, that they really need help, right? They're not going to be able to hire the best of the best for their individual company. They're not going to be able to leverage you know best-in-breed, Which I think is kind of an interesting part of the whole open-source ethos, knowing that the smartest brains aren't necessarily in your four walls. That you need to leverage people outside those four walls. So, as it continues to morph, what do you see changing now? What are you looking forward to here at RSA 2018? >> So I made some big predictions five years ago, so I'll say you know, five years from now, I think we're going to see a lot more companies outsource major parts of their security right, and that's just because you can't do it all in-house right. There's got to be a lot more specialization. There's still people today buying AI products right, and having machine learning models they invest in to, there's no company I'm aware of, unless they're, you know, maybe the top five financial firms out there, that should have a, you know, security focused data scientist on staff, right? And if you have somebody like that in your environment, you're probably not spending money the right way, right. So, I think security is going to get outsourced in a pretty big way. We're going to focus on outcomes more and more. I think the question is not going to be, "What algorithm are you using to identify this breach?" The question is going to be, "How good are your identifying breaches?" Period. And some of the companies that offer those outcomes are going to grow very rapidly. And some of the companies that offer just, you know, picks and shovels, are going to probably not do nearly as well. >> Right. >> So five years from now, I'll come back and we'll talk about it then. >> Well, the other big thing, that's going to be happening in a big way five years from now, is IoT and IIoT and 5G. So, the size of the attacked surface, the opportunities to breach-- >> The data volume. >> The data volume, and the impact. You know it's not necessarily stealing credit cards, it's taking control of somebody's vehicle, moving down the freeway. So, you know, the implications are only going to get higher. >> We collect a lot of logs from our customers. Usually, the log footprint, grows at three times the rate of our revenue and customers, right. So, you know, thank god-- >> The log, the log-- >> The log volume grows-- >> volume that you're tracking for a customer, grows at three times your revenue for that customer? >> That's right. I mean, they're not growing at three times that rate, annually right, but annually, you know, we've clocked anywhere between 200% to 300% growth in data that we collect from them, IoT makes that absolutely explode, right. You know, if every device out there, if you actually are watching it, and if you have any chance of stopping the breaches on IoT networks, you got to collect a lot of that data, that's the fuel for a lot of the machine learning models, because you can't put human eyes on small RTUs and you know, in factories. That means even more data. >> Right, well and you know the model that we've seen in financial services and ad-tech, in terms of, you know, an increasing amount of the transactions are going to happen automatically, with no human intervention, right, it's hardwired stuff. >> So I think it's that balance between data size and data volume, analytics, but most important, what do you feed the humans that are sitting on top of it? Can you feed them just the right signal to know what's a breach and what's just noise? That's the hardest part. >> Right, and can you get enough good ones? >> That's right. >> Underneath your own, underneath your own shell, which is probably, "No", well, hopefully. >> I think building this from scratch for every company is madness, right. There's a handful of companies out there that can pull it off, but I think ultimately everybody will realize, you know, I'm a big audio nerd so I Looked it up, right, you used to build all of your own speakers, right. You'd buy a cabinet and you'd buy some tools, and you would build all the stuff. Now you go to the store and you buy an audio system, right? >> Right, yeah, well at least audio, you had, speakers are interesting 'cause there's a lot of mechanical interpretations about how to take that signal and to make sound, but if you're making CDs you know you got to go, with the standard right? You buy Sonos now, and Sonos is a fully integrated system. What is Sonos for security, right? It doesn't exist yet. And that's, I think that's where Security as a Service is going. Security as a Service should be something you subscribe to that gives you a set of outcomes for your business, and I think that's the only way to consume this stuff. It's too complex for somebody to integrate from best-of-breed products and assemble it just the right way. I think the parallels are going to be exactly the same. I'm not building my car either, right? I'm going to buy one. Alright Misha, well, thanks for the update, and hopefully we'll see you before five years, maybe in a couple and get an update. >> We'll do some checkpoints along the way. >> Alright. Alright, he's Misha, I'm Jeff. You're watching theCUBE from RSA North America 2018 in downtown, San Francisco. Thanks for watching. (techno music)

Published Date : Apr 18 2018

SUMMARY :

of little answers to help you get kind of closer to nirvana. Did you predict it? But it's certainly happening, right. as the dominance of public cloud continues to grow, And the answer is obviously, it does There's no shortage of things for people to worry about. So it's almost, you know how fast can you catch it? That's the reason why, you know last year, and you know, he's got so many resources and you can build it using some of At the other hand, you just can't use and some of the classic breaches we've seen, But I think it's really important, because as you said, And the answer a lot of times is, you can't. to figure out the pattern, that you can even start, There's not, you know, not every company has a SOC right? So, as it continues to morph, what do you see changing now? And some of the companies that offer just, you know, So five years from now, the opportunities to breach-- So, you know, the implications are only going to get higher. So, you know, thank god-- and you know, in factories. Right, well and you know the model what do you feed the humans that are sitting on top of it? Underneath your own, underneath your own shell, and you would build all the stuff. I think the parallels are going to be exactly the same. RSA North America 2018 in downtown, San Francisco.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MishaPERSON

0.99+

AmazonORGANIZATION

0.99+

Jeff FrickPERSON

0.99+

JeffPERSON

0.99+

Misha GovshteynPERSON

0.99+

100%QUANTITY

0.99+

96%QUANTITY

0.99+

last yearDATE

0.99+

James HamiltonPERSON

0.99+

30 web shellsQUANTITY

0.99+

20 billionQUANTITY

0.99+

20 petabytesQUANTITY

0.99+

SonosORGANIZATION

0.99+

15%QUANTITY

0.99+

MicrosoftORGANIZATION

0.99+

Alert LogicORGANIZATION

0.99+

85%QUANTITY

0.99+

less than a dayQUANTITY

0.99+

GoogleORGANIZATION

0.99+

45,000 peopleQUANTITY

0.99+

45,000QUANTITY

0.99+

five years agoDATE

0.99+

This yearDATE

0.99+

Five years agoDATE

0.99+

AWS'ORGANIZATION

0.99+

two endsQUANTITY

0.99+

one endQUANTITY

0.99+

thousandsQUANTITY

0.99+

200%QUANTITY

0.99+

AWSORGANIZATION

0.99+

CUBEORGANIZATION

0.98+

oneQUANTITY

0.98+

GDPRTITLE

0.98+

one personQUANTITY

0.98+

Tuesday nightDATE

0.97+

300%QUANTITY

0.97+

singleQUANTITY

0.97+

three timesQUANTITY

0.97+

EquifaxORGANIZATION

0.96+

theCUBEORGANIZATION

0.95+

Black HatORGANIZATION

0.94+

five financial firmsQUANTITY

0.94+

one thingQUANTITY

0.93+

RSA 2018EVENT

0.93+

one dominoQUANTITY

0.93+

about a hundred daysQUANTITY

0.93+

40,000 plus peopleQUANTITY

0.92+

Each oneQUANTITY

0.89+

North American Conference 2018EVENT

0.86+

todayDATE

0.85+

downtown San FranciscoLOCATION

0.83+

InstagramORGANIZATION

0.82+

Fortune 2000ORGANIZATION

0.8+

applicationsQUANTITY

0.79+

about a monthQUANTITY

0.79+

San FranciscoLOCATION

0.77+

GodPERSON

0.7+

five yearsQUANTITY

0.7+

five yearsDATE

0.69+

2018DATE

0.68+

North America 2018EVENT

0.65+

RSA North AmericaTITLE

0.63+

coupleQUANTITY

0.62+

RSAORGANIZATION

0.6+

GCPTITLE

0.6+

SecurityTITLE

0.58+

RSAEVENT

0.51+

annuallyQUANTITY

0.51+

AzureORGANIZATION

0.5+

nickelQUANTITY

0.48+

TargetORGANIZATION

0.45+

RSA North America 2018EVENT

0.43+

Michael DeCesare, ForeScout Technologies | RSA North America 2018


 

>> Announcer: From downtown San Francisco, it's theCUBE. Covering RSA North America 2018. >> Hey welcome back everybody, Jeff Frick here with theCUBE. We're at RSA North America 2018 in San Francisco. 40,000 plus people talking security, enterprise security, cloud security, a lot going on. It just continues to get more and more important. And we're really excited for our next guest who's been playing in the enterprise space for as long as I can remember, which has been a little while. Mike Decesare, he's the CEO and President of ForeScout. Mike, great to see you. >> Started my career off when I was one. (Jeff laughs) So, I've been in this for a long time. >> You have been in it a long time. So you guys now you're all about, right so there's so much stuff going on in security and security is one of these things that I have to look at it as kind of like insurance. You can't put every last nickel in security, but at the same time, you have to protect yourself. The attack surfaces are only growing with IIoT and we were at an autonomous vehicle show, and 5G is just coming around the corner, and all these connected devices and APIs. So you guys have a pretty unique approach to how you top level think about security called visibility. Explain that to us. >> So visibility is the next big thing in the world of cybersecurity and the dynamic is very basic. It's, for 20 plus years, CIOs and CSOs were substantially able to control everything that was on their network. You'd buy your servers and Windows machines and Blackberries for your employees and then there was very little tolerance for other devices being on those organization's networks. And what happened 10 years ago this year, with the birth of the iPhone was that CIOs, those same CIOs now had to deal with allowing things onto their network that don't subscribe to those same philosophies and when you can't buy it and outfit it with security before you put it into the environment. And that's the gap that ForeScout closes for organizations is we have an agentless approach which means we plug into the network infrastructure itself and we give customers visibility into everything that is connected to their network. >> So that begs a question, how do you do that without an agent? I would imagine you would put a little agent on all the various devices. So what's your technique? >> We actually don't. That's the secret sauce of the company is that >> okay >> you know over 10 years ago, we recognized this IoT trend coming because that's, that's the thing in the world of IoT is unlike the first kind o' 20 years of the internet, there was a substantially smaller number of operating systems, most of them open. The different characteristic about the current internet is that many of these use cases are coming online as closed proprietary operating systems. The example I use here is like your home. You know, you get a Nest thermostat and you put in on your network and it monitors, you know, heating and cooling but the device, the operating system, the application is all one consumer device. It doesn't run Windows. You can't install antivirus on you Nest thermostat. So our approach is we plug into the network infrastructure. We integrate to all of the network vendors, the firewall vendors, the wireless controlling vendors and we pull both active and passive techniques for gathering data off those devices and we translate that into a real-time picture of not just everything connected to the network but we know what those devices are without that client having to do anything. >> So you have what you call device cloud or yeah, ForeScout device cloud. So is that, is that a directory of all potential kind of universe of devices that you're querying off of or is that the devices within the realm of control of your of your clients directly? >> It's the second. It's the, so the way that our product works is we plug into the network infrastructure so anything that requests an IP address, whether is wired and wireless in the campus environment, whether it's data center or cloud in the data center environments or even into the OT space, anything that requests an IP address pops onto our radar the second it requests that address. And that cloud that we've built, that we've had for about nine months, we already have three million devices inside, almost three and a half million devices, is a superset of all of the different devices across our entire install base just from the clients that have been willing to share that data with us already. And that gives us optimism because what that becomes is a known set of fingerprints about all known devices so the first time that we discover a Siemens camera that might be a manufacturer, the company might have ten thousand of those in the environment, the first time that we see that device, we have to understand the pattern of traffic off that device, we label that as a security camera and any other customer world-wide that's has that same device connects, we instantaneously know it's a Siemens security camera. So we need the fingerprint of those devices once. >> Right, and so you're almost going to be like the GE Predix of connected devices down the road potentially with this cloud. >> We won't go there on that. >> He won't go there, alright. We've talked to Bill Ruh a lot of times but he does an interesting concept. The nice thing 'cause you can leverage from a single device and knowledge across the other ones which is so, so important on security so you can pick up multiple patterns, repeated patterns et cetera. >> One of the best parts about ForeScout is the fact that we deployed incredibly quickly. We have clients that have almost a million devices that got live in less than three months. And the reason we're able to do that is we plug into the infrastructure, and then our product kind o' does its own thing with very little effort from the client where we compare what we have in this repository against what they have in their environment. We typically get to an 80 or 90% auto-classification meaning that we know 80 or 90% of the time, not just what's on the network but what that device is and then the other 20% is where we have the implementation where we go through and we look at unique devices. It might be a bank has some model of ATM we've never seen before or a healthcare company has beds or machines on a hospital floor that we haven't recognized before. And the first time that we see each of those devices uniquely, we have to go through the process of fingerprinting it which means that we're looking for the unique pattern of traffic that's coming off a, you know, a router, a switch and a firewall and we're ingesting that and we're tagging that device and saying anytime we see that unique pattern of traffic, that's a certain device, a security camera or what have you. >> Right. >> The reason's that useful is then we get to put a policy in place about how those devices are allowed to behave on the network. So if you take something like the Mirai Botnet which hit about a year ago, was the thing that took down a big chunk of the Northeast, you know, utilities and you know, internet, it infected, it was a bot that infected security cameras predominantly. Nobody thought twice about having security cameras in their environment, but they're the same as they are in your house where you know, you put it online, you hit network pair and it's online. >> Right. >> But that bot was simply trying to find devices that had the default password that shipped from the security manufacturer and was able to be successful millions of time. And with our product in place, that couldn't happen because when you set us up, we would know it's a security camera, we'd put a policy in place that says security camera can speak to one server in the data center called the security camera server. And if that device tries to do anything more criminal, if it tries to dial the internet, if it tries to break into your SAP backend, any of those activities, we would give the customer the ability to automatically to take that device offline in real time. >> Right, so you're... >> And that's why our clients find us to be very useful. >> Right, so you're really segregating the devices to the places they're supposed to play, not letting 'em out of the areas they're supposed to be. Which is the >> Absolutely. >> Which is the classic kind of back door way in that the bad guys are coming in. >> Our philosophy is let everything onto the network. We take a look at that traffic. We give you a picture of all those devices and we allow each customer to put an individual policy in place that fences that in. If you take the other extreme like a Windows machine in a corporate environment, our typical policy will be you know, do you have Windows 2009 or later? 'Cause most customers have policies they don't want XP in their environments anymore. But we enforce it. So if an XP device hits the network, we can block that device or we can force a new version down. If you have Symantec, has it got a dat file update? If you've got Tenable, has it had a scan recently? If you've got, you know, any of the other products that are out there that are on those machines, our job is to enforce that the device actually matches the company's policy before that device is allowed in. >> Before you let it. Alright. >> And if at any time that it's on that network, it becomes noncompliant, we would take that device offline. >> You know, with the proliferation of devices and continuation growth of IoT and then industrial IoT, I mean, you guys are really in a good space because everything is getting an IP address and as you said, most of them have proprietary operation systems or they have some other proprietary system that's not going to allow, kind o' classic IT protections to be put into place. You've really got to have something special and it's a pretty neat approach coming at it from the connectivity. >> It's the secret sauce of the company is we recognized many years ago that the the combination of not just there being very few operating systems but they were all open. Windows, Lennox, right? I mean, you can buy a Windows machine and you can install any product you want on it. But we saw this trend coming when the next wave of devices was going to be massively heterogeneous and also in many cases, very closed. And you know, you mentioned the example of the OT space and that's one of the other, the third biggest driver for us in our business is the OT space because when you looking a WanaCry or a NotPetya and you see companies like Maersk and FedEx and others that are, that are publicly talking about the impact of these breaches on their earnings calls. What those companies are waking up and realizing is they've got 25 year old systems that have run, you know, an old version of Microsoft that's been end-of-life decades ago and the bad actors have proven very adept at trying to find any entry point into an organization, right, and the great news for ForeScout is that really lends itself very much towards our age-endless approach. I mean, many of these OT companies that we're in, devices that are in their manufacturing facilities don't even have an API. There were built so long ago so there's no concept of interacting with that machine. >> Right >> So for us, allowing that device to hit the Belden switches and then be able to interrogate the traffic coming off those switches let's us do the same thing that we do in the campus world over in the OT world as well. >> Good spot to be. So RSA 2018, what are ya looking forward to for this week? >> This is just massive in size. It's like speed dating. From a customer's perspective too, I mean, I meet so many customer's that come here and able to meet with 30 or 40 vendors in a single week and it's no different, you know, for the providers themselves so. You know, we've got some really, kind o' really high profile big wins, you know, it's very coming for us to be doing deals at this point that get up over a million devices so they're very high profile so it's a great chance to reconnect with customers. You know, one of the things I didn't mention to you is that kind o' the, the whole thing that we do of identifying devices and then understanding what they are and allowing those policies to get put in places, that's fundamentally done with our own IP, and the connections into the switch and firewall vendors. But we've built this whole other ecosystem of applications in the world of orchestration that set on top of our products. We integrate the firewall vendors, the vulnerability management vendors, the EDR vendors, the AV vendors, so it's a great chance for us to reconnect with you know, those vendors as well. In fact, we're doing a dinner tonight with CrowdStrike. They're one of our newer partners. Very excited about this week. It brings a lot of optimism. >> Well, great story Mike and excited to watch it to continue to unfold. >> We appreciate you giving us some time. >> Alright, thanks for stopping by. That's Mike Decesare. I'm Jeff Frick. You're watching theCUBE from RSA North America 2018. Thanks for watchin'. Catch you next time. (techno music)

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's theCUBE. Mike Decesare, he's the CEO and President of ForeScout. So, I've been in this for a long time. but at the same time, you have to protect yourself. and the dynamic is very basic. all the various devices. That's the secret sauce of the company and it monitors, you know, heating and cooling or is that the devices within the realm of control of your about all known devices so the first time that we discover a of connected devices down the road from a single device and knowledge across the other ones is the fact that we deployed incredibly quickly. So if you take something like the Mirai Botnet that had the default password that shipped from the not letting 'em out of the areas they're supposed to be. Which is the classic kind of back door way in that So if an XP device hits the network, Before you let it. it becomes noncompliant, we would take that device offline. and as you said, most of them that are publicly talking about the impact of these breaches and then be able to interrogate Good spot to be. You know, one of the things I didn't mention to you is that and excited to watch it to continue to unfold. Catch you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff FrickPERSON

0.99+

30QUANTITY

0.99+

80QUANTITY

0.99+

25 yearQUANTITY

0.99+

Mike DecesarePERSON

0.99+

SymantecORGANIZATION

0.99+

FedExORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

Michael DeCesarePERSON

0.99+

Bill RuhPERSON

0.99+

MaerskORGANIZATION

0.99+

90%QUANTITY

0.99+

MikePERSON

0.99+

20 plus yearsQUANTITY

0.99+

first timeQUANTITY

0.99+

less than three monthsQUANTITY

0.99+

eachQUANTITY

0.99+

GEORGANIZATION

0.99+

SiemensORGANIZATION

0.99+

JeffPERSON

0.99+

20%QUANTITY

0.99+

San FranciscoLOCATION

0.99+

XPTITLE

0.99+

three million devicesQUANTITY

0.99+

40,000 plus peopleQUANTITY

0.99+

40 vendorsQUANTITY

0.99+

tonightDATE

0.99+

ForeScout TechnologiesORGANIZATION

0.99+

CrowdStrikeORGANIZATION

0.99+

twiceQUANTITY

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

one serverQUANTITY

0.99+

Windows 2009TITLE

0.99+

ten thousandQUANTITY

0.98+

ForeScoutORGANIZATION

0.98+

each customerQUANTITY

0.98+

about nine monthsQUANTITY

0.98+

WindowsTITLE

0.98+

secondQUANTITY

0.97+

oneQUANTITY

0.97+

almost three and a half million devicesQUANTITY

0.97+

single deviceQUANTITY

0.97+

OneQUANTITY

0.97+

firstQUANTITY

0.97+

NotPetyaORGANIZATION

0.96+

this weekDATE

0.96+

bothQUANTITY

0.96+

WanaCryORGANIZATION

0.95+

over a million devicesQUANTITY

0.95+

RSA North AmericaORGANIZATION

0.93+

10 years ago this yearDATE

0.93+

almost a million devicesQUANTITY

0.92+

third biggest driverQUANTITY

0.9+

millions of timeQUANTITY

0.9+

ForeScoutTITLE

0.89+

LennoxORGANIZATION

0.88+

Mirai BotnetORGANIZATION

0.82+

2018DATE

0.8+

TenableORGANIZATION

0.78+

20 yearsQUANTITY

0.78+

about a year agoDATE

0.75+

RSA 2018EVENT

0.75+

decades agoDATE

0.75+

over 10 years agoDATE

0.74+

NortheastLOCATION

0.74+

single weekQUANTITY

0.73+

many years agoDATE

0.72+

SAPORGANIZATION

0.64+

waveEVENT

0.59+

2018EVENT

0.54+

theCUBEORGANIZATION

0.54+

BeldenORGANIZATION

0.33+

Sean Cunningham, ForgePoint Capital | RSA North America 2018


 

>> Presenter: From downtown San Francisco, it's theCUBE, covering RSA North America 2018. >> Hey, welcome back, everybody. Jeff Frick here with the theCUBE. We're in downtown San Francisco with RSA North America 2018 40,000 plus professionals talking about security, enterprise security. It's a growing field, it's getting baked into everything. There's a whole lot of reasons that this needs to be better and more integrated into everything that we do, as opposed to just kind of a slap on at the end. And, who better to have on, who's investing at the cutting edge, keeping an eye on the startups than Sean Cunningham, our next guest. He's a managing director ForgePoint Capital, the newly named, so welcome to ForgePoint Capital, I guess. (Sean laughs) >> Thanks, Jeff, we're pretty excited about it. So, we were branded Trident Capital Cybersecurity. We're a 300 million dollar cybersecurity only fund, we closed the fund about a year and a half ago. We've invested in a dozen companies, and we decided that now is a great time to rebrand ForgePoint really tells more about what we're doing, we're forging ahead with our Series A, Series B funded companies, as well as a few growth equity. So, it made a lot of sense, but we're pretty excited about the market, and obviously RSA, with 1700 cybersecurity companies makes it interesting. >> Right, so you've been at this for a while. I wonder if you can speak to some of the macro trends as we've seen the growth of cloud, the growth of IoT will soon be more industrial IoT, enabled by 5G. We've got all these automated systems and financial services trading, and ad tech that we're going to see more and more of that automated transaction happening. You've got APIs and everything's connected to everything else to enable my application. So, really really exciting, and huge, growing threat surface if you will, but at the same, these are the technologies that are driving forward. So, what are you seeing from your, seat at the table some of the newer, more innovative startups? >> Jeff, I think you should probably tell me. You have all the answers there. >> I talked to a lot of smart people, that's the benefit of the job. >> I think the only two buzzwords you left off was Bitcoin and fraudulent payments. >> Oh, we can work a little blockchain in if you want. >> Yeah, but it is absolutely a bit of an interesting environment. I've been doing it since 2000 with Intel Capital for 15 years, but what's really changed, what hasn't changed is the fact that it's all about the hackers are able to monetize this. So, that's not going away. The biggest change are the, I guess, overt nation state attacks. So, between all of those things, the drivers are just continuing to force cybersecurity to become better and better. And, that's why the innovative startups are really, you're seeing these 1700, because the legacy companies can't fix these problems. And, you know, you talk about all these different paths for hackers to get in. It's absolutely the case and we are really big on areas, as you mentioned Jeff, the automation. It has to be about automating. It has to be about having a real solution for a real problem. You know, you look at, let's say 1500 of these security startups, a lot of them are about technology for the sake of technology. So, we're pretty excited about a couple of areas. One, is application security. If you think about the Equifax hack, you know, it's as simple as getting into the website and being able to hack into all of the PII data if you will. And, we've invested in a company called Prevoty and what they do is they make it easy for the application security folks to meet with the DevOps folks and inject the software into these applications. The reason why that's really interesting is, if you think about how long it takes for the DevOps guys to get all their new updates out, through that whole cycle, when you could automate that process and reduce that time to market, that's what it's really all about. >> So, what's your take on GDPR. You know, it's past a little while ago, the enforcement comes into place next month. It's weird what's going on with Facebook right now. I don't ever hear GDPR in the conversation of what's going on, and yet, it's just around the corner and it seems like it would be part of that conversation. DC is just king of a Y2K moment, where there's a lot of buzz and the date hits and we get past it and then we kind of move on with our lives, or is this really a fundamental shift in the way that companies are going to have to manage their data? >> Well, I can show you my scars from investigating compliance companies. I think the winners in that space, from a business standpoint are going to be the consultant companies, initially and at some point then, the legacy guys are going to be also involved, as well as some of the startups. But, clearly, until you see some of the large penalties happen, there's not going to be a lot of movement. There's going to be a lot of hand waving and consulting firms are trying to figure out what's your problem, how do we solve it. So, you're going to see, I'm sure, around the floor a lot of GDLP stuff, but we're being very cautious about where we invest there because, as you say, Y2K and a lot of this is going to be a lot fud. The legacy guys are going to say, oh we can handle that. Same as they did with cloud. Look how long it's taking cloud to get adopted, my God. I mean-- >> Right. >> GDRP is a big piece of that. We did investments in that space, around CASB, it's called. And, we invested in a company called Prelert. It had great traction, but then it just kind of topped out. So, it's going to be investable space and there's going to be a lot of money dumped in there because it's, you know, the Lemming effect. All VCs are going to follow that. >> Right. >> We'll see what happens. >> And then on the cloud, you know, with the growth of public cloud with Amazon and Azure and Google Cloud Platform, and they've got significant resources that they're investing into the security of their clouds and their infrastructure. And, yet, we still hear things happen all the time where there's some breach because somebody forgot to turn a switch from green to blue, or whatever. How did the startups, you know, kind of find their path within these huge public cloud spaces to find a vector that they can concentrate on, that's not already covered by some of these massive investments that the big public cloud people are making? >> Yeah, I think some of the, you know you point something out, I mean we got to think about cloud, you think about the public cloud, you think of private cloud and hybrid model and so on. I think that's really where things are going to to be for a while. The big guys, the big companies, enterprises are not putting a lot of their crown jewels out in the public clouds, yet. And, so the private clouds are equally important to them. And, so they have to be secured. And, the public cloud, you know, there's definitely they have some good security, but they quietly are implementing security from innovative companies also. They're not as public about it because they want to have they're already secure, so don't worry about me, but there's a lot of opportunity there. >> Okay, and then when CIOs are talking about security and thinking about security, ultimately they cannot be 100 percent secure, right, it's just you cannot be. >> It's called job security. >> Yeah, job security for us, right. But, I was thinking of this kind of as an insurance model. At some point, you get kind of the law of diminishing returns and you got to start making business trade-offs for the investment. How are these people thinking about this, at the same time, seeing their competitors and neighbors showing up on the cover of the Wall Street Journal breach after breach after breach? What's the right balance? How should they be thinking about managing risk, and thinking of a risk problem as opposed to kind of a castle problem? >> Yeah, and that's the biggest problem with CIOs and CSOs right now. It's all about what's good enough. Where do I reach that threshold? And, so there is definitely buyer fatigue. And, I think it's a matter, there are companies out there that look at the risk profile and are actually giving ratings of, what is your environment look like. We just invested in a spin out from, we helped spin out a company called CyberCube out of Symantec, and it's insurance. And, they're looking at, from a cyber insurance perspective, of what's your risk profile within your organization and selling and that data from Symantec as well as the data they have and going back to the insurance, the under buyer and saying, hey, we can show you the risk profile of this company and you can properly price your cyber insurance now. We all know how large the cyber insurance market is, so there's a lot of opportunities in that space to really look at the risk factors. >> Alright, well before I let you go, to go visit all the 117 startups, which will be looking for your cheque, I'm sure. >> Human ATM. >> What is one or two things that you think about in some of the more progressive startups that you talk about that still hasn't kind of hit the public eye yet. That they should be thinking about, or that we're going to be talking about in a couple years that's still kind of below the radar? >> Yeah, you know, if I told you then everyone else would be-- >> That's true. >> So, I have to be a little careful. You know, I think the interesting thing is, you know, a bit of a contrarian view. Is, if you think about consumer space, people don't really want to invest. Investors don't want to put money in the consumer, but you think about Symantec again, LifeLock. Identity protection, 2.3 billion dollars Symantec paid to get LifeLock. That's a lot of money. But, if you think about five years ago, how many consumers would pull out their Visa card to buy security. So, we think that there's really a potential opportunity on the consumer side. Now, AV is pretty well scorched earth. A lot of places, a lot of these endpoint things are scorched earth, but consumer might be an interesting place to be able to take these enterprise applications and, what I call, the consumerization of security, and take some of those interesting application and solutions and bring them down to the consumer in a bundle type of environment. >> Yeah, well certainly with all the stuff going on with Facebook now, people's kind of reawakening at the consumer level of what's really happening would certainly be fuel for that fire. >> We have an investment in a company called IDEXPERTS, which does breach remediation and our goal right now is we're continuing to add products from that space to be able to give the consumers a very robust offering. >> Alright, Sean, well thanks for taking a few minutes out of your day from prospecting. >> Yeah, pleasure. >> Over on the floor, he's Sean Cunningham, I'm Jeff Frick. You're watching theCUBE from RSA North America 2018 in downtown San Francisco. Thanks for watching, I'll see you next time. (upbeat music)

Published Date : Apr 18 2018

SUMMARY :

Presenter: From downtown San Francisco, it's theCUBE, as opposed to just kind of a slap on at the end. about the market, and obviously RSA, So, what are you seeing from your, seat at the table You have all the answers there. I talked to a lot of smart people, I think the only two buzzwords you left off and being able to hack into all of the PII data if you will. and the date hits and we get past it Y2K and a lot of this is going to be a lot fud. a lot of money dumped in there because it's, you know, How did the startups, you know, kind of find their path And, the public cloud, you know, there's definitely 100 percent secure, right, it's just you cannot be. and you got to start making business trade-offs Yeah, and that's the biggest problem with CIOs Alright, well before I let you go, to go visit all about in some of the more progressive startups So, I have to be a little careful. at the consumer level of what's really happening to be able to give the consumers a very robust offering. of your day from prospecting. Over on the floor, he's Sean Cunningham, I'm Jeff Frick.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

Sean CunninghamPERSON

0.99+

SymantecORGANIZATION

0.99+

Jeff FrickPERSON

0.99+

SeanPERSON

0.99+

ForgePoint CapitalORGANIZATION

0.99+

oneQUANTITY

0.99+

100 percentQUANTITY

0.99+

15 yearsQUANTITY

0.99+

1500QUANTITY

0.99+

PrelertORGANIZATION

0.99+

2.3 billion dollarsQUANTITY

0.99+

AmazonORGANIZATION

0.99+

Y2KORGANIZATION

0.99+

2000DATE

0.99+

117 startupsQUANTITY

0.99+

PrevotyORGANIZATION

0.99+

next monthDATE

0.99+

IDEXPERTSORGANIZATION

0.99+

GDPRTITLE

0.99+

Series BOTHER

0.99+

FacebookORGANIZATION

0.98+

two thingsQUANTITY

0.98+

Series AOTHER

0.98+

CyberCubeORGANIZATION

0.98+

Intel CapitalORGANIZATION

0.97+

1700 cybersecurityQUANTITY

0.97+

EquifaxORGANIZATION

0.97+

Trident Capital CybersecurityORGANIZATION

0.97+

five years agoDATE

0.96+

two buzzwordsQUANTITY

0.96+

300 million dollarQUANTITY

0.95+

OneQUANTITY

0.93+

CASBORGANIZATION

0.93+

a year and a half agoDATE

0.93+

40,000 plus professionalsQUANTITY

0.92+

1700QUANTITY

0.9+

5GORGANIZATION

0.87+

San FranciscoLOCATION

0.87+

ForgePointORGANIZATION

0.87+

dozen companiesQUANTITY

0.86+

GoogleORGANIZATION

0.86+

LifeLockORGANIZATION

0.84+

2018DATE

0.82+

downtown San FranciscoLOCATION

0.81+

RSA North AmericaORGANIZATION

0.81+

GDLPORGANIZATION

0.79+

Visa cardCOMMERCIAL_ITEM

0.78+

Wall Street JournalORGANIZATION

0.75+

theCUBEORGANIZATION

0.75+

DevOpsTITLE

0.73+

LifeLockCOMMERCIAL_ITEM

0.73+

GDRPORGANIZATION

0.71+

earthLOCATION

0.71+

RSA North America 2018TITLE

0.67+

aboutDATE

0.66+

AzureORGANIZATION

0.62+

RSAORGANIZATION

0.62+

Cloud PlatformTITLE

0.62+

AmericaORGANIZATION

0.61+

2018EVENT

0.61+

DCORGANIZATION

0.6+

RSA NorthTITLE

0.59+

couple yearsQUANTITY

0.53+

Y2KEVENT

0.49+

Jason Brvenik, NSS Labs | RSA North America 2018


 

>> Announcer: From downtown San Francisco, it's The Cube, covering RSA North America 2018. >> Welcome back, Jeff Frick with The Cube. We're at RSAC, the RSA Conference North American in San Francisco, 2018. 40,000 people, it's an amazingly huge and growing conference, 'cause security is obviously at the forefront of everything, especially as everything moves to devices and services and cloud, we can't forget security and we're excited to have somebody who's kind of got to a third-party validation kind of point of view on the marketplace to get their perspective. It's Jason Brvenik and he is the Chief Technology Officer for NSS Labs. So, Jason, great to meet you. >> Great to meet you. >> So for people that aren't familiar with NSS Labs, give us kind of the overview of what you guys are all about. >> We work with enterprises to understand their needs in security, and then, build and create test environments that create real-world conditions to assess whether or not a product is a good fit. We create comparable environments, so that we can understand fundamentally whether or not the products are delivering on their claims. >> Right, and recently you've done some work around the data center intrusion prevention systems group test. >> Mm-hmm. >> It's a mouthful. What is that all about? >> Well, that's all about the recognition that data centers are the keys to access for most organizations and appropriately protecting them is not as easy as deploying a firewall. You need to have much greater inspections on the interactions with systems, whether or not security's being provided within the application layers, being properly secured, and so, latency and performance and effectiveness against attacks are all measured and then presented in a set of group test reports. >> Right. So, must be getting increasingly complex, 'cause there's all these different components now that build up a solution. Right? It's not just one set of applications, that you're pulling maybe public data sources, you've got a bring-your-own-devices, you've got this huge string of things that are all pulled together. How do you incorporate that into your testing? How do you figure out how these things work together? 'cause ultimately, that increases your attack surface area, vulnerabilities, I would imagine. >> Certainly, and we create an environment, an architecture that we propose, that based on our interactions with the enterprises, it's fairly representative of what an enterprise would have, and then we create or simulate the types of interactions you would have with the different systems, generate attacks against them, and measure whether or not the products are able to sustain a concerted attack from an adversary. All the way into creating evasive techniques, so that an attack that is known to be blocked by a technology, we would apply different techniques to make it evasive and see if we can evade the security controls and to measure those. >> So how accurate are people, not to call anybody up, but how accurate are people in assessing the effectiveness of their own products and solutions? >> That's an interesting mixed bag. >> I'm sure it must run the gamut, right? >> It does, it does. >> Well, we don't want to call out any, beat anybody up, but I would imagine there are some that are just, Are they just looking at the wrong thing? Or how do you sort that all out? >> It's interesting to see the different perspectives that exist in the security space. Everything from just make the pain stop, where they want to do simple signature blocking to, we really want to understand what's happening and dig deep into the protocols and interactions and understand what's an appropriate interaction beyond whether or not there's an attack there. The fundamental premise we have in our space is there's an absolute shortage of talent in the security space that understands that just because the standard says something should be, doesn't mean that an attacker has to adhere to it. And so there's a ton of breaks in that. >> Dang. And what are some of the things that people just miss as the attack surfaces change? And I just think of the fully automated systems like we've seen in ad tech and advanced financial trading systems that are now moving more and more into an increasing group of applications that are going to be IoT-enabled, they're all going to be connected with 5G moving very quickly, so the potential for problems becomes pretty significant if there's a bad actor that gets inserted into that process. >> Certainly and it's interesting that the attackers seem to have automation down pretty well. They can get in and move laterally pretty quickly. >> Right. >> And ferreting out attacker behavior from just bad user behavior can be very difficult. The presumptions that a lot of technologies because the standard says something should be, it will be, create these situations where people aren't effectively looking for the ambiguities and standards, and those are abused all the time. When you look at embedded devices, they get deployed and they stay for 10 years. >> Jeff: Right. >> That's 10 years of technical data that's just deployed and waiting to be exercised and exploited, and having a good general hygiene on an operational environments to understand where these rifts are is probably the biggest gap in the Enterprise world. On the security side, the reliance on standards and the reliance on assumptions of what should be tend to continue, come back, and bite vendors, all right? >> It's funny. So you say just general hygiene and we talked about that in one of the prior interviews where often we'll hear, say, there's a Amazon breach or something and you get to the second paragraph and it's because somebody forgot to set a configuration in the right way, so it's not necessarily the technology or the infrastructure or the safeguards that are put up, it's just somebody forgot to turn the switch on. >> It is. >> So, why these things, general hygiene is still such a problem, is it just because it's so complex, things are moving so fast, people are just too busy? Is it a symptom of dev ops? >> We're human, we're human. >> There we go. >> There's a 1000 things demanding our attention all the time, and without solid processes and procedures, it's easy to miss something. And it's easy in the moment when you've got a big project that needs to launch to say that can wait until next week and then the next big project comes along and next week is here and it waits until the week after. Next thing you know, it's forgotten and you've got an old piece of architecture, infrastructure or security out there that just isn't being maintained anymore. >> Right. >> It's one of the reasons we created an environment that strives to do what we call continuous security validation. So even if you had the best security technologies in the world, it's indistinguishable from no security at all until a breach occurs, right? And so, continuous security validation allows us to look at live attacks that you're usually going to face, measure whether or not your security is deployed, is delivering all protections against them, and highlights there's a gap, simply because you're human. The best technology in the world isn't going to work if you're not managing it well. >> Right. So, are you creating kind of like a digital twin of the key components of my environment back in your lab? Or are you putting things in my system so that you can do this kind of continual monitoring? >> We create, effectively, a virtual remote office and then deploy your security controls and then we attack that remote office for you. And measure whether or not your security controls are being effective and whether or not your people with those controls are able to respond effectively. >> So what's been the impact of public cloud? Of the rise of public cloud? Both obviously, for those applications that are sitting in the public cloud from the Enterprise perspective, but now it's creating this kind of hybrid situation where they've still got stuff in the data center, they've got stuff in the public cloud, there's probably some stuff that's migrating in between, maybe it's tested to have in the public cloud and it gets deployed internally, or maybe they're trying to do a lift-and-shift out of the data center, so how has the rise of public cloud and with the hybrid cloud and multi-cloud environments impacted your guys' world? >> Oh, the biggest shift there, I think, is in the proliferation of what otherwise would have been well-controlled development environments into production environments. It's so easy to move what evolved in developing a technology into a production world without going in and paying attention whether or not all of the right elements are in play. So it used to be you developed it, then you moved it into QA and then from QA, it got moved into production. Now you go right from Dev to Production and QA kind of happens in the background. >> Right, right. And we talked in an earlier conversation, too, which is before then this security would be layered on after the test dev, once it was moving in production. Well, let's slap some security on it, but now it's got to be incorporated in from day one, so another huge opportunity, I guess, to miss that, as you roll that into production. >> It seems like nobody ever thinks about security first. It just isn't the function. No developer ever wakes up in the morning and thinks, I need to do security and then develop features. Their life is all around delivering the value that the customers are looking for and security prevents them creating the feature velocity they want to deliver. There's always a push-and-pull there to get the right balance and it's easy when you're not under sustained attack to believe that security isn't important. >> So how do people adjust kind of their thinking around security? Or is it just below the surface, or it's presumed? How does it become more of an ongoing part of the conversation and a feature that's always baked in during the development versus kind of an afterthought or, oh my gosh, my neighbor just got hacked or there's a big story in the Wall Street Journal? >> I think what we're seeing now in the evolution of software and development is the supply chain involved. It used to be you created systems from scratch and you built it from scratch and you had the opportunity to layer security in as you were going. You would find a weakness, you would design around it, you would overcome it. Now it's more of an assemblage of components to produce an outcome, and the security wasn't built in when the component was built, you've pretty much lost that opportunity and it's hard to go retrofit that. I think we're going to soon see the next phase where these components are start building security assumptions in up front, but it's going to be a long time, much like IoT where things are deployed forever, where we start seeing that supply chain evolve on its own and you can assemble secure software from the start. >> Yeah, it's amazing that's it's still kind of an afterthought when these things are in the newspaper every day and it's almost an assumption maybe we're getting a little numb to the thing that you're going to be breached and you're going to have an issue and how do you react to it? How quickly can you find it? How do you limit the damage? Because it seems like everybody's getting breached every day. >> Especially, when you consider we have decades of technical data. There are companies that still run their businesses on mainframes that haven't been produced in 20 years. >> I didn't even think of that part of it. All right, last question before I let you go, Jason. Big, big week this week at RSA. What are you looking forward to? >> Ah, I'm looking forward to really the evolution of advanced end point technologies, the delivery of visibility to the enterprise, that can do new response actions based on new knowledge. I'm looking forward to the growth of automation. Automation as it relates to security elements, so we can reduce the human element. >> Jeff: Right. >> And the mistakes that are made. >> Yeah, 'cause we certainly need it, 'cause it is easy to make mistakes when you've got a 1000 little tasks, right? >> It is. >> All right, Jason. Well, thank you for taking a few minutes of your day and stopping by. >> Thanks for having me. >> All right. He's Jason, I'm Jeff. You're watching The Cube. We're at RSAC 2018 North America in San Francisco. Thanks for watching. (exciting music)

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's The Cube, It's Jason Brvenik and he is the Chief Technology Officer So for people that aren't familiar with NSS Labs, to assess whether or not a product is a good fit. the data center intrusion prevention systems group test. What is that all about? that data centers are the keys to access How do you incorporate that into your testing? and to measure those. and dig deep into the protocols and interactions that are going to be IoT-enabled, the attackers seem to have automation down pretty well. because the standard says something should be, and the reliance on assumptions of what should be and it's because somebody forgot to set a configuration And it's easy in the moment It's one of the reasons we created an environment of the key components of my environment back in your lab? and whether or not your people with those controls and QA kind of happens in the background. after the test dev, and thinks, I need to do security and then develop features. and the security wasn't built in and how do you react to it? Especially, when you consider we have decades What are you looking forward to? the evolution of advanced end point technologies, and stopping by. We're at RSAC 2018 North America in San Francisco.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JasonPERSON

0.99+

Jeff FrickPERSON

0.99+

Jason BrvenikPERSON

0.99+

JeffPERSON

0.99+

10 yearsQUANTITY

0.99+

NSS LabsORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

next weekDATE

0.99+

20 yearsQUANTITY

0.99+

1000 thingsQUANTITY

0.99+

second paragraphQUANTITY

0.99+

oneQUANTITY

0.99+

San FranciscoLOCATION

0.99+

40,000 peopleQUANTITY

0.99+

decadesQUANTITY

0.99+

BothQUANTITY

0.98+

RSAORGANIZATION

0.98+

1000 little tasksQUANTITY

0.97+

one setQUANTITY

0.97+

Wall Street JournalTITLE

0.96+

this weekDATE

0.96+

day oneQUANTITY

0.94+

2018DATE

0.91+

RSA North America 2018EVENT

0.9+

North AmericaLOCATION

0.88+

The CubeTITLE

0.86+

The CubeORGANIZATION

0.85+

RSA Conference North AmericanEVENT

0.84+

RSAC 2018EVENT

0.77+

RSA North AmericaORGANIZATION

0.74+

firstQUANTITY

0.72+

one of the reasonsQUANTITY

0.7+

The CubeCOMMERCIAL_ITEM

0.64+

RSACORGANIZATION

0.6+

technical dataQUANTITY

0.59+

ndQUANTITY

0.52+

Tim Jefferson, Barracuda Networks | RSA North America 2018


 

(upbeat music) >> Announcer: From downtown San Francisco, it's theCUBE. Covering RSA North America 2018. >> Welcome back everybody, Jeff Frick here, with theCUBE. We're at RSA Conference 2018 in downtown San Francisco, 40,000 plus people, it's a really busy, busy, busy conference, talking about security, enterprise security and, of course, a big, new, and growing important theme is cloud and how does public cloud work within your security structure, and your ecosystem, and your system. So we're excited to have an expert in the field, who comes from that side. He's Tim Jefferson, he's a VP Public Cloud for Barracuda Networks. Tim, great to see you. >> Yeah, thanks for having me. >> Absolutely, so you worked for Amazon for a while, for AWS, so you've seen the security from that side. Now, you're at Barracuda, and you guys are introducing an interesting concept of public cloud firewall. What does that mean exactly? >> Yeah, I think from my time at AWS, one of my roles was working with all the global ISVs, to help them re-architect their solution portfolio for public cloud, so got some interesting insight into a lot of the friction that enterprise customers had moving their datacenter security architectures into public cloud. And the great biggest friction point tend to be around the architectures that firewalls are deploying. So they ended up creating, if you think about how a firewall is architected and created, it's really designed around datacenters and tightly coupling all the traffic back into a centralized policy enforcement point that scales vertically. That ends up being a real anti-pattern in public cloud best practice, where you want to build loosely coupled architectures that scale elastically. So, just from feedback from customers, we've kind of re-architected our whole solution portfolio to embrace that, and not only that, but looking at all the native services that the public cloud IaaS platforms, you know, Amazon, Azure, and Google, provide, and integrating those solutions to give customers the benefit, all the security telemetry you can get out of the native fabric, combined with the compliance you get out of web application and next-generation firewall. >> So, it's interesting, James Hamilton, one of my favorite people at AWS, he used to have his Tuesday Nights with James Hamilton at every event, very cool. And what always impressed me every time James talked is just the massive scale that Amazon and the other public cloud vendors have at their disposal, whether it's for networking and running cables or security, et cetera. So, I mean, what is the best way for people to take advantage of that security, but then why is there still a hole, where there's a new opportunity for something like a cloud firewall? >> I think the biggest thing for customers to embrace is that there's way more security telemetry available in the APIs that the public cloud providers do than in the data plane. So most traditional network security architects consider network packets the single source of truth, and a lot of the security architecture's really built around instrumenting in visibility into the data plane so you can kind of crunch through that, but the reality is the management plane on AWS and Azure, GCP, offer tremendous amount of security telemetry. So it's really about learning what all those services are, how you can use the instrument controls, mine that telemetry out, and then combine it with control enforcement that the public cloud providers don't provide, so that kind of gives you the best of both worlds. >> It's interesting, a lot of times we'll hear about a breach and it'll be someone who's on Amazon or another public cloud provider, and then you see, well they just didn't have their settings in the right configuration, right? >> It's usually really kind of Security 101 things. But the reality is, just because it's a new sandbox, there's new rules, new services, you know, and engineers have to kind of, and the other interesting thing is that developers now own the infrastructures they're deploying on. So you don't have the traditional controls that maybe network security engineers or security professionals can build architectures to prevent that. A developer can inadvertently build an app, launch it, not really think about security vulnerabilities he put in, that's kind of what you see in the news. Those people kind of doing basic security misconfigurations that some of these tools can pick up programmatically. >> Now you guys just commissioned a survey about firewalls in the cloud. I wonder if you can share some of the high-level outcomes of that survey. What did you guys find? >> Yeah, it's similar to what we're chatting. It's just that, I think, you know, over 90% of enterprise customers acknowledge the fact that there's friction when they're deploying their datacenter security architectures, specifically network security tools, just because of the architectural friction and the fact that, it's really interesting, you know, a lot of those are really built because everything's tightly coupled into them, but in the public cloud, a lot of your policy enforcement comes from the native services. So, for instance, your segmentation policy, the route tables actually get put into the, when you're creating the networking environment. So the security tools, a network security tool, has to work in conjunction with those native services in order to build architectures that are truly compliant. >> So is firewall even the right name anymore? Should it have a different name, because really, we always think, all right, firewall was like a wall. And now it's really more like this layered risk management approach. >> There's definitely a belief, you know, among especially the cloud security evangelists, to make sure people don't think in terms of perimeter. You don't want to architect in something that's brittle in something that's meant to be truly elastic. I think there's kind of two, you know the word firewall is expanding, right, so more and more customers are now embracing web application firewalls because the applications are developing are port 80 or 443, they're public-facing web apps, and those have a unique set of protections into them. And then next-generation firewalls still provide ingress/egress policy management that the native platforms don't offer, so they're important tools for customers to use for compliance and policy enforcement. They key is just getting customers to understand thinking through specifically which controls they're trying to implement and then architect the solutions to embrace the public cloud they're playing in. So, if they're in Azure, they need to think about making sure the tools they're choosing are architected specifically for the Azure environment. If they're using AWS, the same sort of thing. Both those companies have programs where they highlight the vendors that have well-architected their solutions for those environments. So Barracuda has, you know, two security competencies, there's Amazon Web Services. We are the first security vendor for Azure, so we were their Partner of the Year. So the key is just diving in, and there's no silver bullet, just re-architecting the solutions to embrace the platforms you're deploying on. >> What's the biggest surprise to the security people at the company when they start to deploy stuff on a public cloud? There's obviously things they think about, but what do they usually get caught by surprise? >> I think it's just the depth and breadth of the services. There's just so many of them. And they overlap a little bit. And the other key thing is, especially for network security professionals, a lot of the tools are made for software developers. And they have APIs and they're tooling is really built around software development tools, so if you're not a software developer, it can be pretty intimidating to understand how to architect in the controls and especially to leverage all these native services which all tie together. So it's just bridging those two worlds, you know, software development and network security teams, and figuring out a way for them to collaborate and work together. And our advice to customers have been, we've seen comical stories for those battles between the two. Those are always fun to talk about, but I think the best practice is around getting, instead of security teams saying no, I think everybody's trying to get culturally around how do I say yes. Now the burden can be back to the software development teams. The security teams can say, here the list of controls that I need you to cover in order for this app to go live. You know, HIPAA or PCI, here are these compliance controls. You guys chose which tools and automation frameworks work as part of your CI/CD pipeline pr your development pipeline, and then I'll join your sprints and you guys can show incrementally how we're making progress to those compliance. >> And how early do they interject that data in kind of a pilot program that's on its way to a new production app? How early do the devs need to start baking that in? >> I think it has to be from day zero, because as you embrace and think through the service, and the native services you're going to use, depending on which cloud provider, each one of those has an ecosystem of other native services that can be plugged in and they all have overlapping security value, so it's kind of thinking through your security strategy. And then you can be washed away by all the services, and what they can and can't do, but if you just start from the beginning, like what policies or compliance frameworks, what's our risk management posture, and then architect back from that. You know, start from the end mine and then work back, say hey, what's the best tool or services I can instrument in. And then, it may be, starting with less cloudy tools, you know, just because you can instrument in something you know, and then as you build up more expertise, depending on which cloud platform you're on, you can sort of instrument in the native services that you get more comfortable with then. So it's kind of a journey. >> You got to start from the beginning. Bake it in from the zero >> Got to be from the zero. >> It's not a build-on anymore. All right Tim, last question. What are we looking forward to at RSA this week? >> I'm very cloud-biased, you know, so I'm always looking at the latest startups and how creative people are about rethinking how to deploy security controls and just kind of the story and the pulse around the friction with public cloud security and seeing that evolve. >> All right, well I'm sure there'll be lots of it. It never fails to fascinate me, the way that this valley keeps evolving and evolving and evolving. Whatever the next big opportunity is. All right, he's Tim Jefferson, I'm Jeff Frick, thanks for stopping by. You're watching theCUBE. We're at RSAC 2018 in San Francisco. Thanks for watching. (upbeat techno music)

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's theCUBE. Tim, great to see you. Absolutely, so you worked for Amazon for a while, for AWS, And the great biggest friction point tend to be around is just the massive scale that Amazon and the other and a lot of the security architecture's really built around developers now own the infrastructures they're deploying on. the high-level outcomes of that survey. just because of the architectural friction and the fact So is firewall even the right name anymore? just re-architecting the solutions to embrace So it's just bridging those two worlds, you know, and the native services you're going to use, Bake it in from the zero What are we looking forward to at RSA this week? the story and the pulse around the friction with Whatever the next big opportunity is.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Tim JeffersonPERSON

0.99+

Jeff FrickPERSON

0.99+

AmazonORGANIZATION

0.99+

AWSORGANIZATION

0.99+

JamesPERSON

0.99+

James HamiltonPERSON

0.99+

Barracuda NetworksORGANIZATION

0.99+

Amazon Web ServicesORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

TimPERSON

0.99+

443OTHER

0.99+

oneQUANTITY

0.99+

BothQUANTITY

0.99+

twoQUANTITY

0.99+

GoogleORGANIZATION

0.98+

over 90%QUANTITY

0.98+

40,000 plus peopleQUANTITY

0.97+

each oneQUANTITY

0.97+

Security 101TITLE

0.97+

RSAC 2018EVENT

0.96+

both worldsQUANTITY

0.96+

port 80OTHER

0.96+

AzureTITLE

0.96+

egressORGANIZATION

0.96+

this weekDATE

0.96+

RSA Conference 2018EVENT

0.94+

RSAORGANIZATION

0.94+

BarracudaORGANIZATION

0.94+

ingressORGANIZATION

0.93+

HIPAATITLE

0.89+

single sourceQUANTITY

0.88+

first securityQUANTITY

0.87+

downtown San FranciscoLOCATION

0.85+

two worldsQUANTITY

0.84+

day zeroQUANTITY

0.84+

two security competenciesQUANTITY

0.81+

my rolesQUANTITY

0.74+

AzureORGANIZATION

0.72+

RSA North AmericaORGANIZATION

0.71+

theCUBEORGANIZATION

0.69+

RSA North America 2018EVENT

0.62+

2018DATE

0.58+

TuesdayEVENT

0.57+

zeroQUANTITY

0.5+

NightsDATE

0.44+

Dave Frampton, SumoLogic | RSA North America 2018


 

>> Narrator: From downtown San Francisco, it's theCUBE, covering RSA North America 2018. >> And welcome back everybody, Jeff Frick here with theCUBE. We're at the RSA Conference in San Francisco, it's 40 thousand plus people talking security, really one of the biggest conferences in San Francisco, and security continues to be an ever increasing and important topic, and more and more complex and complicated and multifaceted. We're excited to have really an innovator who just recently sold his company to Sumo Logic, he's Dave Frampton, VP of security solutions now at Sumo Logic. Dave, great to see you. >> Dave: Good to be here. >> So you guys were relatively a relatively small team working on a very specific piece of this giant pie. So, tell us a little bit about what you're doing and what attracted Sumo Logic to you. >> FactorChain, acquired by Sumo Logic in Q4 of last year was focused on building an investigation platform to really help security analysts very quickly and completely identify, for an individual threat or alert of which they get an avalanche every day, what happened, where did it spread, and then what should be done about it, more importantly. >> It's funny 'cause we talk often, at all these conferences, right, everybody in the keynote will talk about it, "six months before you know you've been breached", or two years, or whatever the average, it changes all the time. But nobody ever really talks about once you've figured it out, then what? So that's really what you guys are about, the "then what?" So what are some of the things that people do wrongly, and what are some of the immediate triage and best practices that people should be aware of if they're not already? >> It's a great question, there's really a difficult work flow that exists when you start digging into one of these indicators of compromise or alerts, typically an analyst is trying to connect the dots across huge numbers of systems and huge data sets. They may have to go to five to ten different systems, run queries which take a long time to run and then take a long time to interpret, kind of stitch together the clues across all of them, and this process can often take 30 minutes, an hour, or even two hours against an inflow rate of hundreds of these per day. So there's sort of this expanding backlog of uninvestigated urgent threats. In many cases, people only get to about 10% of the most urgent threats or alerts that come in to their security operation center, or SOC. And FactorChain's innovation was to develop some new techniques to help human analysts quickly connect the dots across these huge data sets. Integrate a lot of those different systems, so you can go to one place, see huge, deep connections between data sets, and then kind of put it all together in a very concise work flow that helps you get through this process just a lot faster, a lot more skilled. >> So are you identifying patterns of past behavior, 'cause you have a database of how these things work, are you looking for consistency of behavior within one system in others, I mean, what are some of the, obviously you're not going to tell us your secret sauce, but what are some of the tricks and tips that enable you to speed up that process? It's scary to hear that they have hundreds of high priority that they can't get to. >> There's two main components of trying to accelerate this whole work flow. The first one is trying to help analysts very quickly get insight into how variables change in an environment. This investigation process is little bit like a game of whack-a-mole, you're following a particular user or particular machine, but then the name will change, and then there'll be another variable introduced but it will change four times, and you're left to try to figure out which one of these changes map to the original. This process just repeats over and over again. So part of our insight was to try to figure out how to chain, hence the name FactorChain, all of these variable changes together in a very, very concise way, so you can help the analyst find the right path through the data and ignore all the false trails, get back on the trail when they lose the trail. So it's really sort of a data navigation and insight, sort of the key core of FactorChain's innovation. >> So a big factor, shouldn't use that word again, but we'll use it again, factor happening today in the industry is everything going to cloud, right? A huge percentage of business going to cloud. AWS is up to 20 billion dollar run rate and Sumo is a big partner, and Microsoft and Google are trying to catch up from behind, and IBM's got a cloud. So cloud's a big thing and there's more and more cloud. Also, we're in this API economy now, so whether I want to use public data sets and inject those into my processes, or I've got partners that I'm, I'm connecting all these things via API's and I still have my on-prem stuff, or the stuff that just can't go to cloud or legacy for whatever reason. So the environment is becoming way more complex, the number of third party people that you're playing nice with is becoming much, much larger, and a lot of these connections are completely automated, right, when you look at ad tech and some of the financial trading systems. So how does that increasing complexity play into what you guys are doing? >> The migration to the cloud is putting enormous disruptive pressure on some of these traditional security processes. You think about, the old world involved a security operations center and a small team of analysts just going through this list of alerts that were sent in by their infrastructure. The cloud really challenges that in two fundamental ways. I think one of them you hit really well in your description of it, which is just the sheer surface area of possible attack has increased so dramatically. You hit all the key points, there's automated processes, there's a lot of customer facing and production security that didn't exist in the old worlds, so you have so many more ways for the attackers to get in. But importantly, there are new sources of information which are critical to actually orchestrating the defense, to figuring out what to pay attention to and how to pay attention to it. Application layer information is much more relevant in a cloud context. And you have a lot of the infrastructures being standardized underneath, but a lot of the interesting insight might be from the application. Is this a customer or is it a partner? Is it a sensitive piece of information or application, or not? There's all sorts of context which needs to be brought in to the forensic process to help the investigators really get to the bottom of what happened and where did it spread. There's also a need to collaborate across security and other functions in IT in a much more seamless, horizontal way. A typical example would be an analyst in the SOC might understand an awful lot about security forensics but may not really understand some of this application context or even how to interpret some of the application logs at all. So you really need a horizontal collaboration involving IT operations, you hear a lot about DevOps and sort of DevSecOps, you need a much more collaborative work flow, not just a common data set, which I think everybody recognized a few years back, but also common analytics and a common work flow, common tooling that they can collaborate in the same system on the same investigation. And so those are the ways in which the traditional security industry and the boundaries around its processes and its tools are really being challenged and disrupted by the migration to the cloud, and at Sumo Logic, this is sort of at the center of where we live. We live in a world where people are rapidly migrating to the cloud, looking for monitoring and troubleshooting and security analytics, functionality. As they do that, looking at modern applications and how their architectures are changing and what implications that has for security. So we have our sights squarely set on sort of creating that new model for that new cloud-oriented environment. >> Right, and then how much do you work with other applications, which I guess in the past may have been thought of as competitive, but when you're in an environment with all these integrated systems at a customer, and there's probably tremendous benefit to sharing some level of information in terms of the signature of threats and when threats are coming in. I'm sure there's ton of great data that, if shared across people on the good side of the fence, will probably be to the benefit of all. So has that been changing, is that evolving, how do you see kind of working with other apps within, let's just pick the AWS cloud for example, within a particular customer, whether it's AWS directly or other partners in the ecosystem? >> Right, well first, you hit it, I mean, this function of security operations has to be agnostic, right? You have to be open to ingesting context from whichever system and whichever vendor and whatever source it might come from. And so these ecosystems are really important, and integration so that you can quickly, not only take in information from third parties, but then quickly get trending and visualization and really bring insight to that data. And so to that end, Sumo Logic's a leader in the AWS ecosystem, we've been built from the ground up on AWS, and we have rich partnerships with the vast majority of the ecosystem of tools that surround the AWS environment. So we can bring that in and very quickly deliver insight, make correlations, figure out what you need to pay attention to, and then do this investigation work flow that we were talking about earlier. >> Alright, crazy times. So, 40 thousand people here, what are you looking forward to for the next couple of days here at RSAC? >> I think a couple of things. One is, I think everyone is focused, right now, on the upcoming deadline for GEPR, and sort of data protection, data privacy, how do we identify within our data what might be subject to some of these regulations and new compliance requirements, and then how many of those overlap. Though the best of intentions, it creates some dilemmas about how to approach problems, such as for example, right to be forgotten. And I think seeing the community come together and sort of in a live venue, which is really what the show is all about, and kind of discuss and debate those issues, I think that's one. Two is the center of what we've been talking about, is the impact of modern application architectures and cloud on some of these old, traditional security practices and models. And that's why we have a bigger presence this year at the show, because we think that's something that is going to change the way things have been done in the security industry, and we want to be a part of that conversation and obviously giving previews of our upcoming products that address some of those problems. Looking forward to a good week. >> Should be good of a week for you, be busy. >> Dave: Absolutely. >> Thanks for taking a few minutes, and again congratulations on the acquisition with Sumo, great marriage I'm sure, and look forward to following the story. >> Thanks so much. >> Alright, he's Dave Frampton, I'm Jeff Frick. You're watching theCUBE from RSAC 2018 San Francisco. Thanks for watching.

Published Date : Apr 18 2018

SUMMARY :

it's theCUBE, covering RSA North America 2018. and security continues to be an ever increasing and what attracted Sumo Logic to you. and then what should be done about it, more importantly. and what are some of the immediate triage and best practices and then take a long time to interpret, that enable you to speed up that process? and ignore all the false trails, in the industry is everything going to cloud, right? and disrupted by the migration to the cloud, Right, and then how much do you work and integration so that you can quickly, So, 40 thousand people here, what are you looking forward to Two is the center of what we've been talking about, and again congratulations on the acquisition Thanks for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MichielPERSON

0.99+

AnnaPERSON

0.99+

DavidPERSON

0.99+

BryanPERSON

0.99+

JohnPERSON

0.99+

IBMORGANIZATION

0.99+

MichaelPERSON

0.99+

ChrisPERSON

0.99+

NECORGANIZATION

0.99+

EricssonORGANIZATION

0.99+

KevinPERSON

0.99+

Dave FramptonPERSON

0.99+

MicrosoftORGANIZATION

0.99+

Kerim AkgonulPERSON

0.99+

Dave NicholsonPERSON

0.99+

JaredPERSON

0.99+

Steve WoodPERSON

0.99+

PeterPERSON

0.99+

Lisa MartinPERSON

0.99+

NECJORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

Mike OlsonPERSON

0.99+

AmazonORGANIZATION

0.99+

DavePERSON

0.99+

Michiel BakkerPERSON

0.99+

FCAORGANIZATION

0.99+

NASAORGANIZATION

0.99+

NokiaORGANIZATION

0.99+

Lee CaswellPERSON

0.99+

ECECTORGANIZATION

0.99+

Peter BurrisPERSON

0.99+

OTELORGANIZATION

0.99+

David FloyerPERSON

0.99+

Bryan PijanowskiPERSON

0.99+

Rich LanePERSON

0.99+

KerimPERSON

0.99+

Kevin BoguszPERSON

0.99+

Jeff FrickPERSON

0.99+

Jared WoodreyPERSON

0.99+

LincolnshireLOCATION

0.99+

KeithPERSON

0.99+

Dave NicholsonPERSON

0.99+

ChuckPERSON

0.99+

JeffPERSON

0.99+

National Health ServicesORGANIZATION

0.99+

Keith TownsendPERSON

0.99+

WANdiscoORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

MarchDATE

0.99+

NutanixORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

IrelandLOCATION

0.99+

Dave VellantePERSON

0.99+

Michael DellPERSON

0.99+

RajagopalPERSON

0.99+

Dave AllantePERSON

0.99+

EuropeLOCATION

0.99+

March of 2012DATE

0.99+

Anna GleissPERSON

0.99+

SamsungORGANIZATION

0.99+

Ritika GunnarPERSON

0.99+

Mandy DhaliwalPERSON

0.99+

Edna Conway, Cisco | RSA North America 2018


 

>> Announcer: From downtown San Francisco, it's theCUBE covering RSA North America 2018. >> Hey welcome back everybody, Jeff Frick here with theCUBE. We're in San Francisco at RSA conference 2018, as 40,000 plus professionals talking about security. It's quickly becoming one of the biggest conferences that we have in San Francisco right up there with Oracle OpenWorld and Salesforce.com, pretty amazing show and we're excited to get some of the insight with some of the experts that are here for the event and all the way from the East Coast, from New Hampshire Edna Conway's joining us, she's a chief security officer, global value chain for Cisco, Edna great to see you. >> Oh I'm delighted to be here Jeff, thank you. >> Absolutely so we're glad to get you out of the 21 degree weather that you said was cold and sleety when you departed. >> Cold and sleety, spring in New Hampshire, although it's not much nicer here in San Francisco. >> No, it's a little dodgy today. Well anyway let's jump into it. So you're all about value chain. What exactly when you think about value chain, explain to the people, what are you thinking? >> You know that's a great question because we define the value chain as the end to end life cycle for any solution. So it could be hardware, it could be software, it could be a service, whether it's a service afforded by a person, or a service afforded by the cloud. >> Now it's interesting because the number of components in a solution value chain just continue to grow over time as we have the API economy, and clouds, and all these things are interconnected so I would imagine that the complexity of managing and then by relation securing that value chain must be getting harder and harder over time as we continue to add all these, kind of API components to the solution. Is that what you see in the field? >> I think there's a challenge there without a doubt, but sometimes that interconnection actually gives you a hook in right, and so what we've been thinking about for years now is, is there a way to actually define a simple high level architecture that can be flexible and elastic with some rigidity that allows you to identify what your core goals are, and then allows those third party ecosystem members to join you in the effort to achieve those goals in a way that works for their business. >> Right and then how does open source play in that? Because that's also an increasing component of the value chain, is that integrated into more and more either just overtly, or you're implementing an open source solution or you've got all these people that are kind of open source plus and what they're building and delivering to the market. >> Yeah open source is a great challenge without a doubt. I think the way in which to deal with open source is to understand where you're getting it from, just like all third party ecosystem members. Who are they? What are they doing for you? And more precisely how are you going to utilize them and take a risk based approach to where you're embedding them. >> Right. >> Right. Not all things are created equally. And so your worry needs to be different depending on the utilization. >> Right. The risk based approach is a great comment because cause security in a way to me is kind of like insurance, you can't be ultimately secure unless you just lock the doors and sit in there by yourself. So it's always kind of this risk trade off, benefit versus trade off, and really a financial decision as to how much do you want to invest in that next unit of security relative to the return. So when you're thinking about it from a risk modeling basis versus just, you know, we're putting up the moat and nobody's coming in, which we know doesn't work anymore. What are some of the factors to think about so that you're achieving the right level of success at the right investment? >> I think there are a number of things to think about, and the primary one I would say is, look at what I believe is the currency of the digital economy which is trust. And in order to build trust what you need to do is understand the risks that you're taking. And those risks need to measured in the language of business. So all of a sudden, it becomes really clear when you know what someone is doing for you, and you know how they're doing it, and the invasiveness of your inquiry and partnership with them actually needs to be adjusted, and all of a sudden you develop not only a baseline, but an opportunity to enhance your trust for, let's take an example. So Cisco's working with Intel, we're going to deploy Intel threat detection technology, our first instantiation of that will be tetration. Clearly they're a third party ecosystem member. >> Right, right. >> And they have been for some time. Now what we're thinking about is how does Intel go about deploying that capability? And not only that, but how are we going to utilize it? And our view is if you take CPU telemetry and you combine it with our edge as well as our network telemetry, you have a better solution down the road, better solution for alerts, better solution for quicker decisions for the inevitable. That risk based approach says we're embedding into and partnering at a core solution level. >> Right. >> That's a different area of inquiry then somebody, we were talking earlier and I said, you know, if you're a sheet metal provider on the external part of a chassis, great. >> Don't they love the diligence on that piece? >> Quality due diligence, but security limited, yeah? >> So but it's interesting because on one hand you're opening up kind of new kind of threat surfaces if you will, the more components that are in a solution from the more providers. On the positive side, now you're leveraging their security expertise within the components that they're bringing to the solution. So as most things in life right, it's really kind of two sides of the same coin, opening up more threats, but leveraging another group of resources who have an expertise within that piece of the value chain. >> Absolutely. Look none of us make something from nothing, you know, the reality is we're relying more and more on the digital economy on those third parties. So understanding precisely how they're doing something is important, but we also have to be respectful of one another's intellectual property. And that is a unique wrinkle in a day and age of integration that we haven't seen previously. The other thing I think that's really important is we're seeing a wonderful, I think explosion of IOT, there's a downside obviously, the question is have folks deployed their IOT in a way that included the security community. You should have security at the table, but what IOT does is give you edge visibility that you've never had before. So I see it as a positive, but it needs to be informed by things like AI, it needs to be informed by things like machine learning, and they need to be gates within at the end of the day where the information is managed, which is at the network. >> Right, cause again it's just another entry point in as well, so good thing, bad thing. I want to circle back on kind of the boardroom discussion that we talked about a little bit earlier. Everyone's talking about securities and board conversation, clouds and board conversation, a lot of these big, kind of IT transformational things that are happening are now being elevated to the board cause everybody's a digital company and everybody's a digital business. When you want to talk to the board, and how should people talk to the board about security vis a vis kind of this risk analysis versus just a pure, you know, we're secure, or we're not secure, and I'm sure every CEO and board is worried for that announcement to come out in the paper that they were breached some time ago. And you almost think it's inevitable at some point in time, so what does the board discussion look like? How's the board decision changing as security gets elevated beyond kind of the basics? >> So let me answer that in the context of value chain security. >> Absolutely. >> I think we need to get to the point where security speaks the language of business. We need to walk into the board and say we have an architecture, we are deploying measures to achieve the architecture at a certain level of compliance and goal setting across the ecosystem on a risk based approach. Fabulous words, I'm a board member. What does that mean to me? >> Help me, help me, gimme a number. Exactly, well, and the number comes out of tolerance levels. So if you have this architecture and you have goals set we have 11 domains, we set goals flexibly based on the nature of the third party and what they do for us. Now we have a tolerance level and guess what you can report? I'm at tolerance, I'm above tolerance, I'm below tolerance. And if you start to model through a variety of techniques, there are a number of standards out there and processes some folks have written about them, where you can translate that risk of tolerance into dollars if you're in the US or currency of your choice and the reality is you're walking in and saying at tolerance means this degree of risk, below tolerance means I've reduced my risk to this. It might afford you an opportunity to say hmmm, perhaps you can share some of that benefit with me to take the program to a new level. >> Right, right or in a different area. >> About tolerance, higher degree of risk, what do we do about it? Now you're speaking the language of business. >> So that's pretty old school business right? I want to talk to you about something that's a little bit newer school which is block chain. And you've used the word trust I don't know how many times in this interview, we'll check the transcript, but trust is a really important thing obviously, and some people have said that they view block chain as trust as a service. I'm just curious to get your perspective as we hear more and more about block chain, and big companies like IBM and a lot of companies are putting a bunch of resources behind it, where do you see block chain fitting? What is Cisco's position or I don't know if they have a official position yet as block chain now is introduced into this world of trust. >> So I think we're all looking at it, Cisco included block chain is an incredibly useful tool without a doubt. I'm not sure that block chain's going to solve world hunger or world peace. >> Shoot. >> However, just as we said trust has elements of use artificial intelligence to inform your decisions, achieve a higher degree of trust, what you can have is a set of let's say, hashes, date and time stamps, as something passes through the network because remember, if the currency is trust the integrity of the data is the fuel that allows you to earn trust. And digital, digital ledger technology or block chain is something that I think allows us to develop what I call a passport for the data. So we have a chain of custody, you know I'm an old homicide prosecutor from many, many, years ago chain of custody was important in the trial so too chain of custody of your data and your actions across the full spectrum of a life cycle add a degree of integrity we've never had the ability to do easily before. >> Interesting times. >> Alright Edna well thank you for spending some of your day with us, I'm sure you have a crazy, busy RSA planned out for the next couple days so thanks again. >> My pleasure, thank you so much for having me. >> Alright she's Edna Conway, I'm Jeff Frick. You're watching theCUBE from RSA Conference 2018 thanks for watching. (theme music)

Published Date : Apr 18 2018

SUMMARY :

Announcer: From downtown San Francisco, it's theCUBE and all the way from the East Coast, from New Hampshire Absolutely so we're glad to get you out of the 21 degree Cold and sleety, spring in New Hampshire, explain to the people, what are you thinking? or a service afforded by the cloud. Is that what you see in the field? to join you in the effort to achieve those goals of the value chain, is that integrated into more and more And more precisely how are you going to utilize them depending on the utilization. What are some of the factors to think about so that you're And in order to build trust what you need to do And our view is if you take CPU telemetry and you combine we were talking earlier and I said, you know, On the positive side, now you're leveraging their security Look none of us make something from nothing, you know, beyond kind of the basics? So let me answer that in the context of of compliance and goal setting across the ecosystem and the reality is you're walking in and saying Now you're speaking the language of business. I want to talk to you about something that's a little bit I'm not sure that block chain's going to solve the integrity of the data is the fuel that allows you Alright Edna well thank you for spending Alright she's Edna Conway, I'm Jeff Frick.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
IBMORGANIZATION

0.99+

EdnaPERSON

0.99+

Jeff FrickPERSON

0.99+

CiscoORGANIZATION

0.99+

JeffPERSON

0.99+

Edna ConwayPERSON

0.99+

San FranciscoLOCATION

0.99+

21 degreeQUANTITY

0.99+

New HampshireLOCATION

0.99+

two sidesQUANTITY

0.99+

USLOCATION

0.99+

11 domainsQUANTITY

0.99+

40,000 plus professionalsQUANTITY

0.99+

todayDATE

0.99+

RSAORGANIZATION

0.98+

Salesforce.comORGANIZATION

0.98+

RSA conference 2018EVENT

0.97+

Oracle OpenWorldORGANIZATION

0.96+

oneQUANTITY

0.96+

IntelORGANIZATION

0.93+

RSA Conference 2018EVENT

0.92+

first instantiationQUANTITY

0.92+

East CoastLOCATION

0.9+

RSA North America 2018EVENT

0.82+

theCUBEORGANIZATION

0.68+

couple daysDATE

0.62+

yearsQUANTITY

0.56+

America 2018EVENT

0.46+

yearsDATE

0.45+

NorthLOCATION

0.4+

Rachel Skaff, AWS | International Women's Day


 

(gentle music) >> Hello, and welcome to theCUBE's coverage of International Women's Day. I'm John Furrier, host of theCUBE. I've got a great guest here, CUBE alumni and very impressive, inspiring, Rachel Mushahwar Skaff, who's a managing director and general manager at AWS. Rachel, great to see you. Thanks for coming on. >> Thank you so much. It's always a pleasure to be here. You all make such a tremendous impact with reporting out what's happening in the tech space, and frankly, investing in topics like this, so thank you. >> It's our pleasure. Your career has been really impressive. You worked at Intel for almost a decade, and that company is very tech, very focused on Moore's law, cadence of technology power in the industry. Now at AWS, powering next-generation cloud. What inspired you to get into tech? How did you get here and how have you approached your career journey, because it's quite a track record? >> Wow, how long do we have? (Rachel and John laugh) >> John: We can go as long as you want. (laughs) It's great. >> You know, all joking aside, I think at the end of the day, it's about this simple statement. If you don't get goosebumps every single morning that you're waking up to do your job, it's not good enough. And that's a bit about how I've made all of the different career transitions that I have. You know, everything from building out data centers around the world, to leading network and engineering teams, to leading applications teams, to going and working for, you know, the largest semiconductor in the world, and now at AWS, every single one of those opportunities gave me goosebumps. And I was really focused on how do I surround myself with humans that are better than I am, smarter than I am, companies that plan in decades, but live in moments, companies that invest in their employees and create like artists? And frankly, for me, being part of a company where people know that life is finite, but they want to make an infinite impact, that's a bit about my career journey in a nutshell. >> Yeah. What's interesting is that, you know, over the years, a lot's changed, and a theme that we're hearing from leaders now that are heading up large teams and running companies, they have, you know, they have 20-plus years of experience under their belt and they look back and they say, "Wow, "things have changed and it's changing faster now, "hopefully faster to get change." But they all talk about confidence and they talk about curiosity and building. When did you know that this was going to be something that you got the goosebumps? And were there blockers in your way and how did you handle that? (Rachel laughs) >> There's always blockers in our way, and I think a lot of people don't actually talk about the blockers. I think they make it sound like, hey, I had this plan from day one, and every decision I've made has been perfect. And for me, I'll tell you, right, there are moments in your life that mark a differentiation and those moments that you realize nothing will be the same. And time is kind of divided into two parts, right, before this moment and after this moment. And that's everything from, before I had kids, that's a pretty big moment in people's lives, to after I had kids, and how do you work through some of those opportunities? Before I got married, before I got divorced. Before I went to this company, after I left this company. And I think the key for all of those is just having an insatiable curiosity around how do you continue to do better, create better and make better? And I'll tell you, those blockers, they exist. Coming back from maternity leave, hard. Coming back from a medical leave, hard. Coming back from caring for a sick parent or a sick friend, hard. But all of those things start to help craft who you are as a human being, not as a leader, but as a human being, and allows you to have some empathy with the people that you surround yourself with, right? And for me, it's, (sighs) you can think about these blockers in one of two ways. You can think about it as, you know, every single time that you're tempted to react in the same way to a blocker, you can be a prisoner of your past, or you can change how you react and be a pioneer of the future. It's not a blocker when you think about it in those terms. >> Mindset matters, and that's really a great point. You brought up something that's interesting, I want to bring this up. Some of the challenges in different stages of our lives. You know, one thing that's come out of this set of interviews, this, of day and in conversations is, that I haven't heard before, is the result of COVID, working at home brought empathy about people's personal lives to the table. That came up in a couple interviews. What's your reaction to that? Because that highlights that we're human, to your point of view. >> It does. It does. And I'm so thankful that you don't ask about balance because that is a pet peeve of mine, because there is no such thing as balance. If you're in perfect balance, you are not moving and you're not changing. But when you think about, you know, the impact of COVID and how the world has changed since that, it has allowed all of us to really think about, you know, what do we want to do versus what do we have to do? And I think so many times, in both our professional lives and our personal lives, we get caught up in doing what we think we have to do to get ahead versus taking a step back and saying, "Hey, what do I want to do? "And how do I become a, you know, "a better human?" And many times, John, I'm asked, "Hey, "how do you define success or achievement?" And, you know, my answer is really, for me, the greatest results that I've achieved, both personally and professionally, is when I eliminate the word success and balance from my vocabulary, and replace them with two words: What's my contribution and what's my impact? Those things make a difference, regardless of gender. And I'll tell you, none of it is easy, ever. I think all of us have been broken, we've been stretched, we've been burnt out. But I also think what we have to talk about as leaders in the industry is how we've also found endurance and resilience. And when we felt unsteady, we've continued to go forward, right? When we can't decide, the best answer is do what's uncomfortable. And all of those things really stemmed from a part of what happened with COVID. >> Yeah, yeah, I love the uncomfortable and the balance highlight. You mentioned being off balance. That means you're growing, you're not standing still. I want to get your thoughts on this because one thing that has come out again this year, and last year as well, is having a team with you when you do it. So if you're off balance and you're going to stretch, if you have a good team with you, that's where people help each other. Not just pick them up, but like maybe get 'em back on track again. So, but if you're solo, you fall, (laughs) you fall harder. So what's your reaction to that? 'Cause this has come up, and this comes up in team building, workforce formation, goal setting, contribution. What's your reaction to that? >> So my reaction to that that is pretty simple. Nobody gets there on their own at all, right? Passion and ambition can only take you so far. You've got to have people and teams that are supporting you. And here's the funny thing about people, and frankly, about being a leader that I think is really important: People don't follow for you. People follow for who you help them become. Think about that for a second. And when you think about all the amazing things that companies and teams are able to do, it's because of those people. And it's because you have leaders that are out there, inspiring them to take what they believe is impossible and turn it into the possible. That's the power of teams. >> Can you give an example of your approach on how you do that? How do you build your teams? How do you grow them? How do you lead them effectively and also make 'em inclusive, diverse and equitable? >> Whew. I'll give you a great example of some work that we're doing at AWS. This year at re:Invent, for the first time in its history, we've launched an initiative with theCUBE called Women of the Cloud. And part of Women of the Cloud is highlighting the business impact that so many of our partners, our customers and our employees have had on the social, on the economic and on the financials of many companies. They just haven't had the opportunity to tell their story. And at Amazon, right, it is absolutely integral to us to highlight those examples and continue to extend that ethos to our partners and our customers. And I think one of the things that I shared with you at re:Invent was, you know, as U2's Bono put it, (John laughs) "We'll build it better than we did before "and we are the people "that we've been waiting for." So if we're not out there, advocating and highlighting all the amazing things that other women are doing in the ecosystem, who will? >> Well, I've got to say, I want to give you props for that program. Not only was it groundbreaking, it's still running strong. And I saw some things on LinkedIn that were really impressive in its network effect. And I met at least half a dozen new people I never would have met before through some of that content interaction and engagement. And this is like the power of the current world. I mean, getting the voices out there creates momentum. And it's good for Amazon. It's not just personal brand building for my next job or whatever, you know, reason. It's sharing and it's attracting others, and it's causing people to connect and meet each other in that world. So it's still going strong. (laughs) And this program we did last year was part of Rachel Thornton, who's now at MessageBird, and Mary Camarata. They were the sponsors for this International Women's Day. They're not there anymore, so we decided we're going to do it again because the impact is so significant. We had the Amazon Education group on. It's amazing and it's free, and we've got to get the word out. I mean, talk about leveling up fast. You get in and you get trained and get certified, and there's a zillion jobs out (laughs) there in cloud, right, and partners. So this kind of leadership is really important. What was the key learnings that you've taken away and how do you extend this opportunity to nurture the talent out there in the field? Because when you throw the content out there from great leaders and practitioners and developers, it attracts other people. >> It does. It does. So look, I think there's two types of people, people that are focused on being and people who are focused on doing. And let me give you an example, right? When we think about labels of, hey, Rachel's a female executive who launched Women of the Cloud, that label really limits me. I'd rather just be a great executive. Or, hey, there's a great entrepreneur. Let's not be a great entrepreneur. Just go build something and sell it. And that's part of this whole Women of the cloud, is I don't want people focused on what their label is. I want people sharing their stories about what they're doing, and that's where the lasting impact happens, right? I think about something that my grandmother used to tell me, and she used to tell me, "Rachel, how successful "you are, doesn't matter. "The lasting impact that you have "is your legacy in this very finite time "that you have on Earth. "Leave a legacy." And that's what Women of the Cloud is about. So that people can start to say, "Oh, geez, "I didn't know that that was possible. "I didn't think about my career in that way." And, you know, all of those different types of stories that you're hearing out there. >> And I want to highlight something you said. We had another Amazonian on the program for this day earlier and she coined a term, 'cause inside Amazon, you have common language. One of them is bar raising. Raise the bar, that's an Amazonian (Rachel laughs) term. It means contribute and improve and raise the bar of capability. She said, "Bar raising is gender neutral. "The bar is a bar." And I'm like, wow, that was amazing. Now, that means your contribution angle there highlights that. What's the biggest challenge to get that mindset set in culture, in these- >> Oh. >> 'Cause it's that simple, contribution is neutral. >> It absolutely is neutral, but it's like I said earlier, I think so many times, people are focused on success and being a great leader versus what's the contribution I'm making and how am I doing as a leader, you know? And when it comes to a lot of the leadership principles that Amazon has, including bar raising, which means insisting on the highest standards, and then those standards continue to raise every single time. And what that is all about is having all of our employees figure out, how do I get better every single day, right? That's what it's about. It's not about being better than the peer next to you. It's about how do I become a better leader, a better human being than I was yesterday? >> Awesome. >> You know, I read this really cute quote and I think it really resonates. "You meditate to upgrade your software "and you work out to upgrade your hardware." And while it's important that we're all ourselves at work, we can't deny that a lot of times, ourselves still need that meditation or that workout. >> Well, I hope I don't have any zero days in my software out there, so, but I'm going to definitely work on that. I love that quote. I'm going to use that. Thank you very much. That was awesome. I got to ask you, I know you're really passionate about, and we've talked about this, around, so you're a great leader but you're also focused on what's behind you in the generation, pipelining women leaders, okay? Seats at the table, mentoring and sponsorship. What can we do to build a strong pipeline of leaders in technology and business? And where do you see the biggest opportunity to nurture the talent in these fields? >> Hmm, you know, that's great, great question. And, you know, I just read a "Forbes" article by another Amazonian, Tanuja Randery, who talked about, you know, some really interesting stats. And one of the stats that she shared was, you know, by 2030, less than 25% of tech specialists will be female, less than 25%. That's only a 6% growth from where we are in 2023, so in seven years. That's alarming. So we've really got to figure out what are the kinds of things that we're going to go do from an Amazon perspective to impact that? And one of the obvious starting points is showcasing tech careers to girls and young women, and talking openly about what a technology career looks like. So specifically at Amazon, we've got an AWS Git IT program that helps schools and educators bring in tech role models to show them what potential careers look like in tech. I think that's one great way that we can help build the pipeline, but once we get the pipeline, we also have to figure out how we don't let that pipeline leak. Meaning how do we keep women and, you know, young women on their tech career? And I think big part of that, John, is really talking about how hard it is, but it's also greater than you can ever imagine. And letting them see executives that are very authentic and will talk about, geez, you know, the challenges of COVID were a time of crisis and accelerated change, and here's what it meant to me personally and here's what we were able to solve professionally. These younger generations are all about social impact, they're about economic impact and they're about financial impact. And if we're not talking about all three of those, both from how AWS is leading from the front, but how its executives are also taking that into their personal lives, they're not going to want to go into tech. >> Yeah, and I think one of the things you mentioned there about getting people that get IT, good call out there, but also, Amazon's going to train 30 million people, put hundreds of millions of dollars into education. And not only are they making it easier to get in to get trained, but once you're in, even savvy folks that are in there still have to accelerate. And there's more ways to level up, more things are happening, but there's a big trend around people changing careers either in their late 20s, early 30s, or even those moments you talk about, where it's before and after, even later in the careers, 40s, 50s. Leaders like, well, good experience, good training, who were in another discipline who re-skilled. So you have, you know, more certifications coming in. So there's still other pivot points in the pipeline. It's not just down here. And that, I find that interesting. Are you seeing that same leadership opportunities coming in where someone can come into tech older? >> Absolutely. You know, we've got some amazing programs, like Amazon Returnity, that really focuses on how do we get other, you know, how do we get women that have taken some time off of work to get back into the workforce? And here's the other thing about switching careers. If I look back on my career, I started out as a civil engineer, heavy highway construction. And now I lead a sales team at the largest cloud company in the world. And there were, you know, twists and turns around there. I've always focused on how do we change and how do we continue to evolve? So it's not just focused on, you know, young women in the pipeline. It's focused on all gender and all diverse types throughout their career, and making sure that we're providing an inclusive environment for them to bring in their unique skillsets. >> Yeah, a building has good steel. It's well structured. Roads have great foundations. You know, you got the builder in you there. >> Yes. >> So I have to ask you, what's on your mind as a tech athlete, as an executive at AWS? You know, you got your huge team, big goals, the economy's got a little bit of a headwind, but still, cloud's transforming, edge is exploding. What's your outlook as you look out in the tech landscape these days and how are you thinking about it? What your plans? Can you share a little bit about what's on your mind? >> Sure. So, geez, there's so many trends that are top of mind right now. Everything from zero trust to artificial intelligence to security. We have more access to data now than ever before. So the opportunities are limitless when we think about how we can apply technology to solve some really difficult customer problems, right? Innovation sometimes feels like it's happening at a rapid pace. And I also say, you know, there are years when nothing happens, and then there's years when centuries happen. And I feel like we're kind of in those years where centuries are happening. Cloud technologies are refining sports as we know them now. There's a surge of innovation in smart energy. Everyone's supply chain is looking to transform. Custom silicon is going mainstream. And frankly, AWS's customers and partners are expecting us to come to them with a point of view on trends and on opportunities. And that's what differentiates us. (John laughs) That's what gives me goosebumps- >> I was just going to ask you that. Does that give you goosebumps? How could you not love technology with that excitement? I mean, AI, throw in AI, too. I just talked to Swami, who heads up the AI and database, and we just talked about the past 24 months, the change. And that is a century moment happening. The large language models, computer vision, more compute. Compute's booming than ever before. Who thought that was going to happen, is still happening? Massive change. So, I mean, if you're in tech, how can you not love tech? >> I know, even if you're not in tech, I think you've got to start to love tech because it gives you access to things you've never had before. And frankly, right, change is the only constant. And if you don't like change, you're going to like being irrelevant even less than you like change. So we've got to be nimble, we've got to adapt. And here's the great thing, once we figure it out, it changes all over again. And it's not something that's easy for any of us to operate. It's hard, right? It's hard learning new technology, it's hard figuring out what do I do next? But here's the secret. I think it's hard because we're doing it right. It's not hard because we're doing it wrong. It's just hard to be human and it's hard to figure out how we apply all this different technology in a way that positively impacts us, you know, economically, financially, environmentally and socially. >> And everyone's different, too. So you got to live those (mumbles). I want to get one more question in before we, my last question, which is about you and your impact. When you talk to your team, your sales, you got a large sales team, North America. And Tanuja, who you mentioned, is in EMEA, we're going to speak with her as well. You guys lead the front lines, helping customers, but also delivering the revenue to the company, which has been fantastic, by the way. So what's your message to the troops and the team out there? When you say, "Take that hill," like what is the motivational pitch, in a few sentences? What's the main North Star message in today's marketplace when you're doing that big team meeting? >> I don't know if it's just limited to a team meeting. I think this is a universal message, and the universal message for me is find your edge, whatever that may be. Whether it is the edge of what you know about artificial intelligence and neural networks or it's the edge of how do we migrate our applications to the cloud more quickly. Or it's the edge of, oh, my gosh, how do I be a better parent and still be great at work, right? Find your edge, and then sharpen it. Go to the brink of what you think is possible, and then force yourself to jump. Get involved. The world is run by the people that show up, professionally and personally. (John laughs) So show up and get started. >> Yeah as Steve Jobs once said, "The future "that everyone looks at was created "by people no smarter than you." And I love that quote. That's really there. Final question for you. I know we're tight on time, but I want to get this in. When you think about your impact on your company, AWS, and the industry, what's something you want people to remember? >> Oh, geez. I think what I want people to remember the most is it's not about what you've said, and this is a Maya Angelou quote. "It's not about what you've said to people "or what you've done, "it's about how you've made them feel." And we can all think back on leaders or we can all think back on personal moments in our lives where we felt like we belonged, where we felt like we did something amazing, where we felt loved. And those are the moments that sit with us for the rest of our lives. I want people to remember how they felt when they were part of something bigger. I want people to belong. It shouldn't be uncommon to talk about feelings at work. So I want people to feel. >> Rachel, thank you for your time. I know you're really busy and we stretched you a little bit there. Thank you so much for contributing to this wonderful day of great leaders sharing their stories. And you're an inspiration. Thanks for everything you do. We appreciate you. >> Thank you. And let's go do some more Women of the Cloud videos. >> We (laughs) got more coming. Bring those stories on. Back up the story truck. We're ready to go. Thanks so much. >> That's good. >> Thank you. >> Okay, this is theCUBE's coverage of International Women's Day. It's not just going to be March 8th. That's the big celebration day. It's going to be every quarter, more stories coming. Stay tuned at siliconangle.com and thecube.net here, with bringing all the stories. I'm John Furrier, your host. Thanks for watching. (gentle music)

Published Date : Mar 6 2023

SUMMARY :

and very impressive, inspiring, Thank you so much. and how have you approached long as you want. to going and working for, you know, and how did you handle that? and how do you work through Some of the challenges in And I'm so thankful that you don't ask and the balance highlight. And it's because you have leaders that I shared with you at re:Invent and how do you extend this opportunity And let me give you an example, right? and raise the bar of capability. contribution is neutral. than the peer next to you. "and you work out to And where do you see And one of the stats that she shared the things you mentioned there And there were, you know, twists You know, you got the and how are you thinking about it? And I also say, you know, I was just going to ask you that. And if you don't like change, And Tanuja, who you mentioned, is in EMEA, of what you know about And I love that quote. And we can all think back on leaders Rachel, thank you for your time. Women of the Cloud videos. We're ready to go. It's not just going to be March 8th.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
TelcoORGANIZATION

0.99+

RachelPERSON

0.99+

Tim CookPERSON

0.99+

Jeff FrickPERSON

0.99+

TelcosORGANIZATION

0.99+

Tanuja RanderyPERSON

0.99+

Rachel ThorntonPERSON

0.99+

AmazonORGANIZATION

0.99+

NayakiPERSON

0.99+

SanjayPERSON

0.99+

Peter BurrisPERSON

0.99+

2014DATE

0.99+

FordORGANIZATION

0.99+

TanujaPERSON

0.99+

Rachel SkaffPERSON

0.99+

Todd SkidmorePERSON

0.99+

NokiaORGANIZATION

0.99+

BarcelonaLOCATION

0.99+

JohnPERSON

0.99+

AustraliaLOCATION

0.99+

FacebookORGANIZATION

0.99+

Bob StefanskiPERSON

0.99+

Steve JobsPERSON

0.99+

Tom JoycePERSON

0.99+

Lisa MartinPERSON

0.99+

Laura CooneyPERSON

0.99+

John FurrierPERSON

0.99+

ToddPERSON

0.99+

AWSORGANIZATION

0.99+

2011DATE

0.99+

Mary CamarataPERSON

0.99+

Meg WhitmanPERSON

0.99+

IBMORGANIZATION

0.99+

TeslaORGANIZATION

0.99+

BlackberryORGANIZATION

0.99+

Coca-ColaORGANIZATION

0.99+

Palo AltoLOCATION

0.99+

Sanjay SrivastavaPERSON

0.99+

Silicon ValleyLOCATION

0.99+

BMC SoftwareORGANIZATION

0.99+

U.S.LOCATION

0.99+

SiriTITLE

0.99+

BMCORGANIZATION

0.99+

HPORGANIZATION

0.99+

MotorolaORGANIZATION

0.99+

JeffPERSON

0.99+

SamsungORGANIZATION

0.99+

Mihir ShuklaPERSON

0.99+

2023DATE

0.99+

Nayaki NayyarPERSON

0.99+

AppleORGANIZATION

0.99+

Rachel Mushahwar SkaffPERSON

0.99+

6%QUANTITY

0.99+

GoogleORGANIZATION

0.99+

Share A CokeORGANIZATION

0.99+

Jillian Kaplan, Dell Technologies & Meg Knauth, T Mobile | MWC Barcelona 2023


 

(low-key music) >> The cube's live coverage is made possible by funding from Dell Technologies. Creating technologies that drive human progress. (uplifting electronic music) (crowd chattering in background) >> Welcome back to Spain, everybody. My name's Dave Vellante. I'm here with Dave Nicholson. We are live at the Fira in Barcelona, covering MWC23 day four. We've been talking about, you know, 5G all week. We're going to talk about it some more. Jillian Kaplan is here. She's the head of Global Telecom Thought Leadership at Dell Technologies, and we're pleased to have Meg Knauth, who's the Vice President for Digital Platform Engineering at T-Mobile. Ladies, welcome to theCUBE. Thanks for coming on. >> Thanks for having us. >> Yeah, thank you. >> All right, Meg, can you explain 5G and edge to folks that may not be familiar with it? Give us the 101 on 5G and edge. >> Sure, I'd be happy to. So, at T-Mobile, we want businesses to be able to focus on their business outcomes and not have to stress about network technology. So we're here to handle the networking behind the scenes for you to achieve your business goals. The main way to think about 5G is speed, reduced latency, and heightened security. And you can apply that to so many different business goals and objectives. You know, some of the use cases that get touted out the most are in the retail manufacturing sectors with sensors and with control of inventory and things of that nature. But it can be applied to pretty much any industry because who doesn't need more (chuckles) more speed and lower latency. >> Yeah. And reliability, right? >> Exactly. >> I mean, that's what you're going to have there. So it's not like it's necessarily going to- you know, you think about 5G and these private networks, right? I mean, it's not going to, oh, maybe it is going to eat into, there's a Venn there, I know, but it's not going to going to replace wireless, right? I mean, it's new use cases. >> Yeah. >> Maybe you could talk about that a little bit. >> Yeah, they definitely coexist, right? And Meg touched a little bit on like all the use cases that are coming to be, but as we look at 5G, it's really the- we call it like the Enterprise G, right? It's where the enterprise is going to be able to see changes in their business and the way that they do things. And for them, it's going to be about reducing costs and heightening ROI, and safety too, right? Like being able to automate manufacturing facilities where you don't have workers, like, you know, getting hit by various pieces of equipment and you can take them out of harm's way and put robots in their place. And having them really work in an autonomous situation is going to be super, super key. And 5G is just the, it's the backbone of all future technologies if you look at it. We have to have a network like that in order to build things like AI and ML, and we talk about VR and the Metaverse. You have to have a super reliable network that can handle the amount of devices that we're putting out today, right? So, extremely important. >> From T-Mobile's perspective, I mean we hear a lot about, oh, we spent a lot on CapEx, we know that. You know, trillion and a half over the next seven years, going into 5G infrastructure. We heard in the early keynotes at MWC, we heard the call to you know, tax the over the top vendors. We heard the OTT, Netflix shot back, they said, "Why don't you help us pay for the content that we're creating?" But, okay, so I get that, but telcos have a great business. Where's T-Mobile stand on future revenue opportunities? Are you looking to get more data and monetize that data? Are you looking to do things like partner with Dell to do, you know, 5G networks? Where are the opportunities for T-Mobile? >> I think it's more, as Jillian said, it's the opportunities for each business and it's unique to those businesses. So we're not in it just for ourselves. We're in it to help others achieve their business goals and to do more with all of the new capabilities that this network provides. >> Yeah, man, I like that answer because again, listening to some of the CEOs of the large telcos, it's like, hmm, what's in it for me as the customer or the business? I didn't hear enough of that. And at least in the early keynotes, I'm hearing it more, you know, as the show goes on. But I don't know, Dave, what do you think about what you've heard at the event? >> Well, I'm curious from T-Mobile's perspective, you know when a consumer thinks about 5G, we think of voice, text, and data. And if we think about the 5G network that you already have in place, I'm curious, if you can share this kind of information, what percentage of that's being utilized now? How much is available for the, you know, for the Enterprise G that we're talking about, and maybe, you know, in five years in the future, do you have like a projected mix of consumer use versus all of these back office, call them processes that a consumer's not aware of, but you know the factory floor being connected via 5G, that frontiers that emerges, where are we now and what are you looking towards? Does that make sense? Kind of the mixed question? >> Hand over the business plan! (all laugh) >> Yeah! Yeah, yeah, yeah. >> Yeah, I- >> I want numbers Meg, numbers! >> Wow. (Dave and Dave laugh) I'm probably actually not the right person to speak to that. But as you know, T-Mobile has the largest 5G network in North America, and we just say, bring it, right? Let's talk- >> So you got room, you got room for Jillian's stuff? >> Yeah, let's solve >> Well, we can build so many >> business problems together. >> private 5G networks, right? Like I would say like the opportunities are... There's not a limit, right? Because as we build out these private networks, right? We're not on a public network when we're talking about like connecting these massive factories or connecting like a retail store to you and your house to be able to basically continue to try on the clothes remotely, something like that. It's limitless and what we can build- >> So they're related, but they're not necessarily mutually exclusive in the sense that what you are doing in the factory example is going to interfere with my ability to get my data through T-mobile. >> No, no, I- >> These are separated. >> Yeah. Yeah. >> Okay. >> As we build out these private networks and these private facilities, and there are so many applications in the consumer space that haven't even been realized yet. Like, when we think about 4G, when 4G launched, there were no applications that needed 4G to run on our cell phones, right? But then the engineers got to work, right? And we ended up with Uber and Instagram stories and all these applications that require 4G to launch. And that's what's going to happen with 5G too, it's like, as the network continues to get built, in the consumer space as well as the enterprise space, there's going to be new applications realized on this is all the stuff that we can do with this amazing network and look how many more devices and look how much faster it is, and the lower latency and the higher bandwidth, and you know, what we can really build. And I think what we're seeing at this show compared to last year is this stuff actually in practice. There was a lot of talk last year, like about, oh, this is what we can build, but now we're building it. And I think that's really key to show that companies like T-Mobile can help the enterprise in this space with cooperation, right? Like, we're not just talking about it now, we're actually putting it into practice. >> So how does it work? If I put in a private network, what are you doing? You slice out a piece of the network and charge me for it and then I get that as part of my private network. How does it actually work for the customer? >> You want to take that one? >> So I was going to say, yeah, you can do a network slice. You can actually physically build a private network, right? It depends, there's so many different ways to engineer it. So I think you can do it either way, basically. >> We just, we don't want it to be scary, right? >> Yep. >> So it starts with having a conversation about the business challenges that you're facing and then backing it into the technology and letting the technology power those solutions. But we don't want it to be scary for people because there's so much buzz around 5G, around edge, and it can be overwhelming and you can feel like you need a PhD in engineering to have a conversation. And we just want to kind of simplify things and talk in your language, not in our language. We'll figure out the tech behind the scenes. Just tell us what problems we can solve together. >> And so many non-technical companies are having to transform, right? Like retail, like manufacturing, that haven't had to be tech companies before. But together with T-Mobile and Dell, we can help enable that and make it not scary like Meg said. >> Right, so you come into my factory, I say, okay, look around. I got all these people there, and they're making hoses and they're physically putting 'em together. And we go and we have to take a physical measurement as to, you know, is it right? And because if we don't do that, then we have to rework it. Okay, now that's a problem. Okay, can you help me digitize that business? I need a network to do that. I'm going to put in some robots to do that. This is, I mean, I'm making this up but this has got to be a common use case, right? >> Yeah. >> So how do you simplify that for the business owner? >> So we start with what we can provide, and then in some cases you need additional solution providers. You might need a robotics company, you might need a sensor company. But we have those contacts to bring that together for you so that you don't have to be the expert in all those things. >> And what do I do with all the data that I'm collecting? Because, you know, I'm not really a data expert. Maybe, you know, I'm good at putting hoses together, but what's the data layer look like here? (all laughing) >> It's a hose business! >> I know! >> Great business. >> Back to the hoses again. >> There's a lot of different things you can do with it, right? You can collect it in a database, you can send it up to a cloud, you can, you know, use an edge device. It depends how we build the network. >> Dave V.: Can you guys help me do that? Can you guys- >> Sure, yeah. >> Help me figure that out. Should I put it into cloud? Should I use this database or that data? What kind of skills do I need? >> And it depends on the size of the network, right? And the size of the business. Like, you know, there's very simple. You don't have to be a massive manufacturer in order to install this stuff. >> No, I'm asking small business questions. >> Yeah. >> Right, I might not have this giant IT team. I might not have somebody who knows how to do ETL and PBA. >> Exactly. And we can talk to you too about what data matters, right? And we can, together, talk about what data might be the most valuable to you. We can talk to you about how we use data. But again, simplifying it down and making it personal to your business. >> Your point about scary is interesting, because no one has mentioned that until you did in four days. Three? Four days. Somebody says, let's do a private 5G network. That sounds like you're offering, you know, it's like, "Hey, you know what we should do Dave? We'll build you a cruise ship." It's like, I don't need a cruise ship, I just want to go bass fishing. >> Right, right, right. >> But in fact, these things are scalable in the sense that it can be scaled down from the trillions of dollars of infrastructure investment. >> Yeah. >> Yeah. It needs to be focused on your outcome, right? And not on the tech. >> When I was at the Dell booth I saw this little private network, it was about this big. I'm like, how much is that? I want one of those. (all laugh) >> I'm not the right person to talk about that! >> The little black one? >> Yes. >> I wanted one of those, too! >> I saw it, it had a little case to carry it around. I'm like, that could fit in my business. >> Just take it with you. >> theCUBE could use that! (all laugh) >> Anything that could go in a pelican case, I want. >> It's true. Like, it's so incredibly important, like you said, to focus on outcomes, right? Not just tech for the sake of tech. What's the problem? Let's solve the problem together. And then you're getting the outcome you want. You'll know what data you need. If you know what the problem is, you're like, okay this is the data I need to know if this problem is solved or not. >> So it sounds like 2022 was the year of talking about it. 2023, I'm inferring is the year of seeing it. >> Yep. >> And 2024 is going to be the year of doing it? >> I think we're doing it now. >> We're doing it now. >> Yeah. >> Okay. >> Yeah, yeah. We're definitely doing it now. >> All right. >> I see a lot of this stuff being put into place and a lot more innovation and a lot more working together. And Meg mentioned working with other partners. No one's going to do this alone. You've got to like, you know, Dell especially, we're focused on open and making sure that, you know, we have the right software partners. We're bringing in smaller players, right? Like ISVs too, as well as like the big software guys. Incredibly, incredibly important. The sensor companies, whatever we need you've got to be able to solve your customer's issue, which in this case, we're looking to help the enterprise together to transform their space. And Dell knows a little bit about the enterprise, so. >> So if we are there in 2023, then I assume 2024 will be the year that each of your companies sets up a dedicated vertical to address the hose manufacturing market. (Meg laughing) >> Oh, the hose manufacturing market. >> Further segmentation is usually a hallmark of the maturity of an industry. >> I got a lead for you. >> Yeah, there you go. >> And that's one thing we've done at Dell, too. We've built like this use case directory to help the service providers understand what, not just say like, oh, you can help manufacturers. Yeah, but how, what are the use cases to do that? And we worked with a research firm to figure out, like, you know these are the most mature, these are the best ROIs. Like to really help hone in on exactly what we can deploy for 5G and edge solutions that make the most sense, not only for service providers, right, but also for the enterprises. >> Where do you guys want to see this partnership go? Give us the vision. >> To infinity and beyond. To 5G! (Meg laughing) To 5G and beyond. >> I love it. >> It's continuation. I love that we're partnering together. It's incredibly important to the future of the business. >> Good deal. >> To bring the strengths of both together. And like Jillian said, other partners in the ecosystem, it has to be approached from a partnership perspective, but focused on outcomes. >> Jillian: Yep. >> To 5G and beyond. I love it. >> To 5G and beyond. >> Folks, thanks for coming on theCUBE. >> Thanks for having us. >> Appreciate your insights. >> Thank you. >> All right. Dave Vellante for Dave Nicholson, keep it right there. You're watching theCUBE. Go to silliconANGLE.com. John Furrier is banging out all the news. theCUBE.net has all the videos. We're live at the Fira in Barcelona, MWC23. We'll be right back. (uplifting electronic music)

Published Date : Mar 2 2023

SUMMARY :

that drive human progress. We are live at the Fira in Barcelona, to folks that may not be familiar with it? behind the scenes for you to I know, but it's not going to Maybe you could talk about VR and the Metaverse. we heard the call to you know, and to do more with all of But I don't know, Dave, what do you think and maybe, you know, in Yeah, yeah, yeah. But as you know, T-Mobile store to you and your house sense that what you are doing and the higher bandwidth, and you know, network, what are you doing? So I think you can do it and you can feel like you need that haven't had to be I need a network to do that. so that you don't have to be Because, you know, I'm to a cloud, you can, you Dave V.: Can you guys help me do that? Help me figure that out. And it depends on the No, I'm asking small knows how to do ETL and PBA. We can talk to you about how we use data. offering, you know, it's like, in the sense that it can be scaled down And not on the tech. I want one of those. it had a little case to carry it around. Anything that could go the outcome you want. the year of talking about it. definitely doing it now. You've got to like, you the year that each of your of the maturity of an industry. but also for the enterprises. Where do you guys want To 5G and beyond. the future of the business. it has to be approached from To 5G and beyond. John Furrier is banging out all the news.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JillianPERSON

0.99+

Dave NicholsonPERSON

0.99+

Dave VellantePERSON

0.99+

Meg KnauthPERSON

0.99+

Jillian KaplanPERSON

0.99+

Dave NicholsonPERSON

0.99+

DellORGANIZATION

0.99+

T-MobileORGANIZATION

0.99+

Four daysQUANTITY

0.99+

DavePERSON

0.99+

ThreeQUANTITY

0.99+

Dell TechnologiesORGANIZATION

0.99+

2023DATE

0.99+

MegPERSON

0.99+

four daysQUANTITY

0.99+

NetflixORGANIZATION

0.99+

SpainLOCATION

0.99+

John FurrierPERSON

0.99+

2024DATE

0.99+

last yearDATE

0.99+

2022DATE

0.99+

North AmericaLOCATION

0.99+

CapExORGANIZATION

0.99+

bothQUANTITY

0.99+

eachQUANTITY

0.99+

Dave V.PERSON

0.99+

UberORGANIZATION

0.98+

trillion and a halfQUANTITY

0.98+

MWC23EVENT

0.98+

trillions of dollarsQUANTITY

0.98+

silliconANGLE.comOTHER

0.97+

5GORGANIZATION

0.97+

BarcelonaLOCATION

0.96+

telcosORGANIZATION

0.96+

InstagramORGANIZATION

0.96+

five yearsQUANTITY

0.95+

each businessQUANTITY

0.95+

todayDATE

0.94+

oneQUANTITY

0.93+

Global TelecomORGANIZATION

0.93+

FiraLOCATION

0.92+

Vice PresidentPERSON

0.91+

MWCEVENT

0.85+

theCUBE.netOTHER

0.85+

next seven yearsDATE

0.82+

MetaverseORGANIZATION

0.81+

101QUANTITY

0.75+

Barcelona,LOCATION

0.72+

edgeORGANIZATION

0.71+

day fourQUANTITY

0.65+

Platform EngineeringPERSON

0.6+

theCUBEORGANIZATION

0.58+

theCUBETITLE

0.56+

T MobileORGANIZATION

0.55+

Barcelona 2023LOCATION

0.55+

MWC23LOCATION

0.53+

5GOTHER

0.48+

Odded Solomon, VMware & Jared Woodrey, Dell Technologies | MWC Barcelona 2023


 

>> Narrator: theCUBE's live coverage is made possible by funding from Dell Technologies. Creating technologies that drive human progress. (upbeat music) >> Welcome back to Barcelona, Spain, everyone. It's theCUBE live at MWC '23, day three of four days of CUBE coverage. It's like a cannon of CUBE content coming right at you. I'm Lisa Martin with Dave Nicholson. We've got Dell and VMware here. Going to be talking about the ecosystem partnerships and what they're doing to further organizations in the telco industry. Please welcome Jared Woodrey, Director of Partner Engineering Open Telecom Ecosystem Lab, OTEL. Odded Solomon is here as well, Director of Product Management, VMware Service Provider and Edge Business Unit at VMware. Guys, great to have you on the program. >> Thank you for having me. >> Welcome to theCUBE. So Jared, first question for you. Talk about OTEL. I know there's a big announcement this week, but give the audience context and understanding of what OTEL is and how it works. >> Sure. So the Open Telecom Ecosystem Lab is physically located at Round Rock, Texas, it's the heart and soul of it. But this week we also just announced opening up the Cork, Ireland extension of OTEL. The reason for our existence is to to try and make it as easy as possible for both partners and customers to come together and to re-aggregate this disaggregated ecosystem. So that comes with a number of automation tools and basically just giving a known good testing environment so that tests that happen in our lab are as close to real world as they possibly can be and make it as transparent and open as possible for both partners like VMware as well as customers. >> Odded, talk about what you're doing with Dell and OTEL and give us a customer example of maybe one that you're working with or even even mentioning it by a high level descriptor if you have to. >> Yeah. So we provide a telco cloud platform, which is essentially a vertical in VMware. The telco cloud platform is serving network function vendors, such as Ericsson, Nokia, Mavenir, and so on. What we do with Dell as part of this partnership is essentially complementing the platform with some additional functionality that is not coming out of the box. We used to have a data protection in the past, but this is no longer our main business focus. So we do provide APIs that we can expose and work together with Dell PPDM solution so customer can benefit from this and leverage the partnership and have overall solution that is not coming out of the box from VMware. >> I'm curious, from a VMware perspective. VMware is associated often with the V in VMware, virtualization, and we've seen a transition over time between sort of flavors of virtualization and what is the mix currently today in the telecom space between environments that are leveraging what we would think of as more traditional virtualization with full blown Linux, Windows operating systems in a VM versus the world of containerized microservices? What does that mix look like today? Where do you see it going? >> Yeah, so the VMware telco cloud platform exists for about eight years. And the V started around that time. You might heard about open stack in addition to VMware. So this has definitely helped the network equipment providers with virtualizing their network functions. Those are typically VNF, virtualized network functions, inside the VMs. Essentially we have 4G applications, so core applications, EPC, we have IMS. Those are typically, I would say maybe 80 or 90% of the ecosystem right now. 5G is associated with cloud native network functions. So 5G is getting started now, getting deployed. There is an exponential growth on the core side. Now, when we expand towards the edge of the network we see more potential growth. This is 5G ran, we see the vRAN, we see the open RAN, we see early POCs, we see field trials that are starting. We obviously has production customer now. You just spoke to one. So this is really starting, cloud native is really starting I would say about 10 to 20% of the network functions these days are cloud native. >> Jared, question for you. You mentioned data protection, a huge topic there obviously from a security perspective. Data protection used to be the responsibility of the CSPs. You guys are changing that. Can you talk a little bit about how you're doing that and what Dell's play there is? >> Yeah, so PowerProtect Data Management is a product, but it's produced by Dell. So what this does is it enables data protection over virtual cloud as well as the physical infrastructure of specifically in this case of a telecoms ecosystem. So what this does is enables an ability to rapidly redeploy and back up existing configurations all the way up to the TCP and TCA that pulls the basis of our work here with VMware. >> So you've offloaded that responsibility from the CSPs. You freed them from that. >> So the work that we did, honestly was to make sure that we have a very clear and concise and accurate procedures for how to conduct this as well. And to put this through a realistic and real world as if it was in a telecoms own production network, what did that would actually look like, and what it would take to bring it back up as well. So our responsibility is to make sure that when we when we provide these products to the customers that not only do they work exactly as their intended to, but there is also documentation to help support them and to enable them to have their exact specifications met by as well. >> Got it. So talk about a little bit about OTEL expansion into Cork. What you guys are doing together to enable CSPs here in EMEA? >> Yeah, so the reason why we opened up a facility in Cork Island was to give, for an EMEA audience, for an EMEA CSPs and ability to look and feel and touch some of the products that we're working on. It also just facilitates and ease especially for European-based partners to have a chance to very easily come to a lab environment. The difference though, honestly, is the between Round Rock, Texas and Cork Island is that it's virtually an extension of the same thing. Like the physical locations can make it easier to provide access and obviously to showcase the products that we've developed with partners. But the reality is that it's more than just the physical location. It's more about the ability and ease by which customers and partners can access the labs. >> So we should be expecting a lot of Tito's vodka to be consumed in Cork at some point. Might change the national beverage. >> We do need to have some international exchange. >> Yeah, no, that's good to know. Odded, on the VMware side of things. There's a large group of folks who have VMware skillsets. >> Odded: Correct. >> The telecom industry is moving into this world of the kind of agility that those folks are familiar with. How do people come out of the traditional VMware virtualization world and move into that world of cloud native applications and serve the telecom space? What would your recommendation be? If you were speaking at a VMUG, a VMware Users Group meeting with all of your telecom background, what would you share with them that's critical to understand about how telecom is different, or how telecom's spot in its evolution might be different than the traditional IT space? >> So we're talking about the people with the knowledge and the background of. >> Yeah, I'm a V expert, let's say. And I'm looking into the future and I hear that there are 80,000 people in Barcelona at this event, and I hear that Dell is building optimized infrastructure specifically for telecom, and that VMware is involved. And I'm an expert in VMware and I want to be involved. What do I need to do? I know it's a little bit outside of the box question, but especially against the backdrop of economic headwinds globally, there are a lot of people facing transitions. What are your thoughts there? >> So, first of all, we understand the telco requirements, we understand the telco needs, and we make sure that what we learn from the customers, what we learn from the partners is being built into the VMware products. And simplicity is number one thing that is important for us. We want the customer experience, we want the user experience to be the same as they know even though we are transitioning into cloud native networks that require more frequent upgrades and they have more complexity to be honest. And what we do in our vertical inside VMware we are focusing on automation, telco cloud automation, telco cloud service assurance. Think of it as a wrapper around the SDDC stack that we have from VMware that really simplifies the operations for the telcos because it's really a challenge about skillset. You need to be a DevOps, SRE in order to operate these networks. And things are becoming really complex. We simplify it for them with the same VMware experience. We have a very good ability to do that. We sell products in VMware. Unlike our competition that is mostly selling professional services and support, we try to focus more on the products and delivering the value. Of course, we have services offering because telcos requires some customizations, but we do focus on automation simplicity throughout our staff. >> So just follow up. So in other words the investment in education in this VMware ecosystem absolutely can be extended and applied into the telecom world. I think it's an important thing. >> I was going to add to that. Our engagement in OTEL was also something that we created a solutions brief whether we released from Mobile World Congress this week. But in conjunction with that, we also have a white paper coming out that has a much more expansive explanation and documentation of what it was that we accomplished in the work that we've done together. And that's not something that is going to be a one-off thing. This is something that will stay evergreen that we'll continue to expand both the testing scope as well as the documentation for what this solution looks like and how it can be used as well as documentation on for the V experts for how they can then leverage and realize the the potential for what we're creating together. >> Jared, does Dell look at OTEL as having the potential to facilitate the continued evolution of the actual telco industry? And if so, how? >> Well, I mean, it would be a horrible answer if I were to say no to that. >> Right. >> I think, I honestly believe that one of the most difficult things about this idea of having desired ecosystem is not just trying to put it back together, but then also how to give yourself choice. So each time that you build one of those solution sets like that exists as an island out of all the other possibilities that comes with it. And OTEL seeks to not just be able to facilitate building that first solution set. Like that's what solutions engineering can do. And that's generally done relatively protected and internally. The Open Telecom Ecosystem seeks to build that then to also provide the ability to very easily change specific components of that whether that's a hardware component, a NIC, whether a security pass just came out or a change in either TCP or TCA or we talked a little bit about for this specific engagement that it was done on TCP 2.5. >> Odded: Correct. >> Obviously there's already a 2.7 and 3.0 is coming out. It's not like we're going to sit around and write our coattails of what 2.7 has happened. So this isn't intended to be a one and done thing. So when we talk about trying to make that easier and simpler and de-risk all of the risk that comes from trying to put all these things together, it's not just the the one single solution that you built in the lab. It's what's the next one? And how do I optimize this? And I have specific requirements as a CSP, how can I take something you built that doesn't quite match it, but how do I make that adjustment? So that's what we see to do and make it as easy and as painless as possible. >> What's the engagement model with CSPs? Is it led by Dell only, VMware partner? How does that work? >> Yeah, I can take that. So that depends on the customer, but typically customers they want to choose the cloud vendor. So they come to VMware, we want VMware. Typically, they come from the IT side. They said, "Oh, we want to manage the network side of the house the same way as we manage the IT. We don't want to have special skill sets, special teams." So they move from the IT to the network side and they want VMware there. And then obviously they have an RSP process and they have hardware choices. They can go with Dell, they can go with others. We leverage vSphere, other compatibility. So we can be flexible with the customer choice. And then depending on which customer, how large they are, they select the network equipment provider that the runs on top. We position our platform as multi-vendor. So many of them choose multiple network functions providers. So we work with Dell. So assuming that the customer is choosing Dell. We work very closely with them, offering the best solution for the customer. We work with them sometimes to even design the boxes to make sure that it fits their use cases and to make sure that it works properly. So we have a partnership validation certification end-to-end from the applications all the way down to the hardware. >> It's a fascinating place in history to be right now with 5G. Something that a lot of consumers sort of assume. It's like, "Oh, hey, yeah, we're already there. What's the 6G thing going to look like?" Well, wait a minute, we're just at the beginning stages. And so you talk about disaggregation, re-aggregation, or reintegration, the importance of that. Folks like Dell have experience in that space. Folks at VMware have a lot of experience in the virtualization space, but I heard that VMware is being acquired by Broadcom, if it all goes through, of course. You don't need to comment on it. But you mentioned something, SDDC, software-defined data center. That stack is sometimes misunderstood by the public at large and maybe the folks in the EU, I will editorialize for a moment here. It is eliminating capture in a way by larger hyperscale cloud providers. It absolutely introduces more competition into the market space. So it's interesting to hear Broadcom acknowledging that this is part of the future of VMware, no matter what else happens. These capabilities that spill into the telecom space are something that they say they're going to embrace and extend. I think that's important for anyone who's evaluating this if they're concern. Well, wait a minute. Yeah, when I reintegrate, do I want VMware as part of this mix? Is that an unknown? It's pretty clear that that's something that is part of the future of VMware moving forward. That's my personal opinion based on analysis. But you brought up SDDC, so I wanted to mention that. Again, I'm not going to ask you to get into trouble on that at all. What should we be, from a broad perspective, are there any services, outcomes that are going to come out of all of this work? The agility that's being built by you folks and folks in the open world. Are there any specific things that you personally are excited about? Or when we think about consumer devices, getting data, what are the other kinds of things that this facilitates? Anything cool, either one of you. >> So specific use cases? >> Yeah, anything. It's got to be cool though. If it's not cool we're going to ask you to leave. >> All right. I'll take that challenge. (laughs) I think one of the things that is interesting for something like OTEL as an exist, as being an Open Telecom Ecosystem, there are going to be some CSPs that it's very difficult for them to have this optionality existing for themselves. Especially when you start talking about tailoring it for specific CSPs and their needs. One of the things that becomes much more available to some of the smaller CSPs is the ability to leverage OTEL and basically act as one of their pre-production labs. So this would be something that would be very specific to a customer and we would obviously make sure that it's completely isolated but the intention there would be that it would open up the ability for what would normally take a much longer time period for them to receive some of the benefits of some of the changes that are happening within the industry. But they would have immediate benefit by leveraging specifically looking OTEL to provide them some of their solutions. And I know that you were also looking for specific use cases out of it, but like that's a huge deal for a lot of CSPs around the world that don't have the ability to lay out all the different permutations that they are most interested in and start to put each one of those through a test cycle. A specific use cases for what this looks like is honestly the most exciting that I've seen for right now is on the private 5G networks. Specifically within mining industry, we have a, sorry for the audience, but we have a demo at our booth that starts to lay out exactly how it was deployed and kind of the AB of what this looked like before the world of private 5G for this mining company and what it looks like afterwards. And the ability for both safety, as well as operational costs, as well as their ability to obviously do their job better is night and day. It completely opened up a very analog system and opened up to a very digitalized system. And I would be remiss, I didn't also mention OpenBrew, which is also an example in our booth. >> We saw it last night in action. >> We saw it. >> I hope you did. So OpenBrew is small brewery in Northeast America and we basically took a very manual process of checking temperature and pressure on multiple different tanks along the entire brewing process and digitized everything for them. All of that was enabled by a private 5G deployment that's built on Dell hardware. >> You asked for cool. I think we got it. >> Yeah, it's cool. >> Jared: I think beer. >> Cool brew, yes. >> Root beer, I think is trump card there. >> At least for folks from North America, we like our brew cool. >> Exactly. Guys, thank you so much for joining Dave and me talking about what Dell, OTEL, and VMware are doing together, what you're enabling CSPs to do and achieve. We appreciate your time and your insights. >> Absolutely. >> Thank you. >> All right, our pleasure. For our guests and for Dave Nicholson, I'm Lisa Martin. You watching theCUBE live from MWC '23. Day three of our coverage continues right after a short break. (upbeat music)

Published Date : Mar 1 2023

SUMMARY :

that drive human progress. in the telco industry. but give the audience context So the Open Telecom Ecosystem Lab of maybe one that you're working with that is not coming out of the box. and what is the mix currently of the network functions responsibility of the CSPs. that pulls the basis of responsibility from the CSPs. So the work that we did, to enable CSPs here in EMEA? and partners can access the labs. Might change the national beverage. We do need to have some Odded, on the VMware side of things. and serve the telecom space? So we're talking about the people and I hear that there are 80,000 people that really simplifies the and applied into the telecom world. and realize the the potential Well, I mean, it would that one of the most difficult and simpler and de-risk all of the risk So that depends on the customer, that is part of the future going to ask you to leave. that don't have the ability to lay out All of that was enabled I think we got it. we like our brew cool. CSPs to do and achieve. You watching theCUBE live from MWC '23.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MichielPERSON

0.99+

AnnaPERSON

0.99+

DavidPERSON

0.99+

BryanPERSON

0.99+

JohnPERSON

0.99+

IBMORGANIZATION

0.99+

MichaelPERSON

0.99+

ChrisPERSON

0.99+

NECORGANIZATION

0.99+

EricssonORGANIZATION

0.99+

KevinPERSON

0.99+

Dave FramptonPERSON

0.99+

MicrosoftORGANIZATION

0.99+

Kerim AkgonulPERSON

0.99+

Dave NicholsonPERSON

0.99+

JaredPERSON

0.99+

Steve WoodPERSON

0.99+

PeterPERSON

0.99+

Lisa MartinPERSON

0.99+

NECJORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

Mike OlsonPERSON

0.99+

AmazonORGANIZATION

0.99+

DavePERSON

0.99+

Michiel BakkerPERSON

0.99+

FCAORGANIZATION

0.99+

NASAORGANIZATION

0.99+

NokiaORGANIZATION

0.99+

Lee CaswellPERSON

0.99+

ECECTORGANIZATION

0.99+

Peter BurrisPERSON

0.99+

OTELORGANIZATION

0.99+

David FloyerPERSON

0.99+

Bryan PijanowskiPERSON

0.99+

Rich LanePERSON

0.99+

KerimPERSON

0.99+

Kevin BoguszPERSON

0.99+

Jeff FrickPERSON

0.99+

Jared WoodreyPERSON

0.99+

LincolnshireLOCATION

0.99+

KeithPERSON

0.99+

Dave NicholsonPERSON

0.99+

ChuckPERSON

0.99+

JeffPERSON

0.99+

National Health ServicesORGANIZATION

0.99+

Keith TownsendPERSON

0.99+

WANdiscoORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

MarchDATE

0.99+

NutanixORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

IrelandLOCATION

0.99+

Dave VellantePERSON

0.99+

Michael DellPERSON

0.99+

RajagopalPERSON

0.99+

Dave AllantePERSON

0.99+

EuropeLOCATION

0.99+

March of 2012DATE

0.99+

Anna GleissPERSON

0.99+

SamsungORGANIZATION

0.99+

Ritika GunnarPERSON

0.99+

Mandy DhaliwalPERSON

0.99+

Jim Harris, International Best Selling Author of Blindsided & Carolina Milanesi, Creative Strategies


 

>> Narrator: "theCUBE's" live coverage is made possible by funding from Dell Technologies. Creating technologies that drive human progress. (intro music) >> Good afternoon, everyone. Welcome back to "theCUBE's" day three coverage of MWC23. Lisa Martin here in Spain, Barcelona, Spain with Dave Nicholson. We're going to have a really interesting conversation next. We're going to really dig into MWC, it's history, where it's going, some of the controversy here. Please welcome our guests. We have Jim Harris, International Best Selling Author of "Blindsided." And Carolina Milanese is here, President and Principle Analyst of creative strategies. Welcome to "theCUBE" guys. Thank you. >> Thanks. So great to be here. >> So this is day three. 80,000 people or so. You guys have a a lot of history up at this event. Caroline, I want to start with you. Talk a little bit about that. This obviously the biggest one in, in quite a few years. People are ready to be back, but there's been some, a lot of news here, but some controversy going on. Give us the history, and your perspective on some of the news that's coming out from this week's event. >> It feels like a very different show. I don't know if I would say growing up show, because we are still talking about networks and mobility, but there's so much more now around what the networks actually empower, versus the network themselves. And a little bit of maybe that's where some of the controversy is coming from, carriers still trying to find their identity, right, of, of what their role is in all there is to do with a connected world. I go back a long way. I go back to when Mobile World Congress was called, was actually called GSM, and it was in Khan. So, you know, we went from France to Spain. But just looking at the last full Mobile World Congress here in Barcelona, in pre-pandemic to now, very different show. We went from a show that was very much focused on mobility and smartphones, to a show that was all about cars. You know, we had cars everywhere, 'cause we were talking about smart cities and connected cars, to now a show this year that is very much focused on B2B. And so a lot of companies that are here to either work with the carriers, or also talk about sustainability for instance, or enable what is the next future evolution of computing with XR and VR. >> So Jim, talk to us a little bit about your background. You, I was doing a little sleuthing on you. You're really focusing on disruptive innovation. We talk about disruption a lot in different industries. We're seeing a lot of disruption in telco. We're seeing a lot of frenemies going on. Give us your thoughts about what you're seeing at this year's event. >> Well, there's some really exciting things. I listened to the keynote from Orange's CEO, and she was complaining that 55% of the traffic on her network is from five companies. And then the CEO of Deutsche Telecom got up, and he was complaining that 60% of the traffic on his network is from six entities. So do you think they coordinated pre, pre-show? But really what they're saying is, these OTT, you know, Netflix and YouTube, they should be paying us for access. Now, this is killer funny. The front page today of the show, "Daily," the CO-CEO of Netflix says, "Hey, we make less profit than the telcos, "so you should be paying us, "not the other way around." You know, we spend half of the money we make just on developing content. So, this is really interesting. The orange CEO said, "We're not challenging net neutrality. "We don't want more taxes." But boom. So this is disruptive. Huge pressure. 67% of all mobile traffic is video, right? So it's a big hog bandwidth wise. So how are they going to do this? Now, I look at it, and the business model for the, the telcos, is really selling sim cards and smartphones. But for every dollar of revenue there, there's five plus dollars in apps, and consulting and everything else. So really, but look at how they're structured. They can't, you know, take somebody who talks to the public and sells sim cards, and turn 'em in, turn 'em in to an app developer. So how are they going to square this circle? So I see some, they're being disrupted because they're sticking to what they've historically done. >> But it's interesting because at the end of the day, the conversation that we are having right now is the conversation that we had 10 years ago, where carriers don't want to just be a dumb pipe, right? And that's what they are now returning to. They tried to be media as well, but that didn't work out for most carriers, right? It is a little bit better in the US. We've seen, you know, some success there. But, but here has been more difficult. And I think that's the, the concern, that even for the next, you know, evolution, that's the, their role. >> So how do they, how do they balance this dumb pipe idea, with the fact that if you make the toll high enough, being a dumb pipe is actually a pretty good job. You know, sit back, collect check, go to the beach, right? So where, where, where, where does this end up? >> Well, I think what's going to happen is, if you see five to 15 X the revenue on top of a pipe, you know, the hyperscalers are going to start going after the business. The consulting companies like PWC, McKinsey, the app developers, they're... So how do you engage those communities as a telco to get more revenue? I think this is a question that they really need to look at. But we tend to stick within our existing business model. I'll just give you one stat that blows me away. Uber is worth more than every taxi cab company in North America added together. And so the taxi industry owns billions in assets in cars and limousines. Uber doesn't own a single vehicle. So having a widely distributed app, is a huge multiplier on valuation. And I look to a company like Safari in Kenya, which developed M-Pesa, which Pesa means mo, it's mobile money in Swahili. And 25% of the country's GDP is facilitated by M-Pesa. And that's not even on smartphones. They're feature phones, Nokia phones. I call them dumb phones, but Nokia would call them "feature phones." >> Yeah. >> So think about that. Like 25, now transactions are very small, and the cut is tiny. But when you're facilitating 25% of a country's GDP, >> Yeah. >> Tiny, over billions of transactions is huge. But that's not the way telcos have historically thought or worked. And so M-Pesa and Safari shows the way forward. What do you think on that? >> I, I think that the experience, and what they can layer on top from a services perspective, especially in the private sector, is also important. I don't, I never believe that a carrier, given how they operate, is the best media company in the world, right? It is a very different world. But I do think that there's opportunity, first of all, to, to actually tell their story in a different way. If you're thinking about everything that a network actually empowers, there's a, there's a lot there. There's a lot that is good for us as, as society. There's a lot that is good for business. What can they do to start talking about differently about their services, and then layer on top of what they offer? A better way to actually bring together private and public network. It's not all about cellular, wifi and cellular coming together. We're talking a lot about satellite here as well. So, there's definitely more there about quality of service. Is, is there though, almost a biological inevitability that prevents companies from being able to navigate that divide? >> Hmm. >> Look at, look at when, when, when we went from high definition 720P, very exciting, 1080P, 4K. Everybody ran out and got a 4K TV. Well where was the, where was the best 4K content coming from? It wasn't, it wasn't the networks, it wasn't your cable operator, it was YouTube. It was YouTube. If you had suggested that 10 years before, that that would happen, people would think that you were crazy. Is it possible for folks who are now leading their companies, getting up on stage, and daring to say, "This content's coming over, "and I want to charge you more "for using my pipes." It's like, "Really? Is that your vision? "That's the vision that you want to share with us here?" I hear the sound of dead people walking- (laughing) when I hear comments like that. And so, you know, my students at Wharton in the CTO program, who are constantly looking at this concept of disruption, would hear that and go, "Ooh, gee, did the board hear what that person said?" I, you know, am I being too critical of people who could crush me like a bug? (laughing) >> I mean, it's better that they ask the people with money than not consumers to pay, right? 'Cause we've been through a phase where the carriers were actually asking for more money depending on critical things. Like for instance, if you're doing business email, then were going to charge you more than if you were a consumer. Or if you were watching video, they would charge you more for that. Then they understood that a consumer would walk away and go somewhere else. So they stopped doing that. But to your point, I think, and, and very much to what you focus from a disruption perspective, look at what Chat GTP and what Microsoft has been doing. Not much talk about this here at the show, which is interesting, but the idea that now as a consumer, I can ask new Bing to get me the 10 best restaurants in Barcelona, and I no longer go to Yelp, or all the other businesses where I was going to before, to get their recommendation, what happens to them? You're, you're moving away, and you're taking eyeballs away from those websites. And, and I think that, that you know, your point is exactly right. That it's, it's about how, from a revenue perspective, you are spending a lot of money to facilitate somebody else, and what's in it for you? >> Yeah. And to be clear, consumers pay for everything. >> Always. Always. (laughs) >> Taxpayers and consumers always pay for everything. So there is no, "Well, we're going to make them pay, so you don't have to pay." >> And if you are not paying, you are the product. Exactly. >> Yes. (laughing) >> Carolina, talk a little bit about what you're seeing at the event from some of the infrastructure players, the hyperscalers, obviously a lot of enterprise focus here at this event. What are some of the things that you're seeing? Are you impressed with, with their focus in telco, their focus to partner, build an ecosystem? What are you seeing? >> I'm seeing also talk about sustainability, and enabling telco to be more sustainable. You know, there, there's a couple of things that are a little bit different from the US where I live, which is that telcos in Europe, have put money into sustainability through bonds. And so they use the money that they then get from the bonds that they create, to, to supply or to fuel their innovation in sustainability. And so there's a dollar amount on sustainability. There's also an opportunity obviously from a growth perspective. And there's a risk mitigation, right? Especially in Europe, more and more you're going to be evaluated based on how sustainable you are. So there are a lot of companies here, if you're thinking about the Ciscos of the world. Dell, IBM all talking about sustainability and how to help carriers measure, and then obviously be more sustainable with their consumption and, and power. >> Going to be interesting to see where that goes over the years, as we talk to, every company we talk to at whatever show, has an ESG sustainability initiative, and only, well, many of them only want to work with other companies who have the same types of initiative. So a lot of, great that there's focus on sustainability, but hopefully we'll see more action down the road. Wanted to ask you about your book, "Blind," the name is interesting, "Blindsided." >> Well, I just want to tag on to this. >> Sure. >> One of the most exciting things for me is fast charging technology. And Shalmie, cell phone, or a smartphone maker from China, just announced yesterday, a smartphone that charges from 0 to 100% in five minutes. Now this is using GAN FEST technology. And the leader in the market is a company called Navitas. And this has profound implications. You know, it starts with the smartphone, right? But then it moves to the laptops. And then it'll move to EV's. So, as we electrify the $10 trillion a year transportation industry, there's a huge opportunity. People want charging faster. There's also a sustainability story that, to Carolina's point, that it uses less electricity. So, if we electrify the grid in order to support transportation, like the Tesla Semi's coming out, there are huge demands over a period. We need energy efficiency technologies, like this GAN FEST technology. So to me, this is humongous. And it, we only see it here in the show, in Shalmie, saying, "Five minutes." And everybody, the consumers go, "Oh, that's cool." But let's look at the bigger story, which is electrifying transportation globally. And this is going to be big. >> Yeah. And, and to, and to double click on that a little bit, to be clear, when we talk about fast charging today, typically it's taking the battery from a, not a zero state of charge, but a relatively low state of charge to 80%. >> Yep. >> Then it tapers off dramatically. And that translates into less range in an EV, less usable time on any other device, and there's that whole linkage between the power in, and the battery's ability to be charged, and how much is usable. And from a sustainability perspective, we are going to have an avalanche of batteries going into secondary use cases over time. >> They don't get tossed into landfills contrary to what people might think. >> Yep. >> In fact, they are used in a variety of ways after their primary lifespan. But that, that is, that in and of itself is a revolutionary thing. I'm interested in each of your thoughts on the China factor. Glaringly absent here, from my perspective, as sort of an Apple fanboy, where are they? Why aren't they talking about their... They must, they must feel like, "Well we just don't need to." >> We don't need to. We just don't need to. >> Absolutely. >> And then you walk around and you see these, these company names that are often anglicized, and you don't necessarily immediately associate them with China, but it's like, "Wait a minute, "that looks better than what I have, "and I'm not allowed to have access to that thing." What happens in the future there geopolitically? >> It's a pretty big question for- >> Its is. >> For a short little tech show. (Caroline laughs) But what happens as we move forward? When is the entire world going to be able to leverage in a secure way, some of the stuff that's coming out of, if they're not the largest economy in the world yet, they shortly will be. >> What's the story there? >> Well, it's interesting that you mentioned First Apple that has never had a presence at Mobile World Congress. And fun enough, I'm part of the GSMA judges for the GLOMO Awards, and last night I gave out Best Mobile Phone for last year, and it was to the iPhone4 Team Pro. and best disruptive technology, which was for the satellite function feature on, on the new iPhone. So, Apple might not be here, but they are. >> Okay. >> And, and so that's the first thing. And they are as far as being top of mind to every competitor in the smartphone market still. So a lot of the things that, even from a design perspective that you see on some of the Chinese brands, really remind you of, of Apple. What is interesting for me, is how there wouldn't be, with the exception of Samsung and Motorola, there's no one else here that is non-Chinese from a smartphone point of view. So that's in itself, is something that changed dramatically over the years, especially for somebody like me that still remember Nokia being the number one in the market. >> Huh. >> So. >> Guys, we could continue this conversation. We are unfortunately out of time. But thank you so much for joining Dave and me, talking about your perspectives on the event, the industry, the disruptive forces. It's going to be really interesting to see where it goes. 'Cause at the end of the day, it's the consumers that just want to make sure I can connect wherever I am 24 by seven, and it just needs to work. Thank you so much for your insights. >> Thank you. >> Lisa, it's been great. Dave, great. It's a pleasure. >> Our pleasure. For our guests, and for Dave Nicholson, I'm Lisa Martin. You're watching, "theCUBE," the leader in live and emerging tech coverage coming to you day three of our coverage of MWC 23. Stick around. Our next guest joins us momentarily. (outro music)

Published Date : Mar 1 2023

SUMMARY :

that drive human progress. We're going to have a really So great to be here. People are ready to be back, And so a lot of companies that are here to So Jim, talk to us a little So how are they going to do this? It is a little bit better in the US. check, go to the beach, right? And 25% of the country's GDP and the cut is tiny. But that's not the way telcos is the best media company "That's the vision that you and I no longer go to Yelp, consumers pay for everything. Always. so you don't have to pay." And if you are not (laughing) from some of the infrastructure and enabling telco to be more sustainable. Wanted to ask you about And this is going to be big. and to double click on that a little bit, and the battery's ability to be charged, contrary to what people might think. each of your thoughts on the China factor. We just don't need to. What happens in the future When is the entire world for the GLOMO Awards, So a lot of the things that, and it just needs to work. It's a pleasure. coming to you day three

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavePERSON

0.99+

JimPERSON

0.99+

Dave NicholsonPERSON

0.99+

CarolinePERSON

0.99+

SamsungORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

Carolina MilanesePERSON

0.99+

Jim HarrisPERSON

0.99+

NokiaORGANIZATION

0.99+

EuropeLOCATION

0.99+

MotorolaORGANIZATION

0.99+

SpainLOCATION

0.99+

PWCORGANIZATION

0.99+

IBMORGANIZATION

0.99+

five companiesQUANTITY

0.99+

UberORGANIZATION

0.99+

LisaPERSON

0.99+

six entitiesQUANTITY

0.99+

BarcelonaLOCATION

0.99+

FranceLOCATION

0.99+

McKinseyORGANIZATION

0.99+

80%QUANTITY

0.99+

NetflixORGANIZATION

0.99+

AppleORGANIZATION

0.99+

DellORGANIZATION

0.99+

60%QUANTITY

0.99+

OrangeORGANIZATION

0.99+

ChinaLOCATION

0.99+

Deutsche TelecomORGANIZATION

0.99+

five minutesQUANTITY

0.99+

67%QUANTITY

0.99+

Carolina MilanesiPERSON

0.99+

55%QUANTITY

0.99+

North AmericaLOCATION

0.99+

25%QUANTITY

0.99+

NavitasORGANIZATION

0.99+

M-PesaORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

YouTubeORGANIZATION

0.99+

USLOCATION

0.99+

yesterdayDATE

0.99+

24QUANTITY

0.99+

telcoORGANIZATION

0.99+

KenyaLOCATION

0.99+

Mobile World CongressEVENT

0.99+

fiveQUANTITY

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

KhanLOCATION

0.99+

BlindsidedTITLE

0.99+

YelpORGANIZATION

0.99+

Dell TechnologiesORGANIZATION

0.99+

last yearDATE

0.99+

five plus dollarsQUANTITY

0.99+

MWC23EVENT

0.99+

MWC 23EVENT

0.99+

0QUANTITY

0.99+

10 best restaurantsQUANTITY

0.98+

theCUBEORGANIZATION

0.98+

720PQUANTITY

0.98+

todayDATE

0.98+

GLOMO AwardsEVENT

0.98+

billionsQUANTITY

0.98+

15 XQUANTITY

0.98+

last nightDATE

0.98+

first thingQUANTITY

0.98+

CarolinaPERSON

0.98+

SafariORGANIZATION

0.98+

this yearDATE

0.98+

OneQUANTITY

0.97+

GAN FESTORGANIZATION

0.97+

sevenQUANTITY

0.97+

1080PQUANTITY

0.97+

80,000 peopleQUANTITY

0.97+

Five minutesQUANTITY

0.97+

FirstQUANTITY

0.97+

ShalmieORGANIZATION

0.97+

10 years agoDATE

0.97+

10 years beforeDATE

0.97+

TeslaORGANIZATION

0.96+

100%QUANTITY

0.96+

Dave Duggal, EnterpriseWeb & Azhar Sayeed, Red Hat | MWC Barcelona 2023


 

>> theCUBE's live coverage is made possible by funding from Dell Technologies. Creating technologies that drive human progress. (ambient music) >> Lisa: Hey everyone, welcome back to Barcelona, Spain. It's theCUBE Live at MWC 23. Lisa Martin with Dave Vellante. This is day two of four days of cube coverage but you know that, because you've already been watching yesterday and today. We're going to have a great conversation next with EnterpriseWeb and Red Hat. We've had great conversations the last day and a half about the Telco industry, the challenges, the opportunities. We're going to unpack that from this lens. Please welcome Dave Duggal, founder and CEO of EnterpriseWeb and Azhar Sayeed is here, Senior Director Solution Architecture at Red Hat. >> Guys, it's great to have you on the program. >> Yes. >> Thank you Lisa, >> Great being here with you. >> Dave let's go ahead and start with you. Give the audience an overview of EnterpriseWeb. What kind of business is it? What's the business model? What do you guys do? >> Okay so, EnterpriseWeb is reinventing middleware, right? So the historic middleware was to build vertically integrated stacks, right? And those stacks are now such becoming the rate limiters for interoperability for so the end-to-end solutions that everybody's looking for, right? Red Hat's talking about the unified platform. You guys are talking about Supercloud, EnterpriseWeb addresses that we've built middleware based on serverless architecture, so lightweight, low latency, high performance middleware. And we're working with the world's biggest, we sell through channels and we work through partners like Red Hat Intel, Fortnet, Keysight, Tech Mahindra. So working with some of the biggest players that have recognized the value of our innovation, to deliver transformation to the Telecom industry. >> So what are you guys doing together? Is this, is this an OpenShift play? >> Is it? >> Yeah. >> Yeah, so we've got two projects right her on the floor at MWC throughout the various partners, where EnterpriseWeb is actually providing an application layer, sorry application middleware over Red Hat's, OpenShift and we're essentially generating operators so Red Hat operators, so that all our vendors, and, sorry vendors that we onboard into our catalog can be deployed easily through the OpenShift platform. And we allow those, those vendors to be flexibly composed into network services. So the real challenge for operators historically is that they, they have challenges onboarding the vendors. It takes a long time. Each one of them is a snowflake. They, you know, even though there's standards they don't all observe or follow the same standards. So we make it easier using models, right? For, in a model driven process to on boards or streamline that onboarding process, compose functions into services deploy those services seamlessly through Red Hat's OpenShift, and then manage the, the lifecycle, like the quality of service and the SLAs for those services. >> So Red Hat obviously has pretty prominent Telco business has for a while. Red Hat OpenStack actually is is pretty popular within the Telco business. People thought, "Oh, OpenStack, that's dead." Actually, no, it's actually doing quite well. We see it all over the place where for whatever reason people want to build their own cloud. And, and so, so what's happening in the industry because you have the traditional Telcos we heard in the keynotes that kind of typical narrative about, you know, we can't let the over the top vendors do this again. We're, we're going to be Apifi everything, we're going to monetize this time around, not just with connectivity but the, but the fact is they really don't have a developer community. >> Yes. >> Yet anyway. >> Then you have these disruptors over here that are saying "Yeah, we're going to enable ISVs." How do you see it? What's the landscape look like? Help us understand, you know, what the horses on the track are doing. >> Sure. I think what has happened, Dave, is that the conversation has moved a little bit from where they were just looking at IS infrastructure service with virtual machines and OpenStack, as you mentioned, to how do we move up the value chain and look at different applications. And therein comes the rub, right? You have applications with different requirements, IT network that have various different requirements that are there. So as you start to build those cloud platform, as you start to modernize those set of applications, you then start to look at microservices and how you build them. You need the ability to orchestrate them. So some of those problem statements have moved from not just refactoring those applications, but actually now to how do you reliably deploy, manage in a multicloud multi cluster way. So this conversation around Supercloud or this conversation around multicloud is very >> You could say Supercloud. That's okay >> (Dave Duggal and Azhar laughs) >> It's absolutely very real though. The reason why it's very real is, if you look at transformations around Telco, there are two things that are happening. One, Telco IT, they're looking at partnerships with hybrid cloud, I mean with public cloud players to build a hybrid environment. They're also building their own Telco Cloud environment for their network functions. Now, in both of those spaces, they end up operating two to three different environments themselves. Now how do you create a level of abstraction across those? How do you manage that particular infrastructure? And then how do you orchestrate all of those different workloads? Those are the type of problems that they're actually beginning to solve. So they've moved on from really just putting that virtualizing their application, putting it on OpenStack to now really seriously looking at "How do I build a service?" "How do I leverage the catalog that's available both in my private and public and build an overall service process?" >> And by the way what you just described as hybrid cloud and multicloud is, you know Supercloud is what multicloud should have been. And what, what it originally became is "I run on this cloud and I run on this cloud" and "I run on this cloud and I have a hybrid." And, and Supercloud is meant to create a common experience across those clouds. >> Dave Duggal: Right? >> Thanks to, you know, Supercloud middleware. >> Yeah. >> Right? And, and so that's what you guys do. >> Yeah, exactly. Exactly. Dave, I mean, even the name EnterpriseWeb, you know we started from looking from the application layer down. If you look at it, the last 10 years we've looked from the infrastructure up, right? And now everybody's looking northbound saying "You know what, actually, if I look from the infrastructure up the only thing I'll ever build is silos, right?" And those silos get in the way of the interoperability and the agility the businesses want. So we take the perspective as high level abstractions, common tools, so that if I'm a CXO, I can look down on my environments, right? When I'm really not, I honestly, if I'm an, if I'm a CEO I don't really care or CXO, I don't really care so much about my infrastructure to be honest. I care about my applications and their behavior. I care about my SLAs and my quality of service, right? Those are the things I care about. So I really want an EnterpriseWeb, right? Something that helps me connect all my distributed applications all across all of the environments. So I can have one place a consistency layer that speaks a common language. We know that there's a lot of heterogeneity down all those layers and a lot of complexity down those layers. But the business doesn't care. They don't want to care, right? They want to actually take their applications deploy them where they're the most performant where they're getting the best cost, right? The lowest and maybe sustainability concerns, all those. They want to address those problems, meet their SLAs meet their quality service. And you know what, if it's running on Amazon, great. If it's running on Google Cloud platform, great. If it, you know, we're doing one project right here that we're demonstrating here is with with Amazon Tech Mahindra and OpenShift, where we took a disaggregated 5G core, right? So this is like sort of latest telecom, you know net networking software, right? We're deploying pulling elements of that network across core, across Amazon EKS, OpenShift on Red Hat ROSA, as well as just OpenShift for cloud. And we, through a single pane of deployment and management, we deployed the elements of the 5G core across them and then connected them in an end-to-end process. That's Telco Supercloud. >> Dave Vellante: So that's an O-RAN deployment. >> Yeah that's >> So, the big advantage of that, pardon me, Dave but the big advantage of that is the customer really doesn't care where the components are being served from for them. It's a 5G capability. It happens to sit in different locations. And that's, it's, it's about how do you abstract and how do you manage all those different workloads in a cohesive way? And that's exactly what EnterpriseWeb is bringing to the table. And what we do is we abstract the underlying infrastructure which is the cloud layer. So if, because AWS operating environment is different then private cloud operating environment then Azure environment, you have the networking is set up is different in each one of them. If there is a way you can abstract all of that and present it in a common operating model it becomes a lot easier than for anybody to be able to consume. >> And what a lot of customers tell me is the way they deal with multicloud complexity is they go with mono cloud, right? And so they'll lose out on some of the best services >> Absolutely >> If best of, so that's not >> that's not ideal, but at the end of the day, agree, developers don't want to muck with all the plumbing >> Dave Duggal: Yep. >> They want to write code. >> Azhar: Correct. >> So like I come back to are the traditional Telcos leaning in on a way that they're going to enable ISVs and developers to write on top of those platforms? Or are there sort of new entrance and disruptors? And I know, I know the answer is both >> Dave Duggal: Yep. >> but I feel as though the Telcos still haven't, traditional Telcos haven't tuned in to that developer affinity, but you guys sell to them. >> What, what are you seeing? >> Yeah, so >> What we have seen is there are Telcos fall into several categories there. If you look at the most mature ones, you know they are very eager to move up the value chain. There are some smaller very nimble ones that have actually doing, they're actually doing something really interesting. For example, they've provided sandbox environments to developers to say "Go develop your applications to the sandbox environment." We'll use that to build an net service with you. I can give you some interesting examples across the globe that, where that is happening, right? In AsiaPac, particularly in Australia, ANZ region. There are a couple of providers who have who have done this, but in, in, in a very interesting way. But the challenges to them, why it's not completely open or public yet is primarily because they haven't figured out how to exactly monetize that. And, and that's the reason why. So in the absence of that, what will happen is they they have to rely on the ISV ecosystem to be able to build those capabilities which they can then bring it on as part of the catalog. But in Latin America, I was talking to one of the providers and they said, "Well look we have a public cloud, we have our own public cloud, right?" What we want do is use that to offer localized services not just bring everything in from the top >> But, but we heard from Ericson's CEO they're basically going to monetize it by what I call "gouge", the developers >> (Azhar laughs) >> access to the network telemetry as opposed to saying, "Hey, here's an open platform development on top of it and it will maybe create something like an app store and we'll take a piece of the action." >> So ours, >> to be is a better model. >> Yeah. So that's perfect. Our second project that we're showing here is with Intel, right? So Intel came to us cause they are a reputation for doing advanced automation solutions. They gave us carte blanche in their labs. So this is Intel Network Builders they said pick your partners. And we went with the Red Hat, Fort Net, Keysite this company KX doing AIML. But to address your DevX, here's Intel explicitly wants to get closer to the developers by exposing their APIs, open APIs over their infrastructure. Just like Red Hat has APIs, right? And so they can expose them northbound to developers so developers can leverage and tune their applications, right? But the challenge there is what Intel is doing at the low level network infrastructure, right? Is fundamentally complex, right? What you want is an abstraction layer where develop and this gets to, to your point Dave where you just said like "The developers just want to get their job done." or really they want to focus on the business logic and accelerate that service delivery, right? So the idea here is an EnterpriseWeb they can literally declaratively compose their services, express their intent. "I want this to run optimized for low latency. I want this to run optimized for energy consumption." Right? And that's all they say, right? That's a very high level statement. And then the run time translates it between all the elements that are participating in that service to realize the developer's intent, right? No hands, right? Zero touch, right? So that's now a movement in telecom. So you're right, it's taking a while because these are pretty fundamental shifts, right? But it's intent based networking, right? So it's almost two parts, right? One is you have to have the open APIs, right? So that the infrastructure has to expose its capabilities. Then you need abstractions over the top that make it simple for developers to take, you know, make use of them. >> See, one of the demonstrations we are doing is around AIOps. And I've had literally here on this floor, two conversations around what I call as network as a platform. Although it sounds like a cliche term, that's exactly what Dave was describing in terms of exposing APIs from the infrastructure and utilizing them. So once you get that data, then now you can do analytics and do machine learning to be able to build models and figure out how you can orchestrate better how you can monetize better, how can how you can utilize better, right? So all of those things become important. It's just not about internal optimization but it's also about how do you expose it to third party ecosystem to translate that into better delivery mechanisms or IOT capability and so on. >> But if they're going to charge me for every API call in the network I'm going to go broke (team laughs) >> And I'm going to get really pissed. I mean, I feel like, I'm just running down, Oracle. IBM tried it. Oracle, okay, they got Java, but they don't they don't have developer jobs. VMware, okay? They got Aria. EMC used to have a thing called code. IBM had to buy Red Hat to get to the developer community. (Lisa laughs) >> So I feel like the telcos don't today have those developer shops. So, so they have to partner. [Azhar] Yes. >> With guys like you and then be more open and and let a zillion flowers bloom or else they're going to get disrupted in a big way and they're going to it's going to be a repeat of the over, over the top in, in in a different model that I can't predict. >> Yeah. >> Absolutely true. I mean, look, they cannot be in the connectivity business. Telcos cannot be just in the connectivity business. It's, I think so, you know, >> Dave Vellante: You had a fry a frozen hand (Dave Daggul laughs) >> off that, you know. >> Well, you know, think about they almost have to go become over the top on themselves, right? That's what the cloud guys are doing, right? >> Yeah. >> They're riding over their backbone that by taking a creating a high level abstraction, they in turn abstract away the infrastructure underneath them, right? And that's really the end game >> Right? >> Dave Vellante: Yeah. >> Is because now, >> they're over the top it's their network, it's their infrastructure, right? They don't want to become bid pipes. >> Yep. >> Now you, they can take OpenShift, run that in any cloud. >> Yep. >> Right? >> You can run that in hybrid cloud, enterprise web can do the application layer configuration and management. And together we're running, you know, OSI layers one through seven, east to west, north to south. We're running across the the RAN, the core and the transport. And that is telco super cloud, my friend. >> Yeah. Well, >> (Dave Duggal laughs) >> I'm dominating the conversation cause I love talking super cloud. >> I knew you would. >> So speaking of super superpowers, when you're in customer or prospective customer conversations with providers and they've got, obviously they're they're in this transformative state right now. How, what do you describe as the superpower between Red Hat and EnterpriseWeb in terms of really helping these Telcos transforms. But at the end of the day, the connectivity's there the end user gets what they want, which is I want this to work wherever I am. >> Yeah, yeah. That's a great question, Lisa. So I think the way you could look at it is most software has, has been evolved to be specialized, right? So in Telcos' no different, right? We have this in the enterprise, right? All these specialized stacks, all these components that they wire together in the, in you think of Telco as a sort of a super set of enterprise problems, right? They have all those problems like magnified manyfold, right? And so you have specialized, let's say orchestrators and other tools for every Telco domain for every Telco layer. Now you have a zoo of orchestrators, right? None of them were designed to work together, right? They all speak a specific language, let's say quote unquote for doing a specific purpose. But everything that's interesting in the 21st century is across layers and across domains, right? If a siloed static application, those are dead, right? Nobody's doing those anymore. Even developers don't do those developers are doing composition today. They're not doing, nobody wants to hear about a 6 million lines of code, right? They want to hear, "How did you take these five things and bring 'em together for productive use?" >> Lisa: Right. How did you deliver faster for my enterprise? How did you save me money? How did you create business value? And that's what we're doing together. >> I mean, just to add on to Dave, I was talking to one of the providers, they have more than 30,000 nodes in their infrastructure. When I say no to your servers running, you know, Kubernetes,running open stack, running different components. If try managing that in one single entity, if you will. Not possible. You got to fragment, you got to segment in some way. Now the question is, if you are not exposing that particular infrastructure and the appropriate KPIs and appropriate things, you will not be able to efficiently utilize that across the board. So you need almost a construct that creates like a manager of managers, a hierarchical structure, which would allow you to be more intelligent in terms of how you place those, how you manage that. And so when you ask the question about what's the secret sauce between the two, well this is exactly where EnterpriseWeb brings in that capability to analyze information, be more intelligent about it. And what we do is provide an abstraction of the cloud layer so that they can, you know, then do the right job in terms of making sure that it's appropriate and it's consistent. >> Consistency is key. Guys, thank you so much. It's been a pleasure really digging through EnterpriseWeb. >> Thank you. >> What you're doing >> with Red Hat. How you're helping the organization transform and Supercloud, we can't forget Supercloud. (Dave Vellante laughs) >> Fight Supercloud. Guys, thank you so much for your time. >> Thank you so much Lisa. >> Thank you. >> Thank you guys. >> Very nice. >> Lisa: We really appreciate it. >> For our guests and for Dave Vellante, I'm Lisa Martin. You're watching theCUBE, the leader in live tech coverage coming to you live from MWC 23. We'll be back after a short break.

Published Date : Feb 28 2023

SUMMARY :

that drive human progress. the challenges, the opportunities. have you on the program. What's the business model? So the historic middleware So the real challenge for happening in the industry What's the landscape look like? You need the ability to orchestrate them. You could say Supercloud. And then how do you orchestrate all And by the way Thanks to, you know, And, and so that's what you guys do. even the name EnterpriseWeb, you know that's an O-RAN deployment. of that is the customer but you guys sell to them. on the ISV ecosystem to be able take a piece of the action." So that the infrastructure has and figure out how you And I'm going to get So, so they have to partner. the over, over the top in, in in the connectivity business. They don't want to become bid pipes. OpenShift, run that in any cloud. And together we're running, you know, I'm dominating the conversation the end user gets what they want, which is And so you have specialized, How did you create business value? You got to fragment, you got to segment Guys, thank you so much. and Supercloud, we Guys, thank you so much for your time. to you live from MWC 23.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavePERSON

0.99+

LisaPERSON

0.99+

Dave DuggalPERSON

0.99+

Dave VellantePERSON

0.99+

Lisa MartinPERSON

0.99+

IBMORGANIZATION

0.99+

TelcosORGANIZATION

0.99+

TelcoORGANIZATION

0.99+

Red HatORGANIZATION

0.99+

FortnetORGANIZATION

0.99+

KeysightORGANIZATION

0.99+

EnterpriseWebORGANIZATION

0.99+

OracleORGANIZATION

0.99+

twoQUANTITY

0.99+

AWSORGANIZATION

0.99+

21st centuryDATE

0.99+

AmazonORGANIZATION

0.99+

two projectsQUANTITY

0.99+

Telcos'ORGANIZATION

0.99+

Latin AmericaLOCATION

0.99+

EMCORGANIZATION

0.99+

Dave DaggulPERSON

0.99+

Dell TechnologiesORGANIZATION

0.99+

second projectQUANTITY

0.99+

oneQUANTITY

0.99+

IntelORGANIZATION

0.99+

todayDATE

0.99+

Fort NetORGANIZATION

0.99+

Barcelona, SpainLOCATION

0.99+

telcoORGANIZATION

0.99+

more than 30,000 nodesQUANTITY

0.99+

two thingsQUANTITY

0.99+

bothQUANTITY

0.99+

OpenShiftTITLE

0.99+

JavaTITLE

0.99+

threeQUANTITY

0.99+

KXORGANIZATION

0.99+

Azhar SayeedPERSON

0.98+

OneQUANTITY

0.98+

Tech MahindraORGANIZATION

0.98+

two conversationsQUANTITY

0.98+

yesterdayDATE

0.98+

five thingsQUANTITY

0.98+

telcosORGANIZATION

0.97+

four daysQUANTITY

0.97+

AzharPERSON

0.97+