Image Title

Search Results for Boston Massachusetts:

Tim Jefferson & Sinan Eren, Barracuda | AWS re:Inforce 2022


 

>>And welcome back to the cubes coverage of a, of us. Reinforc here in Boston, Massachusetts. I'm John furrier. We're here for a great interview on the next generation topic of state of industrial security. We have two great guests, Tim Jefferson, senior vice president data network and application security at Barracuda. And Cenon Aron vice president of zero trust engineering at Barracuda. Gentlemen. Thanks for coming on the queue. Talk about industrial security. >>Yeah, thanks for having us. >>So one of the, one of the big things that's going on, obviously you got zero trust. You've got trusted, trusted software supply chain challenges. You've got hardware mattering more than ever. You've got software driving everything, and all this is talking about industrial, you know, critical infrastructure. We saw the oil pipeline had a hack and ransomware attack, and that's just constant barrage of threats in the industrial area. And all the data is pointing to that. This area is gonna be fast growth machine learning's kicking in automation is coming in. You see a huge topic, huge growth trend. What is the big story going on here? >>Yeah, I think at a high level, you know, we did a survey and saw that, you know, over 95% of the organizations are experiencing, you know, security challenges in this space. So, you know, the blast radius in the, of the, the interface that this creates so many different devices and things and objects that are getting network connected now create a huge challenge for security teams to kind of get their arms around that. >>Yeah. And I can add that, you know, majority of these incidents that, that these organizations suffer lead to significant downtime, right? And we're talking about operational technology here, you know, lives depend on, on these technologies, right? Our, our wellbeing everyday wellbeing depend on those. So, so that is a key driver of initiatives and projects to secure industrial IOT and operational technologies in, in these businesses. >>Well, it's great to have both of you guys on, you know, Tim, you know, you had a background at AWS and sit on your startup, founder, soldier, coming to Barracuda, both very experienced, seeing the ways before in this industry. And I'd like to, if you don't mind talk about three areas, remote access, which we've seen in huge demand with, with the pandemic and the out, coming out with the hybrid and certainly industrial, that's a big part of it. And then secondly, that the trend of clear commitment from enterprises to have in a public cloud component, and then finally the secure access edge, you know, with SAS business models, securing these things, these are the three hot areas let's go into the first one, remote access. Why is this important? It seems that this is the top priority for having immediate attention on what's the big challenge here? Is it the most unsecure? Is it the most important? What, why is this relevant? >>So now I'll let you jump in there. >>Yeah, sure. Happy to. I mean, if you think about it, especially now, we've been through a, a pandemic shelter in place cycle for almost two years. It, it becomes essentially a business continuity matter, right? You do need remote access. We also seen a tremendous shift in hiring the best talent, wherever they are, right. Onboarding them and bringing the talent into, into, into, into businesses that have maybe a lot more distributed environments than traditionally. So you have to account for remote access in every part of everyday life, including industrial technologies, you need remote support, right? You need vendors that might be overseas providing you, you know, guidance and support for these technologies. So remote support is every part of life. Whether you work from home, you work on your, on the go, or you are getting support from a vendor that happens to be in Germany, you know, teleporting into your environment in Hawaii. You know, all these things are essentially critical parts of everyday life. Now >>Talk about ZT and a zero trust network access is a, this is a major component for companies. Obviously, you know, it's a position taking trust and verifies. One other approach, zero trust is saying, Hey, I don't trust you. Take us through why that's important. Why is zero trust network access important in this area? >>Yeah. I mean, I could say that traditionally remote access, if you think about infancy of the internet in the nineties, right? It was all about encryption in, in transit, right? You were all about internet was vastly clear text, right? We didn't have even SSL TLS, widely distributed and, and available. So when VPNs first came out, it was more about preventing sniffing, clear tech clear text information from, from, from the network, right? It was more about securing the, the transport, but now that kind of created a, a big security control gap, which implicitly trusted user users, once they are teleported into a remote network, right? That's the essence of having a remote access session you're brought from wherever you are into an internal network. They implicitly trust you that simply breakdown over time because you are able to compromise end points relatively easily using browser exploits. >>You know, so, so for supply chain issues, water hole attacks, and leverage the existing VPN tunnels to laterally move into the organization from within the network, you literally move in further and further and further down, you know, down the network, right? So the VPN needed a, a significant innovation. It was meant to be securing packets and transit. It was all about an encryption layer, but it had an implicit trust problem with zero trust. We turn it into an explicit trust problem, right? Explicit trust concept, ideally. Right? So you are, who do you say you are? And you are authorized to access only to things that you need to access to get the work done. >>So you're talking about granular levels versus the one time database look up you're in >>That's right. >>Tim, talk about the OT it side of this equation of industrial, because it, you know, is IP based, networking, OT have been purpose built, you know, maybe some proprietary technology yeah. That connects to the internet internet, but it's mainly been secure. Those have come together over the years and now with no perimeter security, how is this world evolving? Because there's gonna be more cloud there, be more machine learning, more hybrid on premise, that's going on almost a reset if you will. I mean, is it a reset? What's the, what's the situation. >>Yeah. I think, you know, in typical human behavior, you know, there's a lot of over rotation going on. You know, historically a lot of security controls are all concentrated in a data center. You know, a lot of enterprises had very large sophisticated well-established security stacks in a data center. And as those applications kind of broke down and, and got rearchitected for the cloud, they got more modular, they got more distributed that centralized security stack became an anti pattern. So now this kind of over rotation, Hey, let's take this stack and, and put it up in the cloud. You know, so there's lots of names for this secure access, service edge, you know, secure service edge. But in the end, you know, you're taking your controls and, and migrating them into the cloud. And, you know, I think ultimately this creates a great opportunity to embrace some of security, best practices that were difficult to do in some of the legacy architectures, which is being able to push your controls as far out to the edge as possible. >>And the interesting thing about OT and OT now is just how far out the edge is, right? So instead of being, you know, historically it was the branch or user edge, remote access edge, you know, Syon mentioned that you, you have technologies that can VPN or bring those identities into those networks, but now you have all these things, you know, partners, devices. So it's the thing, edge device edge, the user edge. So a lot more fidelity and awareness around who users are. Cause in parallel, a lot of the IDP and I IBM's platforms have really matured. So marrying those concepts of this, this lot of maturity around identity management yeah. With device in and behavior management into a common security framework is really exciting. But of course it's very nascent. So people are, it's a difficult time getting your arms around >>That. It's funny. We were joking about the edge. We just watching the web telescope photos come in the deep space, the deep edge. So the edge is continuing to be pushed out. Totally see that. And in fact, you know, one of the things we're gonna, we're gonna talk about this survey that you guys had done by an independent firm has a lot of great data. I want to unpack that, but one of the things that was mentioned in there, and I'll get, I wanna get your both reaction to this is that virtually all organizations are committing to the public cloud. Okay. I think it was like 96% or so was the stat. And if you combine in that, the fact that the edge is expanding, the cloud model is evolving at the edge. So for instance, a building, there's a lot behind it. You know, how far does it go? So we don't and, and what is the topology because the topology seem to change too. So there's this growth and change where we need cloud operations, DevOps at, at the edge and the security, but it's changing. It's not pure cloud, but it's cloud. It has to be compatible. What's your reaction to that, Tim? I mean, this is, this is a big part of the growth of industrial. >>Yeah. I think, you know, if you think about, there's kind of two exciting developments that I would think of, you know, obviously there's this increase to the surface area, the tax surface areas, people realize, you know, it's not just laptops and devices and, and people that you're trying to secure, but now they're, you know, refrigerators and, you know, robots and manufacturing floors that, you know, could be compromised, have their firmware updated or, you know, be ransomware. So this a huge kind of increase in surface area. But a lot of those, you know, industrial devices, weren't built around the concept with network security. So kind of bolting on, on thinking through how can you secure who and what ultimately has access to those, to those devices and things. And where is the control framework? So to your point, the control framework now is typically migrated now into public cloud. >>These are custom applications, highly distributed, highly available, very modular. And then, you know, so how do you, you know, collect the telemetry or control information from these things. And then, you know, it creates secure connections back into these, these control applications, which again, are now migrated to public cloud. So you have this challenge, you know, how do you secure? We were talking about this last time we discussed, right. So how do you secure the infrastructure that I've, I've built in deploying now, this control application and in public cloud, and then connect in with this, this physical presence that I have with these, you know, industrial devices and taking telemetry and control information from those devices and bringing it back into the management. And this kind marries again, back into the remote axis that Sunan was mentioning now with this increase awareness around the efficacy of ransomware, we are, you know, we're definitely seeing attackers going after the management frameworks, which become very vulnerable, you know, and they're, they're typically just unprotected web applications. So once you get control of the management framework, regardless of where it's hosted, you can start moving laterally and, and causing some damage. >>Yeah. That seems to be the common thread. So no talk about, what's your reaction to that because, you know, zero trust, if it's evolving and changing, you, you gotta have zero trust you. I didn't even know it's out there and then it gets connected. How do you solve that problem? Cuz you know, there's a lot of surface area that's evolving all the OT stuff and the new, it, what's the, what's the perspective and posture that the clients your clients are having and customers. Well, >>I, I think they're having this conversation about further mobilizing identity, right? We did start with, you know, user identity that become kind of the first foundational building block for any kind of zero trust implementation. You work with, you know, some sort of SSO identity provider, you get your, you sync with your user directories, you have a single social truth for all your users. >>You authenticate them through an identity provider. However that didn't quite cut it for industrial OT and OT environments. So you see like we have the concept of hardware machines, machine identities now become an important construct, right? The, the legacy notion of being able to put controls and, and, and, and rules based on network constructs doesn't really scale anymore. Right? So you need to have this concept of another abstraction layer of identity that belongs to a service that belongs to an application that belongs to a user that belongs to a piece of hardware. Right. And then you can, yeah. And then you can build a lot more, of course, scalable controls that basically understand the, the trust relation between these identities and enforce that rather than trying to say this internal network can talk to this other internal network through a, through a network circuit. No, those things are really, are not scalable in this new distributed landscape that we live in today. So identity is basically going to operationalize zero trust and a lot more secure access going forward. >>And that's why we're seeing the sassy growth. Right. That's a main piece of it. Is that what you, what you're seeing too? I mean, that seems to be the, the approach >>I think like >>Go >>Ahead to, yeah. I think like, you know, sassy to me is really about, you know, migrating and moving your security infrastructure to the cloud edge, you know, as we talked to the cloud, you know, and then, you know, do you funnel all ingress and egress traffic through this, you know, which is potentially an anti pattern, right? You don't wanna create, you know, some brittle constraint around who and what has access. So again, a security best practices, instead of doing all your enforcement in one place, you can distribute and push your controls out as far to the edge. So a lot of SASI now is really around centralizing policy management, which is the big be one of the big benefits is instead of having all these separate management plans, which always difficult to be very federated policy, right? You can consolidate your policy and then decide mechanism wise how you're gonna instrument those controls at the edge. >>So I think that's the, the real promise of, of the, the sassy movement and the, I think the other big piece, which you kind of touched on earlier is around analytics, right? So it creates an opportunity to collect a whole bunch of telemetry from devices and things, behavior consumption, which is, which is a big, common, best practice around once you have SA based tools that you can instrument in a lot of visibility and how users and devices are behaving in being operated. And to Syon point, you can marry that in with their identity. Yeah. Right. And then you can start building models around what normal behavior is and, you know, with very fine grain control, you can, you know, these types of analytics can discover things that humans just can't discover, you know, anomalous behavior, any kind of indicators are compromised. And those can be, you know, dynamic policy blockers. >>And I think sun's point about what he was talking about, talks about the, the perimeters no longer secure. So you gotta go to the new way to do that. Totally, totally relevant. I love that point. Let me ask you guys a question on the, on the macro, if you don't mind, how concerned are you guys on the current threat landscape in the geopolitical situation in terms of the impact on industrial IOT in this area? >>So I'll let you go first. Yeah. >>I mean, it's, it's definitely significantly concerning, especially if now with the new sanctions, there's at least two more countries being, you know, let's say restricted to participate in the global economic, you know, Mar marketplace, right? So if you look at North Korea as a pattern, since they've been isolated, they've been sanctioned for a long time. They actually double down on rents somewhere to even fund state operations. Right? So now that you have, you know, BES be San Russia being heavily sanctioned due to due to their due, due to their activities, we can envision more increase in ransomware and, you know, sponsoring state activities through illegal gains, through compromising, you know, pipelines and, you know, industrial, you know, op operations and, and seeking large payouts. So, so I think the more they will, they're ized they're pushed out from the, from the global marketplace. There will be a lot more aggression towards critical infrastructure. >>Oh yeah. I think it's gonna ignite more action off the books, so to speak as we've seen. Yeah. We've >>Seen, you know, another point there is, you know, Barracuda also runs a, a backup, you know, product. We do a, a purpose built backup appliance and a cloud to cloud backup. And, you know, we've been running this service for over a decade. And historically the, the amount of ransomware escalations that we got were very slow, you know, is whenever we had a significant one, helping our customers recover from them, you know, you know, once a month, but over the last 18 months, this is routine now for us, this is something we deal with on a daily basis. And it's becoming very common. You know, it's, it's been a well established, you know, easily monetized route to market for the bad guys. And, and it's being very common now for people to compromise management planes, you know, they use account takeover. And the first thing they're doing is, is breaking into management planes, looking at control frameworks. And then first thing they'll do is delete, you know, of course the backups, which this sort of highlights the vulnerability that we try to talk to our customers about, you know, and this affects industrial too, is the first thing you have to do is among other things, is, is protect your management planes. Yeah. And putting really fine grain mechanisms like zero trust is, is a great, >>Yeah. How, how good is backup, Tim, if you gets deleted first is like no backup. There it is. So, yeah. Yeah. Air gaping. >>I mean, obviously that's kinda a best practice when you're bad guys, like go in and delete all the backups. So, >>And all the air gaps get in control of everything. Let me ask you about the, the survey pointed out that there's a lot of security incidents happening. You guys pointed that out and discussed a little bit of it. We also talked about in the survey, you know, the threat vectors and the threat landscape, the common ones, ransomware was one of them. The area that I liked, what that was interesting was the, the area that talked about how organizations are investing in security and particularly around this, can you guys share your thoughts on how you see the, the market, your customers and, and the industry investing? What are they investing in? What stage are they in when it comes to IOT and OT, industrial IOT and OT security, do they do audits? Are they too busy? I mean, what's the state of their investment thesis progress of, of, of how they're investing in industrial IOT? >>Yeah. Our, our view is, you know, we have a next generation product line. We call, you know, our next, our cloud chain firewalls. And we have a form factor that sports industrial use cases we call secure connectors. So it's interesting that if you, what we learned from that business is a tremendous amount of bespoke efforts at this point, which is sort of indicative of a, of a nascent market still, which is related to another piece of information I thought was really interested in the survey that I think it was 93% of the, the participants, the enterprises had a failed OT initiative, you know, that, you know, people tried to do these things and didn't get off the ground. And then once we see build, you know, strong momentum, you know, like we have a, a large luxury car manufacturer that uses our secure connectors on the, on the robots, on the floor. >>So well established manufacturing environments, you know, building very sophisticated control frameworks and, and security controls. And, but again, a very bespoke effort, you know, they have very specific set of controls and specific set of use cases around it. So it kind of reminds me of the late nineties, early two thousands of people trying to figure out, you know, networking and the blast radi and networking and, and customers, and now, and a lot of SI are, are invested in this building, you know, fast growing practices around helping their customers build more robust controls in, in helping them manage those environments. So, yeah, I, I think that the market is still fairly nascent >>From what we seeing, right. But there are some encouraging, you know, data that shows that at least helpful of the organizations are actively pursuing. There's an initiative in place for OT and a, you know, industrial IOT security projects in place, right. They're dedicating time and resources and budget for this. And, and in, in regards to industries, verticals and, and geographies oil and gas, you know, is, is ahead of the curve more than 50% responded to have the project completed, which I guess colonial pipeline was the, you know, the call to arms that, that, that was the big, big, you know, industrial, I guess, incident that triggered a lot of these projects to be accelerating and, and, you know, coming to the finish line as far as geographies go DACA, which is Germany, Austria, Switzerland, and of course, north America, which happens to be the industrial powerhouses of, of the world. Well, APAC, you know, also included, but they're a bit behind the curve, which is, you know, that part is a bit concerning, but encouragingly, you know, Western Europe and north America is ahead of these, you know, projects. A lot of them are near completion or, or they're in the middle of some sort of an, you know, industrial IOT security project right >>Now. I'm glad you brought the colonial pipeline one and, and oil and gas was the catalyst. Again, a lot of, Hey, scared that better than, than me kinda attitude, better invest. So I gotta ask you that, that supports Tim's point about the management plane. And I believe on that hack or ransomware, it wasn't actually control of the pipeline. It was control over the management billing, and then they shut down the pipeline cuz they were afraid it was gonna move over. So it wasn't actually the critical infrastructure itself to your point, Tim. >>Yeah. It's hardly over the critical infrastructure, by the way, you always go through the management plane, right. It's such an easier lying effort to compromise because it runs on an endpoint it's standard endpoint. Right? All this control software will, will be easier to get to rather than the industrial hardware itself. >>Yeah. It's it's, it's interesting. Just don't make a control software at the endpoint, put it zero trust. So down that was a great point. Oh guys. So really appreciate the time and the insight and, and the white paper's called NETEC it's on the Barracuda. Netex industrial security in 2022. It's on the barracuda.com website Barracuda network guys. So let's talk about the read force event hasn't been around for a while cuz of the pandemic we're back in person what's changed in 2019 a ton it's like security years is not dog years anymore. It's probably dog times too. Right. So, so a lot's gone on where are we right now as an industry relative to the security cybersecurity. Could you guys summarize kind of the, the high order bit on where we are today in 2022 versus 2019? >>Yeah, I think, you know, if you look at the awareness around how to secure infrastructure in applications that are built in public cloud in AWS, it's, you know, exponentially better than it was. I think I remember when you and I met in 2018 at one of these conferences, you know, there were still a lot of concerns, whether, you know, IAS was safe, you know, and I think the amount of innovation that's gone on and then the amount of education and awareness around how to consume, you know, public cloud resources is amazing. And you know, I think that's facilitated a lot of the fast growth we've seen, you know, the consistent, fast growth that we've seen across all these platforms >>Say that what's your reaction to the, >>I think the shared responsibility model is well understood, you know, and, and, and, and we can see a lot more implementation around, you know, CSBM, you know, continuously auditing the configurations in these cloud environments become a, a standard table stake, you know, investment from every stage of any business, right? Whether from early state startups, all the way to, you know, public companies. So I think it's very well understood and, and the, and the investment has been steady and robust when it comes to cloud security. We've been busy, you know, you know, helping our customers and AWS Azure environments and, and others. So I, I think it's well understood. And, and, and we are on a very optimistic note actually in a good place when it comes to public cloud. >>Yeah. A lot of great momentum, a lot of scale and data act out there. People sharing data, shared responsibility. Tim is in, thank you for sharing your insights here in this cube segment coverage of reinforce here in Boston. Appreciate it. >>All right. Thanks for having >>Us. Thank you. >>Okay, everyone. Thanks for watching the we're here at the reinforced conference. AWS, Amazon web services reinforced. It's a security focused conference. I'm John furier host of the cube. We'd right back with more coverage after the short break.

Published Date : Jul 27 2022

SUMMARY :

Thanks for coming on the queue. and all this is talking about industrial, you know, critical infrastructure. Yeah, I think at a high level, you know, we did a survey and saw that, you know, here, you know, lives depend on, on these technologies, right? Well, it's great to have both of you guys on, you know, Tim, you know, you had a background at AWS and sit on your startup, Germany, you know, teleporting into your environment in Hawaii. Obviously, you know, it's a position taking trust and verifies. breakdown over time because you are able to compromise end points relatively easily further and further down, you know, down the network, right? you know, maybe some proprietary technology yeah. But in the end, you know, you're taking your controls and, So instead of being, you know, historically it was the branch or user edge, And in fact, you know, one of the things we're gonna, we're gonna talk about this survey that you guys had done by But a lot of those, you know, industrial devices, And then, you know, it creates secure connections back into these, these control applications, Cuz you know, there's a lot of surface area that's evolving all the OT stuff and the you know, some sort of SSO identity provider, you get your, you sync with your user directories, So you need to have this concept of another abstraction layer of identity I mean, that seems to be the, the approach I think like, you know, sassy to me is really about, you know, behavior is and, you know, with very fine grain control, you can, you know, So you gotta go to the new way to do that. So I'll let you go first. the new sanctions, there's at least two more countries being, you know, I think it's gonna ignite more action off the books, so to speak as that we try to talk to our customers about, you know, and this affects industrial too, is the first thing you have Yeah. I mean, obviously that's kinda a best practice when you're bad guys, like go in and delete all the backups. We also talked about in the survey, you know, you know, that, you know, people tried to do these things and didn't get off the ground. So well established manufacturing environments, you know, the, you know, the call to arms that, that, that was the big, big, you know, industrial, So I gotta ask you that, that supports Tim's point about the management plane. It's such an easier lying effort to compromise because it runs on an endpoint it's standard endpoint. Could you guys summarize kind of the, at one of these conferences, you know, there were still a lot of concerns, whether, you know, Whether from early state startups, all the way to, you know, public companies. Tim is in, thank you for sharing your insights here in this Thanks for having I'm John furier host of the cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Tim JeffersonPERSON

0.99+

AWSORGANIZATION

0.99+

Sinan ErenPERSON

0.99+

BostonLOCATION

0.99+

AmazonORGANIZATION

0.99+

HawaiiLOCATION

0.99+

GermanyLOCATION

0.99+

2018DATE

0.99+

TimPERSON

0.99+

2022DATE

0.99+

96%QUANTITY

0.99+

2019DATE

0.99+

93%QUANTITY

0.99+

John furierPERSON

0.99+

SwitzerlandLOCATION

0.99+

AustriaLOCATION

0.99+

IBMORGANIZATION

0.99+

oneQUANTITY

0.99+

north AmericaLOCATION

0.99+

Boston, MassachusettsLOCATION

0.99+

firstQUANTITY

0.99+

bothQUANTITY

0.99+

San RussiaORGANIZATION

0.99+

more than 50%QUANTITY

0.98+

Western EuropeLOCATION

0.98+

zero trustQUANTITY

0.98+

BESORGANIZATION

0.98+

three hot areasQUANTITY

0.98+

BarracudaORGANIZATION

0.97+

todayDATE

0.97+

over 95%QUANTITY

0.97+

pandemicEVENT

0.97+

APACORGANIZATION

0.97+

two exciting developmentsQUANTITY

0.97+

once a monthQUANTITY

0.97+

late ninetiesDATE

0.96+

singleQUANTITY

0.95+

one timeQUANTITY

0.94+

first thingQUANTITY

0.94+

first oneQUANTITY

0.94+

over a decadeQUANTITY

0.91+

ninetiesDATE

0.91+

SASIORGANIZATION

0.88+

NetexORGANIZATION

0.88+

zero trustQUANTITY

0.87+

three areasQUANTITY

0.86+

two great guestsQUANTITY

0.84+

AzureTITLE

0.83+

John furrierPERSON

0.83+

Cenon AronPERSON

0.83+

almost two yearsQUANTITY

0.83+

one placeQUANTITY

0.82+

North KoreaORGANIZATION

0.82+

DACATITLE

0.81+

zeroQUANTITY

0.81+

SunanPERSON

0.81+

SASORGANIZATION

0.8+

BarracudaLOCATION

0.8+

least two more countriesQUANTITY

0.79+

secondlyQUANTITY

0.77+

last 18 monthsDATE

0.75+

a tonQUANTITY

0.75+

two thousands of peopleQUANTITY

0.75+

One other approachQUANTITY

0.72+

Karl Mattson, Noname Security | AWS re:Inforce 2022


 

>>Hello, Ron. Welcome to AWS reinforce here. Live in Boston, Massachusetts. I'm John feer, host of the cube. We're here at Carl Matson. CSO at no name security. That's right, no name security, no name securities, also a featured partner at season two, episode four of our upcoming eightish startup showcase security themed event happening in the end of August. Look for that at this URL, AWS startups.com, but we're here at reinforc Carl. Thanks for joining me today. Good to see >>You. Thank you for having us, John. >>So this show security, it's not as packed as the eight of us summit was in New York. That just happened two weeks ago, 19,000 people here, more focused crowd. Lot at stake operations are under pressure. The security teams are under a lot of pressure as apps drive more and more cloud native goodness. As we say, the gen outta the bottle, people want more cloud native apps. Absolutely. That's put a lot of pressure on the ops teams and the security teams. That's the core theme here. How do you see it happening? How do you see this unfolding? Do you agree with that? And how would you describe today's event? >>Well, I think you're, you're spot on. I think the, the future of it is increasingly becoming the story of developers and APIs becoming the hero, the hero of digital transformation, the hero of public cloud adoption. And so this is really becoming much more of a developer-centric discussion about where we're moving our applications and, and where they're hosted, but also how they're designed. And so there's a lot of energy around that right now around focusing security capabilities that really appeal to the sensibilities and the needs of, of modern applications. >>I want to get to know name security a second, and let you explain what you guys do. Then I'll have a few good questions for you to kind of unpack that. But the thing about the structural change that's happened with cloud computing is kind of, and kind of in the past now, DevOps cloud scale, large scale data, the rise of the super cloud companies like snowflake capital, one there's examples of companies that don't even have CapEx investments building on the cloud. And in a way, our, the success of DevOps has created another sea of problems and opportunities that is more complexity as the benefits of DevOps and open source, continue to rise, agile applications that have value can be quantified. There's no doubt with the pandemic that's value there. Yeah. Now you have the collateral damage of success, a new opportunity to abstract away, more complexity to go to the next level. Yep. This is a big industry thing. What are the key opportunities and areas as this new environment, cuz that's the structural change happening now? Yep. What's the key dynamics right now. That's driving this new innovation and what are some of those problem areas that are gonna be abstracted away that you see? >>Well, the, the first thing I I'd suggest is is to, to lean into those structural changes and take advantage of them where they become an advantage for governance, security risk. A perfect example is automation. So what we have in microservices, applications and cloud infrastructures and new workloads like snowflake is we have workloads that want to talk, they want to be interoperated with. And because of that, we can develop new capabilities that take advantage of those of those capabilities. And, and so we want to have on our, on our security teams in particular is we wanna have the talent and the tools that are leaning into and capitalizing on exactly those strengths of, of the underlying capabilities that you're securing rather than to counter that trend, that the, the security professional needs to get ahead of it and, and be a part of that discussion with the developers and the infrastructure teams. >>And, and again, the tructure exchange could kill you too as well. I mean, some benefits, you know, data's the new oil, but end of the day it could be a problematic thing. Sure. All right. So let's get that. No names talk about the company. What you guys do, you have an interesting approach, heavily funded, good success, good buzz. What's going on with the company? Give the quick overview. >>Well, we're a company that's just under three years old and, and what APIs go back, of course, a, a decade or more. We've all been using APIs for a long time, but what's really shifted over the last couple of years is the, is the transition of, of applications and especially business critical processes to now writing on top of public facing APIs where API used to be the behind the scenes interconnection between systems. Now those APIs are exposed to their public facing. And so what we focus on as a company is looking at that API as a, as a software endpoint, just like any other endpoint in our environments that we're historically used to. That's an endpoint that needs full life cycle protection. It needs to be designed well secure coding standards for, for APIs and tested. Well, it also has to be deployed into production configured well and operated well. And when there's a misuse or an attack in progress, we have to be able to protect and identify the, the risks to that API in production. So when you add that up, we're looking at a full life cycle view of the API, and it's really it's about time because the API is not new yet. We're just starting to now to apply like actual discipline and, and practices that help keep that API secure. >>Yeah. It's interesting. It's like what I was saying earlier. They're not going anywhere. They're not going, they're the underpinning, the underlying benefit of cloud yes. Cloud native. So it's just more, more operational stability, scale growth. What are some of the challenges that, that are there and what do you guys do particularly to solve it? You're protecting it. Are you scaling it? What specifically are you guys addressing? >>But sure. So I think API security, even as a, as a discipline is not new, but I think the, the, the traditional look at API security looks only at, at the quality of the source code. Certainly quality of the source code of API is, is sort of step one. But what we see in, in practices is most of the publicly known API compromises, they weren't because of bad source code that they because of network misconfiguration or the misapplication of policy during runtime. So a great example of that would be developer designs, an API designs. It in such a way that Gar that, that enforces authentication to be well designed and strong. And then in production, those authentication policies are not applied at a gateway. So what we add to the, we add to the, to the conversation on API security is helping fill all those little gaps from design and testing through production. So we can see all of the moving parts in the, the context of the API to see how it can be exploited and, and how we can reduce risk in independent of. >>So this is really about hardening the infrastructure yep. Around cuz the developer did their job in that example. Yep. So academic API is well formed working, but something didn't happen on the network or gateway box or app, you know, some sort of network configuration or middleware configuration. >>Absolutely. So in our, in our platform, we, we essentially have sort of three functional areas. There's API code testing, and then we call next is posture management posture. Management's a real thing. If we're talking about a laptop we're talking about, is it up to date with patches? Is it configured? Well, is it secure network connectivity? The same is true with APIs. They have to be managed and cared for by somebody who's looking at their posture on the network. And then of course then there's threat defense and run time protection. So that posture management piece, that's really a new entrant into the discussion on API security. And that's really where we started as a company is focusing on that sort of acute gap of information, >>Posture, protection, >>Posture, and protection. Absolutely >>Define that. What does that, what does posture posture protection mean? How would you define that? >>Sure. I think it's a, it's identifying the inherent risk exposure of an API. Great example of that would be an API that is addressable by internal systems and external systems at the same time. Almost always. That is, that is an error. It's a mistake that's been made so well by, by identifying that misconfiguration of posture, then we can, we can protect that API by restricting the internet connectivity externally. That's just a great example of posture. We see almost every organization has that and it's never intended. >>Great, great, great call out. Thanks for sharing. All right, so I'm a customer. Yep. Okay. Look at, Hey, I already got an app firewall API gateway. Why do I need another tool? >>Well, first of all, web application firewalls are sort of essential parts of a security ecosystem. An API management gateway is usually the brain of an API economy. What we do is we, we augment those platforms with what they don't do well and also when they're not used. So for example, in, in any environment, we, we aspire to have all of our applications or APIs protected by web application firewall. First question is, are they even behind the web? Are they behind the w at all? We're gonna find that the WAFF doesn't know if it's not protecting something. And then secondary, there are attack types of business logic in particular of like authentication policy that a WAFF is not gonna be able to see. So the WAFF and the API management plan, those are the key control points and we can help make those better. >>You know what I think is cool, Carl, as you're bringing up a point that we're seeing here and we've seen before, but now it's kind of coming at the visibility. And it was mentioned in the keynote by one of the presenters, Kurt, I think it was who runs the platform. This idea of reasoning is coming into security. So the idea of knowing the topology know that there's dynamic stuff going on. I mean, topes aren't static anymore. Yep. And now you have more microservices. Yep. More APIs being turned on and off this runtime is interesting. So you starting to see this holistic view of, Hey, the secret sauce is you gotta be smarter. Yep. And that's either machine learning or AI. So, so how does that relate to what you guys do? Does it, cuz it sounds like you've got something of that going on with the product. Is that fair or yeah. >>Yeah, absolutely. So we, yeah, we talked about posture, so that's, that's really the inherent quality or secure posture of a, of an API. And now let's talk about sending traffic through that API, the request and response. When we're talking about organizations that have more APIs than they have people, employees, or, or tens of thousands, we're seeing in some customers, the only way to identify anomalous traffic is through machine learning. So we apply a machine learning model to each and every API in independently for itself because we wanna learn how that API is supposed to be behave. Where is it supposed to be talking? What kind of data is it supposed to be trafficking in, in, in all its facets. So we can model that activity and then identify the anomaly where there's a misuse, there's an attacker event. There's an, an insider employee is doing something with that API that's different. And that's really key with APIs is, is that no, a no two APIs are alike. Yeah. They really do have to be modeled individually rather than I can't share my, my threat signatures for my API, with your organization, cuz your APIs are different. And so we have to have that machine learning approach in order to really identify that >>Anomaly and watch the credentials, permissions. Absolutely all those things. All right. Take me through the life cycle of an API. There's pre-production postproduction what do I need to know about those two, those two areas with respect to what you guys do? >>Sure. So the pre-production activities are really putting in the hands of a developer or an APSEC team. The ability to test that API during its development and, and source code testing is one piece, but also in pre-production are we modeling production variables enough to know what's gonna happen when I move it into production? So it's one thing to have secure source code, of course, but then it's also, do we know how that API's gonna interact with the world once it's sort of set free? So the testing capabilities early life cycle is really how we de-risk in the long term, but we all have API ecosystems that are existing. And so in production we're applying the, all of those same testing of posture and configuration issues in runtime, but really what it, it may sound cliche to say, we wanna shift security left, but in APIs that's, that's a hundred percent true. We want to keep moving our, our issue detection to the earliest possible point in the development of an API. And that gives us the greatest return in the API, which is what we're all looking for is to capitalize on it as an agent of transformation. >>All right, let's take the customer perspective. I'm the customer, Carl, Carl, why do I need you? And how are you different from the competition? And if I like it, how do I get started? >>Sure. So the, the, the first thing that we differentiate selves from the customer is, or from our competitors is really looking at the API as an entire life cycle of activities. So whether it's from the documentation and the design and the secure source code testing that we can provide, you know, pre-development, or pre-deployment through production posture, through runtime, the differentiator really for us is being a one-stop shop for an entire API security program. And that's very important. And as that one stop shop, the, the great thing about that when having a conversation with a customer is not every customer's at the same point in their journey. And so if, if a customer discussion really focuses on their perhaps lack of confidence in their code testing, maybe somebody else has a lack of confidence in their runtime detection. We can say yes to those conversations, deliver value, and then consider other things that we can do with that customer along a whole continuum of life cycle. And so it allows us to have a customer conversation where we don't need to say, no, we don't do that. If it's an API, the answer is, yes, we do do that. And that's really where we, you know, we have an advantage, I think, in, in looking at this space and, and, and being able to talk with pretty much any customer in any vertical and having a, having a solution that, that gives them something value right away. >>And how do I get started? I like it. You sold me on, on operationalizing it. I like the one stop shop. I, my APIs are super important. I know that could be potential exposure, maybe access, and then lateral movement to a workload, all kinds of stuff could happen. Sure. How do I get started? What do I do to solve >>This? Well, no name, security.com. Of course we, we have, you know, most customers do sandboxing POVs as part of a trial period for us, especially with, you know, being here at AWS is wonderful because these are customers who's with whom we can integrate with. In a matter of minutes, we're talking about literally updating an IAM role. Permission is the complexity of implementation because cloud friendly workloads really allow us to, to do proofs of concept and value in a matter of minutes to, to achieve that value. So whether it's a, a dedicated sandbox for one customer, whether it's a full blown POC for a complicated organization, you know, whether it's here at AWS conference or, or, or Nona security.com, we would love to do a, do a, like a free demo test drive and assessment. >>Awesome. And now you guys are part of the elite alumni of our startup showcase yep. Where we feature the hot startups, obviously it's the security focuses episodes about security. You guys have been recognized by the industry and AWS as, you know, making it, making it happen. What specifically is your relationship with AWS? Are you guys doing stuff together? Cuz they're, they're clearly integrating with their partners. Yeah. I mean, they're going to companies and saying, Hey, you know what, the more we're integrated, the better security everyone gets, what are you doing with Amazon? Can you share any tidbits? You don't have to share any confidential information, but can you give us a little taste of the relationship? >>Well, so I think we have the best case scenario with our relationship with AWSs is, is as a, as a very, very small company. Most of our first customers were AWS customers. And so to develop the, the, the initial integrations with AWS, what we were able to do is have our customers, oftentimes, which are large public corporations, go to AWS and say, we need, we need that company to be through your marketplace. We need you to be a partner. And so that partnership with, with AWS has really grown from, you know, gone from zero to 60 to, you know, miles per hour in a very short period of time. And now being part of the startup program, we have a variety of ways that a customer can, can work with us from a direct purchase through the APS marketplace, through channel partners and, and VA, we really have that footprint now in AWS because our customers are there and, and they brought our customers to AWS with us. >>It's it nice. The customers pulls you to AWS. Yes. Its pulls you more customers. Yep. You get kind of intermingled there, provide the value. And certainly they got, they, they hyperscale so >>Well, that creates depth of the relationship. So for example, as AWS itself is evolving and changing new services become available. We are a part of that inner circle. So to speak, to know that we can make sure that our technology is sort of calibrated in advance of that service offering, going out to the rest of the world. And so it's a really great vantage point to be in as a startup. >>Well, Carl, the CISO for no name security, you're here on the ground. You partner with AWS. What do you think of the show this year? What's the theme. What's the top story one or two stories that you think of the most important stories that people should know about happening here in the security world? >>Well, I don't think it's any surprise that almost every booth in the, in the exhibit hall has the words cloud native associated with it. But I also think that's, that's, that's the best thing about it, which is we're seeing companies and, and I think no name is, is a part of that trend who have designed capabilities and technologies to take advantage and lean into what the cloud has to offer rather than compensating. For example, five years ago, when we were all maybe wondering, will the cloud ever be as secure as my own data center, those days are over. And we now have companies that have built highly sophisticated capabilities here in the exhibit hall that are remarkably better improvements in, in securing the cloud applications in, in our environments. So it's a, it's a real win for the cloud. It's something of a victory lap. If, if you hadn't already been there, you should be there at this point. >>Yeah. And the structural change is happening now that's clear and I'd love to get your reaction if you agree with it, is that the ops on security teams are now being pulled up to the level that the developers are succeeding at, meaning that they have to be in the boat together. Yes. >>Oh, lines of, of reporting responsibility are becoming less and less meaningful and that's a good thing. So we're having just in many conversations with developers or API management center of excellence teams to cloud infrastructure teams as we are security teams. And that's a good thing because we're finally starting to have some degree of conversions around where our interests lie in securing cloud assets. >>So developers ops security all in the boat together, sync absolutely together or win together. >>We, we, we win together, but we don't win on day one. We have to practice like we as organizations we have to, we have to rethink our, we have to rethink our tech stack. Yeah. But we also have to, you have to rethink our organizational models, our processes to get there, to get >>That in, keep the straining boat in low waters. Carl, thanks for coming on. No name security. Why the name just curious, no name. I love that name. Cause the restaurant here in Boston that used to be of all the people that know that. No name security, why no name? >>Well, it was sort of accidental at, in the, in the company's first few weeks, the there's an advisory board of CISOs who provides feedback on, on seed to seed companies on their, on their concept of, of where they're gonna build platforms. And, and so in absence of a name, the founders and the original investor filled out a form, putting no name as the name of this company that was about to develop an API security solution. Well, amongst this board of CSOs, basically there was unanimous feedback that the, what they needed to do was keep the name. If nothing else, keep the name, no name, it's a brilliant name. And that was very much accidental, really just a circumstance of not having picked one, but you know, a few weeks passed and all of a sudden they were locked in because sort of by popular vote, no name was, >>Was formed. Yeah. And now the legacy, the origination story is now known here on the cube call. Thanks for coming on. Really appreciate it. Thank you, John. Okay. We're here. Live on the floor show floor of AWS reinforced in Boston, Massachusetts. I'm John with Dave ALO. Who's out and about getting the stories in the trenches in the analyst meeting. He'll be right back with me shortly day tuned for more cube coverage. After this short break.

Published Date : Jul 26 2022

SUMMARY :

I'm John feer, host of the cube. And how would you describe today's event? developers and APIs becoming the hero, the hero of digital transformation, the hero of public cloud and kind of in the past now, DevOps cloud scale, large scale data, And because of that, we can develop new capabilities that take advantage of those of those capabilities. And, and again, the tructure exchange could kill you too as well. the risks to that API in production. What are some of the challenges that, that are there and what do you guys do particularly to So a great example of that would be developer designs, happen on the network or gateway box or app, you know, some sort of network configuration that's really a new entrant into the discussion on API security. Posture, and protection. How would you define that? systems and external systems at the same time. All right, so I'm a customer. So the WAFF and the API management plan, those are the key control points and So, so how does that relate to what you guys do? And so we have to have that machine learning approach in order to those two areas with respect to what you guys do? So it's one thing to have secure source code, of course, but then it's also, do we know how that API's And how are you different from the competition? and the design and the secure source code testing that we can provide, you know, pre-development, I like the one stop shop. the complexity of implementation because cloud friendly workloads really allow us to, to do proofs of concept and You guys have been recognized by the industry and AWS as, you know, And so that partnership with, with AWS has really grown from, you know, The customers pulls you to AWS. Well, that creates depth of the relationship. What's the top story one or two stories that you think of the most important stories capabilities here in the exhibit hall that are remarkably better improvements in, that the developers are succeeding at, meaning that they have to be in the boat together. API management center of excellence teams to cloud infrastructure teams as we are security teams. So developers ops security all in the boat together, sync absolutely together But we also have to, you have to rethink our organizational models, our processes to get there, Why the name just curious, no name. and so in absence of a name, the founders and the original investor filled Who's out and about getting the stories in the trenches

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AWSsORGANIZATION

0.99+

AWSORGANIZATION

0.99+

CarlPERSON

0.99+

AmazonORGANIZATION

0.99+

JohnPERSON

0.99+

RonPERSON

0.99+

Karl MattsonPERSON

0.99+

New YorkLOCATION

0.99+

BostonLOCATION

0.99+

KurtPERSON

0.99+

19,000 peopleQUANTITY

0.99+

Boston, MassachusettsLOCATION

0.99+

todayDATE

0.99+

First questionQUANTITY

0.99+

DevOpsTITLE

0.99+

twoQUANTITY

0.99+

tens of thousandsQUANTITY

0.99+

Dave ALOPERSON

0.99+

one pieceQUANTITY

0.99+

five years agoDATE

0.99+

two areasQUANTITY

0.99+

two storiesQUANTITY

0.99+

60QUANTITY

0.98+

two weeks agoDATE

0.98+

zeroQUANTITY

0.98+

eightishQUANTITY

0.98+

this yearDATE

0.98+

end of AugustDATE

0.97+

first customersQUANTITY

0.97+

security.comOTHER

0.96+

eightQUANTITY

0.96+

John feerPERSON

0.95+

a decadeQUANTITY

0.94+

Nona security.comORGANIZATION

0.94+

one customerQUANTITY

0.93+

day oneQUANTITY

0.93+

CapExORGANIZATION

0.93+

eachQUANTITY

0.93+

first thingQUANTITY

0.92+

WAFFTITLE

0.91+

one thingQUANTITY

0.91+

oneQUANTITY

0.9+

under three years oldQUANTITY

0.9+

first few weeksQUANTITY

0.89+

hundred percentQUANTITY

0.89+

weeksQUANTITY

0.88+

three functionalQUANTITY

0.84+

APSORGANIZATION

0.82+

pandemicEVENT

0.82+

one stopQUANTITY

0.76+

one-QUANTITY

0.74+

secondQUANTITY

0.71+

yearsDATE

0.69+

last coupleDATE

0.69+

step oneQUANTITY

0.66+

CISOsORGANIZATION

0.64+

episode fourOTHER

0.64+

2022DATE

0.63+

APSECORGANIZATION

0.62+

season twoOTHER

0.6+

Carl MatsonORGANIZATION

0.57+

everyQUANTITY

0.54+

startups.comOTHER

0.53+

IAMTITLE

0.46+

Jay Bretzmann & Philip Bues, IDC | AWS re:Inforce 2022


 

(upbeat music) >> Okay, welcome back everyone. CUBE's coverage here in Boston, Massachusetts, AWS re:inforce 22, security conference. It's AWS' big security conference. Of course, theCUBE's here, all the reinvent, reese, remars, reinforced. We cover 'em all now and the summits. I'm John Furrier, my host Dave Vellante. We have IDC weighing in here with their analysts. We've got some great guests here, Jay Bretzmann research VP at IDC and Philip Bues research manager for Cloud security. Gentlemen, thanks for coming on. >> Thank you. >> Appreciate it. Great to be here. >> Appreciate coming. >> Got a full circle, right? (all laughing) Security's more interesting than storage, isn't it? (all laughing) >> Dave and Jay worked together. This is a great segment. I'm psyched that you guys are here. We had Crawford and Matt Eastwood on at HPE Discover a while back and really the data you guys are getting and the insights are fantastic. So congratulations to IDC. You guys doing great work. We appreciate your time. I want to get your reaction to the event and the keynotes. AWS has got some posture and they're very aggressive on some tones. Some things that we didn't hear. What's your reaction to the keynote? Share your assessment. >> So, you know, I manage two different research services at IDC right now. They are both Cloud security and identity and digital security, right? And what was really interesting is the intersection between the two this morning, because every one of those speakers that came on had something to say about identity or least privileged access, or enable MFA, or make sure that you control who gets access to what and deny explicitly. And it's always been a challenge a little bit in the identity world because a lot of people don't use MFA. And in RSA, that was another big theme at the RSA conference, MFA everywhere. Why don't they use it? Because it introduces friction and all of a sudden people can't get their jobs done. And the whole point of a network is letting people on to get that data they want to get to. So that was kind of interesting, but as we have in the industry, this shared responsibility model for Cloud computing, we've got shared responsibility for between Philip and I. (Philip laughing) I have done in the past more security of the Cloud and Philip is more security in the Cloud. >> So yeah. >> And now with Cloud operation Super Cloud, as we call it, you have on premises, private Cloud coming back, or hasn't really gone anywhere, all that on premises, Cloud operations, public Cloud, and now edge exploding with new requirements. It's really an ops challenge right now. Not so much dev. So the sec and op side is hot right now. >> Yeah, well, we've made this move from monolithic to microservices based applications. And so during the keynote this morning, the announcement around the GuardDuty Malware Protection component, and that being built into the pricing of current GuardDuty, I thought was really key. And there was also a lot of talk about partnering in security certifications, which is also so very important. So we're seeing this move towards filling in that talent gap, which I think we're all aware of in the security industry. >> So Jake, square the circle for me. So Kirk Coofell talked about Amazon AWS identity, where does AWS leave off, and companies like Okta or Ping identity or Cybertruck pickup, how are they working together? Does it just create more confusion and more tools for customers? We know the overused word of seamless. >> Yeah, yeah. >> It's never seamless, so how should we think about that? >> So, identity has been around for 35 years or something like that. Started with the mainframes and all that. And if you understand the history of it, you make more sense to the current market. You have to know where people came from and the baggage they're carrying, 'cause they're still carrying a lot of that baggage. Now, when it comes to the Cloud Service providers, they're more an accommodation from the identity standpoint. Let's make it easy inside of AWS to let you single sign on to anything in the Cloud that they have, right? Let's also introduce an additional MFA capability to keep people safer whenever we can and provide people with tools, to get into those applications somewhat easily, while leveraging identities that may live somewhere else. So there's a whole lot of the world that is still active, directory-centric, right? There's another portion of companies that were born in the Cloud that were able to jump on things like Okta and some of the other providers of these universal identities in the Cloud. So, like I said, if you understand where people came from in the beginning, you start to say, "Yeah, this makes sense." >> It's interesting you talk about mainframe. I always think about Rack F, you know. And I say, "Okay, who did what, when, where?" And you hear about a lot of those themes. So what's the best practice for MFA, that's non-SMS-based? Is it you got to wear something around your neck, is it to have sort of a third party authenticator? What are people doing that you guys would recommend? >> Yeah, one quick comment about adoption of MFA. If you ask different suppliers, what percent of your base that does SSO also does MFA, one of the biggest suppliers out there, Microsoft will tell you it's under 25%. That's pretty shocking. All the messaging that's come out about it. So another big player in the market was called Duo, Cisco bought them. >> Yep. >> And because they provide networks, a lot of people buy their MFA. They have probably the most prevalent type of MFA, it's called Push. And Push can be a red X and a green check mark to your phone, it can be a QR code, somewhere, it can be an email push as well. So that is the next easiest thing to adopt after SMS. And as you know, SMS has been denigrated by NIST and others saying, it's susceptible to man and middle attacks. It's built on a telephony protocol called SS7. Predates anything, there's no certification either side. The other real dynamic and identity is the whole adoption of PKI infrastructure. As you know, certificates are used for all kinds of things, network sessions, data encryption, well, identity increasingly. And a lot of the consumers and especially the work from anywhere, people these days have access through smart devices. And what you can do there, is you can have an agent on that smart device, generate your private key and then push out a public key and so the private key never leaves your device. That's one of the most secure ways to- >> So if our SIM card gets hacked, you're not going to be as vulnerable? >> Yeah, well, the SIM card is another challenge associated with the older ways, but yeah. >> So what do you guys think about the open source connection and they mentioned it up top. Don't bolt on security, implying shift left, which is embedding it in like sneak companies, like sneak do that. Very container oriented, a lot of Kubernetes kind of Cloud native services. So I want to get your reaction to that. And then also this reasoning angle they brought up. Kind of a higher level AI reasoning decisions. So open source, and this notion of AI reasoning. or AI reason. >> And you see more open source discussion happening, so you have your building maintaining and vetting of the upstream open source code, which is critical. And so I think AWS talking about that today, they're certainly hitting on a nerve, as you know, open source continues to proliferate. Around the automated reasoning, I think that makes sense. You want to provide guide rails and you want to provide roadmaps and you want to have sort of that guidance as to, okay, what's a correlation analysis of different tools and products? And so I think that's going to go over really well, yeah. >> One of the other key points about open source is, everybody's in a multi-cloud world, right? >> Yeah. >> And so they're worried about vendor lock in. They want an open source code base, so that they don't experience that. >> Yeah, and they can move the code around, and make sure it works well on each system. Dave and I were just talking about some of the dynamics around data control planes. So they mentioned encrypt everything which is great and I message by the way, I love that one. But oh, and he mentioned data at rest. I'm like, "What about data in flight? "Didn't hear that one." So one of the things we're seeing with SuperCloud, and now multi-cloud kind of as destinations of that, is that in digital transformation, customers are leaning into owning their data flows. >> Yeah. >> Independent of say the control plane aspects of what could come in. This is huge implications for security, where sharing data is huge, even Schmidt on stage said, we have billions and billions of things happening that we see things that no one else sees. So that implies, they're sharing- >> Quad trillion. >> Trillion, 15 zeros. (Jay laughs) >> 15 zeros. >> So that implies they're sharing that or using that pushing that into something. So sharing is huge with cyber security. So that implies open data, data flows. How do you guys see this evolving? I know it's kind of emerging, but it's becoming a nuanced point, that's critical to the architecture. >> Well, yeah, I think another way to look at that is the sharing of intelligence and some of the recent directives, from the executive branch, making it easier for private companies to share data and intelligence, which I think strengthens the cyber community overall. >> Depending upon the supplier, it's either an aggregate level of intelligence that has been anonymized or it's specific intelligence for your environment that everybody's got a threat feed, maybe two or three, right? (John laughs) But back to the encryption point, I mean, I was working for an encryption startup for a little while after I left IBM, and the thing is that people are scared of it. They're scared of key management and rotation. And so when you provide- >> Because they might lose the key. >> Exactly. >> Yeah. >> It's like shooting yourself in the foot, right? So that's when you have things like, KMS services from Amazon and stuff that really help out a lot. And help people understand, okay, I'm not alone in this. >> Yeah, crypto owners- >> They call that hybrid, the hybrid key, they don't know how they call the data, they call it the hybrid. What was that? >> Key management service? >> The hybrid- >> Oh, hybrid HSM, correct? >> Yeah, what is that? What is that? I didn't get that. I didn't understand what he meant by the hybrid post quantum key agreement. >> Hybrid post quantum key exchange. >> AWS never made a product name that didn't have four words in it. (John laughs) >> But he did reference the new NIST algos. And I think I inferred that they were quantum proof or they claim to be, and AWS was testing those. >> Correct, yeah. >> So that was kind of interesting, but I want to come back to identity for a second. So, this idea of bringing traditional IAM and Privileged Access Management together, is that a pipe dream, is that something that is actually going to happen? What's the timeframe, what's your take on that? >> So, there are aspects of privilege in every sort of identity. Back when it was only the back office that used computers for calculations, right? Then you were able to control how many people had access. There were two types of users, admins and users. These days, everybody has some aspect of- >> It's a real spectrum, really. >> Yeah. >> Granular. >> You got the C-suite, the finance people, the DevOps people, even partners and whatever. They all need some sort of privileged access, and the term you hear so much is least-privileged access, right? Shut it down, control it. So, in some of my research, I've been saying that vendors who are in the PAM space, Privilege Access Management space, will probably be growing their suites, playing a bigger role, building out a stack, because they have the expertise and the perspective that says, "We should control this better." How do we do that, right? And we've been seeing that recently. >> Is that a combination of old kind of antiquated systems meets for proprietary hyper scale, or kind of like build your own? 'Cause I mean, Amazon, these guys, Facebook, they all build their own stuff. >> Yes, they do. >> Then enterprises buy services from general purpose identity management systems. >> So as we were talking about knowing the past and whatever, Privileged Access Management used to be about compliance reporting. Just making sure that I knew who accessed what? And could prove it, so I didn't fail at all. >> It wasn't a critical infrastructure item. >> No, and now these days, what it's transitioning into, is much more risk management, okay. I know what our risk is, I'm ahead of it. And the other thing in the PAM space, was really session monitor. Everybody wanted to watch every keystroke, every screen's scrape, all that kind of stuff. A lot of the new Privileged Access Management, doesn't really require that. It's a nice to have feature. You kind of need it on the list, but is anybody really going to implement it? That's the question, right. And then if you do all that session monitoring, does anybody ever go back and look at it? There's only so many hours in the day. >> How about passwordless access? (Jay laughs) I've heard people talk about that. I mean, that's as a user, I can't wait but- >> Well, it's somewhere we want to all go. We all want identity security to just disappear and be recognized when we log in. So the thing with passwordless is, there's always a password somewhere. And it's usually part of a registration action. I'm going to register my device with a username password, and then beyond that I can use my biometrics, right? I want to register my device and get a private key, that I can put in my enclave, and I'll use that in the future. Maybe it's got to touch ID, maybe it doesn't, right? So even though there's been a lot of progress made, it's not quote, unquote, truly passwordless. There's a group, industry standards group called Fido. Which is Fast Identity Online. And what they realized was, these whole registration passwords, that's really a single point of failure. 'Cause if I can't recover my device, I'm in trouble. So they just did new extension to sort of what they were doing, which provides you with much more of like an iCloud vault that you can register that device in and other devices associated with that same identity. >> Get you to it if you have to. >> Exactly. >> I'm all over the place here, but I want to ask about ransomware. It may not be your wheelhouse. But back in the day, Jay, remember you used to cover tape. All the backup guys now are talking about ransomware. AWS mentioned it today and they showed a bunch of best practices and things you can do. Air gaps wasn't one of them. I was really surprised 'cause that's all every anybody ever talks about is air gaps and a lot of times that air gap could be a guess to the Cloud, I guess, I'm not sure. What are you guys seeing on ransomware apps? >> We've done a lot of great research around ransomware as a service and ransomware, and we just had some data come out recently, that I think in terms of spending and spend, and as a result of the Ukraine-Russia war, that ransomware assessments rate number one. And so it's something that we encourage, when we talk to vendors and in our services, in our publications that we write about taking advantage of those free strategic ransomware assessments, vulnerability assessments, as well and then security and training ranked very highly as well. So, we want to make sure that all of these areas are being funded well to try and stay ahead of the curve. >> Yeah, I was surprised to not see air gaps on the list, that's all everybody talks about. >> Well, the old model for air gaping in the land days, the novel days, you took your tapes home and put them in the sock drawer. (all laughing) >> Well, it's a form of air gap. (all laughing) >> Security and no one's going to go there and clean out. >> And then the internet came around and ruined it. >> Guys, final question we want to ask you, guys, we kind of zoom out, great commentary by the way. Appreciate it. We've seen this in many markets, a collection of tools emerge and then there's its tool sprawl. So cyber we're seeing the trend now where mon goes up on stage of all the ecosystems, probably other vendors doing the same thing where they're organizing a platform on top of AWS to be this super platform, for super Cloud capability by building a more platform thing. So we're saying there's a platform war going on, 'cause customers don't want the complexity. I got a tool but it's actually making it more complex if I buy the other tool. So the tool sprawl becomes a problem. How do you guys see this? Do you guys see this platform emerging? I mean tools won't go away, but they have to be easier. >> Yeah, we do see a consolidation of functionality and services. And we've been seeing that, I think through a 2020 Cloud security survey that we released that was definitely a trend. And that certainly happened for many companies over the last six to 24 months, I would say. And then platformization absolutely is something we talk and write about all the time so... >> Couple of years ago, I called the Amazon tool set an erector set because it really required assembly. And you see the emphasis on training here too, right? You definitely need to go to AWS University to be competent. >> It wasn't Lego blocks yet. >> No. >> It was erector set. >> Yeah. >> Very good distinction. >> Loose. >> And you lose a few. (chuckles) >> But still too many tools, right? You see, we need more consolidation. It's getting interesting because a lot of these companies have runway and you look at sale point at stock prices held up 'cause of the Thoma Bravo acquisition, but all the rest of the cyber stocks have been crushed especially the high flyers, like a Sentinel-1 one or a CrowdStrike, but just still M and A opportunity. >> So platform wars. Okay, final thoughts. What do you, think is happening next? What's your outlook for the next year or so? >> So, in the identity space, I'll talk about, Philip can cover Cloud for us. It really is more consolidation and more adoption of things that are beyond simple SSO. It was, just getting on the systems and now we really need to control what you're able to get to and who you are. And do it as transparently as we possibly can, because otherwise, people are going to lose productivity. They're not going to be able to get to what they want. And that's what causes the C-suite to say, "Wait a minute," DevOps, they want to update the product every day. Make it better. Can they do that or did security get in the way? People, every once in a while call security, the Department of No, right? >> They ditch it on stage. They want to be the Department of Yes. >> Exactly. >> Yeah. >> And the department that creates additional value. If you look at what's going on with B2C or CIAM, consumer oriented identity, that is all about opening up new direct channels and treating people like their old friends, not like you don't know them, you have to challenge them. >> We always say, you want to be in the boat together, it sinks or not. >> Yeah. Exactly. >> Philip I'm glad- >> Okay, what's your take? What's your outlook for the year? >> Yeah, I think, something that we've been seeing as consolidation and integration, and so companies looking at from built time to run time, investing in shift left infrastructure is code. And then also in the runtime detection, makes perfect sense to have both the agent and agent lists so that you're covering any of the gaps that might exist. >> Awesome, Jay Phillip, thanks for coming on "theCUBE" with IDC and sharing your- >> Oh, our pleasure- >> Perspective, commentary and insights and outlook. Appreciate it. >> You bet. >> Thank you. >> Okay, we've got the great direction here from IDC analyst here on the queue. I'm John Furrier, Dave Vellante. Be back more after this short break. (bright upbeat music)

Published Date : Jul 26 2022

SUMMARY :

We cover 'em all now and the summits. Great to be here. and the insights are fantastic. and Philip is more security in the Cloud. So the sec and op side is hot right now. and that being built into the So Jake, square the circle for me. and some of the other providers And you hear about a lot of those themes. the market was called Duo, And a lot of the consumers card is another challenge So what do you guys think of the upstream open source so that they don't experience that. and I message by the way, I love that one. the control plane aspects (Jay laughs) So that implies they're sharing that and some of the recent directives, and the thing is that and stuff that really help out a lot. the hybrid key, by the hybrid post quantum key agreement. that didn't have four words in it. the new NIST algos. So that was kind that used computers for and the term you hear so much Is that a combination of old identity management systems. about knowing the past and whatever, It wasn't a critical You kind of need it on the list, I mean, that's as a So the thing with passwordless is, But back in the day, Jay, and stay ahead of the curve. not see air gaps on the list, air gaping in the land days, Well, it's a form of air gap. Security and no one's going And then the internet of all the ecosystems, over the last six to I called the Amazon And you lose a few. 'cause of the Thoma Bravo acquisition, the next year or so? So, in the identity space, They ditch it on stage. And the department that We always say, you want of the gaps that might exist. and insights and outlook. analyst here on the queue.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavePERSON

0.99+

Dave VellantePERSON

0.99+

AWSORGANIZATION

0.99+

Matt EastwoodPERSON

0.99+

AmazonORGANIZATION

0.99+

Jay BretzmannPERSON

0.99+

Jay PhillipPERSON

0.99+

CiscoORGANIZATION

0.99+

John FurrierPERSON

0.99+

AWS'ORGANIZATION

0.99+

FacebookORGANIZATION

0.99+

IBMORGANIZATION

0.99+

JayPERSON

0.99+

Philip BuesPERSON

0.99+

JohnPERSON

0.99+

PhilipPERSON

0.99+

15 zerosQUANTITY

0.99+

MicrosoftORGANIZATION

0.99+

threeQUANTITY

0.99+

Kirk CoofellPERSON

0.99+

each systemQUANTITY

0.99+

Quad trillionQUANTITY

0.99+

IDCORGANIZATION

0.99+

JakePERSON

0.99+

NISTORGANIZATION

0.99+

CrawfordPERSON

0.99+

next yearDATE

0.99+

twoQUANTITY

0.98+

OktaORGANIZATION

0.98+

CIAMORGANIZATION

0.98+

under 25%QUANTITY

0.98+

bothQUANTITY

0.98+

B2CORGANIZATION

0.98+

two typesQUANTITY

0.98+

Thoma BravoORGANIZATION

0.98+

OneQUANTITY

0.98+

CUBEORGANIZATION

0.98+

FidoORGANIZATION

0.97+

CybertruckORGANIZATION

0.97+

Department of NoORGANIZATION

0.97+

2020DATE

0.96+

RSATITLE

0.96+

TrillionQUANTITY

0.96+

AWS UniversityORGANIZATION

0.95+

35 yearsQUANTITY

0.95+

todayDATE

0.95+

Couple of years agoDATE

0.95+

oneQUANTITY

0.95+

this morningDATE

0.95+

SchmidtPERSON

0.94+

LegoORGANIZATION

0.94+

Boston, MassachusettsLOCATION

0.93+

single pointQUANTITY

0.92+

iCloudTITLE

0.91+

Ukraine-Russia warEVENT

0.9+

PhilipORGANIZATION

0.9+

Rack FORGANIZATION

0.89+

billions andQUANTITY

0.89+

one quick commentQUANTITY

0.88+

24 monthsQUANTITY

0.85+

MFATITLE

0.84+

two different research servicesQUANTITY

0.84+

four wordsQUANTITY

0.83+

Ameesh Divatia, Baffle | AWS re:Inforce 2022


 

(upbeat music) >> Okay, welcome back everyone in live coverage here at theCUBE, Boston, Massachusetts, for AWS re:inforce 22 security conference for Amazon Web Services. Obviously reinvent the end of the years' the big celebration, "re:Mars" is the new show that we've covered as well. The res are here with theCUBE. I'm John Furrier, host with a great guest, Ameesh Divatia, co-founder, and CEO of a company called "Baffle." Ameesh, thanks for joining us on theCUBE today, congratulations. >> Thank you. It's good to be here. >> And we got the custom encrypted socks. >> Yup, limited edition >> 64 bitter 128. >> Base 64 encoding. >> Okay.(chuckles) >> Secret message in there. >> Okay.(chuckles) Secret message.(chuckles) We'll have to put a little meme on the internet, figure it out. Well, thanks for comin' on. You guys are goin' hot right now. You guys a hot startup, but you're in an area that's going to explode, we believe. >> Yeah. >> The SuperCloud is here, we've been covering that on theCUBE that people are building on top of the Amazon Hyperscalers. And without the capex, they're building platforms. The application tsunami has come and still coming, it's not stopping. Modern applications are faster, they're better, and they're driving a lot of change under the covers. >> Absolutely. Yeah. >> And you're seeing structural change happening in real time, in ops, the network. You guys got something going on in the encryption area. >> Yes >> Data. Talk about what you guys do. >> Yeah. So we believe very strongly that the next frontier in security is data. We've had multiple waves in security. The next one is data, because data is really where the threats will persist. If the data shows up in the wrong place, you get into a lot of trouble with compliance. So we believe in protecting the data all the way down at the field, or record level. That's what we do. >> And you guys doing all kinds of encryption, or other things? >> Yes. So we do data transformation, which encompasses three different things. It can be tokenization, which is format preserving. We do real encryption with counter mode, or we can do masked views. So tokenization, encryption, and masking, all with the same platform. >> So pretty wide ranging capabilities with respect to having that kind of safety. >> Yes. Because it all depends on how the data is used down the road. Data is created all the time. Data flows through pipelines all the time. You want to make sure that you protect the data, but don't lose the utility of the data. That's where we provide all that flexibility. >> So Kurt was on stage today on one of the keynotes. He's the VP of the platform at AWS. >> Yes. >> He was talking about encrypts, everything. He said it needs, we need to rethink encryption. Okay, okay, good job. We like that. But then he said, "We have encryption at rest." >> Yes. >> That's kind of been there, done that. >> Yes. >> And, in-flight? >> Yeah. That's been there. >> But what about in-use? >> So that's exactly what we plug. What happens right now is that data at rest is protected because of discs that are already self-encrypting, or you have transparent data encryption that comes native with the database. You have data in-flight that is protected because of SSL. But when the data is actually being processed, it's in the memory of the database or datastore, it is exposed. So the threat is, if the credentials of the database are compromised, as happened back then with Starwood, or if the cloud infrastructure is compromised with some sort of an insider threat like a Capital One, that data is exposed. That's precisely what we solve by making sure that the data is protected as soon as it's created. We use standard encryption algorithms, AES, and we either do format preserving, or true encryption with counter mode. And that data, it doesn't really matter where it ends up, >> Yeah. >> because it's always protected. >> Well, that's awesome. And I think this brings up the point that we want been covering on SiliconAngle in theCUBE, is that there's been structural change that's happened, >> Yes. >> called cloud computing, >> Yes. >> and then hybrid. Okay. Scale, role of data, higher level abstraction of services, developers are in charge, value creations, startups, and big companies. That success is causing now, a new structural change happening now. >> Yes. >> This is one of them. What areas do you see that are happening right now that are structurally changing, that's right in front of us? One is, more cloud native. So the success has become now the problem to solve - >> Yes. >> to get to the next level. >> Yeah. >> What are those, some of those? >> What we see is that instead of security being an afterthought, something that you use as a watchdog, you create ways of monitoring where data is being exposed, or data is being exfiltrated, you want to build security into the data pipeline itself. As soon as data is created, you identify what is sensitive data, and you encrypt it, or tokenize it as it flows into the pipeline using things like Kafka plugins, or what we are very clearly differentiating ourselves with is, proxy architectures so that it's completely transparent. You think you're writing to the datastore, but you're actually writing to the proxy, which in turn encrypts the data before its stored. >> Do you think that's an efficient way to do it, or is the only way to do it? >> It is a much more efficient way of doing it because of the fact that you don't need any app-dev resources. There are many other ways of doing it. In fact, the cloud vendors provide development kits where you can just go do it yourself. So that is actually something that we completely avoid. And what makes it really, really interesting is that once the data is encrypted in the data store, or database, we can do what is known as "Privacy Enhanced Computation." >> Mm. >> So we can actually process that data without decrypting it. >> Yeah. And so proxies then, with cloud computing, can be very fast, not a bottleneck that could be. >> In fact, the cloud makes it so. It's very hard to - >> You believe that? >> do these things in static infrastructure. In the cloud, there's infinite amount of processing available, and there's containerization. >> And you have good network. >> You have very good network, you have load balancers, you have ways of creating redundancy. >> Mm. So the cloud is actually enabling solutions like this. >> And the old way, proxies were seen as an architectural fail, in the old antiquated static web. >> And this is where startups don't have the baggage, right? We didn't have that baggage. (John laughs) We looked at the problem and said, of course we're going to use a proxy because this is the best way to do this in an efficient way. >> Well, you bring up something that's happening right now that I hear a lot of CSOs and CIOs and executives say, CXOs say all the time, "Our", I won't say the word, "Our stuff has gotten complicated." >> Yes. >> So now I have tool sprawl, >> Yeah. >> I have skill gaps, and on the rise, all these new managed services coming at me from the vendors who have never experienced my problem. And their reaction is, they don't get my problem, and they don't have the right solutions, it's more complexity. They solve the complexity by adding more complexity. >> Yes. I think we, again, the proxy approach is a very simple. >> That you're solving that with that approach. >> Exactly. It's very simple. And again, we don't get in the way. That's really the the biggest differentiator. The forcing function really here is compliance, right? Because compliance is forcing these CSOs to actually adopt these solutions. >> All right, so love the compliance angle, love the proxy as an ease of use, take the heavy lifting away, no operational problems, and deviations. Now let's talk about workloads. >> Yeah. >> 'Cause this is where the use is. So you got, or workloads being run large scale, lot a data moving around, computin' as well. What's the challenge there? >> I think it's the volume of the data. Traditional solutions that we're relying on legacy tokenizations, I think would replicate the entire storage because it would create a token wall, for example. You cannot do that at this scale. You have to do something that's a lot more efficient, which is where you have to do it with a cryptography approach. So the workloads are diverse, lots of large files in the workloads as well as structured workloads. What we have is a solution that actually goes across the board. We can do unstructured data with HTTP proxies, we can do structured data with SQL proxies. And that's how we are able to provide a complete solution for the pipeline. >> So, I mean, show about the on-premise versus the cloud workload dynamic right now. Hybrid is a steady state right now. >> Yeah. >> Multi-cloud is a consequence of having multiple vendors, not true multi-cloud but like, okay, they have Azure there, AWS here, I get that. But hybrid really is the steady state. >> Yes. >> Cloud operations. How are the workloads and the analytics the data being managed on-prem, and in the cloud, what's their relationship? What's the trend? What are you seeing happening there? >> I think the biggest trend we see is pipelining, right? The new ETL is streaming. You have these Kafka and Kinesis capabilities that are coming into the picture where data is being ingested all the time. It is not a one time migration. It's a stream. >> Yeah. >> So plugging into that stream is very important from an ingestion perspective. >> So it's not just a watchdog. >> No. >> It's the pipelining. >> It's built in. It's built-in, it's real time, that's where the streaming gets another diverse access to data. >> Exactly. >> Data lakes. You got data lakes, you have pipeline, you got streaming, you mentioned that. So talk about the old school OLTP, the old BI world. I think Power BI's like a $30 billion product. >> Yeah. >> And you got Tableau built on OLTP building cubes. Aren't we just building cubes in a new way, or, >> Well. >> is there any relevance to the old school? >> I think there, there is some relevance and in fact that's again, another place where the proxy architecture really helps, because it doesn't matter when your application was built. You can use Tableau, which nobody has any control over, and still process encrypted data. And so can with Power BI, any Sequel application can be used. And that's actually exactly what we like to. >> So we were, I was talking to your team, I knew you were coming on, and they gave me a sound bite that I'm going to read to the audience and I want to get your reaction to. >> Sure. >> 'Cause I love this. I fell out of my chair when I first read this. "Data is the new oil." In 2010 that was mentioned here on theCUBE, of course. "Data is the new oil, but we have to ensure that it does not become the next asbestos." Okay. That is really clever. So we all know about asbestos. I add to the Dave Vellante, "Lead paint too." Remember lead paint? (Ameesh laughs) You got to scrape it out and repaint the house. Asbestos obviously causes a lot of cancer. You know, joking aside, the point is, it's problematic. >> It's the asset. >> Explain why that sentence is relevant. >> Sure. It's the assets and liabilities argument, right? You have an asset which is data, but thanks to compliance regulations and Gartner says 75% of the world will be subject to privacy regulations by 2023. It's a liability. So if you don't store your data well, if you don't process your data responsibly, you are going to be liable. So while it might be the oil and you're going to get lots of value out of it, be careful about the, the flip side. >> And the point is, there could be the "Grim Reaper" waiting for you if you don't do it right, the consequences that are quantified would be being out of business. >> Yes. But here's something that we just discovered actually from our survey that we did. While 93% of respondents said that they have had lots of compliance related effects on their budgets. 75% actually thought that it makes them better. They can use the security postures as a competitive differentiator. That's very heartening to us. We don't like to sell the fear aspect of this. >> Yeah. We like to sell the fact that you look better compared to your neighbor, if you have better data hygiene, back to the. >> There's the fear of missing out, or as they say, "Keeping up with the Joneses", making sure that your yard looks better than the next one. I get the vanity of that, but you're solving real problems. And this is interesting. And I want to get your thoughts on this. I found, I read that you guys protect more than a 100 billion records across highly regulated industries. Financial services, healthcare, industrial IOT, retail, and government. Is that true? >> Absolutely. Because what we are doing is enabling SaaS vendors to actually allow their customers to control their data. So we've had the SaaS vendor who has been working with us for over three years now. They store confidential data from 30 different banks in the country. >> That's a lot of records. >> That's where the record, and. >> How many customers do you have? >> Well, I think. >> The next round of funding's (Ameesh laughs) probably they're linin' up to put money into you guys. >> Well, again, this is a very important problem, and there are, people's businesses are dependent on this. We're just happy to provide the best tool out there that can do this. >> Okay, so what's your business model behind? I love the success, by the way, I wanted to quote that stat to one verify it. What's the business model service, software? >> The business model is software. We don't want anybody to send us their confidential data. We embed our software into our customers environments. In case of SaaS, we are not even visible, we are completely embedded. We are doing other relationships like that right now. >> And they pay you how? >> They pay us based on the volume of the data that they're protecting. >> Got it. >> That in that case which is a large customers, large enterprise customers. >> Pay as you go. >> It is pay as you go, everything is annual licenses. Although, multi-year licenses are very common because once you adopt the solution, it is very sticky. And then for smaller customers, we do base our pricing also just on databases. >> Got it. >> The number of databases. >> And the technology just reviewed low-code, no-code implementation kind of thing, right? >> It is by definition, no code when it comes to proxy. >> Yeah. >> When it comes to API integration, it could be low code. Yeah, it's all cloud-friendly, cloud-native. >> No disruption to operations. >> Exactly. >> That's the culprit. >> Well, yeah. >> Well somethin' like non-disruptive operations.(laughs) >> No, actually I'll give an example of a migration, right? We can do live migrations. So while the databases are still alive, as you write your. >> Live secure migrations. >> Exactly. You're securing - >> That's the one that manifests. >> your data as it migrates. >> Awright, so how much funding have you guys raised so far? >> We raised 36 and a half, series A, and B now. We raised that late last year. >> Congratulations. >> Thank you. >> Who's the venture funders? >> True Ventures is our largest investor, followed by Celesta Capital, National Grid Partners is an investor, and so is Engineering Capital and Clear Vision Ventures. >> And the seed and it was from Engineering? >> Seed was from Engineering. >> Engineering Capital. >> And then True came in very early on. >> Okay. >> Greenspring is also an investor in us, so is Industrial Ventures. >> Well, privacy has a big concern, big application for you guys. Privacy, secure migrations. >> Very much so. So what we are believe very strongly in the security's personal, security is yours and my data. Privacy is what the data collector is responsible for. (John laughs) So the enterprise better be making sure that they've complied with privacy regulations because they don't tell you how to protect the data. They just fine you. >> Well, you're not, you're technically long, six year old start company. Six, seven years old. >> Yeah. >> Roughly. So yeah, startups can go on long like this, still startup, privately held, you're growing, got big records under management there, congratulations. What's next? >> I think scaling the business. We are seeing lots of applications for this particular solution. It's going beyond just regulated industries. Like I said, it's a differentiating factor now. >> Yeah >> So retail, and a lot of other IOT related industrial customers - >> Yeah. >> are also coming. >> Ameesh, talk about the show here. We're at re:inforce, actually we're live here on the ground, the show floor buzzing. What's your takeaway? What's the vibe this year? What if you had to share what your opinion the top story here at the show, what would be the two top things, or three things? >> I think it's two things. First of all, it feels like we are back. (both laugh) It's amazing to see people on the show floor. >> Yeah. >> People coming in and asking questions and getting to see the product. The second thing that I think is very gratifying is, people come in and say, "Oh, I've heard of you guys." So thanks to digital media, and digital marketing. >> They weren't baffled. They want baffled. >> Exactly. >> They use baffled. >> Looks like, our outreach has helped, >> Yeah. >> and has kept the continuity, which is a big deal. >> Yeah, and now you're a CUBE alumni, welcome to the fold. >> Thank you. >> Appreciate you coming on. And we're looking forward to profiling you some day in our startup showcase, and certainly, we'll see you in the Palo Alto studios. Love to have you come in for a deeper dive. >> Sounds great. Looking forward to it. >> Congratulations on all your success, and thanks for coming on theCUBE, here at re:inforce. >> Thank you, John. >> Okay, we're here in, on the ground live coverage, Boston, Massachusetts for AWS re:inforce 22. I'm John Furrier, your host of theCUBE with Dave Vellante, who's in an analyst session, right? He'll be right back with us on the next interview, coming up shortly. Thanks for watching. (gentle music)

Published Date : Jul 26 2022

SUMMARY :

is the new show that we've It's good to be here. meme on the internet, that people are building on Yeah. on in the encryption area. Talk about what you guys do. strongly that the next frontier So tokenization, encryption, and masking, that kind of safety. Data is created all the time. He's the VP of the platform at AWS. to rethink encryption. by making sure that the data is protected the point that we want been and then hybrid. So the success has become now the problem into the data pipeline itself. of the fact that you don't without decrypting it. that could be. In fact, the cloud makes it so. In the cloud, you have load balancers, you have ways Mm. So the cloud is actually And the old way, proxies were seen don't have the baggage, right? say, CXOs say all the time, and on the rise, all these the proxy approach is a very solving that with that That's really the love the proxy as an ease of What's the challenge there? So the workloads are diverse, So, I mean, show about the But hybrid really is the steady state. and in the cloud, what's coming into the picture So plugging into that gets another diverse access to data. So talk about the old school OLTP, And you got Tableau built the proxy architecture really helps, bite that I'm going to read "Data is the new oil." that sentence is relevant. 75% of the world will be And the point is, there could from our survey that we did. that you look better compared I get the vanity of that, but from 30 different banks in the country. up to put money into you guys. provide the best tool out I love the success, In case of SaaS, we are not even visible, the volume of the data That in that case It is pay as you go, It is by definition, no When it comes to API like still alive, as you write your. Exactly. That's the one that We raised that late last year. True Ventures is our largest investor, Greenspring is also an investor in us, big application for you guys. So the enterprise better be making sure Well, you're not, So yeah, startups can I think scaling the business. Ameesh, talk about the show here. on the show floor. see the product. They want baffled. and has kept the continuity, Yeah, and now you're a CUBE alumni, in the Palo Alto studios. Looking forward to it. and thanks for coming on the ground live coverage,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
KurtPERSON

0.99+

Dave VellantePERSON

0.99+

AmeeshPERSON

0.99+

John FurrierPERSON

0.99+

AWSORGANIZATION

0.99+

2010DATE

0.99+

National Grid PartnersORGANIZATION

0.99+

JohnPERSON

0.99+

six yearQUANTITY

0.99+

Engineering CapitalORGANIZATION

0.99+

$30 billionQUANTITY

0.99+

SixQUANTITY

0.99+

Celesta CapitalORGANIZATION

0.99+

Ameesh DivatiaPERSON

0.99+

75%QUANTITY

0.99+

Clear Vision VenturesORGANIZATION

0.99+

93%QUANTITY

0.99+

30 different banksQUANTITY

0.99+

GreenspringORGANIZATION

0.99+

True VenturesORGANIZATION

0.99+

TrueORGANIZATION

0.99+

todayDATE

0.99+

2023DATE

0.99+

Amazon Web ServicesORGANIZATION

0.99+

Palo AltoLOCATION

0.99+

oneQUANTITY

0.99+

two thingsQUANTITY

0.99+

GartnerORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

bothQUANTITY

0.99+

Power BITITLE

0.98+

seven yearsQUANTITY

0.98+

over three yearsQUANTITY

0.98+

Dave VellantePERSON

0.98+

FirstQUANTITY

0.98+

theCUBEORGANIZATION

0.98+

TableauTITLE

0.98+

firstQUANTITY

0.97+

three thingsQUANTITY

0.97+

36 and a halfQUANTITY

0.97+

second thingQUANTITY

0.97+

one timeQUANTITY

0.97+

series AOTHER

0.97+

this yearDATE

0.96+

late last yearDATE

0.96+

BaffleORGANIZATION

0.96+

Capital OneORGANIZATION

0.96+

Industrial VenturesORGANIZATION

0.96+

128QUANTITY

0.95+

Boston,LOCATION

0.95+

KafkaTITLE

0.95+

more than a 100 billion recordsQUANTITY

0.95+

StarwoodORGANIZATION

0.94+

two top thingsQUANTITY

0.93+

Boston, MassachusettsLOCATION

0.93+

CUBEORGANIZATION

0.91+

SQLTITLE

0.89+

re:MarsTITLE

0.88+

capexORGANIZATION

0.87+

three different thingsQUANTITY

0.86+

OneQUANTITY

0.85+

64QUANTITY

0.83+

AzureTITLE

0.83+

HyperscalersCOMMERCIAL_ITEM

0.82+

OLTPTITLE

0.8+

MassachusettsLOCATION

0.67+

re:inforce 22 security conferenceEVENT

0.65+

SiliconAngleORGANIZATION

0.59+

ComputationOTHER

0.55+

SuperCloudORGANIZATION

0.55+

SequelTITLE

0.53+

KinesisORGANIZATION

0.48+

2022DATE

0.41+

JonesesTITLE

0.27+

Denise Hayman, Sonrai Security | AWS re:Inforce 2022


 

(bright music) >> Welcome back everyone to the live Cube coverage here in Boston, Massachusetts for AWS re:Inforce 22, with a great guest here, Denise Hayman, CRO, Chief Revenue of Sonrai Security. Sonrai's a featured partner of Season Two, Episode Four of the upcoming AWS Startup Showcase, coming in late August, early September. Security themed startup focused event, check it out. awsstartups.com is the site. We're on Season Two. A lot of great startups, go check them out. Sonrai's in there, now for the second time. Denise, it's great to see you. Thanks for coming on. >> Ah, thanks for having me. >> So you've been around the industry for a while. You've seen the waves of innovation. We heard encrypt everything today on the keynote. We heard a lot of cloud native. They didn't say shift left but they said don't bolt on security after the fact, be in the CI/CD pipeline or the DevStream. All that's kind of top of line, Amazon's talking cloud native all the time. This is kind of what you guys are in the middle of. I've covered your company, you've been on theCUBE before. Your, not you, but your teammates have. You guys have a unique value proposition. Take a minute to explain for the folks that don't know, we'll dig into it, but what you guys are doing. Why you're winning. What's the value proposition. >> Yeah, absolutely. So, Sonrai is, I mean what we do is it's, we're a total cloud solution, right. Obviously, right, this is what everybody says. But what we're dealing with is really, our superpower has to do with the data and identity pieces within that framework. And we're tying together all the relationships across the cloud, right. And this is a unique thing because customers are really talking to us about being able to protect their sensitive data, protect their identities. And not just people identities but the non-people identity piece is the hardest thing for them to reign in. >> Yeah. >> So, that's really what we specialize in. >> And you guys doing good, and some good reports on good sales, and good meetings happening here. Here at the show, the big theme to me, and again, listening to the keynotes, you hear, you can see what's, wasn't talk about. >> Mm-hmm. >> Ransomware wasn't talked about much. They didn't talk about air-gapped. They mentioned ransomware I think once. You know normal stuff, teamwork, encryption everywhere. But identity was sprinkled in everywhere. >> Mm-hmm. >> And I think one of the, my favorite quotes was, I wrote it down, We've security in the development cycle CSD, they didn't say shift left. Don't bolt on any of that. Now, that's not new information. We know that don't bolt, >> Right. >> has been around for a while. He said, lessons learned, this is Stephen Schmidt, who's the CSO, top dog on security, who has access to what and why over permissive environments creates chaos. >> Absolutely. >> This is what you guys reign in. >> It is. >> Explain, explain that. >> Yeah, I mean, we just did a survey actually with AWS and Forrester around what are all the issues in this area that, that customers are concerned about and, and clouds in particular. One of the things that came out of it is like 95% of clouds are, what's called over privileged. Which means that there's access running amok, right. I mean, it, it is, is a crazy thing. And if you think about the, the whole value proposition of security it's to protect sensitive data, right. So if, if it's permissive out there and then sensitive data isn't being protected, I mean that, that's where we really reign it in. >> You know, it's interesting. I zoom out, I just put my historian hat on going back to the early days of my career in late eighties, early nineties. There's always, when you have these inflection points, there's always these problems that are actually opportunities. And DevOps, infrastructure as code was all about APS, all about the developer. And now open source is booming, open source is the software industry. Open source is it in the world. >> Right. >> That's now the software industry. Cloud scale has hit and now you have the Devs completely in charge. Now, what suffers now is the Ops and the Sec, Second Ops. Now Ops, DevOps. Now, DevSecOps is where all the action is. >> Yep. >> So the, the, the next thing to do is build an abstraction layer. That's what everyone's trying to do, build tools and platforms. And so that's where the action is here. This is kind of where the innovation's happening because the networks aren't the, aren't in charge anymore either. So, you now have this new migration up to higher level services and opportunities to take the complexity away. >> Mm-hmm. >> Because what's happened is customers are getting complexity. >> That's right. >> They're getting it shoved in their face, 'cause they want to do good with DevOps, scale up. But by default their success is also their challenge. >> Right. >> 'Cause of complexity. >> That's exactly right. >> This is, you agree with that. >> I do totally agree with that. >> If you, you believe that, then what's next. What happens next? >> You know, what I hear from customers has to do with two specific areas is they're really trying to understand control frameworks, right. And be able to take these scenarios and build them into something that they, where they can understand where the gaps are, right. And then on top of that building in automation. So, the automation is a, is a theme that we're hearing from everybody. Like how, how do they take and do things like, you know it's what we've been hearing for years, right. How do we automatically remediate? How do we automatically prioritize? How do we, how do we build that in so that they're not having to hire people alongside that, but can use software for that. >> The automation has become key. You got to find it first. >> Yes. >> You guys are also part of the DevCycle too. >> Yep. >> Explain that piece. So, I'm a developer, I'm an organization. You guys are on the front end. You're not bolt-on, right? >> We can do either. We prefer it when customers are willing to use us, right. At the very front end, right. Because anything that's built in the beginning doesn't have the extra cycles that you have to go through after the fact, right. So, if you can build security right in from the beginning and have the ownership where it needs to be, then you're not having to, to deal with it afterwards. >> Okay, so how do you guys, I'm putting my customer hat on for a second. A little hard, hard question, hard problem. I got active directory on Azure. I got, IM over here with AWS. I wanted them to look the same. Now, my on-premises, >> Ah. >> Is been booming, now I got cloud operations, >> Right. >> So, DevOps has moved to my premise and edge. So, what do I do? Do I throw everything out, do a redo. How do you, how do you guys talk about, talk to customers that have that chance, 'cause a lot of them are old school. >> Right. >> ID. >> And, and I think there's a, I mean there's an important distinction here which is there's the active directory identities right, that customers are used to. But then there's this whole other area of non-people identities, which is compute power and privileges and everything that gets going when you get you know, machines working together. And we're finding that it's about five-to-one in terms of how many identities are non-human identities versus human identity. >> Wow. >> So, so you actually have to look at, >> So, programmable access, basically. >> Yeah. Yes, absolutely. Right. >> Wow. >> And privileges and roles that are, you know accessed via different ways, right. Because that's how it's assigned, right. And people aren't really paying that close attention to it. So, from that scenario, like the AD thing of, of course that's important, right. To be able to, to take that and lift it into your cloud but it's actually even bigger to look at the bigger picture with the non-human identities, right. >> What about the CISOs out there that you talk to. You're in the front lines, >> Yep. >> talking to customers and you see what's coming on the roadmap. >> Yep. >> So, you kind of get the best of both worlds. See what they, what's coming out of engineering. What's the biggest problem CISOs are facing now? Is it the sprawl of the problems, the hacker space? Is it not enough talent? What, I mean, I see the fear, what are, what are they facing? How do you, how do you see that, and then what's your conversations like? >> Yeah. I mean the, the answer to that is unfortunately yes, right. They're dealing with all of those things. And, and here we are at the intersection of, you know, this huge complex thing around cloud that's happening. There's already a gap in terms of resources nevermind skills that are different skills than they used to have. So, I hear that a lot. The, the bigger thing I think I hear is they're trying to take the most advantage out of their current team. So, they're again, worried about how to operationalize things. So, if we bring this on, is it going to mean more headcount. Is it going to be, you know things that we have to invest in differently. And I was actually just with a CISO this morning, and the whole team was, was talking about the fact that bringing us on means they have, they can do it with less resource. >> Mm-hmm. >> Like this is a a resource help for them in this particular area. So, that that was their value proposition for us, which I loved. >> Let's talk about Adrian Cockcroft who retired from AWS. He was at Netflix before. He was a big DevOps guy. He talks about how agility's been great because from a sales perspective the old model was, he called it the, the big Indian wedding. You had to get everyone together, do a POC, you know, long sales cycles for big tech investments, proprietary. Now, open sources like speed dating. You can know what's good quickly and and try things quicker. How is that, how is that impacting your sales motions. Your customer engagements. Are they fast? Are they, are they test-tried before they buy? What's the engagement model that you, you see happening that the customers like the best. >> Yeah, hey, you know, because of the fact that we're kind of dealing with this serious part of the problem, right. With the identities and, and dealing with data aspects of it it's not as fast as I would like it to be, right. >> Yeah, it's pretty important, actually. >> They still need to get in and understand it. And then it's different if you're AWS environment versus other environments, right. We have to normalize all of that and bring it together. And it's such a new space, >> Yeah. >> that they all want to see it first. >> Yeah. >> Right, so. >> And, and the consequences are pretty big. >> They're huge. >> Yeah. >> Right, so the, I mean, the scenario here is we're still doing, in some cases we'll do workshops instead of a POV or a POC. 90% of the time though we're still doing a POV. >> Yeah, you got to. >> Right. So, they can see what it is. >> They got to get their hands on it. >> Yep. >> This is one of those things they got to see in action. What is the best-of-breed? If you had to say best-of-breed in identity looks like blank. How would you describe that from a customer's perspective? What do they need the most? Is it robustness? What's some of the things that you guys see as differentiators for having a best-of-breed solution like you guys have. >> A best-of-breed solution. I mean, for, for us, >> Or a relevant solution for that matter, for the solution. >> Yeah. I mean, for us, this, again, this identity issue it, for us, it's depth and it's continuous monitoring, right. Because the issue in the cloud is that there are new privileges that come out every single day, like to the tune of like 35,000 a year. So, even if at this exact moment, it's fine. It's not going to be in another moment, right. So, having that continuous monitoring in there, and, and it solves this issue that we hear from a lot of customers also around lateral movement, right. Because like a piece of compute can be on and off, >> Yeah, yeah, yeah. >> within a few seconds, right. So, you can't use any of the old traditional things anymore. So to me, it's the continuous monitoring I think that's important. >> I think that, and the lateral movement piece, >> Yep. >> that you guys have is what I hear the most of the biggest fears. >> Mm-hmm. >> Someone gets in here and can move around, >> That's right. >> and that's dangerous. >> Mm-hmm. And, and no traditional tools will see it. >> Yeah. Yeah. >> Right. There's nothing in there unless you're instrumented down to that level, >> Yeah. >> which is what we do. You're not going to see it. >> I mean, when someone has a firewall, a perimeter based system, yeah, I'm in the castle, I'm moving around, but that's not the case here. This is built for full observability, >> That's right. >> Yet there's so many vulnerabilities. >> It's all open. Mm-hmm, yeah. And, and our view too, is, I mean you bring up vulnerabilities, right. It, it is, you know, a little bit of the darling, right. People start there. >> Yep. >> And, and our belief in our view is that, okay, that's nice. But, and you do have to do that. You have to be able to see everything right, >> Yep. >> to be able to operationalize it. But if you're not dealing with the sensitive data pieces right, and the identities and stuff that's at the core of what you're trying to do >> Yeah. >> then you're not going to solve the problem. >> Yeah. Denise, I want to ask you. Because you make what was it, five-to-one was the machine to humans. I think that's actually might be low, on the low end. If you could imagine. If you believe that's true. >> Yep. >> I believe that's true by the way If microservices continues to be the, be the wave. >> Oh, it'll just get bigger. >> Which it will. It's going to much bigger. >> Yeah. >> Turning on and off, so, the lateral movement opportunities are going to be greater. >> Yep. >> That's going to be a bigger factor. Okay, so how do I protect myself. Now, 'cause developer productivity is also important. >> Mm-hmm. >> 'Cause, I've heard horror stories like, >> Yep. >> Yeah, my Devs are cranking away. Uh-oh, something's out there. We don't know about it. Everyone has to stop, have a meeting. They get pulled off their task. It's kind of not agile. >> Right. Right. >> I mean, >> Yeah. And, and, in that vein, right. We have built the product around what we call swim lanes. So, the whole idea is we're prioritizing based on actual impact and context. So, if it's a sandbox, it probably doesn't matter as much as if it's like operational code that's out there where customers are accessing it, right. Or it's accessing sensitive data. So, we look at it from a swim lane perspective. When we try to get whoever needs to solve it back to the person that is responsible for it. So we can, we can set it up that way. >> Yeah. I think that, that's key insight into operationalizing this. >> Yep. >> And remediation is key. >> Yes. >> How, how much, how important is the timing of that. When you talk to your customer, I mean, timing is obviously going to be longer, but like seeing it's one thing, knowing what to do is another. >> Yep. >> Do you guys provide that? Is that some of the insights you guys provide? >> We do, it's almost like, you know, us. The, and again, there's context that's involved there, right? >> Yeah. >> So, some remediation from a priority perspective doesn't have to be immediate. And some of it is hair on fire, right. So, we provide actually, >> Yeah. >> a recommendation per each of those situations. And, and in some cases we can auto remediate, right. >> Yeah. >> If, it depends on what the customer's comfortable with, right. But, when I talk to customers about what is their favorite part of what we do it is the auto remediation. >> You know, one of the things on the keynotes, not to, not to go off tangent, one second here but, Kurt who runs platforms at AWS, >> Mm-hmm. >> went on his little baby project that he loves was this automated, automatic reasoning feature. >> Mm-hmm. >> Which essentially is advanced machine learning. >> Right. >> That can connect the dots. >> Yep. >> Not just predict stuff but like actually say this doesn't belong here. >> Right. >> That's advanced computer science. That's heavy duty coolness. >> Mm-hmm. >> So, operationalizing that way, the way you're saying it I'm imagining there's some future stuff coming around the corner. Can you share how you guys are working with AWS specifically? Is it with Amazon? You guys have your own secret sauce for the folks watching. 'Cause this remediation should, it only gets harder. You got to, you have to be smarter on your end, >> Yep. >> with your engineers. What's coming next. >> Oh gosh, I don't know how much of what's coming next I can share with you, except for tighter and tighter integrations with AWS, right. I've been at three meetings already today where we're talking about different AWS services and how we can be more tightly integrated and what's things we want out of their APIs to be able to further enhance what we can offer to our customers. So, there's a lot of those discussions happening right now. >> What, what are some of those conversations like? Without revealing. >> I mean, they have to do with, >> Maybe confidential privilege. >> privileged information. I don't mean like privileged information. >> Yep. I mean like privileges, right, >> Right. >> that are out there. >> Like what you can access, and what you can't. >> What you can, yes. And who and what can access it and what can't. And passing that information on to us, right. To be able to further remediate it for an AWS customer. That's, that's one. You know, things like other AWS services like CloudTrail and you know some of the other scenarios that they're talking about. Like we're, you know, we're getting deeper and deeper and deeper with the AWS services. >> Yeah, it's almost as if Amazon over the past two years in particular has been really tightly integrating as a strategy to enable their partners like you guys >> Mm-hmm. >> to be successful. Not trying to land grab. Is that true? Do you get that vibe? >> I definitely get that vibe, right. Yesterday, we spent all day in a partnership meeting where they were, you know talking about rolling out new services. I mean, they, they are in it to win it with their ecosystem. Not on, not just themselves. >> All right, Denise it's great to have you on theCUBE here as part of re:Inforce. I'll give you the last minute or so to give a plug for the company. You guys hiring? What are you guys looking for? Potential customers that are watching? Why should they buy you? Why are you winning? Give a, give the pitch. >> Yeah, absolutely. So, so yes we are hiring. We're always hiring. I think, right, in this startup world. We're growing and we're looking for talent, probably in every area right now. I know I'm looking for talent on the sales side. And, and again, the, I think the important thing about us is the, the fullness of our solution but the superpower that we have, like I said before around the identity and the data pieces and this is becoming more and more the reality for customers that they're understanding that that is the most important thing to do. And I mean, if they're that, Gartner says it, Forrester says it, like we are one of the, one of the best choices for that. >> Yeah. And you guys have been doing good. We've been following you. Thanks for coming on. >> Thank you. >> And congratulations on your success. And we'll see you at the AWS Startup Showcase in late August. Check out Sonrai Systems at AWS Startup Showcase late August. Here at theCUBE live in Boston getting all the coverage. From the keynotes, to the experts, to the ecosystem, here on theCUBE, I'm John Furrier your host. Thanks for watching. (bright music)

Published Date : Jul 26 2022

SUMMARY :

of the upcoming AWS Startup Showcase, This is kind of what you is the hardest thing for them to reign in. So, that's really Here at the show, the big theme to me, You know normal stuff, We've security in the this is Stephen Schmidt, One of the things that came out of it is open source is the software industry. Ops and the Sec, Second Ops. because the networks aren't the, Because what's happened is customers is also their challenge. that, then what's next. So, the automation is a, is a theme You got to find it first. part of the DevCycle too. You guys are on the front end. and have the ownership Okay, so how do you guys, talk to customers that have that chance, and everything that gets Right. like the AD thing of, You're in the front lines, on the roadmap. What, I mean, I see the fear, what are, the answer to that is So, that that was their that the customers like the best. because of the fact that We have to normalize all of And, and the 90% of the time though So, they can see what it is. What is the best-of-breed? I mean, for, for us, for the solution. Because the issue in the cloud is that So, you can't use any of the of the biggest fears. And, and no traditional tools will see it. down to that level, You're not going to see it. but that's not the case here. bit of the darling, right. But, and you do have to do that. that's at the core of to solve the problem. might be low, on the low end. to be the, be the wave. going to much bigger. so, the lateral movement That's going to be a bigger factor. Everyone has to stop, have a meeting. Right. So, the whole idea is that's key insight into is the timing of that. We do, it's almost like, you know, us. doesn't have to be immediate. And, and in some cases we it is the auto remediation. baby project that he loves Which essentially is but like actually say That's advanced computer science. the way you're saying it I'm imagining with your engineers. to be able to further What, what are some of I don't mean like privileged information. I mean like privileges, right, access, and what you can't. some of the other scenarios to be successful. to win it with their ecosystem. to have you on theCUBE here the most important thing to do. Thanks for coming on. From the keynotes, to the

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Denise HaymanPERSON

0.99+

Adrian CockcroftPERSON

0.99+

DenisePERSON

0.99+

Stephen SchmidtPERSON

0.99+

AWSORGANIZATION

0.99+

BostonLOCATION

0.99+

John FurrierPERSON

0.99+

95%QUANTITY

0.99+

AmazonORGANIZATION

0.99+

SonraiPERSON

0.99+

ForresterORGANIZATION

0.99+

KurtPERSON

0.99+

todayDATE

0.99+

late eightiesDATE

0.99+

90%QUANTITY

0.99+

second timeQUANTITY

0.99+

NetflixORGANIZATION

0.99+

Boston, MassachusettsLOCATION

0.99+

Sonrai SecurityORGANIZATION

0.99+

GartnerORGANIZATION

0.99+

YesterdayDATE

0.99+

late AugustDATE

0.99+

early ninetiesDATE

0.98+

three meetingsQUANTITY

0.98+

one secondQUANTITY

0.98+

OneQUANTITY

0.98+

fiveQUANTITY

0.97+

eachQUANTITY

0.97+

oneQUANTITY

0.97+

awsstartups.comOTHER

0.96+

DevSecOpsTITLE

0.96+

early SeptemberDATE

0.96+

both worldsQUANTITY

0.96+

35,000 a yearQUANTITY

0.95+

two specific areasQUANTITY

0.95+

CROPERSON

0.94+

AzureTITLE

0.93+

firstQUANTITY

0.92+

this morningDATE

0.9+

DevCycleORGANIZATION

0.89+

DevOpsTITLE

0.89+

2022DATE

0.88+

AWS Startup ShowcaseEVENT

0.86+

CloudTrailTITLE

0.86+

late August,DATE

0.85+

IndianOTHER

0.83+

Season TwoQUANTITY

0.8+

DevStreamORGANIZATION

0.8+

about fiveQUANTITY

0.79+

theCUBEORGANIZATION

0.78+

Chief RevenuePERSON

0.77+

past two yearsDATE

0.77+

one thingQUANTITY

0.77+

Sonrai SystemsPERSON

0.73+

SonraiORGANIZATION

0.7+

single dayQUANTITY

0.69+

CubeTITLE

0.66+

waves of innovationEVENT

0.66+

Episode FourQUANTITY

0.62+

thingsQUANTITY

0.61+

yearsQUANTITY

0.61+

Inforce 22TITLE

0.45+

secondQUANTITY

0.42+

Shreyans Mehta, Cequence Security | AWS re:Inforce 2022


 

(gentle upbeat music) >> Okay, welcome back everyone to theCUBE's live coverage here in Boston, Massachusetts for AWS RE:INFORCE 22. I'm John Furrier, your host with Dave Vellante co-host of theCUBE, and Shreyans Metah, CTO and founder of Cequence Security. CUBE alumni, great to see you. Thanks for coming on theCUBE. >> Yeah. Thanks for having me here. >> So when we chatted you were part of the startup showcase. You guys are doing great. Congratulations on your business success. I mean, you guys got a good product in hot market. >> Yeah. >> You're here before we get into it. I want to get your perspective on the keynote and the talk tracks here and the show. But for the folks that don't know you guys, explain what you guys, take a minute to explain what you guys do and, and key product. >> Yeah, so we are the unified API protection place, but I mean a lot of people don't know what unified API protection is but before I get into that, just just talking about Cequence, we've been around since 2014. But we are protecting close to 6 billion API transactions every day. We are protecting close to 2 billion customer accounts, more than 2 trillion dollars in customer assets and a hundred million plus sort of, data points that we look at across customer base. That's that's who we are. >> I mean, of course we all know APIs is, is the basis of cloud computing and you got successful companies like Stripe, for instance, you know, you put API and you got a financial gateway, billions of transactions. What's the learnings. And now we're in a mode now where single point of failure is a problem. You got more automation you got more reasoning coming a lot more computer science next gen ML, AI there too. More connections, no perimeter. Right? More and more use cases, more in the cloud. >> Yeah. So what, what we are seeing today is, I mean from six years ago to now, when we started, right? Like the monolith apps are breaking down into microservices, right? What effectively, what that means is like every of the every such microservices talking APIs, right? So what used to be a few million web applications have now become billions of APIs that are communicating with each other. I mean, if you look at the, I mean, you spoke about IOT earlier, I call, I call like a Tesla is an application on four wheels that is communicating to its cloud over APIs. So everything is API yesterday. 80% traffic on internet is APIs. >> Now that's dated transit right there. (laughing) Couldn't resist. >> Yeah. >> Fully encrypted too. >> Yeah. >> Yeah, well hopefully. >> Maybe, maybe, maybe. (laughing) We dunno yet, but seriously everything is talking to an API. >> Yeah. >> Every application. >> Yeah. And, and there is no single choke point, right? Like you spoke about it. Like everybody is hosting their application in the cloud environments of their choice, AWS being one of them. But it's not the only one. Right? The, the, your APIs are hosted behind a CDN. Your APIs are hosted on behind an API gateway behind a load balancer in guest controllers. There is no single. >> So what's the problem? What's the problem now that you're solving? Because one was probably I can imagine connecting people, connecting the APIs. Now you've got more operational data. >> Yeah. >> Potential security hacks? More surface area? What's the what's what are you facing? >> Well, I can speak about some of the, our, some of the well known sort of exploits that have been well published, right. Everybody gets exploited, but I mean some of the well knowns. Now, if you, if you heard about Expedian last year there was a third party API that was exposing your your credit scores without proper authentication. Like Facebook had Ebola vulnerability sometime ago, where people could actually edit somebody else's videos online. Peloton again, a well known one. So like everybody is exposed, right. But that is the, the end results. All right? But it all starts with people don't even know where their APIs are and then you have to secure it all the way. So, I mean, ultimately APIs are prone to business logic attacks, fraud, and that's what, what you need to go ahead and protect. >> So is that the first question is, okay, what APIs do I need to protect? I got to take a API portfolio inventory. Is that? >> Yeah, so I think starting point is where. Where are my APIs? Right, so we spoke about there's no single choke point. Right, so APIs could be in, in your cloud environment APIs could be behind your cloud front, like we have here at RE:INFORCE today. So APIs could be behind your AKS, Ingrid controllers API gateways. And it's not limited to AWS alone, right. So, so knowing the unknown is, is the number one problem. >> So how do I find him? I asked Fred, Hey, where are our API? No, you must have some automated tooling to help me. >> Yeah, so, I, Cequence provides an option without any integration, what we call it, the API spider. Whereas like we give you visibility into your entire API attack surface without any integration into any of these services. Where are your APIs? What's your API attack surface about? And then sort of more details around that as well. But that is the number one. Is that agent list or is that an agent? >> There's no agent. So that means you can just sign up on our portal and then, then, then fire it away. And within a few minutes to an hour, we'll give you complete visibility into where your API is. >> So is it a full audit or is it more of a discovery? >> Or both? >> So, so number one, it's it's discovery, but we are also uncovering some of the potential vulnerabilities through zero knowledge. Right? So. (laughing) So, we've seen a ton of lock for J exposed server still. Like recently, there was an article that lock four J is going to be endemic. That is going to be here. >> Long time. >> (laughs) For, for a very long time. >> Where's your mask on that one? That's the Covid of security. >> Yeah. Absolutely absolutely. So, you need to know where your assets are what are they exposing? So, so that is the first step effectively discovering your attack surface. Yeah. >> I'm sure it's a efficiency issue too, with developers. The, having the spider allows you to at least see what's connecting out there versus having a meeting and going through code reviews. >> Yeah. Right? Is that's another big part of it? >> So, it is actually the last step, but you have, you actually go through a journey. So, so effectively, once you're discovering your assets you actually need to catalog it. Right. So, so I know where they're hosted but what are developers actually rolling out? Right. So they are updating your, the API endpoints on a daily basis, if not hourly basis. They have the CACD pipelines. >> It's DevOps. (laughing) >> Welcome to DevOps. It's actually why we'll do it. >> Yeah, and people have actually in the past created manual ways to catalog their APIs. And that doesn't really work in this new world. >> Humans are terrible at manual catalogization. >> Exactly. So, cataloging is really the next step for them. >> So you have tools for that that automate that using math, presumably. >> Exactly. And then we can, we can integrate with all these different choke points that we spoke about. There's no single choke points. So in any cloud or any on-prem environment where we actually integrate and give you that catalog of your APIs, that becomes your second step really. >> Yeah. >> Okay, so. >> What's the third step? There's the third step and then compliance. >> Compliance is the next one. So basically catalog >> There's four steps. >> Actually, six. So I'll go. >> Discovery, catalog, then compliance. >> Yeah. Compliance is the next one. So compliance is all about, okay, I've cataloged them but what are they really exposing? Right. So there could be PII information. There could be credit card, information, health information. So, I will treat every API differently based on the information that they're actually exposing. >> So that gives you a risk assessment essentially. >> Exactly. So you can, you can then start looking into, okay. I might have a few thousand API endpoints, like, where do I prioritize? So based on the risk exposure associated with it then I can start my journey of protecting so. >> That that's the remediation that's fixing it. >> Okay. Keep going. So that's, what's four. >> Four. That was that one, fixing. >> Yeah. >> Four is the risk assessment? >> So number four is detecting abuse. >> Okay. >> So now that I know my APIs and each API is exposing different business logic. So based on the business you are in, you might have login endpoints, you might have new account creation endpoint. You might have things around shopping, right? So pricing information, all exposed through APIs. So every business has a business logic that they end up exposing. And then the bad guys are abusing them. In terms of scraping pricing information it could be competitors scraping pricing. They will, we are doing account take. So detecting abuse is the first step, right? The fifth one is about preventing that because just getting visibility into abuse is not enough. I should be able to, to detect and prevent, natively on the platform. Because if you send signals to third party platforms like your labs, it's already too late and it's too course grain to be able to act on it. And the last step is around what you actually spoke about developers, right? Like, can I shift security towards the left, but it's not about shifting left. Just about shifting left. You obviously you want to bring in security to your CICD pipelines, to your developers, so that you have a full spectrum of API securities. >> Sure enough. Dave and I were talking earlier about like how cloud operations needs to look the same. >> Yeah. >> On cloud premise and edge. >> Yes. Absolutely. >> Edge is a wild card. Cause it's growing really fast. It's changing. How do you do that? Cuz this APIs will be everywhere. >> Yeah. >> How are you guys going to reign that in? What's the customers journey with you as they need to architect, not just deploy but how do you engage with the customer who says, "I have my environment. I'm not going to be to have somebody on premise and edge. I'll use some other clouds too. But I got to have an operating environment." >> Yeah. "That's pure cloud." >> So, we need, like you said, right, we live in a heterogeneous environment, right? Like effectively you have different, you have your edge in your CDN, your API gateways. So you need a unified view because every gateway will have a different protection place and you can't deal with 5 or 15 different tools across your various different environments. So you, what we provide is a unified view, number one and the unified way to protect those applications. So think of it like you have a data plane that is sprinkled around wherever your edges and gateways and risk controllers are and you have a central brains to actually manage it, in one place in a unified way. >> I have a computer science or computer architecture question for you guys. So Steven Schmidt again said single controls or binary states will fail. Obviously he's talking from a security standpoint but I remember the days where you wanted a single point of control for recovery, you talked about microservices. So what's the philosophy today from a recovery standpoint not necessarily security, but recovery like something goes wrong? >> Yeah. >> If I don't have a single point of control, how do I ensure consistency? So do I, do I recover at the microservice level? What's the philosophy today? >> Yeah. So the philosophy really is, and it's very much driven by your developers and how you want to roll out applications. So number one is applications will be more rapidly developed and rolled out than in the past. What that means is you have to empower your developers to use any cloud and serverless environments of their choice and it will be distributed. So there's not going to be a single choke point. What you want is an ability to integrate into that life cycle and centrally manage that. So there's not going to be a single choke point but there is going to be a single control plane to manage them off, right. >> Okay. >> So you want that unified, unified visibility and protection in place to be able to protect these. >> So there's your single point of control? What about the company? You're in series C you've raised, I think, over a hundred million dollars, right? So are you, where are you at? Are you scaling now? Are you hiring sales people or you still trying to sort of be careful about that? Can you help us understand where you're at? >> Yeah. So we are absolutely scaling. So, we've built a product that is getting, that is deployed already in all these different verticals like ranging from finance, to detail, to social, to telecom. Anybody who has exposure to the outside world, right. So product that can scale up to those demands, right? I mean, it's not easy to scale up to 6 billion requests a day. So we've built a solid platform. We've rolled out new products to complete the vision. In terms of the API spider, I spoke about earlier. >> The unified, >> The unified API protection covers three aspects or all aspects of API life cycle. We are scaling our teams from go to market motion. We brought in recently our chief marketing officer our chief revenue officer as well. >> So putting all the new, the new pieces in place. >> Yeah. >> So you guys are like API observability on steroids. In a way, right? >> Yeah, absolutely. >> Cause you're doing the observability. >> Yes. >> You're getting the data analysis for risk. You're having opportunities and recommendations around how to manage the stealthy attacks. >> From a full protection perspective. >> You're the API store. >> Yeah. >> So you guys are what we call best of breed. This is a trend we're seeing, pick something that you're best in breed in. >> Absolutely. >> And nail it. So you're not like an observability platform for everything. >> No. >> You guys pick the focus. >> Specifically, APS. And, so basically your, you can have your existing tools in place. You will have your CDN, you will have your graphs in place. So, but for API protection, you need something specialized and that stuff. >> Explain why I can't just rely on CDN infrastructure, for this. >> So, CDNs are, are good for content delivery. They do your basic TLS, and things like that. But APIs are all about your applications and business that you're exposing. >> Okay, so you, >> You have no context around that. >> So, yeah, cause this is, this is a super cloud vision that we're seeing of structural change in the industry, a new thing that's happening in real time. Companies like yours are be keeping a focus and nailing it. And now the customer's can assemble these services and company. >> Yeah. - Capabilities, that's happening. And it's happening like right now, structural change has happened. That's called the cloud. >> Yes. >> Cloud scale. Now this new change, best of brief, what are the gaps? Because I'm a customer. I got you for APIs, done. You take the complexity away at scale. I trust you. Where are the other gaps in my architecture? What's new? Cause I want to run cloud operations across all environments and across clouds when appropriate. >> Yeah. >> So I need to have a full op where are the other gaps? Where are the other best of breed components that need to be developed? >> So it's about layered, the layers that you built. Right? So, what's the thing is you're bringing in different cloud environments. That is your infrastructure, right? You, you, you either rely on the cloud provider for your security around that for roll outs and operations. Right? So then is going to be the next layer, which is about, is it serverless? Is it Kubernetes? What about it? So you'll think about like a service mesh type environment. Ultimately it's all about applications, right? That's, then you're going to roll out those applications. And that's where we actually come in. Wherever you're rolling out your applications. We come in baked into that environment, and for giving you that visibility and control, protection around that. >> Wow, great. First of all, APIs is the, is what cloud is based on. So can't go wrong there. It's not a, not a headwind for you guys. >> Absolutely. >> Great. What's a give a quick plug for the company. What are you guys looking to do hire? Get customers who's uh, when, what, what's the pitch? >> So like I started earlier, Cequence is around unified API protection, protecting around the full life cycle of your APIs, ranging from discovery all the way to, to testing. So, helping you throughout the, the life cycle of APIs, wherever those APIs are in any cloud environment. On-prem or in the cloud in your serverless environments. That's what Cequence is about. >> And you're doing billions of transactions. >> We're doing 6 billion requests every day. (laughing) >> Which is uh, which is, >> A lot. >> Unheard for a lot of companies here on the floor today. >> Sure is. Thanks for coming on theCUBE, sure appreciate it. >> Yeah. >> Good, congratulations to your success. >> Thank you. >> Cequence Security here on theCUBE at RE:INFORCE. I'm chatting with Dave Vellante, more coverage after this short break. (upbeat, gentle music)

Published Date : Jul 26 2022

SUMMARY :

I'm John Furrier, your host So when we chatted you were and the talk tracks here and the show. We are protecting close to and you got a financial gateway, means is like every of the Now that's dated transit right there. everything is talking to an API. But it's not the only one. What's the problem now and then you have to So is that the first question is, okay, So APIs could be behind your AKS, No, you must have some But that is the number one. So that means you can that lock four J is going to be endemic. That's the Covid of security. So, so that is the first step effectively The, having the spider allows you to Yeah. So, it is actually the It's DevOps. Welcome to DevOps. actually in the past Humans are terrible the next step for them. So you have tools for that and give you that catalog What's the third step? Compliance is the next one. So I'll go. Compliance is the next one. So that gives you a risk So based on the risk That that's the So that's, what's four. That was that one, fixing. So based on the business you are in, needs to look the same. How do you do that? What's the customers journey with you Yeah. So you need a unified view but I remember the days where What that means is you have So you want that So product that can scale from go to market motion. So putting all the new, So you guys are like API You're getting the So you guys are what So you're not like an observability you can have your existing tools in place. for this. and business that you're exposing. And now the customer's can assemble these That's called the cloud. I got you for APIs, done. the layers that you built. It's not a, not a headwind for you guys. What are you guys looking to do hire? So, helping you throughout And you're doing (laughing) here on the floor today. Thanks for coming on on theCUBE at RE:INFORCE.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

DavePERSON

0.99+

FredPERSON

0.99+

Steven SchmidtPERSON

0.99+

5QUANTITY

0.99+

Shreyans MetahPERSON

0.99+

third stepQUANTITY

0.99+

John FurrierPERSON

0.99+

Cequence SecurityORGANIZATION

0.99+

second stepQUANTITY

0.99+

last yearDATE

0.99+

Shreyans MehtaPERSON

0.99+

first questionQUANTITY

0.99+

more than 2 trillion dollarsQUANTITY

0.99+

AWSORGANIZATION

0.99+

sixQUANTITY

0.99+

2014DATE

0.99+

four stepsQUANTITY

0.99+

bothQUANTITY

0.99+

first stepQUANTITY

0.99+

Boston, MassachusettsLOCATION

0.99+

15 different toolsQUANTITY

0.99+

FacebookORGANIZATION

0.99+

RE:INFORCEORGANIZATION

0.99+

6 billion requestsQUANTITY

0.98+

todayDATE

0.98+

six years agoDATE

0.98+

billionsQUANTITY

0.98+

single choke pointQUANTITY

0.98+

CUBEORGANIZATION

0.98+

single pointQUANTITY

0.98+

oneQUANTITY

0.98+

three aspectsQUANTITY

0.97+

TeslaORGANIZATION

0.97+

over a hundred million dollarsQUANTITY

0.97+

AKSORGANIZATION

0.97+

theCUBEORGANIZATION

0.97+

one placeQUANTITY

0.96+

yesterdayDATE

0.96+

each APIQUANTITY

0.96+

singleQUANTITY

0.96+

FourQUANTITY

0.96+

StripeORGANIZATION

0.95+

CTOPERSON

0.95+

an hourQUANTITY

0.94+

FirstQUANTITY

0.93+

80% trafficQUANTITY

0.91+

series COTHER

0.9+

fifth oneQUANTITY

0.9+

up to 6 billion requests a dayQUANTITY

0.89+

single choke pointsQUANTITY

0.88+

million web applicationsQUANTITY

0.86+

6 billion API transactionsQUANTITY

0.83+

fourQUANTITY

0.83+

single control planeQUANTITY

0.83+

close to 2 billion customer accountsQUANTITY

0.83+

IngridPERSON

0.81+

PelotonLOCATION

0.78+

DevOpsTITLE

0.74+

re:Inforce 2022TITLE

0.73+

APIsQUANTITY

0.72+

transactionsQUANTITY

0.71+

single controlsQUANTITY

0.71+

22TITLE

0.68+

a hundred millionQUANTITY

0.68+

ExpedianORGANIZATION

0.68+

IOTTITLE

0.67+

EbolaOTHER

0.62+

KubernetesTITLE

0.61+

CequenceORGANIZATION

0.59+

zeroQUANTITY

0.59+

minutesQUANTITY

0.53+

Phillip Bues & Jay Bretzmann, IDC | AWS re:Inforce 2022


 

>>Okay, welcome back everyone. Cube's coverage here in Boston, Massachusetts, AWS reinforced 22, the security conference. It's ADOS big security conference. Of course, the cubes here, all the reinvent res re Mars reinforce. We cover 'em all now and the summits. I'm John. Very my host, Dave ante have IDC weighing in here with their analysis. We've got some great guests here, Jay Brisbane, research VP at IDC and Philip who research managed for cloud security. Gentlemen, thanks for coming on. Thank you. Appreciate it. Great >>To, to be here. I appreciate the got the full >>Circle, right? Just, security's more interesting >>Than storage. Isn't it? >>Dave, Dave and Jay worked together. This is a, a great segment. I'm psyched that you guys are here. We had Crawford and Matt Eastwood on at HPE discover a while back and really the, the, the data you guys are getting and the insights are fantastic. So congratulations to IDC. You guys doing great work. We appreciate your time. I wanna get your reaction to the event and the keynotes. AWS has got some posture and they're very aggressive on some tones. Some things that they didn't, we didn't hear. What's your reaction to the keynote, share your, your assessment. >>So, you know, I managed two different research services at IDC right now. They are both cloud security and identity and, and digital security. Right. And what was really interesting is the intersection between the two this morning, because every one of those speakers that came on had something to say about identity or least privileged access, or, you know, enable MFA, or make sure that you, you know, control who gets access to what and deny explicitly. Right? And it's always been a challenge a little bit in the identity world because a lot of people don't use MFA. And in RSA, that was another big theme at the RSA conference, right? MFA everywhere. Why don't they use it because it introduces friction and all of a sudden people can't get their jobs done. Right. And the whole point of a network is letting people on to get that data they want to get to. So that was kind of interesting, but, you know, as we have in the industry, this shared responsibility model for cloud computing, we've got shared responsibility for between Philip and I, I have done in the ke past more security of the cloud and Philip is more security in the cloud, >>So yeah. And it's, and now with cloud operation, super cloud, as we call it, you have on premises, private cloud coming back, or hasn't really gone anywhere, all that on premises, cloud operations, public cloud, and now edge exploding with new requirements. Yeah. It's really an ops challenge right now. Not so much dev. So the sick and op side is hot right now. >>Yeah. Well, we've made this move from monolithic to microservices based applications. And so during the keynote this morning, the announcement around the guard duty malware protection component, and that being built into the pricing of current guard duty, I thought was, was really key. And there was also a lot of talk about partnering in security certifications. Yeah. Which is also so very important. So we're seeing this move towards filling in that talent gap, which I think we're all aware of in the security industry. >>So Jake square, the circle for me. So Kirk, Coel talked about Amazon AWS identity, where does AWS leave off and, and companies like Okta or ping identity or crock pickup, how are they working together? Does it just create more confusion and more tools for customers? We, we have, we know the over word overused word of seamless. Yeah. Yeah. It's never seamless. So how should we think about that? >>So, you know, identity has been around for 35 years or something like that started with the mainframes and all that. And if you understand the history of it, you make more sense to the current market. You have to know where people came from and the baggage they're carrying, cuz they're still carrying a lot of that baggage. Now, when it comes to the cloud service providers, they're more an accommodation from the identity standpoint, let's make it easy inside of AWS to let you single sign on to anything in the cloud that they have. Right. Let's also introduce an additional MFA capability to keep people safer whenever we can and, you know, provide people the tools to, to get into those applications somewhat easily, right. While leveraging identities that may live somewhere else. So, you know, there's a whole lot of the world that is still active directory centric, right? There's another portion of companies that were born in the cloud that were able to jump on things like Okta and some of the other providers of these universal identities in the cloud. So, you know, like I said, you, if you understand where people came from in the beginning, you start to, to say, yeah, this makes sense. >>It's, it's interesting. You talk about mainframe. I, I always think about rack F you know, and I say, okay, who did what, when, where, yeah. And you hear about a lot of those themes. What, so what's the best practice for MFA? That's, that's non SMS based. Is it, you gotta wear something around your neck, is it to have sort of a third party authenticator? What are people doing that is that, that, that you guys would recommend? >>Yeah. One quick comment about adoption of MFA. You know, if you ask different suppliers, what percent of your base that does SSO also does MFA one of the biggest suppliers out there Microsoft will tell you it's under 25%. That's pretty shocking. Right? All the messaging that's come out about it. So another big player in the market was called duo. Cisco bought them. Yep. Right. And because they provide networks, a lot of people buy their MFA. They have probably the most prevalent type of MFA it's called push. Right. And push can be, you know, a red X and a green check mark to your phone. It can be a QR code, you know, somewhere, it can be an email push as well. So that is the next easiest thing to adopt after SMS. And as you know, SMS has been denigrated by N and others saying, you know, it's susceptible to man and middle attacks. >>It's built on a telephony protocol called SS seven. Yep. You know, predates anything. There's no certification, either side. The other real dynamic and identity is the whole adoption of PKI infrastructure. As you know, certificates are used for all kinds of things, network sessions, data encryption, well identity increasingly, and a lot of the, you know, consumers and especially the work from anywhere, people these days have access through smart devices. Right. And what you can do there is you can have an agent on that smart device, generate your private key and then push out a public key. And so the private key never leaves your device. That's one of the most secure ways to, so if your >>SIM card gets hacked, you're not gonna be as at vulnerable >>Or as vulnerable. Well, the SIM card is another, you know, challenge associated with the, the older waste. But yeah. Yeah. >>So what do you guys think about the open source connection and, and they, they mentioned it up top don't bolt on security implying shift left, which is embedding it in like sneak companies, like sneak do that, right. Container oriented, a lot of Kubernetes kind of cloud native services. So I wanna get your reaction to that. And then also this reasoning angle, they brought up kind of a higher level AI reasoning decisions. So open source and this notion of AI reasoning >>Automation. Yeah. And, and you see more open source discussion happening, right. So you, you know, you have your building maintaining and vetting of the upstream open source code, which is critical. And so I think AWS talking about that today, they're certainly hitting on a nerve as, you know, open source continues to proliferate around the automated reasoning. I think that makes sense. You know, you want to provide guiderails and you want to provide roadmaps and you wanna have sort of that guidance as to okay. What's the, you know, a correlation analysis of different tools and products. And so I think that's gonna go over really well. >>Yeah. One of the other, you know, key points of what open source is, everybody's in a multi-cloud world, right? Yeah. And so they're worried about vendor lockin, they want an open source code base so that they don't experience that. >>Yeah. And they can move the code around and make sure it works well on each system. Dave and I were just talking about some of the dynamics around data control planes. So yeah. They mentioned encrypt everything, which is great. And I message, by the way, I love that one, but oh. And he mentioned data at rest. I'm like, what about data in flight? Didn't hear that one. So one of the things we're seeing with super cloud, and now multi-cloud kind of, as destinations of that, is that in digital transformation, customers are leaning into owning their data flows. >>Yeah. >>Independent of say the control plane aspects of what could come in. This is huge implications for security, where sharing data is huge. Even Schmidt on Steve said we have billions and billions of things happening that we see things that no one else else sees. So that implies, they're >>Sharing quad trillion, >>Trillion, 15 zeros trillion. Yeah. 15 >>Zeros, 15 zeros. Yeah. >>So that implies, they're sharing that or using that, pushing that into something. So sharing's huge with cyber security. So that implies open data, data flows. What do, how do you guys see this evolving? I know it's kind of emerging, but it's becoming a, a nuanced point that's critical to the architecture. >>Well, I, yeah, I think another way to look at that is the sharing of intelligence and some of the recent directives, you know, from the executive branch, making it easier for private companies to share data and intelligence, which I think strengthens the cyber community overall, >>Depending upon the supplier. Right? Yeah. It's either an aggregate level of intelligence that has been, you know, anonymized or it's specific intelligence for your environment that, you know, everybody's got a threat feed, maybe two or three, right. Yeah. But back to the encryption point, I mean, I was working for an encryption startup for a little while. Right after I left IBM. And the thing is that people are scared of it. Right. They're scared of key management and rotation. And so when you provide, >>Because they might lose the key. >>Exactly. Yeah. It's like shooting yourself in the foot. Right. So that's when you have things like, you know, KMS services from Amazon and stuff, they really help out a lot and help people understand, okay, I'm not alone in this. >>Yeah. Crypto >>Owners, they call that hybrid, the hybrid key, they call the, what they call the, today. They call it the hybrid. >>What was that? The management service. Yeah. The hybrid. So hybrid HSM, correct. >>Yeah. What is that? What is that? I didn't, I didn't get that. I didn't understand what he meant by the hybrid post hybrid, post quantum key agreement. Right. That still notes >>Hybrid, post quantum key exchange, >>You know, AWS never made a product name that didn't have four words in it, >>But he did, but he did reference the, the new N algos. And I think I inferred that they were quantum proof or the claim it be. Yeah. And AWS was testing those. Correct. >>Yeah. >>So that was kind of interesting, but I wanna come back to identity for a second. Okay. So, so this idea of bringing traditional IAM and, and privilege access management together, is that a pipe dream, is that something that is actually gonna happen? What's the timeframe, what's your take on that? >>So, you know, there are aspects of privilege in every sort of identity back when, you know, it was only the back office that used computers for calculations, right? Then you were able to control how many people had access. There were two types of users, admins, and users, right? These days, everybody has some aspect of, >>It's a real spectrum, really >>Granular. You got the, you know, the C suite, the finance people, the DevOps, people, you know, even partners and whatever, they all need some sort of privileged access. And the, the term you hear so much is least privileged access. Right? Shut it down, control it. So, you know, in some of my research, I've been saying that vendors who are in the Pam space privilege access management space will probably be growing their suites, playing a bigger role, building out a stack because they have, you know, the, the expertise and the, and the perspective that says we should control this better. How do we do that? Right. And we've been seeing that recently, >>Is that a combination of old kind of antiquated systems meets for proprietary hyperscale or kind of like build your own? Cause I mean, Amazon, these guys, they Facebook, they all build their own stuff. >>Yes. They >>Do enterprises buy services from general purpose identity management systems. >>So as we were talking about, you know, knowing the past and whatever privileged access management used to be about compliance reporting. Yeah. Right. Just making sure that I knew who accessed what and could prove it. So I didn't fail in art. It wasn't >>A critical infrastructure item. >>No. And now these days, what it's transitioning into is much more risk management. Okay. I know what our risk is. I'm ahead of it. And the other thing in the Pam space was really session monitor. Right. Everybody wanted to watch every keystroke, every screen's scrape, all that kind of stuff. A lot of the new privilege access Mon management doesn't really require that it's nice to have feature. You kind of need it on the list, but is anybody really gonna implement it? That's the question. Right. And then, you know, if, if you do all that session monitor, does anybody ever go back and look at it? There's only so many hours in the day. >>How about passwordless access? You know? Right. I've heard people talk about that. Yeah. I mean, that's as a user, I can't wait, but >>It's somewhere we want to all go. Yeah. Right. We all want identity security to just disappear and be recognized when we log in. So the, the thing with password list is there's always a password somewhere and it's usually part of a registration, you know, action. I'm gonna register my device with a username password. And then beyond that, I can use my biometrics. Right. I wanna register my device and get a private key that I can put in my enclave. And I'll use that in the future. Maybe it's gotta touch ID. Maybe it doesn't. Right. So even though there's been a lot of progress made, it's not quote unquote, truly passwordless, there's a group industry standards group called Fido. Right. Which is fast identity online. And what they realized was these whole registration passwords. That's really a single point of failure. Cuz if I can't recover my device, I'm in trouble. Yeah. So they just did a, a new extension to sort of what they were doing, which provides you with much more of a, like an iCloud vault, right. That you can register that device in and other devices associated with that same iPad that you can >>Get you to it. If you >>Have to. Exactly. I had >>Another have all over the place here, but I, I want to ask about ransomware. It may not be your wheelhouse. Yeah. But back in the day, Jay, remember you used to cover tape. All the, all the backup guys now are talking about ransomware. AWS mentioned it today and they showed a bunch of best practices and things you can do air gaps. Wasn't one, one of 'em. Right. I was really surprised cuz that's all, every anybody ever talks about is air gaps. And a lot of times that air gaps that air gap could be a guess to the cloud. I guess I'm not sure. What are you guys seeing on ransomware >>Apps? You know, we've done a lot of great research around ransomware as a service and ransomware and, and you know, we just had some data come out recently that I think in terms of spending and, and spend and in as a result of the Ukraine, Russia war, that ransomware assessments rate number one. And so it's something that we encourage, you know, when we talk to vendors and in our services, in our publications that we write about taking advantage of those free strategic ransomware assessments, vulnerability assessments, right. As well, and then security and training ranked very highly as well. So we wanna make sure that all of these areas are being funded well to try and stay ahead of the curve. >>Yeah. I was surprised that not the air gaps on the list, that's all everybody >>Talks about. Well, you know, the, the old model for air gaping in the, the land days, the Noel days, you took your tapes home and put 'em in the sock drawer. >>Well, it's a form of air gap security and no one's gonna go there >>Clean. And then the internet came around >>Guys. Final question. I want to ask you guys, we kind zoom out. Great, great commentary by the way. Appreciate it. As the, we've seen this in many markets, a collection of tools emerge and then there's it's tool sprawl. Oh yeah. Right? Yeah. So cyber we're seeing trend now where Mon goes up on stage of all the E probably other vendors doing the same thing where they're organizing a platform on top of AWS to be this super platform. If you super cloud ability by building more platform thing. So we're saying there's a platform war going on, cuz customers don't want the complexity. Yeah. I got a tool, but it's actually making it more complex if I buy the other tool. So the tool sprawl becomes a problem. How do you guys see this? Do you guys see this platform emerging? I mean, tools won't go away, but they have to be >>Easier. Yeah. We do see a, a consolidation of functionality and services. And we've been seeing that, I think through a 20, 20 flat security survey that we released, that that was definitely a trend. And you know, that certainly happened for many companies over the last six to 24 months, I would say. And then platformization absolutely is something we talk 'em right. About all the time. So >>More M and a couple of years ago, I called the, the Amazon tool set in rector set. Yeah. Because it really required assembly. Yeah. And you see the emphasis on training here too, right? Yeah. You definitely need to go to AWS university to be competent. It >>Wasn't Lego blocks yet. No, it was a rector set. Very good distinction rules, you know, and, and you lose a few. It's >>True. Still too many tools. Right. You see, we need more consolidation. That's getting interesting because a lot of these companies have runway and you look, you look at sale point, its stock prices held up cuz of the Toma Bravo acquisition, but all the rest of the cyber stocks have been crushed. Yeah. You know, especially the high flyers, like a Senti, a one or a crowd strike, but yeah, just still M and a opportunity >>Itself. So platform wars. Okay. Final thoughts. What do you thinks happening next? What's what's your outlook for the, the next year or so? >>So in the, in the identity space, I'll talk about Phillip can cover cloud force. You know, it really is more consolidation and more adoption of things that are beyond simple SSO, right. It was, you know, just getting on the systems and now we really need to control what you're able to get to and who you are and do it as transparently as we possibly can because otherwise, you know, people are gonna lose productivity, right. They're not gonna be able to get to what they want. And that's what causes the C-suite to say, wait a minute, you know, DevOps, they want to update the product every day. Right. Make it better. Can they do that? Or did security get in the way people every once in a while I'll call security, the department of no, right? Yeah. Well, >>Yeah. They did it on stage. Yeah. They wanna be the department of yes, >>Exactly. And the department that creates additional value. If you look at what's going on with B to C or C IAM, consumer identity, that is all about opening up new direct channels and treating people like, you know, they're old friends, right. Not like you don't know 'em you have to challenge >>'em we always say you wanna be in the boat together. It sinks or not. Yeah. Right. Exactly. >>Phillip, >>Okay. What's your take? What's your outlook for the year? >>Yeah. I think, you know, something that we've been seeing as consolidation and integration, and so, you know, companies looking at from built time to run time investing in shift left infrastructure is code. And then also in the runtime detection makes perfect sense to have both the agent and agentless so that you're covering any of the gaps that might exist. >>Awesome. Jerry, Phillip, thanks for coming on the queue with IDC and sharing >>Your oh our pleasure perspective. >>Commentary, have any insights and outlook. Appreciate it. You bet. Thank you. Okay. We've got the great direction here from IDC analyst here on the queue. I'm John for a Dave, we're back more after this shirt break.

Published Date : Jul 26 2022

SUMMARY :

We cover 'em all now and the summits. I appreciate the got the full I'm psyched that you guys are here. or, you know, enable MFA, or make sure that you, you know, And it's, and now with cloud operation, super cloud, as we call it, you have on premises, And so during the keynote this morning, the announcement around the guard duty malware protection So Jake square, the circle for me. to keep people safer whenever we can and, you know, provide people the tools to, I, I always think about rack F you know, And as you know, SMS has been denigrated by N and others saying, you know, and a lot of the, you know, consumers and especially the work from anywhere, Well, the SIM card is another, you know, challenge associated with the, So what do you guys think about the open source connection and, and they, they mentioned it up top don't you know, you have your building maintaining and vetting of the upstream open source code, And so they're worried about vendor lockin, they want an open source code base so And I message, by the way, I love that one, but oh. Independent of say the control plane aspects of what could come in. Yeah. 15 Yeah. What do, how do you guys see this evolving? been, you know, anonymized or it's specific intelligence for your environment So that's when you have They call it the hybrid. Yeah. I didn't understand what he meant by the hybrid post hybrid, And I think I inferred So that was kind of interesting, but I wanna come back to identity for a second. So, you know, there are aspects of privilege in every sort of identity back when, You got the, you know, the C suite, the finance people, the DevOps, people, you know, Cause I mean, Amazon, these guys, they Facebook, So as we were talking about, you know, knowing the past and whatever privileged access management used And then, you know, Yeah. somewhere and it's usually part of a registration, you know, action. Get you to it. I had But back in the day, Jay, remember you used to cover tape. And so it's something that we encourage, you know, the Noel days, you took your tapes home and put 'em in the sock drawer. And then the internet came around I want to ask you guys, we kind zoom out. And you know, that certainly happened for many companies over the And you see the emphasis on training here you know, and, and you lose a few. runway and you look, you look at sale point, its stock prices held up cuz of the Toma Bravo acquisition, What do you thinks happening next? the C-suite to say, wait a minute, you know, DevOps, they want to update the product every day. Yeah. direct channels and treating people like, you know, they're old friends, 'em we always say you wanna be in the boat together. What's your outlook for the year? and so, you know, companies looking at from built time to run time investing in shift analyst here on the queue.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavePERSON

0.99+

Jay BretzmannPERSON

0.99+

AWSORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

IBMORGANIZATION

0.99+

Matt EastwoodPERSON

0.99+

Jay BrisbanePERSON

0.99+

JerryPERSON

0.99+

JayPERSON

0.99+

CiscoORGANIZATION

0.99+

FacebookORGANIZATION

0.99+

PhilipPERSON

0.99+

20QUANTITY

0.99+

JohnPERSON

0.99+

PhillipPERSON

0.99+

two typesQUANTITY

0.99+

Phillip BuesPERSON

0.99+

iPadCOMMERCIAL_ITEM

0.99+

IDCORGANIZATION

0.99+

billionsQUANTITY

0.99+

PhilipORGANIZATION

0.99+

Jake squarePERSON

0.99+

threeQUANTITY

0.99+

MicrosoftORGANIZATION

0.99+

StevePERSON

0.99+

twoQUANTITY

0.99+

each systemQUANTITY

0.99+

KirkPERSON

0.99+

CoelPERSON

0.99+

under 25%QUANTITY

0.98+

todayDATE

0.98+

next yearDATE

0.98+

bothQUANTITY

0.98+

15QUANTITY

0.97+

OktaORGANIZATION

0.97+

CrawfordPERSON

0.96+

oneQUANTITY

0.96+

Boston, MassachusettsLOCATION

0.96+

Toma BravoORGANIZATION

0.95+

single pointQUANTITY

0.95+

two different research servicesQUANTITY

0.94+

SS sevenOTHER

0.94+

FidoORGANIZATION

0.94+

ZerosQUANTITY

0.94+

35 yearsQUANTITY

0.94+

this morningDATE

0.93+

24 monthsQUANTITY

0.93+

MFATITLE

0.92+

couple of years agoDATE

0.92+

TrillionQUANTITY

0.92+

2022DATE

0.9+

ADOSEVENT

0.9+

One quick commentQUANTITY

0.89+

SchmidtPERSON

0.88+

15 zerosQUANTITY

0.87+

Russia warEVENT

0.86+

OneQUANTITY

0.84+

RSATITLE

0.83+

four wordsQUANTITY

0.8+

singleQUANTITY

0.76+

20 flatQUANTITY

0.75+

NoelEVENT

0.75+

LegoORGANIZATION

0.73+

Will Kapcio, HackerOne & Sean Ryan, HackerOne | AWS re:Inforce 2022


 

(theme music) >> Okay, welcome back everyone, theCUBE's live coverage here in Boston, Massachusetts for AWS re:Inforce '22. Big show for ground security, Amazon re:Invent's coming up. That's the big event of all time for AWS. re:MARS was another one, re:Inforce, the re:Shows, they call them, theCUBE's got you covered. I'm John Furrier, host of theCUBE with Dave Vellante, who's in an analyst session right now. He'll be back shortly. We've got 2 great guests from an amazing company, HackerOne, been on theCUBE many times, (mumbles) Marten Mickos, of course, a big time, (mumbles) We got two great guests. Sean Ryan, Sr. Principal Product Marketing Manager Will Kapcio, Senior Sales Engineer. Gents, welcome to theCUBE. >> Thanks for having us John. >> So Marten's been on many times, he's such a character. He's such a legend. >> Yeah. >> Your company has had great traction, great community, just this phenomenal example of community meets technology and problem solver. >> Yeah. >> He's been part of that organization. Here at re:Inforce they're just kind of getting wind of it now, right? You hear an open, teamwork, breaking down the silos, a big theme is this whole idea of open community, but yet be hardcore with the security. It's been a big part of the re:Inforce. What do you guys think of the show so far? >> Loving it. Partly too, we're both local here in the Boston area. So the commute was pretty nice. (everyone laughs) And the heat wave broke the other day so that's wonderful, but yeah, great show. It's good to be back in person doing this kind of stuff and just, it's really lively. You get a lot of good energy. We've had a bunch of people stopping by trying to learn what we're all about and so, it's really fun. Great show so far. >> And you guys have a great company. Take a minute to explain for the folks who may not know HackerOne. Tell them what you guys do real quick in one minute. >> Okay, the quick elevator pitch. (chuckles) So really we're making the internet safer using a community of ethical hackers. And so our platform enables that so we can skill match the best talent that's out there around the world to help find all the vulnerabilities that your company needs to discover. So you can plug those holes and keep yourself safe. >> So in an era of a talent gap, Will, you know the technologies out there, but sometimes the skills are not there. So you guys can feel the void kind of a crowdsourced vibe, right? >> Yeah, exactly. If you're trying to build a security program, and apply defense in depth, we offer a terrific way to engage additional security talent either because you can't hire enough or your team is simply overloaded, too much to do, so. >> Hackers like to be a little bit, white hat hackers like to be independent, might want some flexibility in their schedule, live around the world. >> Yes. No question for hackers that do it full time, that do it part-time and then everything in between. >> Well, you guys are in the middle here with some real products. So talk about what's going on here. How vulnerable are the surface areas in organizations that you're seeing? >> Yeah, probably more so than you would think. So we ran a survey earlier this year, 800 security and IT professionals across North America and Europe. And one of the findings from that survey was that nearly a third, actually over a third, 37% of the attack surfaces, not secured. Some of it's not even known. They don't know what they don't know. They just have this entire area. And you can imagine, I mean there's a lot of reasons you know, real legitimate reasons that this happens. One of those really being that we don't know what we don't know. We haven't scanned our attack surface. >> And also it's about a decade of no perimeter anymore. >> Yes. >> Welcome to the cloud. >> For sure. Absolutely. And people are moving quick, right? You know, the Cloud perfect example. Cloud people are building new applications on top of these new underlying configurations happening on a constant basis. Acquisitions, you know, that's just a fast moving thing. Nobody can keep track of it. There's a lot of different skill sets you need you know. And yeah, skill shortage out there too. As we talked about. >> What's the attacker solution you guys have? You guys have this HackerOne attack resistance component, what's that about? >> That's right. So that is to solve what we call the attack resistance gap. So that area that's not protected, hasn't been secured, on top of just not knowing what those assets are, or how vulnerable they are. The other thing that happens is people are sort of doing status quo testing, or they're not able to keep up with effective testing. So scanners are great. They can catch common vulnerabilities, but they're not going to catch those really hard to find vulnerabilities. The thing that the really sophisticated attackers are going to go after. >> Yeah. >> So we use... This large community that we have of ethical hackers around the world to be able to skill match them and get them doing bug bounties, doing pen tests, really bulletproofing the organization, and helping them risk-rank what they find. >> Yeah. >> Triage these, do the retesting, you know, get it very secure. So that's how we do it on a high level. Will, you might have a-- >> Yeah. I mean there's a tremendous amount of automation out there, right? But you can't quite at least not yet replace critical thinking. >> Yeah. >> From smart security minds. So HackerOne has a number of solutions where we can apply those minds in different ways at different parts of the software life cycle at different cadences, to fit our customers' needs, to fit their security needs, and make sure that there's more complete human coverage throughout their software lifecycle, and not just automation. >> Yeah. I think that's a great point, Will and Sean, because you think about open source is like not only grown significantly, it's like's it is the software industry. If you believe that, which I do. Open source is there it's all software free. The integration is creating a DevOps movement that's going the whole level. So Devs are doing great. They're pumping out codes. In fact, I heard a quote here on theCUBE earlier this morning from the CTO Sequence Security that said: "Shift left but shield right." So shifting left is build your security into the code, but still you got to have a shield. You guys have this shielding capability with your attack module management service. So you now you got the Devs thinking: "I got to get better security native" So but they're pumping out so much code. >> Yep. >> There's more use cases, so there's going to be code reviews needed for stuff that she said, "What is this? We got to code review new stuff. A developer created something." >> Yes. >> I mean, that's what happened. That's what's going on everywhere, right? >> Exactly. We often hear that for every 100 developers, you've got one security professional. (John laughs) You know, talk about skill shortage that's just not sustainable. How are you going to keep up with that? >> Yeah. >> So-- >> Your phone is ringing off the hook. There's no phones anymore, but like technically-- >> Yeah, yeah, exactly. So, you know, yeah, you need to go external find some experts who can help you figure that out, and keep up with that cadence, you know keeps going and going. >> So, HackerOne. I love the ethical thing. I mean, you know, I'm a big fan. Everyone who watches theCUBE knows I'm a big fan of Marten and your company, but it's not just bug bounties that you do. That's just people think of, they see that in the news. "Oh, I made a million dollars from saving Microsoft teams from being exploited" or something like that, or weird things big numbers. But you do more than that. There's code reviews, there's assessments, like a variety of different things, right? >> Yes, exactly. Exactly. >> What are the hottest areas? >> Yeah, I mean, that's exactly why we coined the term, Attack Resistance Management really is to help describe all those areas that we cover, so you're right, bug bounty is our flagship product. It's what we're best known for. And it's a terrific solution. But on top of that, we're able to layer things like vulnerability disclosure, pen testing and code review. >> Pen test is actually really important-- >> Attack surface management, you know, a whole suite of complimentary offerings to help you engage these hackers in new and interesting ways. >> Yeah. >> The bug bounty is very popular because it's fun. >> Yeah. >> I mean if your going to work on something... It's fun for the hackers but the white hat hackers, the companies they can see where's my bugs it's the fear of missing out and the fear of getting screwed over. That's the biggest driver, right, you Know-- >> Yes, definitely and we now have a product called assets. So this is attack surface management. And what we're able to do with that is bring that in leverage the ethical hackers to risk-rank. What's your assets out there? How vulnerable are these? What's critical? Feed that in, and then you know, as Will was saying we've got all kinds of different testing options. Sometimes bug bounty continuous that works. Sometimes you want pen test, you know, you want it bound. >> Well, the thing about the thing about the pen test, well the soccer report, Amazon's got soccer reports but pen test is a moving train. >> Yeah >> Cause if you're pushing new code, you got to pen test it all the time. It's not a one and done. >> Exactly. >> You got to keep it running. Just one and run, right? >> You can't do the old school penetration test once a year, big monolithic thing. You know, this is just a check the box for compliances like, no, you need to be focusing this on the assets that you're releasing, which are constantly changing. And doing ongoing smaller cadences of pen testing. >> I had someone at a conference had a few cocktails in them, confessed to me, that they forged a pen test report. >> Oh man. >> Wow! (everyone laughs) >> Because he's like, "Oh! It was three months ago. Don't Worry about it." Like, but a lot can happen in three months. No, this is reality, they are like, "I can't turn it around fast enough" They had an Apsec review... >> Yeah. >> In their company and... >> And that's it. >> I mean, I'm not saying everyone's doing bad behavior, but like people can look the other way that creates more vulnerabilities. >> It can happen. And even just that time space. Let's say you're only doing a pen test once a year or once every two years. That's a long time. It's a lot of dwell time, you can have an attacker inside mulling around your network. >> All right. So we get a big service here. This one, AWS, we're here at re:Inforce the trend that you see Amazon getting closer to the ecosystem, lot more integration. How are you guys taking HackerOne's attack surface area product management software, closer to Amazon? What's going involved? Because at the end of the day they're enabling a lot of value and their partners are growing and becoming platforms within of themselves. What is the connection with Amazon? Keeping those apps running? How do you guys do that? >> Yeah. So we've got a specific assessment type for AWS. So... On the one hand, we're bringing in the right group of ethical hack hackers who are AWS certified. They have the right skillset, we're matching them. We've got the right assessment type for them to be able to track against and find the right vulnerabilities, report on those. So this is our pen test offering geared particularly towards the AWS platform. And then we also have an AWS security hub integration. So if customers are using the AWS security hub, we can plug into that, feed that information. And that gets more to it, the defense and depth for your AWS. >> And you guys verify all the ethical hackers? Everything's verified? >> Oh yes, absolutely. Fully. >> Yep. So they're verified for their pen testing experience, and skills and of course their AWS skills in particular. And their work experience, making sure that it's long enough that it's good, background check, the whole nine, so. >> How far has Amazon come from your perspective, over the past few years with the security partnerships? I mean their services have grown every year. I mean, every Amazon re:Invent, thousands of new announcements, new services. I mean if they update the DNS server, it's a new thing. Right? So like everything's happening. >> Yeah. >> What's different now? >> It's great to see. I mean, you look around at how many different types of security solutions there are here how many different types of partners, and it just shows you that defense in depth again, it's a really critical thing. Been a wonderful partner for us. I mean that, they're a big fan of us. They tell us that all the time. >> Yeah, 'cause the customers use you. >> Cause they're customers too. Right. Exactly. Exactly. But no, it's, it's been great. So we're looking at, we've got some things on the roadmap, some continued integrations that we look forward to doing with AWS, but you know, again it's a great powerful platform. It gives customers a lot of freedom, but with that freedom comes the responsibility that's needed to actually-- >> Will, what's your take? We hear hybrid security keys, management systems, announced today, encrypt everything, don't have over permissive environments. Obviously they're talking about more platform and that type of stuff >> Absolutely. My take would be, I think our own partnership with the AWS security team is great evidence that they're thinking about the right things. We worked within conjunction with them to develop our pen test methodology. So that combined for proprietary HackerOne platform data and findings across all of our customers that are common issues found in AWS environments with their own knowledge and their own experiences from the AWS security team directly. So it's a pretty powerful checklist that we're able to run through on some of these customers and make sure that all of the most common miss-configurations and such are covered. >> Yeah. They're highly motivated to do that. 'Cause they get blamed for the S3 buckets being kept open. It's not even their fault. >> Right. (crosstalk) >> We got hack over in Amazon. Amazon's terrible! >> Yeah. You know, one of the things we like to talk about is the fact that, you know, cloud is really about automation, right? >> Yeah. >> Yep. >> But you can't automate that human ingenuity the skills that come with an actual human who has the experience and the know how to fix these things. >> It's a lot going on in Amazon. It's always been kind of like, you just described earlier in theCUBE. An erector set, not Lego blocks yet, but still kind of, you still got to build it. It's getting better in the Lego model, but there are challenges in protecting cloud, Will. I mean this is a big part of protecting cloud platforms like AWS. What are some of those challenges? >> I think some of the challenges are the ephemeral nature of the cloud can really result in developers, and you know really business units across an organization spinning up assets that IT or security don't know about. And so that's where things like HackerOne assets in those attack surface management style solutions come into play, trying to identify those assets proactively and make sure that they're receiving some sort of attention from the security team whether it's automated or manual or ideally both. >> You guys got a good solution. So how about the partnership? We got one minute left. Talk about your partnership with AWS. You guys are certified in their security group, with their team and marketplace, right? Talk about some of those things. >> Yeah, we've been in marketplace over a year. We've had that the specific solution that I mentioned the App Pen test for AWS in place and integrated with security hub for some time now. There's some other stats that we could probably share around the ethical hackers that we have working on that. We have a number of certified AWS hackers, who again they have the right skill set for AWS, and they've been a great partner. We are very focused on continuing to work with them, and build out some new offerings going forward. >> Well, you guys have done a great job. Will, tell your team congratulations on the tech side, on the product side, very strong community. You guys had a lot of success. Congratulations! And thanks for sharing on theCUBE, appreciate it. >> Thanks for having us John. >> Thank you for your time-- We're here at re:Inforce where all the access tab is open, it's team oriented, we got cloud scale, data, encryption on everything. Big news coming out of re:Inforce, well, theCUBE's got it covered here. I'm John Furrier, your host. Thanks for watching. We'll be right back with more coverage after this short break. (theme music)

Published Date : Jul 26 2022

SUMMARY :

That's the big event of all time for AWS. So Marten's been on many and problem solver. It's been a big part of the re:Inforce. So the commute was pretty nice. And you guys have a great company. So you can plug those holes So you guys can feel the void either because you can't hire enough Hackers like to be a that do it full time, that do it part-time Well, you guys are in the middle here 37% of the attack surfaces, not secured. decade of no perimeter anymore. You know, the Cloud perfect example. So that is to solve what we around the world to be do the retesting, But you can't quite and make sure that there's So you now you got the Devs thinking: We got to code review new stuff. I mean, that's what happened. How are you going to keep up with that? Your phone is ringing off the hook. So, you know, yeah, bounties that you do. Exactly. really is to help describe to help you engage these hackers The bug bounty is very and the fear of getting screwed over. bring that in leverage the Well, the thing about the you got to pen test it all the time. You got to keep it running. You can't do the old school confessed to me, that they Like, but a lot can but like people can look the other way And even just that time space. the trend that you see and find the right vulnerabilities, Oh yes, absolutely. check, the whole nine, so. over the past few years with and it just shows you that on the roadmap, some and that type of stuff and make sure that all of the most common motivated to do that. Right. We got hack over in Amazon. you know, cloud is really the skills that come with an actual human It's getting better in the Lego model, and you know really business units So how about the partnership? We've had that the specific solution congratulations on the tech side, all the access tab is open,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

AWSORGANIZATION

0.99+

John FurrierPERSON

0.99+

Sean RyanPERSON

0.99+

AmazonORGANIZATION

0.99+

Marten MickosPERSON

0.99+

MartenPERSON

0.99+

JohnPERSON

0.99+

WillPERSON

0.99+

Will KapcioPERSON

0.99+

BostonLOCATION

0.99+

SeanPERSON

0.99+

North AmericaLOCATION

0.99+

MicrosoftORGANIZATION

0.99+

EuropeLOCATION

0.99+

one minuteQUANTITY

0.99+

Boston, MassachusettsLOCATION

0.99+

three months agoDATE

0.99+

once a yearQUANTITY

0.99+

2 great guestsQUANTITY

0.98+

LegoORGANIZATION

0.98+

OneQUANTITY

0.98+

earlier this yearDATE

0.98+

todayDATE

0.98+

over a yearQUANTITY

0.97+

bothQUANTITY

0.97+

800 security and IT professionalsQUANTITY

0.97+

nineQUANTITY

0.97+

theCUBEORGANIZATION

0.97+

nearly a thirdQUANTITY

0.96+

oneQUANTITY

0.96+

a million dollarsQUANTITY

0.96+

HackerOneORGANIZATION

0.94+

over a third, 37%QUANTITY

0.93+

three monthsQUANTITY

0.93+

two great guestsQUANTITY

0.92+

CTO Sequence SecurityORGANIZATION

0.91+

S3COMMERCIAL_ITEM

0.9+

ApsecORGANIZATION

0.9+

earlier this morningDATE

0.9+

once every two yearsQUANTITY

0.89+

2022DATE

0.86+

HackerOnePERSON

0.86+

InforceORGANIZATION

0.84+

thousands of new announcementsQUANTITY

0.77+

one of the findingsQUANTITY

0.76+

100 developersQUANTITY

0.75+

about a decadeQUANTITY

0.74+

re:ShowsEVENT

0.72+

one security professionalQUANTITY

0.7+

Eric Kostlan, Cisco Secure | AWS re:Inforce 2022


 

>>Okay, welcome back. Everyone's cubes live coverage of eight of us reinforced 22. I'm John furrier, my host David Lon. We've got a great guest from Cisco, Eric Costin, technical marketing engineer, Cisco systems. Great to have you on. Thanks with >>The all right. Thanks for having, >>Of course we've doing a lot of Cisco laws, Cisco events, Barcelona us know a lot of folks over there. A lot of great momentum supply chain challenges, but you got the cloud with a lot of networking there too. A lot of security conversations, dev sec ops, the trend we're hearing here is operations security and operations. What are some of the business realities that you guys are looking at right now focused on from a Cisco perspective and a landscape perspective? >>Well, the transition to the cloud is accelerating and it's really changed the way we're doing business and what we do now, this combined with the more and more remote work by remote users and also the consumption of cloud-based tools to perform your business functions has dramatically changed the contour of the business environment. The traditional trust boundary has evaporated or at least transformed dramatically, but you still have those requirements for trust for micro segmentation. So what we've seen is a dramatic change in how we do business and what we do. And this is essential because the value proposition is enormous and companies are able to pursue more and more ambitious objectives. But from a security point of view, it's quite challenging because on one hand, what we call the attack surface has increased and the stakes are much higher. So you have more sophisticated malicious actors taking advantage of a broader security target in order to conduct your business in order to maintain business continuity and achieve your objectives. You need to protect this environment. And one, one of the, >>Sorry, just to, just to clarify, sure. You said the value proposition is enormous. You mean the value proposition of the cloud is enormous. Exactly. So the business is leaning in big time and there are security consequences to >>That precisely. And so, and one thing that we've seen happen in the industry is as these components of the business environment have change, the industry has sort of bolted on more and more security solutions. But the problem with that is that's led to enormous complexity in administering security for the company, which is very expensive to find people with those expertise. And also the complexity itself is a vulnerability. >>And, and that traditional trust boundary that you talked about, it hasn't been vaporized has it, it's still there. So are you connecting into that? Is there an interoperability challenge? Does that create more security issues or are people kind of redoing? We talk about security as a do over, how are customers approaching it? >>It is a challenge because although the concept of a trust boundary still exists, the nature of the hybrid multi-cloud environment makes it very difficult to define furthermore, the traditional solutions such as simply having a, a, a firewall and, and an on-premise network is now much more complex because the on-premise network has to connect to the cloud infrastructure and parts of the cloud infrastructure have to be exposed to the public. Other parts have to be protected. So it's not that the, the concept of trusted versus untrusted has gone away. It's just become fundamentally more complex. >>So Eric, I wanna get your thoughts on this higher level abstraction trend, because you're seeing the complexity being pushed to the customers and they want to buy cloud or cloud operations from partners platforms that take the heavy lifting from there, and best of breed products that handle the complexity. What's your reaction to that, that statement? Do you think that's happening or that will happen because either the complexity is gonna be solved by the customer, or they're gonna buy a platform or SA product. >>Now the, the it's it's unreasonable to expect the customers to constantly adapt to this changing environment. From the point of view of, of security, they have to be able to focus on their business objectives, which is to actually sell their products and pursue their ambitions. And it's a distraction that they really can't afford if they have to be focused on security. So the solutions have to take that challenge that distraction away from them, and that has to be integral to the solution. >>So you're saying that the, the vendors, the provi supplier has to deal the underlying complexities on behalf of the customer. >>Exactly. The vendor can't do this without a robust partnership with the cloud provider, working together, the both at the engineering level to develop the products together and in the implementation, as well as standing side by side with the customer, as they expand their business into the >>Cloud, this is super cloud it's super cloud. Right? Exactly. So give us the specifics. What are you doing? What's Cisco doing? How are you working with AWS? What solutions are you talking about? >>Well, Cisco has a wide variety, quite an expansive portfolio because there's a large number of components to the solution. This spans both the, the workload protection, as well as the infrastructure protection. And these are integrated and in partnership with AWS not only integrated together, but integrated into the cloud components. And this is what allows comprehensive protection across the hybrid cloud environment. >>So are we talking about solutions that are embedded into switches? We're talking about software layers, maybe give, describe, add a little color, paint, a picture of the portfolio. >>And, and it's really all of those things. So the most of the solutions historically could say evolved from solutions that were utilized in the physical infrastructure, in the firewalls, in the switches, in the routers. And some of these technologies are still basically confined to those, to those form factors. But some of the most important technologies we use such as snort three, which is a best of breed intrusion protection system that we have adopted is, is applicable as well to the virtual environment, so that we, we push into the cloud in a way that's seamless. So that if you're, if you've developed those policies for your on-prem solutions, you can extend them into the cloud effortlessly. Another example of something that adapts quite well to the cloud is security intelligence. Cisco has talus. Talus is the world's leading security intelligence operation. This is fundamental for addressing threats day zero attacks and Taos updates are products approximately once every hour with the new, with information about these emerging attacks, as well as informing the community as a whole of this. And now that that architecture is very easily extensible into the cloud because you can inform a virtual device just as easily as you can inform a physical device of an emergent threat, >>But technically, how do you do that integration? That's just through AWS primitives. How do you, how does Cisco work with AWS at an engineering level to make that happen? >>So, part of it is that we, we, we have taken certain of our products and we virtualized them. So you could say the, the, the simplest or more straightforward approach is to take our firewalls and, and our other products and simply make virtual machines out of them. But that's really not sort of the most exciting thing. The most exciting thing is that working with them, with integration, with their components and doing such things as having our management platforms, like our Cisco defense orchestrator, be able to discover the virtual environment and utilize that discovery to, to manipulate the security components of that environment. Yeah. >>Kurt, this is where I think you, you, onto something big here management is kind of like, oh yeah, we have software management software kind of always a thing. When you talk about large scale, multiple data point billions and billions of things happening a month. Quantum, we mentioned that in the keynote, we heard Kurt who's VP of platform. So about reasoning. This is kind of a whole nother level of technology. Next level reasoning, knowing things mentioned micro segmentation. So we're seeing a new era of not just policies, reasoning around the networks, around the software stuff that needs to be better than just machine learning, doing predictive and, you know, analysis. Can you share your reaction to that? Because I see this dots connecting at a whole nother level. >>Yes. Now, as we understand artificial intelligence machine learning, I think we appreciate that one of the key components there, we think about it as data science, as data management. But when you think about data, you suddenly recognize where's it coming from data requires visibility. And when we talk about the transition to the cloud and the dispersion of the workforce, visibility is one of the great challenges and visibility even prior to these transitions has been one of the primary focuses of Cisco systems. So as we transition to the cloud and we recognize the need to be able to interpret what we're seeing, we have expanded our capacity to visualize what's happening. And I think there's a, a significant contribution yeah. To the >>Dave and I were talking about this in context to our thesis about super cloud, how that's going evolving building on top of the hyperscalers CapEx investment, doing things, customer data control flows are a huge thing going across multiple geographies. It's global, you got regions, you got network, some trusted, some not. And you have now applications that are global. So you got data flows. >>Yes. >>I mean, data's gotta move across multiple environments. So that's a challenge >>And it has to move secure securely. And furthermore, there's a real challenge here with confidence, with confidence of the company that it's data flow is secure in this new environment that is frankly, can be a little bit uncomfortable. And also the customer and the partners of that business have to be confident that their intellectual property, that their security and identity is protected. >>Yeah. Dave and I were talking also, we're kind of old and seen some seen the movie before. Remember the old days of multi-vendor and OSI models and, you know, interoperability, we're kind of at a new inflection point where teamwork, not just ecosystem partners, companies working together to make sure things are secure. This is a whole nother data problem, opportunity. Amazon sees things that other people don't seek and contribute that back. How does this whole next level multi-vendor partnerships, the open source is a big part of the software piece of it. You got it's custom Silicon. You mentioned. How do you view that whole team oriented approach in security? >>Now this is absolutely essential. The community, the industry has to work together. Fortunately, it's in the DNA of Cisco to interate, I've sat next to competitors at customer sites working to solve the customer's problem. It's just how we function. So it's not just our partnerships, but it's our relationship with industry because industry has common purpose in solving these problems. We have to be confident in order to pursue our objectives. >>You see, you see this industry at a flash point right now, everyone has to partner. >>Exactly. >>Okay. How would you summarize that? We, we are out of time, but so give us your leadership about the >>Part of you, of business leadership. A business needs business continuity, its contributors have to be able to access resources to perform their job. And the customers and partners need confidence to deal with that business. You need the continuity, you demand flexibility to adapt to the changing environment and to take advantage of emerging opportunities. And you expect security. The security has to be resilient. It has to be robust. The security has to be simple to implement Cisco in partnership with AWS provides the security. You need to succeed. >>Eric, thanks coming for so much for coming on the cube. Really appreciate your insights and your experience and, and candid commentary and appreciate your time. Thank >>You. Thank you very much for the >>Opportunity. Okay. We're here. Live on the floor and expo hall at reinforce Avis reinforced 22 in Boston, Massachusetts. I'm John ante. We'll be right back with more coverage after this short break.

Published Date : Jul 26 2022

SUMMARY :

Great to have you on. The all right. What are some of the business realities and also the consumption of cloud-based tools to So the business is leaning in big time and there are security consequences to administering security for the company, which is very expensive to find people with those expertise. And, and that traditional trust boundary that you talked about, it hasn't been vaporized has it, and parts of the cloud infrastructure have to be exposed to the public. complexity is gonna be solved by the customer, or they're gonna buy a platform or SA product. So the solutions have to take that challenge that on behalf of the customer. the cloud provider, working together, the both at the engineering level to How are you working with AWS? the hybrid cloud environment. layers, maybe give, describe, add a little color, paint, a picture of the portfolio. So the most of the solutions historically But technically, how do you do that integration? But that's really not sort of the most exciting thing. reasoning around the networks, around the software stuff that needs to be better than is one of the great challenges and visibility even prior to these transitions So you got data flows. So that's a challenge the partners of that business have to be confident that their a big part of the software piece of it. the DNA of Cisco to interate, I've sat next to We, we are out of time, but so give us your leadership about the And the customers and partners need confidence to deal with that Eric, thanks coming for so much for coming on the cube. Live on the floor and expo hall at reinforce Avis reinforced 22

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavePERSON

0.99+

AWSORGANIZATION

0.99+

David LonPERSON

0.99+

KurtPERSON

0.99+

EricPERSON

0.99+

Eric CostinPERSON

0.99+

CiscoORGANIZATION

0.99+

Eric KostlanPERSON

0.99+

AmazonORGANIZATION

0.99+

Boston, MassachusettsLOCATION

0.99+

AvisORGANIZATION

0.99+

billionsQUANTITY

0.99+

John furrierPERSON

0.99+

bothQUANTITY

0.98+

eightQUANTITY

0.97+

oneQUANTITY

0.95+

a monthQUANTITY

0.95+

one thingQUANTITY

0.93+

22QUANTITY

0.88+

BarcelonaLOCATION

0.88+

approximately once every hourQUANTITY

0.87+

Cisco SecureORGANIZATION

0.86+

TalusORGANIZATION

0.85+

2022DATE

0.84+

CapExORGANIZATION

0.83+

zeroQUANTITY

0.82+

TaosTITLE

0.81+

John antePERSON

0.72+

Keynote Analysis | AWS re:Inforce 2022


 

>>Hello, everyone. Welcome to the Cube's live coverage here in Boston, Massachusetts for AWS reinforce 2022. I'm John fur, host of the cube with Dave. Valante my co-host for breaking analysis, famous podcast, Dave, great to see you. Um, Beck in Boston, 2010, we started >>The queue. It all started right here in this building. John, >>12 years ago, we started here, but here, you know, just 12 years, it just seems like a marathon with the queue. Over the years, we've seen many ways. You call yourself a historian, which you are. We are both now, historians security is doing over. And we said in 2013 is security to do where we asked pat GSK. Now the CEO of Intel prior to that, he was the CEO of VMware. This is the security show fors. It's called the reinforce. They have reinvent, which is their big show. Now they have these, what they call reshow, re Mars, machine learning, automation, um, robotics and space. And then they got reinforced, which is security. It's all about security in the cloud. So great show. Lot of talk about the keynotes were, um, pretty, I wouldn't say generic on one hand, but specific in the other clear AWS posture, we were both watching. What's your take? >>Well, John, actually looking back to may of 2010, when we started the cube at EMC world, and that was the beginning of this massive boom run, uh, which, you know, finally, we're starting to see some, some cracks of the armor. Of course, we're threats of recession. We're in a recession, most likely, uh, in inflationary pressures, interest rate hikes. And so, you know, finally the tech market has chilled out a little bit and you have this case before we get into the security piece of is the glass half full or half empty. So budgets coming into this year, it was expected. They would grow at a very robust eight point half percent CIOs have tuned that down, but it's still pretty strong at around 6%. And one of the areas that they really have no choice, but to focus on is security. They moved everything into the cloud or a lot of stuff into the cloud. >>They had to deal with remote work and that created a lot of security vulnerabilities. And they're still trying to figure that out and plug the holes with the lack of talent that they have. So it's interesting re the first reinforc that we did, which was also here in 2019, Steven Schmidt, who at the time was chief information security officer at Amazon web services said the state of cloud security is really strong. All this narrative, like the pat Gelsinger narrative securities, a do over, which you just mentioned, security is broken. It doesn't help the industry. The state of cloud security is very strong. If you follow the prescription. Well, see, now Steven Schmidt, as you know, is now chief security officer at Amazon. So we followed >>Jesse all Amazon, not just AWS. So >>He followed Jesse over and I asked him, well, why no, I, and they said, well, he's responsible now for physical security. Presumably the warehouses I'm like, well, wait a minute. What about the data centers? Who's responsible for that? So it's kind of funny, CJ. Moses is now the CSO at AWS and you know, these events are, are good. They're growing. And it's all about best practices, how to apply the practices. A lot of recommendations from, from AWS, a lot of tooling and really an ecosystem because let's face it. Amazon doesn't have the breadth and depth of tools to do it alone. >>And also the attendance is interesting, cuz we are just in New York city for the, uh, ado summit, 19,000 people, massive numbers, certainly in the pandemic. That's probably one of the top end shows and it was a summit. This is a different audience. It's security. It's really nerdy. You got OT, you got cloud. You've got on-prem. So now you have cloud operations. We're calling super cloud. Of course we're having our inaugural pilot event on August 9th, check it out. We're called super cloud, go to the cube.net to check it out. But this is the super cloud model evolving with security. And what you're hearing today, Dave, I wanna get your reaction to this is things like we've got billions of observational points. We're certainly there's no perimeter, right? So the perimeter's dead. The new perimeter, if you will, is every transaction at scale. So you have to have a new model. So security posture needs to be rethought. They actually said that directly on the keynote. So security, although numbers aren't as big as last week or two weeks ago in New York still relevant. So alright. There's sessions here. There's networking. Very interesting demographic, long hair. Lot of >>T-shirts >>No lot of, not a lot of nerds doing to build out things over there. So, so I gotta ask you, what's your reaction to this scale as the new advantage? Is that a tailwind or a headwind? What's your read? >>Well, it is amazing. I mean he actually, Steven Schmidt talked about quadrillions of events every month, quadrillions 15 zeros. What surprised me, John. So they, they, Amazon talks about five areas, but by the, by the way, at the event, they got five tracks in 125 sessions, data protection and privacy, GRC governance, risk and compliance, identity network security and threat detection. I was really surprised given the focus on developers, they didn't call out container security. I would've thought that would be sort of a separate area of focus, but to your point about scale, it's true. Amazon has a scale where they'll see events every day or every month that you might not see in a generation if you just kind of running your own data center. So I do think that's, that's, that's, that's a, a, a, a valid statement having said that Amazon's got a limited capability in terms of security. That's why they have to rely on the ecosystem. Now it's all about APIs connecting in and APIs are one of the biggest security vulnerability. So that's kind of, I, I I'm having trouble squaring that circle. >>Well, they did just to come up, bring back to the whole open source and software. They did say they did make a measurement was store, but at the beginning, Schmidt did say that, you know, besides scale being an advantage for Amazon with a quadri in 15 zeros, don't bolt on security. So that's a classic old school. We've heard that before, right. But he said specifically, weave in security in the dev cycles. And the C I C D pipeline that is, that basically means shift left. So sneak is here, uh, company we've covered. Um, and they, their whole thing is shift left. That implies Docker containers that implies Kubernetes. Um, but this is not a cloud native show per se. It's much more crypto crypto. You heard about, you know, the, uh, encrypt everything message on the keynote. You heard, um, about reasoning, quantum, quantum >>Skating to the puck. >>Yeah. So yeah, so, you know, although the middleman is logged for J heard that little little mention, I love the quote from Lewis Hamilton that they put up on stage CJ, Moses said, team behind the scenes make it happen. So a big emphasis on teamwork, big emphasis on don't bolt on security, have it in the beginning. We've heard that before a lot of threat modeling discussions, uh, and then really this, you know, the news around the cloud audit academy. So clearly skills gap, more threats, more use cases happening than ever before. >>Yeah. And you know, to your point about, you know, the teamwork, I think the problem that CISOs have is they just don't have the talent to that. AWS has. So they have a real difficulty applying that talent. And so but's saying, well, join us at these shows. We'll kind of show you how to do it, how we do it internally. And again, I think when you look out on this ecosystem, there's still like thousands and thousands of tools that practitioners have to apply every time. There's a tool, there's a separate set of skills to really understand that tool, even within AWS's portfolio. So this notion of a shared responsibility model, Amazon takes care of, you know, securing for instance, the physical nature of S3 you're responsible for secure, make sure you're the, the S3 bucket doesn't have public access. So that shared responsibility model is still very important. And I think practitioners still struggling with all this complexity in this matrix of tools. >>So they had the layered defense. So, so just a review opening keynote with Steve Schmidt, the new CSO, he talked about weaving insecurity in the dev cycles shift left, which is the, I don't bolt it on keep in the beginning. Uh, the lessons learned, he talked a lot about over permissive creates chaos, um, and that you gotta really look at who has access to what and why big learnings there. And he brought up the use cases. The more use cases are coming on than ever before. Um, layered defense strategy was his core theme, Dave. And that was interesting. And he also said specifically, no, don't rely on single security control, use multiple layers, stronger together. Be it it from the beginning, basically that was the whole ethos, the posture, he laid that down >>And he had a great quote on that. He said, I'm sorry to interrupt single controls. And binary states will fail guaranteed. >>Yeah, that's a guarantee that was basically like, that's his, that's not a best practice. That's a mandate. <laugh> um, and then CJ, Moses, who was his deputy in the past now takes over a CSO, um, ownership across teams, ransomware mitigation, air gaping, all that kind of in the weeds kind of security stuff. You want to check the boxes on. And I thought he did a good job. Right. And he did the news. He's the new CISO. Okay. Then you had lean is smart from Mongo DB. Come on. Yeah. Um, she was interesting. I liked her talk, obviously. Mongo is one of the ecosystem partners headlining game. How do you read into that? >>Well, I, I I'm, its really interesting. Right? You didn't see snowflake up there. Right? You see data breaks up there. You had Mongo up there and I'm curious is her and she's coming on the cube tomorrow is her primary role sort of securing Mongo internally? Is it, is it securing the Mongo that's running across clouds. She's obviously here talking about AWS. So what I make of it is, you know, that's, it's a really critical partner. That's driving a lot of business for AWS, but at the same time it's data, they talked about data security being one of the key areas that you have to worry about and that's, you know what Mongo does. So I'm really excited. I talked to her >>Tomorrow. I, I did like her mention a big idea, a cube alumni, yeah. Company. They were part of our, um, season one of our eight of us startup showcase, check out AWS startups.com. If you're watching this, we've been doing now, we're in season two, we're featuring the fastest growing hottest startups in the ecosystem. Not the big players, that's ISVs more of the startups. They were mentioned. They have a great product. So I like to mention a big ID. Um, security hub mentioned a config. They're clearly a big customer and they have user base, a lot of E C, two and storage going on. People are building on Mongo so I can see why they're in there. The question I want to ask you is, is Mongo's new stuff in line with all the upgrades in the Silicon. So you got graviton, which has got great stuff. Um, great performance. Do you see that, that being a key part of things >>Well, specifically graviton. So I I'll tell you this. I'll tell you what I know when you look at like snowflake, for instance, is optimizing for graviton. For certain workloads, they actually talked about it on their earnings call, how it's lowered the cost for customers and actually hurt their revenue. You know, they still had great revenue, but it hurt their revenue. My sources indicate to me that that, that Mongo is not getting as much outta graviton two, but they're waiting for graviton three. Now they don't want to make that widely known because they don't wanna dis AWS. But it's, it's probably because Mongo's more focused on analytics. But so to me, graviton is the future. It's lower cost. >>Yeah. Nobody turns off the database. >>Nobody turns off the database. >><laugh>, it's always cranking C two cycles. You >>Know the other thing I wanted to bring, bring up, I thought we'd hear, hear more about ransomware. We heard a little bit of from Kirk Coel and he, and he talked about all these things you could do to mitigate ransomware. He didn't talk about air gaps and that's all you hear is how air gap. David Flo talks about this all the time. You must have air gaps. If you wanna, you know, cover yourself against ransomware. And they didn't even mention that. Now, maybe we'll hear that from the ecosystem. That was kind of surprising. Then I, I saw you made a note in our shared doc about encryption, cuz I think all the talk here is encryption at rest. What about data in motion? >>Well, this, this is the last guy that came on the keynote. He brought up encryption, Kurt, uh, Goel, which I love by the way he's VP of platform. I like his mojo. He's got the long hair >>And he's >>Geeking out swagger, but I, he hit on some really cool stuff. This idea of the reasoning, right? He automated reasoning is little pet project that is like killer AI. That's next generation. Next level >>Stuff. Explain that. >>So machine learning does all kinds of things, you know, goes to sit pattern, supervise, unsupervised automate stuff, but true reasoning. Like no one connecting the dots with software. That's like true AI, right? That's really hard. Like in word association, knowing how things are connected, looking at pattern and deducing things. So you predictive analytics, we all know comes from great machine learning. But when you start getting into deduction, when you say, Hey, that EC two cluster never should be on the same VPC, is this, this one? Why is this packet trying to go there? You can see patterns beyond normal observation space. So if you have a large observation space like AWS, you can really put some killer computer science technology on this. And that's where this reasoning is. It's next level stuff you don't hear about it because nobody does it. Yes. I mean, Google does it with metadata. There's meta meta reasoning. Um, we've been, I've been watching this for over two decades now. It's it's a part of AI that no one's tapped and if they get it right, this is gonna be a killer part of the automation. So >>He talked about this, basically it being advanced math that gets you to provable security, like you gave an example. Another example I gave is, is this S3 bucket open to the public is a, at that access UN restricted or unrestricted, can anyone access my KMS keys? So, and you can prove, yeah. The answer to that question using advanced math and automated reasoning. Yeah, exactly. That's a huge leap because you used to be use math, but you didn't have the data, the observation space and the compute power to be able to do it in near real time or real time. >>It's like, it's like when someone, if in the physical world real life in real life, you say, Hey, that person doesn't belong here. Or you, you can look at something saying that doesn't fit <laugh> >>Yeah. Yeah. >>So you go, okay, you observe it and you, you take measures on it or you query that person and say, why you here? Oh, okay. You're here. It doesn't fit. Right. Think about the way on the right clothes, the right look, whatever you kind of have that data. That's deducing that and getting that information. That's what reasoning is. It's it's really a killer level. And you know, there's encrypt, everything has to be data. Lin has to be data in at movement at rest is one thing, but you gotta get data in flight. Dave, this is a huge problem. And making that work is a key >>Issue. The other thing that Kirk Coel talked about was, was quantum, uh, quantum proof algorithms, because basically he put up a quote, you're a hockey guy, Wayne Greski. He said the greatest hockey player ever. Do you agree? I do agree. Okay, great. >>Bobby or, and Wayne Greski. >>Yeah, but okay, so we'll give the nada Greski, but I always skate to the where the puck is gonna be not to where it's been. And basically his point was where skating to where quantum is going, because quantum, it brings risks to basically blow away all the existing crypto cryptographic algorithms. I, I, my understanding is N just came up with new algorithms. I wasn't clear if those were supposed to be quantum proof, but I think they are, and AWS is testing them. And AWS is coming out with, you know, some test to see if quantum can break these new algos. So that's huge. The question is interoperability. Yeah. How is it gonna interact with all the existing algorithms and all the tools that are out there today? So I think we're a long way off from solving that problem. >>Well, that was one of Kurt's big point. You talking about quantum resistant cryptography and they introduce hybrid post quantum key agreements. That means KMS cert certification, cert manager and manager all can manage the keys. This was something that's gives more flexibility on, on, on that quantum resistance argument. I gotta dig into it. I really don't know how it works, what he meant by that in terms of what does that hybrid actually mean? I think what it means is multi mode and uh, key management, but we'll see. >>So I come back to the ho the macro for a second. We've got consumer spending under pressure. Walmart just announced, not great earning. Shouldn't be a surprise to anybody. We have Amazon meta and alphabet announcing this weekend. I think Microsoft. Yep. So everybody's on edge, you know, is this gonna ripple through now? The flip side of that is BEC because the economy yeah. Is, is maybe not in, not such great shape. People are saying maybe the fed is not gonna raise after September. Yeah. So that's, so that's why we come back to this half full half empty. How does that relate to cyber security? Well, people are prioritizing cybersecurity, but it's not an unlimited budget. So they may have to steal from other places. >>It's a double whammy. Dave, it's a double whammy on the spend side and also the macroeconomic. So, okay. We're gonna have a, a recession that's predicted the issue >>On, so that's bad on the one hand, but it's good from a standpoint of not raising interest rates, >>It's one of the double whammy. It was one, it's one of the double whammy and we're talking about here, but as we sit on the cube two weeks ago at <inaudible> summit in New York, and we did at re Mars, this is the first recession where the cloud computing hyperscale is, are pumping full cylinder, all cylinders. So there's a new economic engine called cloud computing that's in place. So unlike data center purchase in the past, that was CapEx. When, when spending was hit, they pause was a complete shutdown. Then a reboot cloud computer. You can pause spending for a little bit, make, might make the cycle longer in sales, but it's gonna be quickly fast turned on. So, so turning off spending with cloud is not that hard to do. You can hit pause and like check things out and then turn it back on again. So that's just general cloud economics with security though. I don't see the spending slowing down. Maybe the sales cycles might go longer, but there's no spending slow down in my mind that I see. And if there's any pause, it's more of refactoring, whether it's the crypto stuff or new things that Amazon has. >>So, so that's interesting. So a couple things there. I do think you're seeing a slight slow down in the, the, the ex the velocity of the spend. When you look at the leaders in spending velocity in ETR data, CrowdStrike, Okta, Zscaler, Palo Alto networks, they're all showing a slight deceleration in spending momentum, but still highly elevated. Yeah. Okay. So, so that's a, I think now to your other point, really interesting. What you're saying is cloud spending is discretionary. That's one of the advantages. I can dial it down, but track me if I'm wrong. But most of the cloud spending is with reserved instances. So ultimately you're buying those reserved instances and you have to spend over a period of time. So they're ultimately AWS is gonna see that revenue. They just might not see it for this one quarter. As people pull back a little bit, right. >>It might lag a little bit. So it might, you might not see it for a quarter or two, so it's impact, but it's not as severe. So the dialing up, that's a key indicator get, I think I'm gonna watch that because that's gonna be something that we've never seen before. So what's that reserve now the wild card and all this and the dark horse new services. So there's other services besides the classic AC two, but security and others. There's new things coming out. So to me, this is absolutely why we've been saying super cloud is a thing because what's going on right now in security and cloud native is there's net new functionality that needs to be in place to handle multiple clouds, multiple abstraction layers, and to do all these super cloudlike capabilities like Mike MongoDB, like these vendors, they need to up their gain. And that we're gonna see new cloud native services that haven't exist. Yeah. I'll use some hatchy Corp here. I'll use something over here. I got some VMware, I got this, but there's gaps. Dave, there'll be gaps that are gonna emerge. And I think that's gonna be a huge wild >>Cup. And now I wanna bring something up on the super cloud event. So you think about the layers I, as, uh, PAs and, and SAS, and we see super cloud permeating, all those somebody ask you, well, because we have Intuit coming on. Yep. If somebody asks, why Intuit in super cloud, here's why. So we talked about cloud being discretionary. You can dial it down. We saw that with snowflake sort of Mongo, you know, similarly you can, if you want dial it down, although transaction databases are to do, but SAS, the SAS model is you pay for it every month. Okay? So I've, I've contended that the SAS model is not customer friendly. It's not cloudlike and it's broken for customers. And I think it's in this decade, it's gonna get fixed. And people are gonna say, look, we're gonna move SAS into a consumption model. That's more customer friendly. And that's something that we're >>Gonna explore in the super cloud event. Yeah. And one more thing too, on the spend, the other wild card is okay. If we believe super cloud, which we just explained, um, if you don't come to the August 9th event, watch the debate happen. But as the spending gets paused, the only reason why spending will be paused in security is the replatforming of moving from tools to platforms. So one of the indicators that we're seeing with super cloud is a flight to best of breeds on platforms, meaning hyperscale. So on Amazon web services, there's a best of breed set of services from AWS and the ecosystem on Azure. They have a few goodies there and customers are making a choice to use Azure for certain things. If they, if they have teams or whatever or office, and they run all their dev on AWS. So that's kind of what's happened. So that's, multi-cloud by our definition is customers two clouds. That's not multi-cloud, as in things are moving around. Now, if you start getting data planes in there, these customers want platforms. If I'm a cybersecurity CSO, I'm moving to platforms, not just tools. So, so maybe CrowdStrike might have it dial down, but a little bit, but they're turning into a platform. Splunk trying to be a platform. Okta is platform. Everybody's scale is a platform. It's a platform war right now, Dave cyber, >>A right paying identity. They're all plat platform, beach products. We've talked about that a lot in the queue. >>Yeah. Well, great stuff, Dave, let's get going. We've got two days alive coverage. Here is a cubes at, in Boston for reinforc 22. I'm Shante. We're back with our guests coming on the queue at the short break.

Published Date : Jul 26 2022

SUMMARY :

I'm John fur, host of the cube with Dave. It all started right here in this building. Now the CEO of Intel prior to that, he was the CEO of VMware. And one of the areas that they really have no choice, but to focus on is security. out and plug the holes with the lack of talent that they have. So And it's all about best practices, how to apply the practices. So you have to have a new No lot of, not a lot of nerds doing to build out things over there. Now it's all about APIs connecting in and APIs are one of the biggest security vulnerability. And the C I C D pipeline that is, that basically means shift left. I love the quote from Lewis Hamilton that they put up on stage CJ, Moses said, I think when you look out on this ecosystem, there's still like thousands and thousands I don't bolt it on keep in the beginning. He said, I'm sorry to interrupt single controls. And he did the news. So what I make of it is, you know, that's, it's a really critical partner. So you got graviton, which has got great stuff. So I I'll tell you this. You and he, and he talked about all these things you could do to mitigate ransomware. He's got the long hair the reasoning, right? Explain that. So machine learning does all kinds of things, you know, goes to sit pattern, supervise, unsupervised automate but you didn't have the data, the observation space and the compute power to be able It's like, it's like when someone, if in the physical world real life in real life, you say, Hey, that person doesn't belong here. the right look, whatever you kind of have that data. He said the greatest hockey player ever. you know, some test to see if quantum can break these new cert manager and manager all can manage the keys. So everybody's on edge, you know, is this gonna ripple through now? We're gonna have a, a recession that's predicted the issue I don't see the spending slowing down. But most of the cloud spending is with reserved So it might, you might not see it for a quarter or two, so it's impact, but it's not as severe. So I've, I've contended that the SAS model is not customer friendly. So one of the indicators that we're seeing with super cloud is a We've talked about that a lot in the queue. We're back with our guests coming on the queue at the short break.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Steven SchmidtPERSON

0.99+

AWSORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

Wayne GreskiPERSON

0.99+

WalmartORGANIZATION

0.99+

DavePERSON

0.99+

BostonLOCATION

0.99+

JohnPERSON

0.99+

MicrosoftORGANIZATION

0.99+

2013DATE

0.99+

MosesPERSON

0.99+

New YorkLOCATION

0.99+

MongoORGANIZATION

0.99+

August 9thDATE

0.99+

David FloPERSON

0.99+

BobbyPERSON

0.99+

2019DATE

0.99+

Steve SchmidtPERSON

0.99+

ShantePERSON

0.99+

KurtPERSON

0.99+

thousandsQUANTITY

0.99+

JessePERSON

0.99+

Lewis HamiltonPERSON

0.99+

125 sessionsQUANTITY

0.99+

two daysQUANTITY

0.99+

VMwareORGANIZATION

0.99+

last weekDATE

0.99+

GoogleORGANIZATION

0.99+

eightQUANTITY

0.99+

12 yearsQUANTITY

0.99+

2010DATE

0.99+

John furPERSON

0.99+

todayDATE

0.99+

19,000 peopleQUANTITY

0.99+

GreskiPERSON

0.99+

ZscalerORGANIZATION

0.99+

Kirk CoelPERSON

0.99+

SASORGANIZATION

0.99+

GoelPERSON

0.99+

IntelORGANIZATION

0.99+

twoQUANTITY

0.99+

12 years agoDATE

0.98+

bothQUANTITY

0.98+

OktaORGANIZATION

0.98+

TomorrowDATE

0.98+

two weeks agoDATE

0.98+

15 zerosQUANTITY

0.98+

five tracksQUANTITY

0.98+

firstQUANTITY

0.98+

BeckPERSON

0.98+

Gunnar Hellekson, Red Hat | Red Hat Summit 2022


 

(upbeat music) >> Welcome back to Boston, Massachusetts. We're here at the Seaport. You're watching theCUBE's coverage of Red Hat Summit 2022. My name is Dave Vellante and Paul Gillin is here. He's my cohost for the next day. We are going to dig in to the famous RHEL, Red Hat Enterprise Linux. Gunnar Hellekson is here, he's the Vice President and General Manager of Red Hat Enterprise Linux. Gunnar, welcome to theCUBE. Good to see you. >> Thanks for having me. Nice to be here, Dave, Paul. >> RHEL 9 is, wow, nine, Holy cow. It's been a lot of iterations. >> It's the highest version of RHEL we've ever shipped. >> And now we're talking edge. >> Yeah, that's right. >> And so, what's inside, tell us. to keep happy with a new RHEL release. to keep happy with a new RHEL release. The first is the hardware partners, right, because they rely on RHEL to light up all their delicious hardware that they're making, then you got application developers and the ISVs who rely on RHEL to be that kind of stable platform for innovation, and then you've got the operators, the people who are actually using the operating system itself and trying to keep it running every day. So we've got on the, I'll start with the hardware side, So we've got on the, I'll start with the hardware side, which is something, as you know, RHEL success, and I think you talked about this with Matt, just in a few sessions earlier that the success of RHEL is really, hinges on our partnerships with the hardware partners and in this case, we've got, let's see, in RHEL 9 we've got all the usual hardware suspects and we've added, just recently in January, we added support for ARM servers, as general ARM server class hardware. And so that's something customers have been asking for, delighted to be shipping that in RHEL 9. So now ARM is kind of a first-class citizen, right? Alongside x86, PowerZ and all the other usual suspects. And then of course, working with our favorite public cloud providers. So making sure that RHEL 9 is available at AWS and Azure and GCP and all our other cloud friends, right? >> Yeah, you mentioned ARM, we're seeing ARM in the enterprise. We're obviously seeing ARM at the edge. You guys have been working with ARM for a long time. You're working with Intel, you're working with NVIDIA, you've got some announcements this week. Gunnar, how do you keep Linux from becoming Franken OS with all these capabilities? >> This is a great question. First is, the most important thing is to be working closely with, I mean, the whole point of Linux and the reason why Linux works is because you have all these people working together to make the same thing, right? And so fighting that is a bad idea. Working together with everyone, leaning into that collaboration, that's an important part of making it work over time. The other one is having, just like in any good relationship, having healthy boundaries. And so making sure that we're clear about the things that we need to keep stable and the places where we're allowed to innovate and striking the right balance between those two things, that allows us to continue to ship one coherent operating system while still keeping literally thousands of platforms happy. >> So you're not trying to suck in all the full function, you're trying to accommodate that function that the ecosystem is going to develop? >> Yeah, that's right. So the idea is that what we strive for is consistency across all of the infrastructures and then allowing for kind of optimizations and we still let ourselves take advantage of whatever indigenous feature might appear on, such an ARM chip or thus in a such cloud platform. But really, we're trying to deliver a uniform platform experience to the application developers, right? Because they can't be having, like there can't be kind of one version of RHEL over here and another version of RHEL over here, the ecosystem wouldn't work. The whole point of Linux and the whole point of Red Hat Enterprise Linux is to be the same so that everything else can be different. >> And what incentives do you use to keep customers current? >> To keep customers current? Well so the best thing to do I found is to meet customers where they are. So a lot of people think we release RHEL 9 at the same time we have Red Hat Enterprise Linux 8, we have Red Hat Enterprise Linux 7, all these are running at the same time, and then we also have multiple minor release streams inside those. So at any given time, we're running, let's say, a dozen different versions of RHEL are being maintained and kept up-to-date, and we do this precisely to make sure that we're not force marching people into the new version and they have a Red Hat Enterprise Linux subscription, they should just be able to sit there and enjoy the minor version that they like. And we try and keep that going for as long as possible. >> Even if it's 10 years out of date? >> So, 10 years, interesting you chose that number because that's the end of life. >> That's the end of the life cycle. >> Right. And so 10 years is about, that's the natural life of a given major release, but again inside that you have several 10-year life cycles kind of cascading on each other, right? So nine is the start of the next 10-year cycle while we're still living inside the 10-year cycle of seven and eight. So lots of options for customers. >> How are you thinking about the edge? how do you define, let's not go to the definition, but at high level. (Gunnar laughing) Like I've been in a conference last week. It was Dell Tech World, I'll just say it. They were sort of the edge to them was the retail store. >> Yeah. >> Lowe's, okay, cool, I guess that's edgy, I guess, But I think space is the edge. (Gunnar chuckling) >> Right, right, right. >> Or a vehicle. How do you think about the edge? All the above or but the exciting stuff to me is that far edge, but I wonder if you can comment. >> Yeah, so there's all kinds of taxonomies out there for the edge. For me, I'm a simple country product manager at heart and so, I try to keep it simple, right? And the way I think about the edge is, here's a use case in which somebody needs a small operating system that deploys on probably a small piece of hardware, usually varying sizes, but it could be pretty small. That thing needs to be updated without any human touching it, right? And it needs to be reliably maintained without any human touching it. Usually in the edge cases, actually touching the hardware is a very expensive proposition. So we're trying to be as hands off as possible. >> No truck rolls. >> No truck rolls ever, right, exactly. (Dave chuckling) And then, now that I've got that stable base, I'm going to go take an application. I'll probably put it in a container for simplicity's sake and same thing, I want to be able to deploy that application. If something goes wrong, I need to build a roll back to a known good state and then I need to set of management tools that allow me to touch things, make sure that everything is healthy, make sure that the updates roll out correctly, maybe do some AB testing, things like that. So I think about that as, that's the, when we talk about the edge case for RHEL, that's the horizontal use case and then we can do specializations inside particular verticals or particular industries, but at bottom that's the use case we're talking about when we talk about the edge. >> And an assumption of connectivity at some point? >> Yeah. >> Right, you didn't have to always be on. >> Intermittent, latent, eventual connectivity. >> Eventual connectivity. (chuckles) That's right in some tech terms. >> Red Hat was originally a one trick pony. I mean, RHEL was it and now you've got all of these other extensions and different markets that you expanded into. What's your role in coordinating what all those different functions are doing? >> Yes, you look at all the innovations we've made, whether it's in storage, whether it's in OpenShift and elsewhere, RHEL remains the beating heart, right? It's the place where everything starts. And so a lot of what my team does is, yes, we're trying to make all the partners happy, we're also trying to make our internal partners happy, right? So the OpenShift folks need stuff out of RHEL, just like any other software vendor. And so I really think about RHEL is yes, we're a platform, yes, we're a product in our own right, but we're also a service organization for all the other parts of the portfolio. And the reason for that is we need to make sure all this stuff works together, right? Part of the whole reasoning behind the Red Hat Portfolio at large is that each of these pieces build on each other and compliment each other, right? I think that's an important part of the Red Hat mission, the RHEL mission. >> There's an article in the journal yesterday about how the tech industry was sort of pounding the drum on H-1B visas, there's a limit. I think it's been the same limit since 2005, 65,000 a year. We are facing, customers are facing, you guys, I'm sure as well, we are, real skills shortage, there's a lack of talent. How are you seeing companies deal with that? What are you advising them? What are you guys doing yourselves? >> Yeah, it's interesting, especially as everybody went through some flavor of digital transformation during the pandemic and now everybody's going through some, and kind of connected to that, everybody's making a move to the public cloud. They're making operating system choices when they're making those platform choices, right? And I think what's interesting is that, what they're coming to is, "Well, I have a Linux skills shortage and for a thousand reasons the market has not provided enough Linux admins." I mean, these are very lucrative positions, right? With command a lot of money, you would expect their supply would eventually catch up, but for whatever reason, it's not catching up. So I can't solve this by throwing bodies at it so I need to figure out a more efficient way of running my Linux operation. People are making a couple choices. The first is they're ensuring that they have consistency in their operating system choices, whether it's on premise or in the cloud, or even out on the edge, if I have to juggle three, four different operating systems, as I'm going through these three or four different infrastructures, that doesn't make any sense, 'cause the one thing is most precious to me is my Linux talent, right? And so I need to make sure that they're consistent, optimized and efficient. The other thing they're doing is tooling and automation and especially through tools like Ansible, right? Being able to take advantage of as much automation as possible and much consistency as possible so that they can make the most of the Linux talent that they do have. And so with Red Hat Enterprise Linux 9, in particular, you see us make a big investment in things like more automation tools for things like SAP and SQL server deployments, you'll see us make investments in things like basic stuff like the web console, right? We should now be able to go and point and click and go basic Linux administration tasks that lowers the barrier to entry and makes it easier to find people to actually administer the systems that you have. >> As you move out onto these new platforms, particularly on the edge, many of them will be much smaller, limited function. How do you make the decisions about what features you're going to keep or what you're going to keep in RHEL when you're running on a thermostat? >> Okay, so let me be clear, I don't want RHEL to run on a thermostat. (everybody laughing) >> I gave you advantage over it. >> I can't handle the margins on something like that, but at the end. >> You're running on, you're running on the GM. >> Yeah, no that's, right? And so the, so the choice at the, the most important thing we can do is give customers the tools that they need to make the choice that's appropriate for their deployment. I have learned over several years in this business that if I start choosing what content a customer decide wants on their operating system I will always guess it wrong, right? So my job is to make sure that I have a library of reliable, secure software options for them, that they can use as ingredients into their solution. And I give them tools that allow them to kind of curate the operating system that they need. So that's the tool like Image Builder, which we just announced, the image builder service lets a customer go in and point and click and kind of compose the edge operating system they need, hit a button and now they have an atomic image that they can go deploy out on the edge reliably, right? >> Gunnar can you clarify the cadence of releases? >> Oh yeah. >> You guys, the change that you made there. >> Yeah. >> Why that change occurred and what what's the standard today? >> Yeah, so back when we released RHEl 8, so we were just talking about hardware and you know, it's ARM and X86, all these different kinds of hardware, the hardware market is internally. I tell everybody the hardware market just got real weird, right? It's just got, the schedules are crazy. We got so many more entrance. Everything is kind of out of sync from where it used to be, it used to be there was a metronome, right? You mentioned Moore's law earlier. It was like a 18 month metronome. Everybody could kind of set their watch to. >> Right. >> So that's gone, and so now we have so much hardware that we need to reconcile. The only way for us to provide the kind of stability and consistency that customers were looking for was to set a set our own clock. So we said three years for every major release, six months for every minor release and that we will ship a new minor release every six months and a new major release every three years, whether we need it or not. And that has value all by itself. It means that customers can now plan ahead of time and know, okay, in 36 months, the next major release is going to come on. And now that's something I can plan my workload around, that something I can plan a data center migration around, things like that. So the consistency of this and it was a terrifying promise to make three years ago. I am now delighted to announce that we actually made good on it three years later, right? And plan two again, three years from now. >> Is it follow up, is it primarily the processor, optionality and diversity, or as I was talking to an architect, system architect the other day in his premise was that we're moving from a processor centric world to a connect centric world, not just the processor, but the memories, the IO, the controllers, the nics and it's just keeping that system in balance. Does that affect you or is it primarily the processor? >> Oh, it absolutely affects us, yeah. >> How so? >> Yeah, so the operating system is the thing that everyone relies on to hide all that stuff from everybody else, right? And so if we cannot offer that abstraction from all of these hardware choices that people need to make, then we're not doing our job. And so that means we have to encompass all the hardware configurations and all the hardware use cases that we can in order to make an application successful. So if people want to go disaggregate all of their components, we have to let 'em do that. If they want to have a kind of more traditional kind of boxed up OEM experience, they should be able to do that too. So yeah, this is what I mean is because it is RHEL responsibility and our duty to make sure that people are insulated from all this chaos underneath, that is a good chunk of the job, yeah. >> The hardware and the OS used to be inseparable right before (indistinct) Hence the importance of hardware. >> Yeah, that's right. >> I'm curious how your job changes, so you just, every 36 months you roll on a new release, which you did today, you announced a new release. You go back into the workplace two days, how is life different? >> Not at all, so the only constant is change, right? And to be honest, a major release, that's a big event for our release teams. That's a big event for our engineering teams. It's a big event for our product management teams, but all these folks have moved on and like we're now we're already planning. RHEL 9.1 and 9.2 and 8.7 and the rest of the releases. And so it's kind of like brief celebration and then right back to work. >> Okay, don't change so much. >> What can we look forward to? What's the future look like of RHEL, RHEL 10? >> Oh yeah, more bigger, stronger, faster, more optimized for those and such and you get, >> Longer lower, wider. >> Yeah, that's right, yeah, that's right, yeah. >> I am curious about CentOS Stream because there was some controversy around the end of life for CentOS and the move to CentOS Stream. >> Yeah. >> A lot of people including me are not really clear on what stream is and how it differs from CentOS, can you clarify that? >> Absolutely, so when Red Hat Enterprise Linux was first created, this was back in the days of Red Hat Linux, right? And because we couldn't balance the needs of the hobbyist market from the needs of the enterprise market, we split into Red Hat Enterprise Linux and Fedora, okay? So then for 15 years, yeah, about 15 years we had Fedora which is where we took all of our risks. That was kind of our early program where we started integrating new components, new open source projects and all the rest of it. And then eventually we would take that innovation and then feed it into the next version of Red Hat Enterprise Linux. The trick with that is that the Red Hat Enterprise Linux work that we did was largely internal to Red Hat and wasn't accessible to partners. And we've just spent a lot of time talking about how much we need to be collaborating with partners. They really had, a lot of them had to wait until like the beta came out before they actually knew what was going to be in the box, okay, well that was okay for a while but now that the market is the way that it is, things are moving so quickly. We need a better way to allow partners to work together with us further upstream from the actual product development. So that's why we created CentOS Stream. So CentOS Stream is the place where we kind of host the party and people can watch the next version of Red Hat Enterprise get developed in real time, partners can come in and help, customers can come in and help. And we've been really proud of the fact that Red Hat Enterprise Linux 9 is the first release that came completely out of CentOS Stream. Another way of putting that is that Red Hat Enterprise Linux 9 is the first version of RHEL that was actually built, 80, 90% of it was built completely in the open. >> Okay, so that's the new playground. >> Yeah, that's right. >> You took a lot of negative pushback when you made the announcement, is that basically because the CentOS users didn't understand what you were doing? >> No, I think the, the CentOS Linux, when we brought CentOS Linux on, this was one of the things that we wanted to do, is we wanted to create this space where we could start collaborating with people. Here's the lesson we learned. It is very difficult to collaborate when you are downstream of the product you're trying to improve because you've already shipped the product. And so once you're for collaborating downstream, any changes you make have to go all the way up the water slide and before they can head all the way back down. So this was the real pivot that we made was moving that partnership and that collaboration activity from the downstream of Red Hat Enterprise Linux to putting it right in the critical path of Red Hat Enterprise Linux development. >> Great, well, thank you for that Gunnar. Thanks for coming on theCUBE, it's great to, >> Yeah, my pleasure. >> See you and have a great day tomorrow. Thanks, and we look forward to seeing you tomorrow. We start at 9:00 AM. East Coast time. I think the keynotes, we will be here right after that to break that down, Paul Gillin and myself. This is day one for theCUBE's coverage of Red Hat Summit 2022 from Boston. We'll see you tomorrow, thanks for watching. (upbeat music)

Published Date : May 10 2022

SUMMARY :

He's my cohost for the next day. Nice to be here, Dave, Paul. It's been a lot of iterations. It's the highest version that the success of RHEL is really, We're obviously seeing ARM at the edge. and the places where across all of the infrastructures Well so the best thing to do because that's the end of life. So nine is the start of to them was the retail store. But I think space is the edge. the exciting stuff to me And the way I think about the make sure that the updates That's right in some tech terms. that you expanded into. of the Red Hat mission, the RHEL mission. in the journal yesterday that lowers the barrier to entry particularly on the edge, Okay, so let me be clear, I can't handle the margins you're running on the GM. So that's the tool like Image Builder, You guys, the change I tell everybody the hardware market So the consistency of this but the memories, the IO, and all the hardware use cases that we can The hardware and the OS You go back into the workplace two days, Not at all, so the only Yeah, that's right, for CentOS and the move to CentOS Stream. but now that the market Here's the lesson we learned. Great, well, thank you for that Gunnar. to seeing you tomorrow.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

Gunnar HelleksonPERSON

0.99+

Paul GillinPERSON

0.99+

JanuaryDATE

0.99+

NVIDIAORGANIZATION

0.99+

DavePERSON

0.99+

tomorrowDATE

0.99+

Red Hat LinuxTITLE

0.99+

BostonLOCATION

0.99+

RHEL 9TITLE

0.99+

GunnarPERSON

0.99+

six monthsQUANTITY

0.99+

threeQUANTITY

0.99+

three yearsQUANTITY

0.99+

RHELTITLE

0.99+

Red Hat Enterprise LinuxTITLE

0.99+

Red Hat Enterprise LinuxTITLE

0.99+

FirstQUANTITY

0.99+

yesterdayDATE

0.99+

10-yearQUANTITY

0.99+

MattPERSON

0.99+

15 yearsQUANTITY

0.99+

10 yearsQUANTITY

0.99+

Boston, MassachusettsLOCATION

0.99+

last weekDATE

0.99+

RHEL 9.1TITLE

0.99+

sevenQUANTITY

0.99+

two daysQUANTITY

0.99+

9:00 AMDATE

0.99+

two thingsQUANTITY

0.99+

ARMORGANIZATION

0.99+

2005DATE

0.99+

LinuxTITLE

0.99+

CentOS LinuxTITLE

0.99+

RHEL 10TITLE

0.99+

eachQUANTITY

0.99+

PaulPERSON

0.99+

CentOS StreamTITLE

0.99+

Red Hat Enterprise Linux 7TITLE

0.99+

AWSORGANIZATION

0.99+

18 monthQUANTITY

0.99+

Red Hat Enterprise Linux 9TITLE

0.99+

Red Hat Enterprise Linux 8TITLE

0.99+

eightQUANTITY

0.99+

CentOSTITLE

0.99+

H-1BOTHER

0.99+

Red Hat Summit 2022EVENT

0.99+

36 monthsQUANTITY

0.99+

Red HatTITLE

0.99+

thousandsQUANTITY

0.99+

three years laterDATE

0.99+

firstQUANTITY

0.99+

first releaseQUANTITY

0.98+

Paul Cormier, Red Hat | Red Hat Summit 2022


 

>>To the Seaport in Boston, Massachusetts, everybody's buzzing. The Bruins are playing tonight. They tied it up. The Celtics tied it up last night. We're excited. We don't talk about the red Sox. Red Sox are getting struggles, but you know, we have good distractions. Paul goer is here. He's the president and chief executive officer at red hat and also a Boston fan of great to see, of course, you too. >>Nice to see you guys, you know, it's been a, it's been a while. >><laugh> yeah, we saw you, you know, online and virtually for a couple of years there, but, uh, you know, we've been doing red hat summit for a long, long time. Yeah, of course we were talking earlier. It's just much more intimate, kind of a VIP event, a few more suit jackets here. You know, I got my tie on, so I don't get too much grief. I usually get grief when I wear a tie of red hat summit, but it's a different format this year. Compressed keynotes. Your keynote was great. The new normal, sometimes we call it the new abnormal <laugh>, uh, but you know, how do you feel? >>I, I, I, I feel great. First of all, you know, combination today, virtual audience in, in house audience here today. I think we're gonna see a lot of that in the future. I mean, we designed the event around that and I, I think it, I think it played pretty well. Kudos, kudos to our team. You're right. It's, it's, it's a bit more intimate even the way it was set up, but those are the conversations we like having with our customers and our partners, much more partner centric, uh, as well right now, as well. >>You know, we were talking about, you know, hybrid cloud. It was kind of, you know, it was a good marketing term. And, but now it's, it's, it's become the real thing. I've said many times the, the definition of cloud is changing. It's expanding it's no, the cloud is no longer this remote set of services, you know, somewhere up in the cloud, it's on prem connecting to a cloud across clouds, out to the edge and you need capabilities that work everywhere. And that's what red hat did. The market's just swimming toward you. >>Yeah. I mean, you look at it, you know, I was, uh, you know, if you look at it, you know, the clouds are powerful unto themselves, right? The clouds are powerful unto themselves. They're all different. Right? And that that's, I mean, hardware vendors were, were similar, but different, same thing. You need that connective tissue across, across the whole thing. I mean, as I said, in my keynote today, I remember talking to some of our CIOs and customers 10 years ago and they said, we're going 90% of our apps tomorrow to one cloud. And we knew that wasn't practical because of course the clouds are built from Linux. So we knew it was underneath the hood and, and what's happened. It's taken some time, but as they started to get into that, they started to see, well, maybe one cloud's more suited for one application than the other, these apps. You may have to keep on premise, but you know, what really exploded at the, the, the hybrid thing, the edge. Now they're putting things at the edge, the GM announcement tell you, I know you're gonna talk to Francis. Yeah, yeah. Later. I mean, that's, that's a mini data center in, in every cloud, but that's still under the purview of the CIO, you know? So, so, so that's what hybrid's all about is tying all those pieces together, cuz it got more powerful, but it also more complex. >>You mentioned being the connective tissue, but we don't hear as much talk about multi-cloud seems to me, as we used to this conference has been all about hybrid cloud. You don't really talk about multi-cloud. How important is that to the red hat strategy, being that consistent layer? >>It's probably my mistake or our mistake because multi's more prevalent and more important than just hybrid alone. I mean, hybrid hybrid started from on-premise to one part to any one particular cloud. That was the, the first thought of hybrid. But as I said, as, as, as um, some of the cloud providers became so big, um, every, every CIO I talked to, whether they know whether they know it or not most do are in a multi environment for a whole bunch of reasons, right. You know, one cloud provider might be better in a different part of the world. And another one cloud provider might have a better service than another. Some just don't like to be stuck to one it's it's really hybrid multi. We should, we should train ourselves to every time we say hybrid, say multi, because that's really, that's really what it is. It, I think that happened overnight with, with Microsoft, you know, with Microsoft they've, they've, they've really grown over the last few years, so has Amazon for that matter. But Microsoft really coming up is what really made it a, a high, a multi world. >>Microsoft's remarkable what, what they're doing. But I, I, I have a different thinking on this. I, I heard Chuck Whitten last week at, at the Dell conference he used, he said used the phrase a multicloud, uh, by default versus multi-cloud by design. And I thought that was pretty interesting because I've said that multi-cloud is largely multi-vendor, you know? And so hybrid has implications, right? We, we bring and a shesh came up with a new term today. Metacloud I use Supercloud I like Metacloud better because something's happening, Paul. It feels like there's this layer abstraction layer that the underlying complexity is hidden. Think about OpenShift. Yeah. I could buy, I could get OpenShift for free. Yeah. I mean, I could, and I could cobble together and stitch together at 13, 15 dozens of different services and replicate, but I don't, I don't want that complexity. I want you to hide that complexity. I want, I'd rather spend money on your R and D than my engineering. So something's changing. It feels like >>You buy that. I totally buy that. I mean, you know, I, I, I'm gonna try to not make this sound like a marketing thing because it's not, not fair enough. Right. I mean, I'm engineer at heart, you know that, so, >>Okay. >>I really look to what we're trying to do is we're building a hybrid multi cloud. I mean that we, I look at us as a cloud provider spanning the hybrid multi all the way out to the edge world, but we don't have the data centers in the back. Like the cloud providers do in and by that is you're seeing our products being consumed more like cloud services because that's what our customers are demanding. Our, our products now can be bought out of the various marketplaces, et cetera. You're seeing different business models from us. So, uh, you're seeing, uh, committed spend, for example, like the cloud providers where a customer will buy so much up front and sort of just work it down. You're seeing different models on how they're consumed, consumption, based pricing. These, these are all things that came from the cloud providers and customers buying like that. >>They now want that across their entire environment. They don't wanna buy differently on premise or in one cloud and they don't wanna develop differently. They don't wanna operate differently. They don't wanna have to secure it differently. Security's the biggest thing with, with our, with our customers, because hybrid's powerful, but you no longer have the, you know, your security per perimeter, no longer the walls of your data center. You know, you're, you're responsible as a CIO. You're responsible for every app. Yeah. No matter where it's running, if that's the break in point, you're responsible for that. So that's why we've done things like, you know, we cried stack rocks. We've, we've built it into the container Kubernetes platform that spans those various footprints because you no longer can just do perimeter security because the perimeter is, is very, very, very large right now >>Diffuse. One of the thing on the multi-cloud hyper skills, I, I, red hat's never been defensive about public cloud. You, I think you look at the a hundred billion dollars a year in CapEx spend that's a gift to the industry. Not only the entire it industry, but, but the financial services companies and healthcare companies, they can build their own hybrid clouds. Metacloud super clouds taking advantage of that, but they still need that connective tissue. And that's where >>We products come in. We welcome our customers to go to, to the public cloud. Um, uh, look, it's it's. I said a long time ago, we said a long time it was gonna be a hybrid. Well, I should have said multi anybody said hybrid, then it's gonna be a hybrid world. It is. And it doesn't matter if it's a 20, 80, 80, 20, 40, 60, 60, 40. It's not gonna be a hundred percent anywhere. Yeah. And, and so in that, in that definition, it's a hybrid multi world. >>I wanna change the tune a little bit because I've been covering IBM for 40 years and seen a lot of acquisitions and see how they work. And usually it follows the same path. There's a commitment to leaving the acquire company alone. And then over time that fades, the company just becomes absorbed. Same thing with red hat. It seems like they're very much committed to, to, to leaving you alone. At least they said that upon the acquisition, have they followed through on that promise? >>I have to tell you IBM has followed through on every commitment they've made, made to us. I mean, I, I owe it, I owe a lot of it to Arvin. Um, he was the architect of the deal, right. Um, we've known each other for a long time. Um, he's a great guy. Um, he, uh, he, he believes in it. It's not, he's not just doing it that way because he thinks, um, something bad will happen if he doesn't, he's doing it that way. Cuz he believes in that our ecosystem is what made us. I mean, I mean, even here it's about the partners in the ecosystem. If you look at what made REL people think what made red hat as a company was support, right. Support's really important. Small piece of the value proposition life cycle supports certainly their life cycle a 10 year life cycle just came out of a, a, a customer conference asking about the life cycle and could we extend it to 15 years? You know? Um, the ecosystem is probably the most important part of, of, of, of the, of the overall value proposition. And Arvin knows in IBM knows that, you know, we have to be neutral to be able to do everything the same for all of our ecosystem partners. Some that are IBM's competitors, even. So, >>So we were noticing this morning, I mean, aside from a brief mention of power PC and the IBM logo during, at one point, there was no mention of IBM during the keynote sessions this morning. Is that intentional? Or is that just >>No, no, it it's, it's not intentional. I mean, I think that's part of, we have our strategy to drive and we're, we're driving our, our strategy. We, we, we IBM great partner. We look at them as a partner just as we do our, our many other partners and we won't, you know, we wouldn't, we wouldn't do something with our products, um, for I with IBM that we wouldn't offer to our, our entire ecosystem. >>But there is a difference now, right? I don't know these numbers. Exactly. You would know though, but, but pre 2019 acquisition red hat was just, I think north of 3 billion in revenue growing at maybe 12% a year. Something like that, AR I mean, we hear on the earnings calls, 21% growth. I think he's publicly said you're north of 5 billion or now I don't know how much of that consulting gets thrown in. IBM likes to, you know, IBM math, but still it's a much bigger business. And, and I wonder if you could share with us, obviously you can't dig into the numbers, but have you hired more people? I would imagine. I mean, sure. Like what's been different from that standpoint in terms of the accelerant to your >>Business. Yeah. We've been on the same hiring cycle percentage wise as, as we, we always were. I mean, I think the best way to characterize the relationship and where they've helped is, um, Arvin, Arvin will say, IBM can be opinionated on red hat, but not the other way around <laugh>. So, so what that, what that means is they had a lot of, they had, they had a container based Linux platform. Yeah, right, right. They, they had all their, they were their way of moving to the cloud was that when we came in, they actually stopped that. And they standardized on OpenShift across all of their products. We're now the vehicle that brings the blue software products to the hybrid cloud. We are that vehicle that does it. So I think that's, that's how, that's how they, they look about it. I mean, I know, I mean in IBM consulting, I know, I know they have a great relationship with Microsoft of course. >>Right. And so, so that's, that's how to really look at it. They they're opinionated on us where we not the other way around, but that, but they're a great partner. And even if we're at two separate companies, we'd do be doing all the same things we're doing with them. Now, what they do do for us can do for us is they open a lot of doors in many cases. I mean, IBM's been around for over a hundred years. So in many cases, they're in, in, in the C-suite, we, we may be in the C suite, but we may be one layer down, one, two layers down or something. They, they can, they help us get access. And I think that's been a, a part of the growth as well as is them talking into their, into, into their >>Constituents. Their consulting's one of the FA if not the fastest growing part of their business. So that's kind of the tip of the spear for application modernization, but enough on IBM you said something in your keynote. That was really interesting to me. You said, you, you, you didn't use the word hardware Renaissance, but that my interpretation was you're expecting the next, you know, several years to be a hardware Renaissance. We, we certainly have done relationships with arm. You mentioned Nvidia and Intel. Of course, you've had relationships with Intel for a long time. And we're seeing just the spate of new hardware developments, you know, does hardware matter? I'll ask you, >>Oh, oh, I mean the edge, as I said, you're gonna see hardware innovation out in the edge, software innovation as well. You know, the interesting part about the edge is that, you know, obviously remade red hat. What we did with REL was we did a lot of engineering work to make every hardware architecture when, when it was, when, when the world was just standalone servers, we made every hardware architecture just work out of the box. Right? And we did that in such, because with an open source development model. So embedded in our psyche, in our development processes is working upstream, bringing it downstream 10 years, support all of that kind of thing. So we lit up all that hardware. Now we go out to the edge, it's a whole new, different set of hardware innovation out at the edge. We know how to do that. >>We know how to, we know how to make hardware, innovation safe for the customer. And so we're bringing full circle and you have containers embedded in, in Linux and REL right now as well. So we're actually with the edge, bringing it all full circle back to what we've been doing for 20 plus years. Um, on, on the hardware side, even as a big part of the world, goes to containers and hybrid in, in multi-cloud. So that's why we're so excited about, about, about the edge, you know, opportunity here. That's, that's a big part of where hybrid's going. >>And when you guys talk about edge, I mean, I, I know a lot of companies will talk about edge in the context of your retail location. Okay. That's fine. That's cool. That's edge or telco that that's edge. But when you talk about, um, an in vehicle operating system, right. You know, that's to me the far edge, and that's where it gets really interesting, massive volumes, different architectures, both hardware and software. And a lot of the data may stay. Maybe it doesn't even get persisted. May maybe some comes back to the club, but that's a new >>Ballgame. Well, think about it, right? I mean, you, if you listen, I think you, right. My talk this morning, how many changes are made in the Linux kernel? Right? You're running in a car now, right? From a safety perspective. You wanna update that? I mean, look, Francis talked about it. You'll talk to Francis later as well. I mean, you know, how many, how many in, in your iPhone world Francis talked about this this morning, you know, they can, they can bring you a whole new world with software updates, the same in the car, but you have to do it in such a way that you still stay with the safety protocols. You're able to back things out, things like that. So it's open source, but getting raw upstream, open source and managing itself yourself, I just, I'm sorry. It takes a lot of experience to be able to be able to do those kinds of things. So it's secure, that's insecure. And that's what that's, what's exciting about it. You look at E the telco world look where the telco world came from in the telco world. It was a hardware stack from the hardware firmware operating system, every service, whether it was 9 1, 1 or 4, 1, 1 was its own stack. Yep. In the 4g, 3g, >>4g >>Virtualized. Now, now it's all software. Yeah. Now it's all software all the way out to the cell tower. So now, so, so now you see vendors out there, right? As an application, as a container based application, running out, running in the base of a cell tower, >>Cell tower is gonna be a little mini data >>Center. Yeah, exactly. Because we're in our time here asking quickly, because you've been at red hat a long time. You, you, you, uh, architected a lot of the reason they're successful is, is your responsibility. A lot of companies have tried to duplicate the red hat model, the, the service and support model. Nobody has succeeded. Do you think anybody ever will or will red hat continue to be a unicorn in that respect? >>No, I, I, I think, I think it will. I think open source is making it into all different parts of technology. Now I have to tell you the, the reason why we were able to do it is we stayed. We stayed true to our roots. We made a decision a long time ago that we weren't gonna put a line, say everything below the line was open and above the line was closed. Sometimes it's hard sometimes to get a differentiation with the competition, it can be hard, but we've stayed true to that. And I, to this day, I think that's the thing that's made us is never a confusion on if it's open or not. So that forces us to build our business models around that as well. But >>Do you have a differentiated strategy? Talk about that. What's your what's your differentiation >>Are, are, well, I mean, with the cloud, a differentiation is that common cloud platform across I differentiate strategy from an open source perspective is to, to sort make open source consumable. And, and it's even more important now because as Linux Linux is the base of everything, there's not enough skills out there. So even, even a container platform like open source op like OpenShift, could you build your own? Certainly. Could you keep it updated? Could you keep it updated without breaking all the applications on top? Do you have an ecosystem around it? It's all of those things. It was, it was the support, the, the, the hardening the 10 year to predictability the ecosystem. That was, that was, that is the secret. I mean, we even put the secret out as open. >>Yeah, <laugh> right. Free, like a puppy, as they say. All right, Paul, thanks so much for coming back in the cubes. Great to see you face to face. Nice to see you guys get it. All right. Keep it right there. Dave Valante for Paul Gill, you're watching the cubes coverage of red hat summit, 2022 from Boston. Be right back.

Published Date : May 10 2022

SUMMARY :

getting struggles, but you know, we have good distractions. The new normal, sometimes we call it the new abnormal <laugh>, uh, but you know, how do you feel? First of all, you know, combination today, virtual audience in, You know, we were talking about, you know, hybrid cloud. You may have to keep on premise, but you know, You mentioned being the connective tissue, but we don't hear as much talk about multi-cloud seems to me, with Microsoft, you know, with Microsoft they've, they've, they've really grown I want you to hide that complexity. I mean, you know, I, I, I'm gonna try to not make this sound like I really look to what we're trying to do is we're building a hybrid multi cloud. you know, your security per perimeter, no longer the walls of your data center. You, I think you look at the a hundred billion dollars a year in CapEx I said a long time ago, to, to leaving you alone. I have to tell you IBM has followed through on every commitment they've made, made to us. So we were noticing this morning, I mean, aside from a brief mention of power PC and the IBM and we won't, you know, we wouldn't, we wouldn't do something with our products, um, IBM likes to, you know, IBM math, but still it's a brings the blue software products to the hybrid cloud. And I think that's been a, So that's kind of the tip of the spear You know, the interesting part about the edge is that, about the edge, you know, opportunity here. And a lot of the data may stay. I mean, you know, how many, So now, so, so now you see vendors out there, right? Do you think anybody ever will or will red hat continue to be a unicorn in Now I have to tell you the, the reason why we were able to do it is we stayed. Do you have a differentiated strategy? I mean, we even put the secret out as open. Great to see you face to face.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
IBMORGANIZATION

0.99+

Dave ValantePERSON

0.99+

Red SoxORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

ArvinPERSON

0.99+

NvidiaORGANIZATION

0.99+

red SoxORGANIZATION

0.99+

FrancisPERSON

0.99+

90%QUANTITY

0.99+

Paul GillPERSON

0.99+

PaulPERSON

0.99+

AmazonORGANIZATION

0.99+

15 yearsQUANTITY

0.99+

40 yearsQUANTITY

0.99+

10 yearQUANTITY

0.99+

Paul CormierPERSON

0.99+

firstQUANTITY

0.99+

last weekDATE

0.99+

Chuck WhittenPERSON

0.99+

BostonLOCATION

0.99+

20 plus yearsQUANTITY

0.99+

21%QUANTITY

0.99+

IntelORGANIZATION

0.99+

13QUANTITY

0.99+

LinuxTITLE

0.99+

Boston, MassachusettsLOCATION

0.99+

two separate companiesQUANTITY

0.99+

OpenShiftTITLE

0.99+

10 yearsQUANTITY

0.99+

two layersQUANTITY

0.99+

todayDATE

0.99+

one layerQUANTITY

0.98+

RELTITLE

0.98+

this yearDATE

0.98+

oneQUANTITY

0.98+

Paul goerPERSON

0.98+

CapExORGANIZATION

0.98+

Red HatORGANIZATION

0.98+

last nightDATE

0.98+

10 years agoDATE

0.98+

bothQUANTITY

0.98+

CelticsORGANIZATION

0.98+

one partQUANTITY

0.97+

20QUANTITY

0.97+

tomorrowDATE

0.97+

one applicationQUANTITY

0.96+

iPhoneCOMMERCIAL_ITEM

0.96+

telcoORGANIZATION

0.95+

12% a yearQUANTITY

0.95+

over a hundred yearsQUANTITY

0.94+

Linux kernelTITLE

0.93+

one cloudQUANTITY

0.93+

RELORGANIZATION

0.93+

hundred percentQUANTITY

0.93+

this morningDATE

0.91+

red hat summitEVENT

0.91+

tonightDATE

0.9+

Ashesh Badani, Red Hat | Red Hat Summit 2022


 

welcome back to the seaport in boston massachusetts with cities crazy with bruins and celtics talk but we're here we're talking red hat linux open shift ansible and ashesh badani is here he's the senior vice president and the head of products at red hat fresh off the keynotes had amex up in the state of great to see you face to face amazing that we're here now after two years of of the isolation economy welcome back thank you great to see you again as well and you as well paul yeah so no shortage of announcements uh from red hat this week paul wrote a piece on siliconangle.com i got my yellow highlights i've been through all the announcements which is your favorite baby hard for me to choose hard for me to choose um i'll talk about real nine right well nine's exciting um and in a weird way it's exciting because it's boring right because it's consistent three years ago we committed to releasing a major well uh every three years right so customers partners users can plan for it so we released the latest version of rel in between we've been delivering releases every six months as well minor releases a lot of capabilities that are bundled in around security automation edge management and then rel is also the foundation of the work we announced with gm with the in-vehicle operating system so you know that's extremely exciting news for us as well and the collaboration that we're doing with them and then a whole host of other announcements around you know cloud services work around devsecops and so on so yeah a lot of news a lot of announcements i would say rel nine and the work with gm probably you know comes right up to the top i wanted to get to one aspect of the rail 9 announcement that is the the rose centos streams in that development now in december i think it was red hat discontinued development or support for for centos and moved to central streams i'm still not clear what the difference is between the two can you clarify that i think we go into a situation especially with with many customers many partners as well that you know didn't sort of quite exactly uh get a sense of you know where centos was from a life cycle perspective so was it upstream to rel was it downstream to rel what's the life cycle for itself as well and then there became some sort of you know implied notions around what that looked like and so what we decided was to say well we'll make a really clean break and we'll say centos stream is the upstream for enterprise linux from day one itself partners uh you know software partners hardware partners can collaborate with us to develop rel and then take it all the way through life cycle right so now it becomes a true upstream a true place for development for us and then rel essentially comes uh out as a series of releases based on the work that we do in a fast-moving center-os environment but wasn't centos essentially that upstream uh development environment to begin with what's the difference between centos stream yeah it wasn't wasn't um it wasn't quite upstream it was actually a little bit downstream yeah it was kind of bi-directional yeah and yeah and so then you know that sort of became an implied life cycle to it when there really wasn't one but it was just became one because of some usage and adoption and so now this really clarifies the relationship between the two we've heard feedback for example from software partners users saying hey what do i do for development because i used you know centervis in the past we're like yup we have real for developers available we have rel for small teams available we have rel available for non-profit organizations up and so we've made rail now available in various form factors for the needs that folks had and they were perhaps using centos for because there was no such alternative or rel history so language so now it's this clarity so that's really the key point there so language matters a lot in the technology business we've seen it over the years the industry coalesces around you know terminology whether it was the pc era everything was pc this pc that the internet era and and certainly the cloud we we learned a lot of language from the likes of you know aws two pizza teams and working backwards and things like that became common commonplace hybrid and multi-cloud are kind of the the parlance of the day you guys use hybrid you and i have talked about this i feel like there's something new coming i don't think my term of super cloud is the right necessary terminology but it signifies something different and i feel like your announcements point to that within your hybrid umbrella point being so much talk about the edge and it's we heard paul cormier talk about new hardware architectures and you're seeing that at the edge you know what you're doing with the in-vehicle operating system these are new the cloud isn't just a a bunch of remote services in the cloud anymore it's on-prem it's a cloud it's cross-clouds it's now going out to the edge it's something new and different i think hybrid is your sort of term for that but it feels like it's transcending hybrid are your thoughts you know really really great question actually since you and i talked dave i've been spending some time you know sort of noodling just over that right and you're right right there's probably some terminology something sort of you know that will get developed you know either by us or you know in collaboration with the industry you know where we sort of almost have the connection almost like a meta cloud right that we're sort of working our way towards because there's if you will you know the cloud right so you know on premise you know virtualized uh bare metal by the way you know increasingly interesting and important you know we do a lot of work with nvidia folks want to run specific workloads there we announced support for arm right another now popular architecture especially as we go out to the edge so obviously there's private cloud public cloud then the edge becomes a continuum now you know on that process we actually have a major uh uh shipping company so uh a cruise lines that's talking about using openshift on cruise lines right so you know that's the edge right last year we had verizon talking about you know 5g and you know ran in the next generation there to then that's the edge when we talk to retail the store front's the edge right you talk to a bank you know the bank environments here so everyone's got a different kind of definition of edge we're working with them and then when we you know announce this collaboration with gm right now the edge there becomes the automobile so if you think of this as a continuum right you know bare metal private cloud public cloud take it out to the edge now we're sort of almost you know living in a world of you know a little bit of abstractions and making sure that we are focused on where uh data is being generated and then how can we help ensure that we're providing a consistent experience regardless of you know where meta meta cloud because i can work in nfts i can work a little bit we're going to get through this whole thing without saying metaverse i was hoping i do want to ask you about about the edge and the proliferation of hardware platforms paul comey mentioned this during the keynote today hardware is becoming important yeah there's a lot of people building hardware it's in development now for areas like uh like intelligent devices and ai how does this influence your development priorities you have all these different platforms that you need to support yeah so um we think about that a lot mostly because we have engagements with so many partners hardware right so obviously there's more traditional partners i'd say like the dell and the hpes that we work with we've historically worked with them also working with them in in newer areas uh with regard to appliances that are being developed um and then the work that we do with partners like nvidia or new architectures like arm and so our perspective is this will be uh use case driven more than anything else right so there are certain environments right where you have arm-based devices other environments where you've got specific workloads that can take advantage of being built on gpus that we'll see increasingly being used especially to address that problem and then provide a solution towards that so our belief has always been look we're going to give you a consistent platform a consistent abstraction across all these you know pieces of hardware um and so you mr miss customer make the best choice for yourself a couple other areas we have to hit on i want to talk about cloud services we've got to talk about security leave time to get there but why the push to cloud services what's driving that it's actually customers they're driving right so we have um customers consistently been asking us say you know love what you give us right want to make sure that's available to us when we consume in the cloud so we've made rel available for example on demand right you can consume this directly via public cloud consoles we are now making available via marketplaces uh talked about ansible available as a managed service on azure openshift of course available as a managed service in multiple clouds um all of this also is because you know we've got customers who've got these uh committed spends that they have you know with cloud providers they want to make sure that the environments that they're using are also counting towards that at the same time give them flexibility give them the choice right if in certain situations they want to run in the data center great we have that solution for them other cases they want to procure from the cloud and run it there we're happy to support them there as well let's talk about security because you have a lot of announcements like security everywhere yeah um and then some specific announcements as well i i always think about these days in the context of the solar wind supply chain hack would this have you know how would this have affected it but tell us about what's going on in security your philosophy there and the announcements that you guys made so our secure announcements actually span our entire portfolio yeah right and and that's not an accident right that's by design because you know we've really uh been thinking and emphasizing you know how we ensure that security profile is raised for users both from a malicious perspective and also helping accidental issues right so so both matters so one huge amounts of open source software you know out of the world you know and then estimates are you know one in ten right has some kind of security vulnerability um in place a massive amount of change in where software is being developed right so rate of change for example in kubernetes is dramatic right much more than even than linux right entire parts of kubernetes get rewritten over over a three-year period of time so as you introduce all that right being able to think for example about you know what's known as shift left security or devsec ops right how do we make sure we move security closer to where development is actually done how do we ensure we give you a pattern so you know we introduced a software supply chain pattern uh via openshift delivers complete stack of code that you know you can go off and run that follows best practices uh including for example for developers you know with git ops and support on the pipelines front a whole bunch of security capabilities in rel um a new image integrity measurement architecture which allows for a better ability to see in a post install environment what the integrity of the packages are signing technology they're incorporating open shift as well as an ansible so it's it's a long long list of cables and features and then also more and more defaults that we're putting in place that make it easier for example for someone not to hurt themselves accidentally on security front i noticed that uh this today's batch of announcements included support within openshift pipelines for sigstor which is an open source project that was birthed actually at red hat right uh we haven't heard a whole lot about it how important is zig store to to you know your future product direction yeah so look i i think of that you know as you know work that's you know being done out of our cto's office and obviously security is a big focus area for them um six store's great example of saying look how can we verify content that's in uh containers make sure it's you know digitally signed that's appropriate uh to be deployed across a bunch of environments but that thinking isn't maybe unique uh for us uh in the container side mostly because we have you know two decades or more of thinking about that on the rel side and so fundamentally containers are being built on linux right so a lot of the lessons that we've learned a lot of the expertise that we've built over the years in linux now we're starting to you know use that same expertise trying to apply it to containers and i'm my guess is increasingly we're going to see more of the need for that you know into the edge as well i i i picked up on that too let me ask a follow-up question on sigstor so if i'm a developer and i and i use that capability it it ensures the provenance of that code is it immutable the the signature uh and the reason i ask is because again i think of everything in the context of the solar winds where they were putting code into the the supply chain and then removing it to see what happened and see how people reacted and it's just a really scary environment yeah the hardest part you know in in these environments is actually the behavior change so what's an example of that um packages built verified you know by red hat when it went from red hat to the actual user have we been able to make sure we verify the integrity of all of those when they were put into use um and unless we have behavior that you know make sure that we do that then we find ourselves in trouble in the earliest days of open shift uh we used to get knocked a lot by by developers because i said hey this platform's really hard to use we investigate hey look why is that happening so by default we didn't allow for root access you know and so someone's using you know the openshift platform they're like oh my gosh i can't use it right i'm so used to having root access we're like no that's actually sealed by default because that's not a good security best practice now over a period of time when we you know randomly enough times explained that enough times now behavior changes like yeah that makes sense now right so even just kind of you know there's behaviors the more that we can do for example in in you know the shift left which is one of the reasons by the way why we bought uh sac rocks a year right right for declarative security contain native security so threat detection network segmentation uh watching intrusions you know malicious behavior is something that now we can you know essentially make native into uh development itself all right escape key talk futures a little bit so i went downstairs to the expert you know asked the experts and there was this awesome demo i don't know if you've seen it of um it's like a design thinking booth with what happened how you build an application i think they were using the who one of their apps um during covet and it's you know shows the the granularity of the the stack and the development pipeline and all the steps that have to take place and it strikes me of something we've talked about so you've got this application development stack if you will and the database is there to support that and then over here you've got this analytics stack and it's separate and we always talk about injecting more ai into apps more data into apps but there's separate stacks do you see a day where those two stacks can come together and if not how do we inject more data and ai into apps what are your thoughts on that so great that's another area we've talked about dave in the past right um so we definitely agree with that right and and what final shape it takes you know i think we've got some ideas around that what we started doing is starting to pick up specific areas where we can start saying let's go and see what kind of usage we get from customers around it so for example we have openshift data science which is basically a way for us to talk about ml ops right and you know how can we have a platform that allows for different models that you can use we can uh test and train data different frameworks that you can then deploy in an environment of your choice right and we run that uh for you up and assist you in in uh making sure that you're able to take the next steps you want with with your machine learning algorithms um there's work that we've uh introduced at summit around databases service so essentially our uh a cloud service that allows for deep as an easy way for customers to access either mongodb or or cockroach in a cloud native fashion and all of these things that we're sort of you know experimenting with is to be able to say look how do we sort of bring the world's closer together right off database of data of analytics with a core platform and a core stack because again right this will become part of you know one continuum that we're going to work with it's not i'd like your continuum that's that's i think really instructive it's not a technical barrier is what i'm hearing it's maybe organizational mindset i can i should be able to insert a column into my my my application you know development pipeline and insert the data i mean kafka tensorflow in there there's no technical reason i can't can't do that it's just we've created these sort of separate stovepipe organizations 100 right right so they're different teams right you've got the platform team or the ops team and you're a separate dev team there's a separate data team there's a separate storage team and each of them will work you know slightly differently independently right so the question then is i mean that's sort of how devops came along then you're like oh wait a minute yeah don't forget security and now we're at devsecops right so the more of that that we can kind of bring together i think the more convergence that we'll see when i think about the in-vehicle os i see the the that is a great use case for real-time ai inferencing streaming data i wanted to ask you that about that real quickly because at the very you know just before the conference began we got an announcement about gm but your partnership with gm it seems like this came together very quickly why is it so important for red hat this is a whole new category of application that you're going to be working on yeah so we've been working with gm not publicly for a while now um and it was very clear that look you know gm believes this is the future right you know electric vehicles into autonomous driving and we're very keen to say we believe that a lot of attributes that we've got in rel that we can bring to bear in a different form factor to assist with the different needs that exist in this industry so one it's interesting for us because we believe that's a use case that you know we can add value to um but it's also the future of automotive right so the opportunity to be able to say look we can get open source technology we can collaborate out with the community to fundamentally help transform that industry uh towards where it wants to go you know that that's just the passion that we have that you know is what wakes us up every morning you're opening into that yeah thank you for coming on the cube really appreciate your time and your insights and uh have a great rest of rest of the event thank you for having me metacloud it's a thing it's a thing right it's it's it's kind of there we're gonna we're gonna see it emerge over the next decade all right you're watching the cube's coverage of red hat summit 2022 from boston keep it right there be right back you

Published Date : May 10 2022

SUMMARY :

of the need for that you know into the

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Peter BurrisPERSON

0.99+

Dave VellantePERSON

0.99+

Lisa MartinPERSON

0.99+

IBMORGANIZATION

0.99+

DavePERSON

0.99+

MichaelPERSON

0.99+

eightQUANTITY

0.99+

Dave AlampiPERSON

0.99+

Michael DellPERSON

0.99+

IndiaLOCATION

0.99+

Nick CarrPERSON

0.99+

2001DATE

0.99+

MicrosoftORGANIZATION

0.99+

MohammadPERSON

0.99+

Pat KelsonPERSON

0.99+

Ashesh BadaniPERSON

0.99+

PeterPERSON

0.99+

AWSORGANIZATION

0.99+

50QUANTITY

0.99+

Mohammed FarooqPERSON

0.99+

Skyhigh NetworksORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

EMCORGANIZATION

0.99+

6thQUANTITY

0.99+

Mohammad FarooqPERSON

0.99+

2019DATE

0.99+

FacebookORGANIZATION

0.99+

MikePERSON

0.99+

CiscoORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

100 softwaresQUANTITY

0.99+

1000 dollarsQUANTITY

0.99+

80%QUANTITY

0.99+

NetflixORGANIZATION

0.99+

Las VegasLOCATION

0.99+

DellORGANIZATION

0.99+

Allen BeanPERSON

0.99+

90%QUANTITY

0.99+

John FurrierPERSON

0.99+

80 yearsQUANTITY

0.99+

Dell TechnologiesORGANIZATION

0.99+

1000 timesQUANTITY

0.99+

2QUANTITY

0.99+

7500 customersQUANTITY

0.99+

PivitolORGANIZATION

0.99+

100QUANTITY

0.99+

'18DATE

0.99+

1000 customersQUANTITY

0.99+

secondQUANTITY

0.99+

USLOCATION

0.99+

34 billion dollarsQUANTITY

0.99+

Beth Phalen, Dell EMC | CUBE Conversation, March 2020


 

from the silicon angle media office in Boston Massachusetts it's the queue now here's your host David on tape the imperative to protect data has never been more pressing as companies transform themselves from businesses into digital businesses the intrinsic value of their data Rises exponentially the problem for infrastructure pros is that everything in IT is additive it seems like nothing ever dies which means more things to manage now think about that when you're protecting data you have bare metal VMs now containers you've got cloud you got to worry about the edge all this data needs to be protected not only does this increase complexity it expands the attack surface for adversaries wanting to steal or ransom your data at the heart of all this is a build out of a massively global distributed cloud we saw wave 1 of the cloud which was public wave 2 was really hybrid and that's evolving now in parallel you're seeing the emergence of multi cloud and as I said these earlier trends are additive they're not replacements and with me to discuss these important issues and how Dell EMC specifically is pivoting toward cloud data protection is Beth Phelan who was the president of Dell emcs Data Protection Division that's great to see you well good to be here again so we know the world is hybrid it's a fundamental the on-prem stuff is part of the fundamental digital digital transformations of these these companies and now you've got data protection for the cloud so what do you see happening in that world yeah let's start with what we're seeing in the market we recently remade our global data protection index we've been doing it for many years and we've been really using that to help us understand the landscape and what our customers need and first not surprisingly it shows that continued trend of movement and reliance towards cloud environments for business applications sure continuing to increase on top of that the customers despite that are continuing to struggle with ensuring they have the right data protection for their cloud environments right so they're they're struggling you see that we see that as well what what's going on there Wow what is the data tell you yeah first of all more than half the customers don't have a comprehensive data protection solution for their Salas cloud native and multi cloud environments more than two-thirds of the customers who may be relying on their cloud service providers for data protection say that they do not have a solution that covers all of their workloads so whether they're working with a cloud service provider or some other vendor they're being really clear that they do not have a comprehensive approach to cloud data protection yeah so I mean you see the cloud adoption is going like crazy but it seems like the data protection component is lagging how is that affecting the traction in your business yeah you know it's a double-edged sword right on one level customers see the advantages of moving to a cloud but on the other hand you know they are really looking for vendors that they can partner with to still have the same confidence that the data is protected that they have on Prem and what we're seeing now is that customers are turning to us to help solve that problem we have over a thousand customers using Dell EMC for their Cloud Data Protection and we're narrowing in on three exabytes of data that we're currently protecting in the cloud so it's happening yeah that's pretty good traction so I want to talk about VMware obviously VMware is the linchpin of many customers hybrid strategy and it's a clearly an important component of Dell technologies talk a little bit about the relationship between Dell EMC data protection specifically and VMware I'm interested in you know they've announced project tenzou and there's kubernetes how are you guys working together to really deliver a value for customers so we are super excited about the opportunity to work so closely with VMware because as their in their domain we're working directly with them and that's an advantage that comes with being part of the dell technologies family and so we were the first company to bring data protection for were kubernetes environments out to market it's available now so you'll see us bring that into the tan zoom mission-critical has been moved forward partnering closely with with VMware and of course we're already fully certified for VMware cloud it's really an ongoing regular conversation about how we can work together to bring the best to our customers so Beth I gotta ask you so you're part of your role as the leader of the the division is obviously you got a you got a lot of mouths to feed big division you got to make your plan you got to deliver for customers but strategy is another key component of this how do all these cloud trends shape your strategy so core to our strategy is to be the essential provider of data protection for multi cloud environments so no matter where customers are choosing to deploy their applications they can have the same confidence that they always did that that data is protected and the way they can get it back so that's core and if you want three words to remember for our strategy think VMware cloud and cyber cloud is central to it and you're gonna be hearing a lot more about it in the weeks and months ahead okay so I gotta ask you break out your binoculars maybe even the telescope what are the future what are the futures look like when you think about the division and the market so we've been talking about cloud for a long time but we are still in the middle of this journey customers are going to rely on the cloud even more for additional use cases and especially in the data protection space right now we're seeing backup to the cloud dr to the cloud but the future will include cyber resiliency that's leveraging cloud deployments you're also going to see more and more of an emphasis on people leveraging SAS for their software consumption and for us that means not only protecting SAS applications but it also means giving customers the option to consume data protection in a SAS model we already do that today with things like cloud snapshot manager with things like the power protect management and orchestration but you're going to see us do even more of that because they're just incredible benefits of people leveraging sass to consume their software data constantly evolving lamps landscape data protection has to evolve with it that thanks so much for her thank you thank you keep it right there we'll be right back right after this short break

Published Date : Mar 24 2020

**Summary and Sentiment Analysis are not been shown because of improper transcript**

ENTITIES

EntityCategoryConfidence
Beth PhelanPERSON

0.99+

Beth PhalenPERSON

0.99+

DavidPERSON

0.99+

March 2020DATE

0.99+

wave 1EVENT

0.99+

DellORGANIZATION

0.99+

Dell EMCORGANIZATION

0.98+

BethPERSON

0.98+

Boston MassachusettsLOCATION

0.98+

over a thousand customersQUANTITY

0.98+

todayDATE

0.98+

VMwareORGANIZATION

0.97+

more than two-thirdsQUANTITY

0.97+

three exabytesQUANTITY

0.95+

one levelQUANTITY

0.94+

wave 2EVENT

0.94+

more than halfQUANTITY

0.94+

dellORGANIZATION

0.93+

first companyQUANTITY

0.92+

firstQUANTITY

0.88+

three wordsQUANTITY

0.85+

SASTITLE

0.82+

Data Protection DivisionORGANIZATION

0.81+

publicEVENT

0.79+

VMware cloudTITLE

0.67+

double-edgedQUANTITY

0.62+

many yearsQUANTITY

0.56+

SASORGANIZATION

0.5+

Dell EMC: Cloud Data Protection Momentum


 

from the silicon angle media office in Boston Massachusetts it's the cube now here's your host David on tape the imperative to protect data has never been more pressing as companies transform themselves from businesses into digital businesses the intrinsic value of their data Rises exponentially the problem for infrastructure pros is that everything in IT is additive it seems like nothing ever dies which means more things to manage now think about that when you're protecting data you have bare metal VMs now containers you've got cloud you got to worry about the edge all this data needs to be protected not only does this increase complexity it expands the attack surface for adversaries wanting to steal or ransom your data at the heart of all this is a build out of a massively global distributed cloud we saw wave 1 of the cloud which was public wave 2 was really hybrid and that's evolving now in parallel you're seeing the emergence of multi cloud and as I said these earlier trends are additive they're not replacements and with me to discuss these important issues and how Dell EMC specifically is pivoting toward cloud data protection is Beth Phelan who is the president of Dell emcs Data Protection Division that's great to see you well good to be here again so we know the world is hybrid it's a fundamental the on-prem stuff is part of the fundamental digital digital transformations of these these companies and now you've got data protection for the cloud so what do you see happening in that world yeah let's start with what we're seeing in the market we recently remade on our global data protection index we've been doing it for many years and we've been really using that to help us understand the landscape and what our customers need and first not surprisingly it shows that continued trend of movement and reliance towards cloud environments for business applications continuing to increase on top of that the customers despite that are continuing to struggle with ensuring they have the right data protection for their cloud environments right so they're they're struggling you see that we see that as well what what's going on there well what is the data tell you yeah first of all more than half of the customers don't have a comprehensive data protection solution for their Salas cloud native and multi cloud environments more than two-thirds of the customers who may be relying on their cloud service providers for data protection say that they do not have a solution that covers all of their workloads so whether they're working with a cloud service provider or some other vendor they're being really clear that they do not have a comprehensive approach to cloud data protection yeah so I mean you see the cloud adoption is going like crazy but it seems like the data protection component is lagging how is that affecting the traction in your business yeah you know it's a double-edged sword right on one level customers see the advantages of moving to a cloud on the other hand you know they are really looking for vendors that they can partner with to still have the same confidence that the data is protected that they have on Prem and what we're seeing now is that customers are turning to us to help solve that problem we have over a thousand customers using Dell EMC for their Cloud Data Protection and we're narrowing in on three exabyte the data that we're currently protecting in the cloud so it's happening yeah that's pretty good traction so I want to talk about VMware obviously VMware is the linchpin of many customers hybrid strategy and it's a clearly an important component of Dell technologies talk a little bit about the relationship between Dell EMC data protection specifically and VMware I'm interested in you know they've announced project tenzou and there's kubernetes how are you guys working together to really deliver a value for customers so we are super excited about the opportunity to work so closely with VMware because as they're cut in their domain we're working directly with them and that's an advantage that comes with being part of the dell technologies family and so we were the first company to bring data protection for were kubernetes environments out to market it's available now so you'll see us bring that into the tenzou mission-critical has been moved forward partnering closely with with vmware and of course we're already fully certified for vmware cloud it's really an ongoing regular conversation about how we can work together to bring the best to our customers so Beth I gotta ask you so you're part of your role as the leader of the the division is obviously you gotta get a lot of mouths to feed big division you got to make your plan you got to deliver for customers but strategy is another key component of this how do all these cloud trends shape your strategy so core to our strategy is to be the essential provider of data protection for multi cloud environments so no matter where customers are choosing to deploy their applications they can have the same confidence that they always did that that data is protected and the way they can get it back so that's core and if you want three words to remember for our strategy think VMware cloud and cyber cloud is central to it and you're going to be hearing a lot more about it in the weeks and months ahead okay so I gotta ask you break out your binoculars maybe even the telescope what are the future what are the future's look like when you think about the division and the market so we've been talking about cloud for a long time but we are still in the middle of this journey customers are going to rely on the cloud even more for additional use cases and especially in the data protection space right now we're seeing backup to the cloud dr to the cloud but the future will include cyber resiliency that's leveraging cloud deployments you're also going to see more and more of an emphasis on people leveraging SAS for their software consumption and for us that means not only protecting SAS applications but it also means giving customers the option to consume data protection in a SAS model we already do that today with things like cloud snapshot manager with things like the power protect management and orchestration but you're going to see us do even more of that because they're just incredible benefits of people leveraging sass to consume their software data constantly evolving lamps landscape data protection has to evolve with it Beth thanks so much for thank you and thank you keep it right there we'll be right back right after this short break from world famous cloud Studios Dell Technologies presents the world's number one show on data protection solutions for today's organizations it's proven in modern magazine with Jake and Emmy hello everyone and welcome to the premiere of PM magazine where we cover the proven Dell technology solutions that you've come to rely on and the latest modern innovation driving powerful data protection for the future I recently spent some quality time with one of our customers and I learned a thing or two about Dell proven data protection solutions let's watch the clip we've always relied on tell performance efficiency and scale to help us keep pace with our data protection needs but there's so much more for example we've been crushing it with Dell cloud data protection for backup to the cloud in cloud backup cloud tearing cloud dr uh-huh look at the picture it's a huge business advantage how so our costs are down we spend less time on management we're meeting our service levels and we have peace of mind that all of our data is protected right awesome did you talk about how Dells agile development approach is accelerating the speed at which we deliver customer value yes and how cloud capabilities will continue to grow yes and about VMware protection yes and cyber recovery yes I mean we covered all of that as well as the mega trends that require data protection with a modern approach well modern is exactly what our guests today are here to discuss Jake he is Ken fatale a noted data protection expert and joining us from the field on her vacation in the Bahamas is Barbara Penner of the data management Institute thank you both for being here so Ken what should our viewers think about when they hear the phrase modern data protection they should think new requirements for modern applications cloud native workloads Cubana is multi-cloud and data services to name a few Barbara would you add anything to that list I would add business service recovery on premises or in the cloud autonomous protection to auto detect and protect workloads across edge core and cloud infrastructure and lastly all of this must operate at global scale thank you both this is exactly where we're heading with Dell power protect solutions well it's time for a break but when we come back we've got something special in store for you don't we Jake I was hoping you forgot oh no someone learned how to make cream puffs and it did not turn out well for him yeah my apologies in advance to my mother who tried to show me around the kitchen but as you can see we'll be right back [Music] we're back with Rob and Rob Emslie who's the director of product marketing for Delhi MCS data protection division Rob good to see you hi Dave good to be back so we just heard from Beth about some of the momentum that you guys have from your perspective from a product angle what is really driving this yeah well one of the things that we've you know definitely seen is that as we talk to our customers both existing and new customers cloud journeys is is top of mind for all of the CIOs it's being driven by either the desire to drive efficiency take out costs and data protection is one of the the most common use cases and one of the things that we find is that there's four use cases for data protection that we see long term retention of data cloud disaster recovery backup to the cloud and the emerging desire to stand up new applications in the cloud that need to be protected so backup in the cloud really completes the four major use cases well one of the things I think is really important this market is that you deliver optionality to your customers so how are our customers enabling these use cases yeah so the the first two UK's first two use cases of long term retention and cleitus recovery is is really driven by our software on our appliances both of those are really predicated based upon the assumption that customers are going to deploy data protection on premises to protect their on-premises workloads and then it's here to the cloud or which is becoming more common used to cloud as a disaster recovery target you know it's delivered by our data protection software and that's either in a software form factor or that software delivered in an integrated appliance form factor so let's talk about purpose-built backup appliances I think you know our friends at IDC I think you know coined that they tracked that market for a while you guys have been a leader there the acquisition of data domain obviously put you in a really strong position give us the update there is it's still a vibrant market is it growing what's the size it's it look like yeah so as we look at 2020 you know IDC forecasts the market size to be a little under five billion dollars so it's still a very large market the overall market is growing at a little over four percent but the interesting thing is that if you think about how the market is is made up it's made up of two different types of appliances one is a target appliance such as data domain and the new power protect dd and the other is integrated appliances where you integrate the target appliance architecture with data protection software and it's the integrated appliance part of the market that is really growing faster than the other part of the of the people being market it's actually growing at 8% in fact IBC's projection is that by 2022 half of the purpose-built back to appliance market will be made up of integrated appliance solutions so it's growing at twice the overall market rate but you guys have two integrated appliances what why - how should people think about those yeah so a little under three years ago we introduced a new integrated appliance the called the integrated data protection appliance it was really the combination of our backup software with our data domain appliance architecture and the integrated air protection appliance has been our workhorse for the last three years really allowing us to to support that that fastest-growing segment of the market in fact last year the integrated air protection appliance grew by over a hundred percent so triple digit growth was great you know it's something that you know allows us to address all market segments all the way down to SMB all the way to the enterprise but last year one of the things you may remember at Delta Nadi's world is we introduced our power to protect portfolio you know and that constituted power protect data manager our new software to find platform as well as the delivery of packet there in an integrated appliance form-factor with perfectly x400 so that's really our our new scale out data protection appliance we've never had a scale out appliance in the architecture before in the portfolio before and that gives us the ability to offer customers choice scale up or scale out integrated and target and with the X 400 it's available is a hybrid configuration or it's also our first or flash architecture so really we're providing customers with the existing software solutions that we've had in the market for a long time an integrated form factor with the integrator protection appliance as well as the brand-new software platform that will really be our innovation engine that will be where we'll be looking at supporting new workloads and certainly leaning into how we support cloud air protection and the hybrid cloud reality of the next decade okay so one of the other things I want to explore is we've heard a lot about your new agile development organization Beth has talked about that a lot and the benefit obviously is you're more you're able to get products out more quickly respond to market changes but ultimately the proof is in translating that development into product what can you tell us about how that's progressing yep so certainly with Papa Tech Data Manager and the X 400 that really is the the epicenter of our agile product development activities you know we've moved to a three-month cadence for software releases so working to deliver a small batch releases into the market much more rapidly than we've ever done before in fact since we introduced palpitate Denham manager where we we shipped the first release in July we're now at the third iteration of palpitate Data Manager and therefore the third iteration of the x100 appliance so there's three things that you know I'd like to highlight within the x100 appliance specifically first is really the the exciting news that we've introduced support for kubernetes so we're really the first you know large enterprise data protection vendor to to lean into providing kubernetes data protection so that becomes the vitally important especially with the developments over our partner in VMware with vSphere 7 with the introduction of tan zoo and the reality is that customers will have both these fear virtual machines and kubernetes containers working side-by-side and both of those environments need to be protected soap a patek denim algae and the x400 appliance has that support available now for customers to take advantage of second we talked about long-term retention of of data in the cloud the x100 appliance has just received the capabilities to also take part in long term retention to AWS so those are two very important cloud capabilities that are brand-new with the excellent appliance and then finally we introduced yet 400 appliance with a maximum configuration of four capacity cubes rough-and-tough that was 400 terabytes of usable capacity we've just introduced support of 12 capacity cubes so that gives the customers the ability to scale out the x100 appliance from 64 terabytes all the way to over a petabyte storage so now if you look at our two integrated appliances we now cover the landscape from small numbers of terabytes all the way through to a petabyte of capacity whether or not you pick a scale up architecture or a scale length architecture yeah so that really comes back to the point I was making about optionality and kubernetes is key it's gonna be a linchpin obviously a portability for multi cloud sets that up as we've said it's it's not the be-all end-all but it's a really necessary condition to enable multi cloud which is fundamental to your strategy absolutely alright Rob thanks very much for coming on the cube it's great to have you thanks Dave and thank you for watching everybody this is Dave Volante for the cube we'll see you next time [Music]

Published Date : Mar 24 2020

**Summary and Sentiment Analysis are not been shown because of improper transcript**

ENTITIES

EntityCategoryConfidence
Beth PhelanPERSON

0.99+

DavePERSON

0.99+

RobPERSON

0.99+

Barbara PennerPERSON

0.99+

KenPERSON

0.99+

Dave VolantePERSON

0.99+

400 terabytesQUANTITY

0.99+

BarbaraPERSON

0.99+

Rob EmsliePERSON

0.99+

2020DATE

0.99+

IBCORGANIZATION

0.99+

three-monthQUANTITY

0.99+

8%QUANTITY

0.99+

BahamasLOCATION

0.99+

64 terabytesQUANTITY

0.99+

last yearDATE

0.99+

JakePERSON

0.99+

DavidPERSON

0.99+

Ken fatalePERSON

0.99+

2022DATE

0.99+

Dell TechnologiesORGANIZATION

0.99+

JulyDATE

0.99+

wave 1EVENT

0.99+

DellORGANIZATION

0.99+

IDCORGANIZATION

0.99+

Delta NadiORGANIZATION

0.99+

third iterationQUANTITY

0.99+

AWSORGANIZATION

0.99+

EmmyPERSON

0.99+

three thingsQUANTITY

0.98+

firstQUANTITY

0.98+

BethPERSON

0.98+

over a hundred percentQUANTITY

0.98+

todayDATE

0.98+

first releaseQUANTITY

0.98+

Boston MassachusettsLOCATION

0.98+

Dell EMCORGANIZATION

0.98+

third iterationQUANTITY

0.98+

VMwareORGANIZATION

0.98+

two integrated appliancesQUANTITY

0.98+

over a thousand customersQUANTITY

0.98+

next decadeDATE

0.98+

vSphere 7TITLE

0.98+

twoQUANTITY

0.97+

four use casesQUANTITY

0.97+

400 applianceQUANTITY

0.97+

first twoQUANTITY

0.97+

oneQUANTITY

0.97+

twiceQUANTITY

0.97+

bothQUANTITY

0.97+

more than two-thirdsQUANTITY

0.97+

x100COMMERCIAL_ITEM

0.97+

four major use casesQUANTITY

0.96+

under five billion dollarsQUANTITY

0.96+

x400COMMERCIAL_ITEM

0.96+

two different typesQUANTITY

0.95+

a thingQUANTITY

0.95+

first two use casesQUANTITY

0.94+

more than halfQUANTITY

0.94+

two integrated appliancesQUANTITY

0.94+

wave 2EVENT

0.94+

DelhiLOCATION

0.93+

DellsORGANIZATION

0.92+

one of the thingsQUANTITY

0.91+

first companyQUANTITY

0.9+

12 capacity cubesQUANTITY

0.9+

UKLOCATION

0.9+

MCSORGANIZATION

0.89+

X 400COMMERCIAL_ITEM

0.87+

dellORGANIZATION

0.86+

over four percentQUANTITY

0.86+

Breaking Analysis: VMware Announces vSphere 7


 

>>from the Silicon Angle Media office in Boston, Massachusetts. It's the Cube now here's your host, Dave Vellante. >>Hello, everyone. And welcome to this breaking analysis. We're here to assess the VM Ware v Sphere seven announcement, which is the general availability of so called Project Pacific. VM Ware has called this the biggest change to V sphere in the last 10 years. Now Project Specific Pacific supports kubernetes and natively in VM Ware environments. Why is this important? This is critical for multi and hybrid cloud because Kubernetes and its surrounding orchestration enable application portability and management. Yeah, as we've been reporting, VM Ware is one of the big players eyeing multi cloud, along with a crowded field of aspirants that include IBM with Red hat, Microsoft, Cisco, Google and a host of specialists in the ecosystem. Like how she and rancher as well play. Some players have focused in their respective stack swim lanes like security and data protection, storage, networking, etcetera. And with me to dig into this announcement is stew. Minutemen's Do is a senior analyst at Wiki Bond and co host of The Cube is too good to see you and let's get into it great to talk about this state. Okay, so the Sphere seven, what is being announced? And why is it relevant? >>Yes. So, David, as you said in the open, this is the general availability of what they talked about at VM World 2019 as Project Pacific. So it really is integrating kubernetes into V sphere. The VM ware, of course, will position this is that they're now enabling, you know, the 90% of the data centers around the world that have VM ware. Hey, your kubernetes enabled. Congratulations. You're cloud native. Everything like that. Only being a little facetious here. But this is very important. How do we get from where we were to live in this more cloud? Native environments. So containers in general and kubernetes specifically are being a first class citizen. There's a lot of work, Dave, and my understanding this has been going on for a number of years. You know, it's not like they just started working at this six months ago. A overhaul to how this works. Because it's not just we're going to stick a couple of containers on top of, you know, the guest operating system in the virtual machine. But there is a supervisor cluster for kubernetes at the hyper visor level. And there's a lot of, you know, in the weeds things that we're all trying to understand and figure out because you've got you know, we've got a hyper visor and you've got VM. And now you've got the containers and kubernetes on. Some of them are living in my data center. Some VM ware, of course, lives on multiple clouds like the VM ware on AWS. Solutions of this will go there on and, you know, how do I manage that? How does this impact my operations? You know, how did this change my application portfolio? Because, you know, the early value proposition for VM Ware always was. Hey, you're gonna put VM ware on there. You don't need to touch your applications. Everything runs like it did before you were running windows APS on a physical server. You move into virtual. It's all great. There's a lot of nuance and complexity. So when VM Ware says this is the biggest change in a decade probably is, I think back to you know, I remember when the fx 2.0, rolled out in V motion really changed the landscape. That was big V balls. Move to really ah storage. To really understand that architecture and really fix storage was was a huge undertaking that took many years. This this definitely stacks up with some of those previous changes to really change the way that we think about VM Ware. I think the advertising you have even seen from being where some places is don't think of them as VM ware their cloud where our container ware with like because vm zehr still there. But VM Ware is much more than VMS today, >>so this feels like it's bm were trying to maintain its relevance in a cloud native world and really solidify its because, let's face it, VM Ware is a platform that Pat Gelsinger's has ride. The Waves tried many times in many angles to try to ride the cloud wave, and it's finally settled on the partnerships with AWS specifically. But others on DSO really Is this their attempt to become cloud native, not get left behind and be cloud naive? His many say >>Yeah, great question, David. Absolutely. There's the question as to you know what's happening with my applications, you know lots of customers. They say, Well, I'm just going to satisfy the environments. Watched the huge growth of companies like service now workday. Those applications, well, customers don't even know what they live on. Do they live on virtualization? Environment is a containers I don't need to worry about because SAS takes care of that. If I'm building modern applications, well, I'm probably not starting with VMS. Containers are the way that most people are doing that. Or they might even be going serverless now if we take these environments. So how does VM ware make sure that they have the broadest application support? Kubernetes really won the container orchestration wars on. And this is a way that VM ware now can enable customers to move down that path to modernize their environments on. And what they wanna have is really some consistency between what's happening in the cloud and happening in the environments that they control >>themselves. Vm ware saying that containers in our first class citizen within v sphere what does that mean? Why is that important? First of all, are they really And what does that mean? And why is that important? >>Yes. So, Dave, my understanding is, you know, absolutely. It's their, You know, the nuances that you will put there is. You know, we're not just running bare metal servers with Lennox and running containers on top of it. It is. You're still sitting on top of the hyper visors. One of the things I'm trying to understand when you dig down is you know what? The device driver level VM ware always looked a little bit like Linux. But the people that use it and operate it, they're not letting people Dave, these, you know, the OS. The number one os that always ran on VM ware was Windows and the traditional applications that ran there. So when we talk about containers and we're enabling that in a kubernetes environment, there are some questions about how do we make sure that my applications get certified? Dave, you got a lot of history knowing things like s ap and Oracle. I need to make sure that we've tested everything in this works. This is not what we were running traditionally in VM ware and VM ware. Just thanks. Hey, v Sphere seven, turn the crank. Everything certified Well, I would tell customers make sure you understand that your application has been tested, that your Eyes V has certified this environment because this is definitely, as VM Ware says, a huge architectural change. So therefore, there's some ripple effects to make sure that what I'm doing in this environment stays fully supported. Of course, I'm sure VM Ware is working with their huge ecosystem to make sure that all the pieces or environment you mentioned things like data protection. We absolutely know that VM Ware is making sure the day one the data protection plugs in and supported in these environments when you're using the kind of kubernetes persona or containers solutions in V sphere. >>Well, this brings me to my next question. I mean, we were talking to Bernard Golden the other day and he was saying, You know, Kubernetes is necessary for multi cloud, but it's insufficient. And so this seems to me to be a first step and, as I say, VM ware maintaining and growing its relevance. But there's gonna be a roadmap here that goes beyond just containers and portability. There's other management factors you mentioned security of enabling the ecosystem to plug in. So maybe talk about that a little bit in terms of what's necessary to really build this out over the next >>decade. And actually, it's a great point. So, first of all, you know, V. Sphere, of course, is the core of VM Ware's business. But there's only a piece of the overall portfolio said this lives in. I believe they would consider this part of what they call their Tansu family. Tando is their cloud native overarching piece of it, and one of the updates is their product hands admission control. Which of the existing product really came out of the Hep D Oh acquisition is how we can really manage any kubernetes anywhere, and this is pure software. Dave. I'm sure you saw the most recent earnings announcement from VM Ware, and you know what's going sass. What's going subscription? VM Ware is trying to build out some of their software portfolio that that isn't kind of the more traditional shrink wrap software, so Tan Xue can manage any kubernetes environment. So, of course, day one Hey, obviously or seven, it's a kubernetes distribution. Absolutely. It's going to manage this environment and but also if I've got Cooper days from azure kubernetes from Amazon communities from other environment. Tanja can manage across all of those environments. So when when you're what VM Ware has always done. If you think back in the early days of virtualization, I had a lot of different servers. How do I manage across those environments? Well, VM ware was a layer that lived across them. VM Ware is trying to do the same thing in the cloud. Talk about multi cloud. And how do I manage that? How do we get value across them? Well, there's certain pieces that you know VM Ware is looking to enable with their management software to go across them. But there are a lot of other companies, you know, Amazon Google actually not Amazon yet for multi cloud. But Microsoft and Google absolutely spent a lot of time talking about that in the last year. A swell as you mentioned. Companies like Rancher and Hashi Corp absolutely play across What Lots of these multi cloud. Well, >>let's talk about the competition. Who do you see is the number one competitors >>Well, so the number one competitor absolutely has to be red hat, Dave. So you know, when I've been in the kubernetes ecosystem for a number of years for many years. When I talk to practitioners, the number one, you know what kubernetes you're using? Well, the answer for many years was, Well, I'm grabbing it, you know, the open source and I'm building my own stack. And the reason customers did that was because there wasn't necessarily maturity, and this was kind of leading edge, bleeding edge customers in this space. The number two besides build my own was Red Hat was because I'm a red hat customer, a lot of Lennox tooling the way of building things the way my application developers do. Things fit in that environment. And therefore, that's why Red Hat has over 2000 open shift customers leading distribution for Kubernetes. And you know, this seems purely directly targeted at that market. That red hat did you know it was a big reason why IBM spent $34 billion on the Red Hat acquisition is to go after this multi cloud opportunity. So you know, absolutely this shot across the bow because Red Hat is a partner of VM Ware's, but absolutely is also a competitive >>Well, Maritz told me years ago that's true. We're with everybody and you could see that playing out. What if you look at what VM Ware could do and some of their options if they gave it away, that would really be a shot across the bow at open shift, wouldn't it? >>Yeah, absolutely, Dave, because kubernetes is not free if you're enabling kubernetes on my Google environment, I, you know, just within the last week's awesome things that were like, Okay, wait. If you're testing an environment, yes, it is free. But, you know, started talking about the hourly charges for the management layer of kubernetes. So you know kubernetes again. A color friend, Cory Quinn. Communities absolutely is not free, and he will give you an earful and his thoughts on it s o in Amazon or Google. And absolutely, Dave, it's an important revenue stream for red hat. So if I'm vm ware and you know, maybe for some period of time, you make it a line item, it's part of my l. A. You know, a good thing for customers to look out for is when you're renegotiating your l a toe, understand? If you're going to use this, what is the impact? Because absolutely, you know, from a financial standpoint, you know, Pat Gelsinger on the VM Ware team has been doing a lot of acquisitions. Many of those Dave have been targeted at this space. You know, not to step Geo, but a bit NAMI. And even the pivotal acquisition all fit in this environment. So they've spent billions of dollars. It shouldn't be a net zero revenue to the top line of what VM Ware is doing in the space. >>So that would be an issue from Wall Street's perspective. But at the same time, it's again, they're playing the long game here. Do we have any pricing data at this point? >>So I still have not gotten clear data as to how they're doing pricing now. >>Okay, Um, and others that are in there and in the mix. We talked about Red Hat. Certainly Microsoft is in there with Arc. I've mentioned many times Cisco coming at this from a networking perspective. But who else do you see and then Antos with Google? >>Yeah. And you know, Dave, all the companies we're talking about here, you know, Pat Gelsinger has had to leverage his intel experience to how to balance that line between a partner with everybody but slowly competing against everybody. So, you know, we've spent many hours talking about the VM Ware Amazon relationship. Amazon does not admit the multi cloud a solution yet and does not have a management tool for supporting all of the kubernetes environment. But absolutely Microsoft and Google do. Cisco has strong partnerships with all the cloud environment and is doing that hybrid solution and Dave Justice nothingto expand on a little bit there. If you talk about V sphere, you say, Okay, Visa or seven trolling out Well, how long will it take most of the customer base to roll to this environment? There will be some that absolutely want to take advantage of kubernetes and will go there. But we know that is typically a multi year process to get most of the install base over onto this. And if you extend that out to where VM Ware is putting their solution into cloud environments, there's that tension between, you know, Is there a match actually, between what I have in my data center and what is in the managed environment managed by VM Ware and Amazon, or manage for to support some of the other cloud environment. So the positioning always is that you're going to do VM Ware everywhere, and therefore it's going to be consistent everywhere. Well, the devil's in the details because I have control on what's in my data center, and I might have a little bit less control to some of those managed services that I'm consuming. So absolutely something to keep a close eye on. And not just for VM, where everybody is having these concerns. Even if you talk about the native kubernetes distributions, most of the kubernetes services from the cloud providers are not, you know, immediately on the latest revision of kubernetes, >>right, So Okay, well, let's let's talk about that. Remember when open Stack first came out? It was a Hail Mary against Amazon. Yeah, well, the new Hail Mary and looks like it has more teeth is kubernetes right, because it allows portability and and and of course, you know Amazon doesn't publicly say this, but it's not. That's not good for Amazon. If you're reporting things, applications, moving things around, moving them out of the Amazon cloud, and that makes it easier. Of course, Amazon does support kubernetes right, But you've got >>alternatives. So, David, it's fascinating. So I've talked to many practitioners that have deployed kubernetes and one of the top reasons that they say that why they're using Kubernetes is so they have options with the cloud. When you also ask them what cloud they're running, they're running Amazon. Did they have planned to move off of it? Well, probably not. I had a great customer that I didn't interview with that one of the Cube con shows, and they actually started out with Azure just because it was a little further head with kubernetes and then for the services they wanted. They ended up moving to AWS and Dave. It's not a click a button and you move from one kubernetes to another. You need toe match up and say, Okay, here's the five or six services I'm using. What are the equivalent? What changes do I need to make? Multi cloud is not simple. Today, I mentioned Hashi Corp is one of those companies that help people across these environments. If you have haji solution and you're managing across multiple clouds, you look in the code and you understand that there's a lot of difference between those different clouds, and they simplify that. But don't eliminate it. Just it is not. There is not a way today. This is not a utility when you talk about the public cloud. So you know Kubernetes absolutely is existentially a little bit of a threat to Amazon but Amazon still going strong in that space. And you know that the majority of customers that have deployed kubernetes in the public cloud are doing it on Amazon just because of their position in the marketplace and what they're. >>So let's double click on that. So Jassy, an exclusive interview with John Furrier before last year's re invent, said, Look, we understand there's a lot of reasons why people might choose multiple clouds, you know, go through them in a developer preference. And I think I think, you know, people want o optionality and reduce lock in potentially. But I've always said, by the way, just as an aside, that that the risk of lock in it is far down on the list relative to business value, people will choose business value over over, you know, no lock in every time. About 15% of the customers you might not agree. Nonetheless, Jassy claimed that typically when you get into a multiple cloud environment, he didn't use the term multi cloud that it's it's not a 50 50. It's a premier primary cloud supplier. So might be 70 30 or 80 20 or even 90 10. But it's really that kind of, you know, imbalance. First of all, do you see that? And then what does that mean for how they approach of this space? Multi cloud and in particular. >>So I'm sorry. You're asking how Amazon should approach the space. And you've said that I don't think they'll >>eventually enter this market place. >>Yeah, you know, absolutely, Dave. You know, first of all, in general, yes, I do agree. It is not. There are certain financial companies that, you know, have always chosen two of everything. Because for regulation and you know certain we need to protect ourselves. We're gonna have to suppliers. We're going to keep them as even as possible. But that is a corner case. Most customers I have a primary cloud. That's what I'm doing. That what I t tries to get everybody on and you need to have Is there a reason why you want to use a secondary or tertiary cloud because there's a service that they need. Of course, Google. You often run it. It's like, Oh, well, there's certain data services that they're doing well And, of course, the business productivity solutions that Microsoft's doing where the relationship with Oracle that are driving people towards Microsoft. But just as we saw Amazon soften on their hybrid solutions, we spent a lot of time at re invent talking about all the various hybrid solutions. Um, since their customers are going to have multiple clouds on and even you take most of their customers that have M and a involved you buy another company, they might be using another cloud. As Microsoft's position in the marketplace has grown, you would expect that Amazon would have not just migration services but management services to match what customers need, especially in this kubernetes environment, seems that it seems a natural fit for them. It's possible they might just leverage, you know, partnerships with red hat VM ware, you know, in some of the other players for the time being. But if the market gets big enough and customers are asking for it, that's usually when Amazon response >>So let's let's wrap with what this means to the customer. And I've said that last decade really multi cloud was a symptom of multi vendor and not so much of the strategy that's changing. You know, clearly, jokes CIOs are being called in to clean up the crime scene on do you know, put in edicts corporate edicts around security and governance and compliance and so forth. So it started to become a complicated situation for a lot of companies. We've said that multi cloud is gonna it's gonna be they're going. People are going to put the right war load and the right cloud, etcetera, and this advantages to certain clouds. But what should customers be thinking specifically as it relates to v. Sphere seven? >>Yes. So, Dave, the biggest thing I would say that people need to look at it is that understanding in your organization that that boundary and line between infrastructure and application people have often looked at you looked at the ascendancy of VM Ware, Andi V. M's and then what's happening with cloud and containers. And we think of it from an infrastructure standpoint that I'm just changing the underlying pieces. This is where it lives and where I put things. But the really important thing is it's about my data and my applications, Dave. So if I'm moving an application to a new environment, how do I take advantage of it? You know, we don't just move it to a new environment and run it the same way we were doing it. I need to take advantage of those new environments. Kubernetes is involved in infrastructure, but the real piece is how I have my application, my developers, my app. Dev's working on this environment and therefore it might be that if VM Ware's the right environment, I'm doing a lot of it that the development team says, Hey, I need you to give me a pool and provisioned this for me and I can have my sandbox where I can move really fast. But VM Ware helped initially customers when they went from physical to virtual, move faster. From an infrastructure standpoint, what it needs to do to really enable this environment is help me move faster on the application side. And that's a big gap from VM. Ware's history is where the pivotal people and hefty O people and bit NAMI and all the new people are helping along to help that whole cloud native team. But that is a big shift from customers. So for this to be successful, it's not just, oh, the virtualization admin. He upgraded to the new thing. He made some changes and said, Okay, hey, I can give you a kubernetes cluster when you need it. It's really understanding what's going to happen on the application side in a lot of that is going to be very similar to what you're doing in cloud environments. And I think this is Dave often where your customers, they say, Oh, well, I did that cloud and it was too expensive and it was too hard, and I repatriated. Everything else is, well, you probably didn't plan properly and you didn't understand what you're getting yourself into. And you jumped into the deep end of the pool and oh, wait, I forgot how to learn how to swim. So you know, that is where we are. You know, Dave, you know the technology parts. Always the easiest piece. It's getting all of the organizational and political things sorted out. And you know the developer we know how important that is, we're seeing. It's great to see VM Ware pushing faster in this environment. Kudos to them for how fast they moved. Project Pacific to G. A. That is really impressive to see and can't wait to hear the customers roll out because if this is successful, we should be hearing great transformation stories from customers as to how this is enabling their business, enabling them to move faster on. You know, that has been what, one of the favorite stories that I've been telling with customers on the Cube last couple of years. >>The vast majority of VM Ware's business, of course, is on print, and essentially they're doing here is enabling developers in their customer base and the half a 1,000,000 customers to really develop in a cloud native manner. The question is, you know, from a ah, from a cultural standpoint, is that actually gonna happen? Or the developers gonna reject the organ and say, No, I want to develop in AWS or Microsoft in the cloud. I think VM Ware would say, We're trying to embrace no matter where they want to develop, but they're still going to be. That's interesting organizational tension or developer attention in terms of what their primary choices is. They're not. >>Yeah, Dave, Absolutely. We've been saying for years. That cloud is not a location. It is an operating model. So this is helping to enable that operating model more in the data center. There's still questions and concerns, of course around, you know, consumption on demand versus you know, whether whether you've bought the entire thing as more and more services become available in the public cloud, are those actually enabled to be able to be used, you know, in my data center hosted environment. So you know, this story is not completed, but we're definitely ready. I believe we're saying it's the multi clouds Chapter three of what? We've been watching >>you and you're seeing a major tam expansion yet again from VM Ware that started with the NSX. And then, of course, went in tow networking and storage. And now they've got a cloud security division. We're talking about the the cloud native capabilities here and and on and on, it goes to thanks for helping us break this VC seven announcement down and good job fixed. All right. And thank you for watching everybody. This is Dave Volante for stew Minimum. We'll see you next time on the Cube. >>Yeah,

Published Date : Mar 10 2020

SUMMARY :

It's the Cube now VM Ware has called this the biggest change to V sphere in the I think back to you know, I remember when the fx 2.0, rolled out in V motion many times in many angles to try to ride the cloud wave, and it's finally settled on the partnerships There's the question as to First of all, are they really And what does that mean? One of the things I'm trying to understand when you dig And so this seems to me to be a So, first of all, you know, V. Sphere, of course, is the core of Who do you see is the number one competitors When I talk to practitioners, the number one, you know what kubernetes you're using? and you could see that playing out. you know, started talking about the hourly charges for the management layer of kubernetes. But at the same time, But who else do you see and are not, you know, immediately on the latest revision of kubernetes, because it allows portability and and and of course, you know Amazon doesn't publicly This is not a utility when you talk about the public cloud. But it's really that kind of, you know, You're asking how Amazon should approach the space. you know, partnerships with red hat VM ware, you know, on do you know, put in edicts corporate edicts around security and governance and compliance and And you know the developer we know how important that is, The question is, you know, So this is helping to enable that operating model more in the data center. And thank you for watching everybody.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavidPERSON

0.99+

Pat GelsingerPERSON

0.99+

AmazonORGANIZATION

0.99+

Dave VellantePERSON

0.99+

fiveQUANTITY

0.99+

DavePERSON

0.99+

MicrosoftORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

Dave VolantePERSON

0.99+

90%QUANTITY

0.99+

AWSORGANIZATION

0.99+

OracleORGANIZATION

0.99+

Cory QuinnPERSON

0.99+

JassyPERSON

0.99+

IBMORGANIZATION

0.99+

MaritzPERSON

0.99+

RancherORGANIZATION

0.99+

Bernard GoldenPERSON

0.99+

Red HatORGANIZATION

0.99+

John FurrierPERSON

0.99+

VM WareTITLE

0.99+

VM WareTITLE

0.99+

$34 billionQUANTITY

0.99+

six servicesQUANTITY

0.99+

VMwareORGANIZATION

0.99+

WindowsTITLE

0.99+

Hashi CorpORGANIZATION

0.99+

TodayDATE

0.99+

Hashi CorpORGANIZATION

0.99+

twoQUANTITY

0.99+

Boston, MassachusettsLOCATION

0.99+

last yearDATE

0.99+

Wiki BondORGANIZATION

0.99+

VM World 2019EVENT

0.99+

Dave JusticePERSON

0.99+

oneQUANTITY

0.99+

six months agoDATE

0.99+

SASORGANIZATION

0.99+

VM WareORGANIZATION

0.99+

OneQUANTITY

0.99+

LinuxTITLE

0.99+

Breaking Analysis: Coronavirus - Pivoting From Physical to Digital Events


 

>> From the SiliconANGLE Media office in Boston, Massachusetts, it's "theCUBE." (intro music) Now, here's your host, Dave Vellante. >> Hello, everyone and welcome to this week's episode of Wikibon's CUBE Insights, Powered by ETR. In this Breaking Analysis, we're going to take a break from our traditional spending assessment and share with you our advice on how to deal with this crisis, specifically shifting your physical to digital in the age of Coronavirus. So, we're not going to be digging into the spending data. I talked to ETR this week, and they are obviously surveying on the impact of COVID-19, but those results won't be ready for a little bit. So, theCUBE team has been in discussions with over 20 companies that have events planned in the near term and the inbound call volume has been increasing very rapidly. Now, we've been doing digital for a decade, and we have a lot of experience, and are really excited to share our learnings, tools, and best practices with you as you try to plan through this crisis. So look, this is uncharted territory. We haven't ever seen a country quarantine 35 million people before, so of course everyone is panicked by this uncertainty but our message, like others, is don't panic but don't be complacent. You have to act and you have to make decisions. This will reduce uncertainty for your stakeholders, your employees, and of course, your community. Now as you well know, major physical events are dropping very fast as a risk mitigation measure. Mobile World Congress, HIMSS canceled, Kube-Con was postponed, IMB Think has gone digital, and so it goes. Look, if you have an event in the next three weeks, you have little choice but to cancel the physical attendee portion of that event. You really have three choices here. One is to cancel the event completely and wait until next year. Now the problem with that is, that type of capitulation doesn't really preserve any of the value related to why you were originally holding the physical event in the first place. Now you can do what Kube-Con did and postpone til the summer or kind of indefinitely. Okay, that's a near-term recision on the event, but now you're in limbo. But if you can sort out a venue down the road, that might work. The third option is to pivot to digital. It requires more thought but what it does is allow you to create an ongoing content ark that has benefits. The number-one complaint brands tell us about physical events is that after the event, they don't create a post-event halo effect. A digital strategy that expands time will enable that. This is important because when the market calms down, you're going to be able to better-leverage digital for your physical events. The key question you want to ask is, what are the most important aspects of that physical event that you want to preserve? And then start thinking about building a digital twin of those areas. But it's much more than that. And I'll address this opportunity that we think is unfolding for you a little later. Your challenge right now is to act decisively and turn lemons into lemonade with digital. Experiences are built around content, community, and the interaction of people. This is our philosophy. It's a virtuous cycle where data and machine intelligence are going to drive insights, discovery by users is going to bring navigation which leads to engagement and ultimately outcomes. Now, very importantly, this is not about which event software package to use. Do not start there. Start with the outcome that you want to achieve and work backwards. Identify the parts of that outcome that are achievable and then work from there. The technology decision will be easy and fall out of it if you take that path. So out of a high-level, you have two paths. One, which is the preferred path is to pivot to digital, on the right-hand side, especially if your event is in March or early April. Two is hold your physical event, but your general counsel is going to be all over you about the risks and precautions that you need to take. There are others better than I to advise you on those precautions. I've listed some here on the left-hand side and I'm going to publish this on Wikibon, but you know what to do there. But we are suggesting advising for the near-term events that you optimize for digital. That's the right side. Send out a crisp and clear communications, Adobe has a good example, that asks your loyal community to opt-in for updates and start the planning process. You want to identify the key objectives of your event and build a digital program that maximizes the value for your attendees and the maps to those objectives. We're going to share some examples that theCUBE participated in this week on what might look like the digital event, and we'll share that with you. Event software should come last. Don't even worry about that until you've envisioned your outcome. And I'll talk about software tools a little bit later. So new thinking is required, we believe. The old way was a big venue, big bang event, you get thousands of people. You're spending tons of money on a band. There's exhibitor halls. You're not going to preserve that, obviously. Rather, think about resetting the physical and optimizing for digital which really is about serving a community. Now let's talk about, again, what that might look like in the near-term and then we're going to close on how we see this evolving to a new era. The pattern emerging with our sponsors and our clients is, they want to preserve five key content areas from physical. Not necessarily all of them but in some combination. First is the keynotes. You bring together a captive audience, and you have your customers there, they want to hear from executives. Your customers have made a bet on you, and they want to feel good about it. So one is keynotes. Two is the breakout sessions, the deeper dives from subject matter experts. Third are technical sessions. A big reason customers attend these events is to get technical training. Four is to actually share news in a press conference-like format. And the fifth area that we've seen is, of course, theCUBE. Many of our customers have said, "We not only want you to turn to turnkey the digital event, we want to plug theCUBE into our digital production that we are running." Now these are not in stone, they're just examples of what some of the customers are doing, and they're blending keynotes into their press conference, and there's a lot of different news cases. I want to stress that, initially, everyone's mindset is to simply replicate physical to digital. It's fine to start there, but there's more to this story that we'll address later on. So let's have a look at what something like this might look like in the near-term. Here's an example of a digital event we did this week with a company called "Aviatrix." Small company but very nice look for their brand which is a priority for them. You can see the live audience vibe. This was live but it can be pre-recorded. All the speakers were together in one place. You can see the very high production value. Now, some of our clients have said, "Look, soon we want to do this completely remote with 100 percent of the speakers distributed." And our feeling is that's much more challenging for high-value events. Our strong recommendation is plan to get the speakers into a physical venue. And ideally, get a small VIP/influencer audience to be there. Make the audience feel important with a vibe of a VIP event. Yeah, you can wait a few weeks to see how this thing shakes out, and if travel loosens up, then you can pull this off. But for your Brand value, you really want to look as professional as possible. Same thing for keynotes. You can see how good this looks. Nice stage, lighting, the blue lights, and a live audience. This is a higher-end production with a venue, and food, and music for the intros and outros, very professional audio and visual. And this requires budget. You got to think about at least 200 to 300 thousand dollars and up for a full-blown event that you bring in influencers and the like. But you have options. You can scale it down. You can host the event at your facility. Host it off at our facility in Palo Alto. I'll talk about that a little later. Use your own people for the studio audience. Use your own production people and dial back the glam, which will lower the cost. Just depends on the brand that you want to convey, and of course, your budget. Now as well, you can run the event as a live or as a semi-live. You can pre-record some of all of the segments. You can have a portion, like the press conference and/or the keynotes, run live and then insert the breakouts into the stream as a semi-live, or as on-demand assets. You have options. Now before I talk about technical sessions, I want to share another best practice. theCUBE this week participated in a digital event at Stanford with the Women in Data Science organization, WiDS, and we plugged into their digital platform. WiDS is amazing. They created a hybrid physical/digital event, and again, had a small group of VIPs and speakers onsite at Stanford with keynotes and panels and breakouts, and then theCUBE interviews all were streaming. What was really cool is they connected to dozens and dozens of outposts around the globe, and these outposts hosted intimate meet-ups and participated in the live event. And, of course, all the content is hosted on-demand for a post-event halo effect. I want to talk a little bit about technical sessions. Where as with press conferences and keynotes, we're strongly recommending a higher scale and stronger brand production. With technical sessions, we see a different approach working. Technical people are fine with you earbuds and laptop speakers. Here's an example of a technical talk that Dan Hushon, who is the Senior VP and CTO at DXC, has run for years using the CrowdChat platform. He used the free community edition, along with Google Handouts, and has run dozens and dozens of these tech talks designed for learning and collaboration. Look, you can run these weekly as part of the pre-game, up to your digital event. You can run them day of the event, at the crescendo, and you can continue the cadence post-event for that halo effect that I've been talking about. Now let's spend the moment talking about software tooling. There are a lot of tools out there. Some, super functional. Some are monolithic and bloated. Some are just emerging. And you might have some of these, either licensed or you might be wed to one. Webinar software, like ON24 and Brightcove, and there's other platforms, that's great, awesome. From our standpoint, we plug right into any platform and are really agnostic to that. But the key is not to allow your software to dictate the outcome of your digital event. Technology should serve the outcome, not the reverse. Let me share with you theCUBE's approach to software. Now first thing I want to tell you is our software is free. We have a community editions that are very robust, they're not neutered. And we're making these available to our community. We've taken a CloudNative horizontally scalable angle bringing to bear the right tools for the right job. We don't think of software just to hold content. Rather, we think about members of the community and our goal is to allow teams to form and be successful. We see digital events creating new or evolving roles in organizations where the event may end, but the social organization and community aspect lives on. Think of theCUBE as providing a membrane to the conference team and a template for organizing and executing on digital events. Whether it's engaging in CrowdChats, curating video, telling stories post-event, hosting content, amplifying content, visualize your community as a whole and serve them. That's really the goal. Presence here is critical in a digital event, "Oh hey, I see you're here. "Great, let's talk." There are a number of news cases, and I encourage you to call us, contact us, and we'll focus on how to keep it simple. We have a really simple MVP use case that we're happy to share with you. All right, I got to wrap. The key point here is we see a permanent change. This is not a prediction about Coronavirus. Rather, we see a transformation created with new dynamics. Digital is about groups which are essentially a proxy for communities. Successful online communities require new thinking and we see new roles emerging. Think about the protocol stack for an event today and how that's going to change. Today is very structured. You have a captive audience, you got a big physical venue. In the future, it may evolve to multiple venues and many runs of shows. Remote pods rules around who is speaking. Self-forming schedules is not going to be the same as today. We think digital moves to a persistent commitment by the community where the group collectively catalyzes collaboration. Hosting an online event is cool, but a longterm digital strategy doesn't just move physical to digital. Rather, it reimagines events as an organic entity, not a mechanism or a piece of software. This is not about hosting content. Digital communities have an emotional impact that must be reflected through your brand. Now our mission at theCUBE has always been to serve communities with great content. And it's evolving to provide the tools, infrastructure, and data for communities, to both self-govern and succeed. Even though these times are uncertain and very difficult, we are really excited to serve you. We'll make the time to consult with you and are really thrilled to share what we've learned in the last 10 years and collaborate with you to create great outcomes for audiences. Okay, that's a wrap. As always, we really appreciate the comments that we get on our LinkedIn posts, and on Twitter, I'm @DVellante, so thanks for that. And thank you for watching, everyone. This is Dave Vellante for theCUBE Insights, Powered by ETR. And we'll see you next time. (outro music)

Published Date : Mar 6 2020

SUMMARY :

From the SiliconANGLE Media office We'll make the time to consult with you

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavidPERSON

0.99+

AmazonORGANIZATION

0.99+

Dave VellantePERSON

0.99+

Justin WarrenPERSON

0.99+

Sanjay PoonenPERSON

0.99+

IBMORGANIZATION

0.99+

ClarkePERSON

0.99+

David FloyerPERSON

0.99+

Jeff FrickPERSON

0.99+

Dave VolantePERSON

0.99+

GeorgePERSON

0.99+

DavePERSON

0.99+

Diane GreenePERSON

0.99+

Michele PalusoPERSON

0.99+

AWSORGANIZATION

0.99+

Sam LightstonePERSON

0.99+

Dan HushonPERSON

0.99+

NutanixORGANIZATION

0.99+

Teresa CarlsonPERSON

0.99+

KevinPERSON

0.99+

Andy ArmstrongPERSON

0.99+

Michael DellPERSON

0.99+

Pat GelsingerPERSON

0.99+

JohnPERSON

0.99+

GoogleORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

Kevin SheehanPERSON

0.99+

Leandro NunezPERSON

0.99+

MicrosoftORGANIZATION

0.99+

OracleORGANIZATION

0.99+

AlibabaORGANIZATION

0.99+

NVIDIAORGANIZATION

0.99+

EMCORGANIZATION

0.99+

GEORGANIZATION

0.99+

NetAppORGANIZATION

0.99+

KeithPERSON

0.99+

Bob MetcalfePERSON

0.99+

VMwareORGANIZATION

0.99+

90%QUANTITY

0.99+

SamPERSON

0.99+

Larry BiaginiPERSON

0.99+

Rebecca KnightPERSON

0.99+

BrendanPERSON

0.99+

DellORGANIZATION

0.99+

PeterPERSON

0.99+

Clarke PattersonPERSON

0.99+

Craig Hibbert, Vcinity | CUBE Conversation, March 2020


 

from the silicon angle media office in Boston Massachusetts it's the queue now here's your host David on tape hello everyone and welcome to this special presentation we're gonna introduce you to a new kind of company first you might recall we've been reporting extensively on multi cloud and the need to create consistent experiences across cloud at high performance now a key to that outcome is the ability to leave data in place where it belongs not moving it around and bringing a cloud like experience to that data we've talked about kubernetes as a multi cloud enabler but it's an insufficient condition for success latency matters in fact it's critical and the ability to access data at high speeds wherever that data lives well we believe be a fundamental tenet of multi cloud now today I want to introduce you to a company called vicinity V CIN ity the simplest way to think of this company is they turn wide area networks into a global land and with me is Craig Hobart to talk about this he's the VP at vicinity Craig good to see you again thanks a lot thanks Howie middays good to be back so when I first heard about this company I said wow no it can't that breaking the law of physics so first of all tell me a little bit background about the company sure yeah absolutely so about two decades ago this company was formerly known as Bay Microsystems they were they were asked to come up with a solution specific for the United States military and there was a couple of people involved in that that tender fortunately for us Bay Microsystems prevailed and they've had their solution in place with the US military for well over a decade approach in two decades so that is the foundation that is the infrastructure of where we originated so did I get it right it kind of come through what you do can you add some color to that yeah yeah as much as I can right so based on who the the main consumer is so we do some very creative things where we we take the benefits of tcp/ip which is the retransmit the ability to ensure the data arrives there in one piece but we take away all the bad things with it things like dropping packets typically ones are lossy networks and and most people are accustomed to two fiber channel networks which of course which are lossless right and so what we've done is take the beauty of tcp/ip but remove the hindrances to it and that's how we get it to function at the same speeds as Al and overall one so but there's got to be more to it than that I mean it just sounds like magic right so you're able to leave data in place and access it at very low latency very high speeds so you know what's the secret sauce behind that is it is it you know architecture patents I mean yeah absolutely so we have over 30 unique patents that contribute to that we're not just doing those things that I just thought about before is a lot more we're actually shortly in the typical OSI stack the the moving through those layers and using our DMA so a lot of companies users today obviously infinite out uses in between the nodes Dell uses at HP is it's a very ubiquitous technology but typically it has a very short span it's designed for low latency as a 21-foot limitation there's certain things you can do to get around that now so what we did in our earlier iterations is extend that so you could go across the world but utilizing that inside a proprietary sort of l2 a tunneling protocol allows you to reinstate those calls that happened on the local side and bring them up on the other side of the world so presumably that sets up for Rocky it does yeah and rocky to you absolutely so we use that we use it converged Ethernet we can do some magical things where we can go in InfiniBand and potentially come out rocky at the other end there's a lot of really good things that we do obviously if it uh bans expensive converged Ethernet it's a lot more feasible and a lot easier to adapt when we can make sure I understand this so you think InfiniBand you're thinking you know in a data center you know proximate and shocking synchronous distances are you saying that you can extend that we can but extended not extending finna band but you're saying you can you translate it into Ethernet yeah yeah we we translate into we have some proprietary mechanisms obviously that that all the patents on but in essence that's exactly what we're doing yeah we take in the earlier years InfiniBand and extend that to wherever it needed to be over any distance and and now we do it with conversion and infinite in like speeds yeah yeah so obviously you've got that we can't get around physics oh I mean it for instance between our Maryland office and our San Jose office it's a 60 millisecond r/t team we can't get beyond that we can't achieve physics but what we can do is deliver us sometimes a 20x payload inside that same RTT so in essence you could argue that would be due to the speed of light by delivering a higher payload is what's the trade-off I mean there's got to be something here yeah so it's today it's not it's not ideal for every single situation if you were to do a transactional LTP a database at one side of the world to the other it would that would not be great for that something files yeah so so what we actually do I mean some some great examples we have is seismic data we have some companies that are doing seismic exploration and it used to take a lot of time to bring that data back to shore copied to a disk array and then you know copied to multiple disk arrays across the world so people can analyze it in that particularly use case we bring that data back we can even access it via satellite directly from the boats that are doing the the surveys and then we can have multiple people around the world looking at that sample live when we do a demonstration for our customers that shows that so that's one great example of time to market and getting ahead of your competition what's the file system underneath so we have a choice of different file system is a parallel file system we chose spectrum Connect it's a very ubiquitous file system it's well known it has there is no other file system that has the the hours of runtime that that has we off you skate the complexities from the customers we do all of the tuning so it's a custom solution and so they don't see it but we do have some of the hyper scales that want to use lustre and cluster and be GFS and things that we can accommodate those so you have a choice but the preferred is gpfs is a custom one we have you absolutely if somebody wants to use another one we have done that and can certainly have dialogues around it could talk about how this is different from competitors I think of like guys like doing Wayne acceleration sure sure yeah so what acceleration regardless of who you are today with it's predicated upon caching substantial caching and some of the problems with that are obviously once you turn on encryption that compression and those deduplication or data reduction technologies are hampered in that caching based on who our primary customer was we're handed encrypted data from them we encrypted as well so we have double layers of encrypted data and that does not affect our performance so massive underlying technological differences that allow you to adapt to the modern world with encrypted data so we've been talking about I said in the intro a lot about multi cloud can you tell us sooner where do you fit in but first of all how do you see that evolving sure and where do you guys fit in Joe so I actually read to assess very certain dividends I read your article before we had a dialogue last week and there was a good article talking about the complexities around multi cloud and I think you know you look at Google it's got some refactoring involved in it they're all great approaches we think the best way to deal with multi cloud today is to hold your data yourself and bring those services that you want to it and before we came along you couldn't do that so think now a movie studio we have a company in California that needs people working on video editing across the world and typically they would proliferate multiple copies out to storage in India and China and Australia and not only is that costly but it's incredibly time consuming and in one of those instances it opens up security holes and the movies were getting hacked and stolen and of course that's billions of dollars worth of damage to to any movie company so by having one set of security tenants in your in your physical place you can now bring anybody you want to consume that day to bring them all together bid GCP AWS as you for the compute and you maintain your data and that segues well into things like gdpr and things like that where the data isn't moving so you're not affected by those rules and regulations the data stays in one place it's we think it's a huge advantage so has that helped you get some business I mean the fact that you have to move data and you can keep it in you can give us an example yeah it absolutely doesn't mean if you think of companies like pharmaceutical companies that have a lot of data to process whether it's electron microscopy data nano tissue samples they need heavy iron to do that we're talking craze so we can facilitate the ability to rent out supercomputers and the security company of the farmers is happy to do that because it's not leaving the four walls present the data and run it live because we're getting land speeds right we're giving you land speed performance over the wine so it's it's possible we've actually done it for them to do that craze make money by renting the farmers are happy because they can't afford craze it's a great way to accelerate time to marketing in that case they're making drug specific for your genome specific for your body tissue so the efficacy of the drugs is greatly improved as well well as you have been we know the storage business primary storage right now is I've said it's a knife fight yeah and it's a cloud is eating away at it flash was injected and gave people a lot of head rooms and they're not buying spindles for performance anymore but but data protection and backup and and data management is really taking off do you guys fit in there is are there use cases for you you there when you think of companies like cookie City and rubric and and many others that are the cloud seems to be a tailwind for them is it a tailwind for you I think so and I think he just brought up a great point if you look at and again another one of your articles I'm giving you some thanks Rick you know saying I won't forget it is the article you wrote I thought was excellent about how data is changed it's not so much about the primary data now it's about the backup data and what rubric and cohesive tea especially have done is bring value to that data and they've elevated it up the stack for analytics and AI and made available to DevOps and that's brilliant but today that can find it too within the four walls of that company what vicinity can do for those companies has come along and make that data available anywhere in the world at anytime so if they've got different countries that they're trying to sell into that may have diff back up types or different data they can access this and model the data and see how it's relevant to their specific industry right as we say our zeros and ones are different than your zeros and ones so it's a massive expansion it take that richness that they've created and extrapolate that globally and that's what facility brings to the table you know within the days of big data we used to look at high performance computing as an example going more into commercial notes that's clearly happened but mainstream is still VMware is there a VMware play for you guys or opportunity great question great question in q1 of this year so so January end of January 2020 typically in the intro we talked about how we were born on a6 which is incredibly expensive and limited you get one go ahead and then we move to FPGAs we actually wrote a lot of libraries that took the FPGAs into a VMware instance and so what we're doing now with our customers is when we go in and present they say there's no way you can do this and we show them the demo when we actually leave they can log-in download to VMware instances put one in in these case one the west coast or with one of my customers we have now one on the east coast one in London download the VM and see the improvement that we can get over their dedicated lines or even the Internet by using the VM fact we did that in a test with AWS last week and got a 90 percent improvement just using the VM so when you are talking to customers what's the you know what's the the situation that you're looking for the the problem that comes up that you say bone that's vicinity maybe you could show not you do slash call in there so I think a lot of that is people looking to use multi cloud right that aren't sure which way they want to go how they want to do it and for other companies that can't move the data there's a lot of companies that either went to the cloud and came back or cannot go to the cloud because of the sensitivity of the data so and also things like the the seismic exploration right there is no cloud solution that makes that expedient enough to consume it as it's been developed and so anybody that needs movie editing large file transfer dr you know if you're moving a lot of files from one location to another we can't get involved in storage replication but if it's a file share we can do that and one of the great things we do is if you have cysts or NFS shares today we can consume those shares with the with the spectrum scale the gpfs under the cover and make that appear anywhere else in the world and we do that through our proprietary technology of course so now remote offices can collapse a lot of the infrastructure they have and consume the resources from the main data center because we can reach right back here at land space they just become an extension of the land no different than me plug in the laptop into an Ethernet you pay a penalty on first byte we do but it's almost transparent because of the way tcp/ip works very chatty yeah it is so we drop all that and that that's a great question an analogy we use in house is you turn on a garden house and it takes a few seconds for that garden hose to fill but with us that water stream is constant and it's constantly output in water with tcp/ip a bit stop start stop start stop start and if you have to start doing retransmit which is a regular occurrence of tcp/ip and that entire capacity of that garden hose will be dropped and then refilled and this is where our advantage is the ability to keep that full and keep serving data in that what you just described makes people really think twice about multi clouds essentially they want to put the right workload in the right place and kind of leave it there and essentially it's like the old mini computer days they're creating you know silos you're helping sort of bridge those we are that and that is the plot and so you know we have B to B we are B to C I mean if you sit and think about the possibilities I mean it could end up on every one of these right this software you know do we tackle every Wireless point this is this is some of the things that we can do you're an app or do we put vicinity on that to take the the regular tcp/ip and send the communication you know through through our proprietary Network around proprietary configuration so there's a lot of things that we can do we can we can affect everybody and that is that is the goal so divide by hardware from you or software or both that's another great question so if you are in a data center in the analogy I just gave before about being a a big data center you would use a piece of hardware that's got accelerants in it and then the remote office could use a smaller piece of hardware or just the VM with the movie company example I gave you earlier India and Australia is edit in live files on the west coast of the United States of America just using the VM so it depends what we come in as we look at your needs and we don't oversell you we try and sell you the correct solution and that typically is a combination of some hardware in the main data center and some software at the others so I've said you know multi-cloud in many ways creates more problems today than it solves you guys are really in there attacking that multi-cloud is a reality it's it's happening you know I said historically it's been a symptom of multi-vendor but now it's becoming increasingly a strategy and I think frankly I think companies like yours are critical in the ecosystem to really you know drive that transformation for organizations so congratulations thank you thank you we hope so and I'm sure we'll be seeing more of you in the future excellent well thanks for coming in Craig and we'll talk to you soon thank you for watching everybody this is Dave latte for the cube and we'll see you next time

Published Date : Mar 5 2020

**Summary and Sentiment Analysis are not been shown because of improper transcript**

ENTITIES

EntityCategoryConfidence
Bay MicrosystemsORGANIZATION

0.99+

21-footQUANTITY

0.99+

CaliforniaLOCATION

0.99+

90 percentQUANTITY

0.99+

March 2020DATE

0.99+

IndiaLOCATION

0.99+

LondonLOCATION

0.99+

AustraliaLOCATION

0.99+

Craig HibbertPERSON

0.99+

DavidPERSON

0.99+

Craig HobartPERSON

0.99+

AWSORGANIZATION

0.99+

ChinaLOCATION

0.99+

billions of dollarsQUANTITY

0.99+

RickPERSON

0.99+

last weekDATE

0.99+

San JoseLOCATION

0.99+

January end of January 2020DATE

0.99+

Boston MassachusettsLOCATION

0.99+

20xQUANTITY

0.98+

GoogleORGANIZATION

0.98+

CraigPERSON

0.98+

todayDATE

0.98+

over 30 unique patentsQUANTITY

0.98+

one locationQUANTITY

0.98+

bothQUANTITY

0.98+

firstQUANTITY

0.97+

60 millisecondQUANTITY

0.97+

US militaryORGANIZATION

0.97+

one sideQUANTITY

0.97+

MarylandLOCATION

0.97+

twiceQUANTITY

0.96+

one pieceQUANTITY

0.96+

Dave lattePERSON

0.96+

JoePERSON

0.95+

oneQUANTITY

0.94+

United States militaryORGANIZATION

0.94+

a lot of filesQUANTITY

0.94+

United States of AmericaLOCATION

0.94+

one setQUANTITY

0.93+

HPORGANIZATION

0.93+

DellORGANIZATION

0.93+

one placeQUANTITY

0.92+

a lot of dataQUANTITY

0.9+

couple of peopleQUANTITY

0.9+

vicinityORGANIZATION

0.9+

InfiniBandTITLE

0.9+

VMwareTITLE

0.88+

q1 of this yearDATE

0.86+

gdprTITLE

0.85+

west coastLOCATION

0.83+

V CINORGANIZATION

0.83+

about two decades agoDATE

0.82+

a lot of companiesQUANTITY

0.82+

two fiber channelQUANTITY

0.8+

VcinityPERSON

0.78+

single situationQUANTITY

0.76+

east coastLOCATION

0.72+

two decadesQUANTITY

0.71+

timeQUANTITY

0.68+

InfiniBandCOMMERCIAL_ITEM

0.68+

lotQUANTITY

0.67+

WaynePERSON

0.67+

VMware playTITLE

0.67+

OSIOTHER

0.63+

few secondsQUANTITY

0.63+

over a decadeQUANTITY

0.61+

doubleQUANTITY

0.56+

GCPORGANIZATION

0.54+

four wallsQUANTITY

0.53+

a6COMMERCIAL_ITEM

0.51+

InfiniBandORGANIZATION

0.39+

Joseph D’Angelo, Veritas | CUBE Conversation, March 2020


 

from the silicon angle media office in Boston Massachusetts it's the queue now here's your host Stu minimun hi I'm Stu minimun and welcome to a special cube conversation here in our Boston area studio the one constant that we know for customers is change and how they manage their data there are applications in this ever-changing world is something that is always interesting to dig into and helping me with this conversation first time guests on the program Joe DeAngelo who is a distinguished engineer and national practice lead of availability solutions with Veritas is here with me Joe thanks so much for joining us it's - thanks for having me yours is great all right so first before we get into it give us a little bit about you know your background what you work on how long you been with Veritas sure so I've been with Veritas for nine years in various different roles I was a product manager when I joined the company since then I joined the field sales technical or technical field sales organization working as an advocate with some of our more strategic customers sort of like the liaison back to the product team before that I was a consultant sort of as a implementing these technologies from Veritas and of course it was a customer - so always had sort of that round out that full full spectrum of experience with love that we can draw on some of your experience as a customer right let's start there if we will now you're working with a lot of customers and the space you're working on the availability solutions I kind of teed it up with we know that there's change happening you know when I talk about customers in their cloud journey it is an ever moving thing it's not a one-way thing there's data centers there's cloud there's edge there's all of these environments and what you know figuring out what application what application goes where and how that's changing over time is there's a real challenge for customers these days is it not it absolutely is and really one of the sort of the foundational tenants of the availability solutions at Veritas is that we give customers the ability to sort of decouple their applications from all of that sort of chaos that's in the in their infrastructure whether it's in the cloud whether it's hyper-converged physical virtual different storage technologies they can run their application where they need to run it when they need to run it and be to know that it'll be performance yeah well we know from Veritas as legacy I remember seeing the billboards and the t-shirts there are no hardware agenda so you understand Veritas has always been a software share company when you look at that kind of wave of you know software-defined storage and the like help us understand you know today here's 2020 we're living in the future you know what that means for you know customers data is customers application what the availability solution in the product lines that you work yeah I mean that's that's a terrific question well what it means is you have a myriad of choices you have to decide on so it's not just the individual application but really the the composition of those apps and the relationships they have with other different other applications you mentioned software-defined storage I mean we cut our teeth on software-defined storage back when that wasn't even a term you know thirty years ago all right I like to think that it's almost in our DNA that you know taking and virtualizing storage is one of the first things we did as a technology today we we've taken that same sort of approach to commoditizing most of the infrastructure so that it doesn't matter what operating system it doesn't matter what storage vendor you use doesn't matter what cloud provider you use our technology gives you the luxury or I like to say breathing room in many cases to make those decisions so that they can align with your business outcomes more effectively all right so Joe the the product we're going to be talking a bit about is info scale for people that aren't familiar you know what is info scale how does it fit in this ever-changing landscape you mentioned you know cloud and operating systems and hypervisors and everything so help us tee up we're in for a scale fits sure thing so info scale is really a moniker if nothing else on top of our storage foundation veritos volume manager Veritas file system veritas cluster server technologies and those have been industry staples for decades right being able to address the needs of the most critical applications and so most stringent and high demanding workloads be at the top financial institutions health care providers etc the the technology itself really addresses resiliency and availability from sort of three areas we'd like to think that you can provide the ability to keep your services online with our with our high availability and disaster recovery solutions but we also wanna make sure that those applications and those data sets that you're using the technology with making sure that they're performing right because an underperforming application is just as detrimental to availability as would be a simply going offline and we also want to give you the ability to migrate workloads and move those applications among different technologies so that's really where the the focus of impost scalable it ok so you know Joe when you have customers that are trying to figure out ok I'm taking an application do I take that from my data center do I move that to the cloud I'm building a new application where do I do that how does in fel scale fit into that discussion and how is the discussion of info scale fit with the infrastructure discussion that they are having yeah absolutely so inevitably what the choice a lot of the customers I have conversations with struggle with just what's the first step to get to the cloud and many of them are locked into a proprietary solution or some technology that doesn't really have an analogue or some sort of equivalency in the cloud with info scale what we allowed them to do is actually replicate that data anywhere they want to go because you said we don't have a hardware agenda it doesn't matter what the storage underneath the covers might be so we can go from physical storage on Prem into the public cloud across any variety of different tiers of storage that exists there and this works at not just the from a data set standpoint but the applications as well so if you've got something as critical as a database a relational database that's Oracle them as a sequel database whatever may be you can very easily replicate those and move those workloads into the public cloud for purposes of migrations or disaster recovery with truth be told of the exact same thing you know migrations just a one-way ticket a dr is a roundtrip ticket but the technology is exactly the same so that's how you're able to achieve those goals ok we talked about application in general you mentioned some specific is there you know you know a compatibility list or you know what sorts of classes of applications how do I know if my application today is something that fits under this certainly so we have a catalogue of agents that we support what we call our bundled agents or agent framework and it it's a list of roughly over 500 different infrastructure components applications and services that we monitor and protect for the purposes of again for disaster recovery and migration capabilities pretty much all the enterprise applications the most prolific workloads that are in the in the industry today so are your databases or middleware to your application servers those are all included but we also have the ability to very easily introduce custom applications so a customer can take and say they may have written something homegrown and it has any number of different components to it if you could tell me how to start it how to stop it how to monitor it we can put it into info skill okay Joe I think we paint a pretty good picture of what info scale is maybe if you have a customer example that might help us understand a little bit about kind of the use cases and commonly why they're using it now that work well I can I have a little bit of an anecdote that I like to tell a story about a customer a state agency that was a big info scale user just happened to be on Windows and we've gotten through a deployment and everything was looking great and they were able to move all of their their their applications in this particular these Windows applications all in it being particularly info scale being replicated and having both high availability as well as disaster recovery and everything was looking great I finished the project on a Friday afternoon and bye-bye Sunday morning I was getting frantic phone calls from the people that I was working with at the time I was actually a consultant and they're asking me what what happened what's going on why what's what's what's the issue here I go I left the customer just fine on Friday there were no issues at all and they said you need to reach out to your team there and see what's going on so we're getting some phone calls that there's some problems like okay so I got on the phone and I spoke to my contact there and he said oh no nothing's wrong with the environment but we might have some issues with who's gonna be maintaining it come Monday morning and I go why it was well I think half the team well pretty much all the team's gonna be calling in rich Monday morning and I go what are you talking about goes the entire IT staff hit the Mega Millions jackpot so the this is the entire staff this was the DBAs the network admins the manager the managers manager all had the Mega Man jackpot so needless to say they weren't too concerned about coming into work on Monday morning but this poor person that was left he was holding the bag he said we already reached out to support your guys are on the call we're confident knowing that you know that that veritas is going to be there to help us through this transitional period because we've got this consistent layer so I used that example because it's a fantastic story but too it addresses the fact that disasters come in many different flavors and many different you know they can produce and manifest in many different ways and your people that to me that that's always your most critical asset and when those suffer that you know this technology is there really helped address me well Joe I like that example rather than I think going forward rather than saying well what happens if one of your critical staff gets hit by a bus yeah what if your entire support team you know it did happen all right what would you say are some of the kind of misconceptions that but maybe people don't understand if they're that they haven't look closely at in post-game lately yeah great question so I think some of the misconceptions about it is that it's tied to a very specific sort of heritage big iron unix only workloads admittedly we cut our teeth in that space right whether it's going back in the days of the original Sun OS and some of the the big iron systems we gained a lot of traction a lot of you know we earned our stripes in that space but in reality that that space is shrunk tremendously over the last you know 10 or 15 years for a variety of reasons and I think there's still some misconception that that info scale or veritas you know volume management file system only is relevant in that space and truth be told nothing could be further from nothing to be further from the truth because if you go back to what I comment I made earlier about this idea of commoditizing that infrastructure we can help customers transition throughout all those different sort of points of inflection so if going from the big iron to go into the more commodity commoditized you know x86 hardware going from physical to virtual going from virtual to the cloud going from virtual to hyper-converged and even back in some cases we have the capabilities and the wherewithal to be able to help customers do those kinds of transitions yeah I've been in the industry long enough I remember a lot of those UNIX migrations you know whether it going over to Windows whether I'm going over the Linux what would you say are some of the similarities some of the differences from what we did in those environments compared to what's often a cloud discussion today yeah so truth be told is that we we we tend to not reinvent the wheel at Veritas we look and say okay what are some of the really you know tremendously powerful tools and capabilities that we have how do we apply those to new platforms you take the cloud for example one of the things that we've always prided ourselves on is giving customers again that breathing room to make a decision and say I'm gonna move to a new platform so I can literally take a worker that was running on UNIX and I can move it over to Linux well that same model now can be applied where I can take that legacy work load running in Solaris I can move that directly into the public cloud and that's something that turns a lot of heads because I asked a lot of customers I know would it be compelling if I had a means for you to be able to take that legacy Solaris environment or that UNIX workload and I can write it directly into say ec2 in AWS and they're all there it's it's they're incredulous they're thinking no this can't happen there's no way you can do this and I said yes it can because we look at the cloud is another platform and we want to be able to have customers take full advantage of it exploit it but at the same time not be fearful that they won't have a way to move data in and out yeah oh it's Veritas helping with some of the the management pieces when you talk about going through those migrations it's one thing about what platform I live on but how do I manage that environment what skills that do I need yeah how are you working hand-in-hand with your customers on that well the great thing about it is is that there is a there's a sense of parity between what we do on Prem and what you do in the public cloud when you're using info scale because again we consume cloud resources just like they were any other platform so whether you were going from physical to virtual virtual to hyper converts or into the public cloud the same operations the same configurations the same the same scripts the same user interface all the things all of the the the machinery and the tooling that's around those applications can can can be consistent and in many cases that is it is invaluable because a lot of customers while they want to adopt the public cloud they don't want to have to redefine their operational paradigm they want to be able to take those workloads and I want to just be able to scoop them up and say put me in the public cloud I don't want to change everything around it because I don't have the bandwidth to do that to take on a whole new react of texture using the cloud that's that's basically starting your IT from from zero and building only backup and they don't have the time or the money or the resources to make that happen so looking for that consistency looking for that parity between the on-prem the public cloud all right what are some of the features that are most resonating with your customers well I would say first and foremost the the the fact that that our core technology around volume management helps you to virtualize storage all the capabilities you have there the fact that our file system can transition between different different Indians rate going from UNIX to Linux going from from Solaris to Red Hat and so on that gives you that flexibility our Hardware agnostic replication with volume replicator giving you the ability to not only provide dr over any geographic distance but also the ability to migrate between those platforms so being able to take and replicate data that's on a UNIX system today into the public cloud running Linux so that's with volume replicator we also have capabilities that allow you to utilize local storage in the sense that and treat it like it's shared storage some of the challenges with the public cloud are around some of the restrictive storage architectures so you take like a an availability zone inside of AWS all that storage is only available inside of at that particular availability zone if you want to move an application over to the other node you can't share storage between those availability zones we didn't focus Caleb you can and you can basically address some of those gaps or shoot through some of those blind spots yeah how was your team helping your customers keep up with all those changes you know we look at the public cloud there there's always new instances there's new zones there's it's it's a constant reinvention happening and day out yeah absolutely so a couple of things were happening first and foremost we're in the marketplace we have CF T's we've got you know a.m. eyes for that product so that you can further info scale so you can spin those up much more quickly working to get in the same thing for the azure marketplace we integrate with a lot of the automation and orchestration tools that are in the market today the ansible is the Puppets the chef's making sure that what I call the time to value for our technology is as short as possible so that you get out of the business of becoming you know a very tossed admin but focusing more on your on your business and what Veritas can do to help you improve that yeah it's interesting stuff a lot of automation going on in this space you know it's a very different world for your customers you know is is there some that you need to kind of react eight customers as do you know what Veritas is doing today versus what they might yeah there's there's a we're we're not your father's Veritas kind of mentality that we try to promote and I think you you've seen over the last 12 to 18 months that our our messaging our corporate strategy in general has had a tremendous sort of resurgence of info scale being a big part of that because recognize that when you talk about Veritas as a whole with our API strategy of availability protection and insights availability of your services in your data are critical to your success as an enterprise not just from an IT perspective and it's where info scale really plays sort of the the sort of the critical role in achieving that any other what sort of outcomes do you do your customers find once they've rolled these solutions out well I think operationally that there is a significant reduction in the overhead needed to make some of the more complex and and and really challenging operations you know cookie cutter I had a customer just last week you know this might sound like a little bit of you know self-promotion but he said storage foundation is the single greatest software-defined storage technology that's ever been written and because they are able to achieve a migration on a scale that they never would have been able to achieve without without a technology like this and of course I know there's no way to vet that statement but you're just going to if the customer is gonna has said it we will take them on there he did it it was I took pause I'm like wow I was like can I quote you on that he was just like yes you may Joe what else what other features underneath or kind of lesser-known things from info scale do you want to make sure customers know about oh yeah I mean listen there there are so many incredible capabilities that are included with info scale I would say that most important is that you know we can do things like transparently tear storage between on-prem and the public cloud and that can be something as granular as and as an Oracle database or something is you know general-purpose is just a shared you know NFS file system we have intelligent caching mechanisms to accelerate performance of workloads that again address the issues of performance on Prem as well as the public cloud we can help you transition your applications we have a migration wizard framework inside of our dashboard our info scale operations manager that allows you to on you know on the fly establish all of the necessary relationships between the different different clusters to be able to move applications from from from UNIX to the Linux move it from physical to virtual to go from a virtual and a hyper-converged we identify all those pieces and you know I said in an on-demand fashion build all the components for you we have you know a number of different you know what's most common talk about today is ransomware right this idea that how do we insulate our data from the from the threats of ransomware you can do so many different off host snapshot recovery method methodologies with info scale right creating an air gap between your data and secondary data sets that you can recover instantly from but has that enough gap so that that something that would corrupt the primary data set would not infiltrate your secondary copies so I mean there's just so many cool things that it can do it's just the use cases are just pretty you know innumerable yeah so last question Joe is a let's go up level a little bit you talk about you know the application portfolios really changing for a lot of customers lift relational databases we talked about you know virtual and physical and and cloud environments ever changing so when customers think about Veritas how should they when and how should they be thinking about Veritas well especially from from the from an availability standpoint it's really about abstracting your applications from the underlying infrastructure providing a resilient and performant storage layer to achieve really the the goals of your business not just the goals of your IT because at the end of the day we want to make sure that there is a direct line of sight between what you're trying to do is an enterprise what you're trying to do as a business be it a financial service institution healthcare provider doesn't matter what the industry is and that that the investments you make an IT can directly contribute to that and with Veritas we really help customers to make that a reality and we do it tactically with the idea of protecting your applications and ensuring that you have resilient services and we do it strategically by giving a platform to be able to host any number of different applications across all different operating systems and technologies so DeAngelo thank you so much for all the updates really a pleasure all right be sure to check out the cube net for all of the interviews we have go hit the search you can find past interviews we've done with Veritas as well as all the shows that we'll be at at 2020 and beyond I'm Stu minimun and thank you for watching the Q

Published Date : Mar 2 2020

SUMMARY :

that that the investments you make an IT

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Joe DeAngeloPERSON

0.99+

DeAngeloPERSON

0.99+

VeritasORGANIZATION

0.99+

Monday morningDATE

0.99+

JoePERSON

0.99+

2020DATE

0.99+

March 2020DATE

0.99+

nine yearsQUANTITY

0.99+

10QUANTITY

0.99+

Friday afternoonDATE

0.99+

UNIXTITLE

0.99+

BostonLOCATION

0.99+

Sunday morningDATE

0.99+

WindowsTITLE

0.99+

LinuxTITLE

0.99+

last weekDATE

0.99+

15 yearsQUANTITY

0.99+

Boston MassachusettsLOCATION

0.99+

Stu minimunPERSON

0.99+

Stu minimunPERSON

0.99+

first stepQUANTITY

0.98+

SolarisTITLE

0.98+

thirty years agoDATE

0.98+

todayDATE

0.98+

oneQUANTITY

0.97+

eight customersQUANTITY

0.97+

Red HatTITLE

0.97+

OracleORGANIZATION

0.97+

VeritasPERSON

0.97+

Joseph D’AngeloPERSON

0.97+

first timeQUANTITY

0.96+

AWSORGANIZATION

0.96+

firstQUANTITY

0.95+

FridayDATE

0.95+

Sun OSTITLE

0.93+

decadesQUANTITY

0.91+

one-wayQUANTITY

0.9+

singleQUANTITY

0.9+

one thingQUANTITY

0.89+

over 500 differentQUANTITY

0.89+

ec2TITLE

0.83+

bothQUANTITY

0.82+

a lot of customersQUANTITY

0.82+

Mega ManTITLE

0.81+

lot of customersQUANTITY

0.81+

Mega MillionsTITLE

0.8+

lot of customersQUANTITY

0.76+

zeroQUANTITY

0.74+

three areasQUANTITY

0.71+

Breaking Analysis: Multi-Cloud...A Symptom Or Cure?


 

from the silicon angle media office in Boston Massachusetts it's the queue now here's your host David on tape hello everyone and welcome to this week's wiki bond cube insights powered by ETR in this breaking analysis we want to dig into the so called multi-cloud arena some of the questions we're getting from our community are what is a multi cloud did we really need it what problems does multi-cloud solve and importantly what problems does it create how is this thing called multi cloud likely to evolve and who are some of the key players to watch how do they stack up relative to each other you know recently I got a couple of interesting questions from a customer that says I have all this AI action going on and doing sophisticated modeling and this data lives and oh clouds all over the place how do I cross connect to the data and the workloads that are running on these clouds with the consistence this consistent experience of what our other customers doing another question came up in the community today is there a financial advantage to multi cloud or is it just about avoiding lock-in so I'm gonna take a stab at addressing these questions so first of all let's look at some of the noise that's going on in the marketplace and try to extract a little signal every vendor especially the ones who don't own a cloud are touting this thing called multi cloud and they tell us that customers want to avoid lock-in and organizations want seamless integration across clouds and they say we the vendor are uniquely qualified to deliver that capability although as you can see here in for a not everybody agrees because some feel that multi cloud is less secure more complicated in higher cost now the reality is that one two and three are true as is for a to a certain degree but generally I would say that multi cloud to date is more of a symptom of multi vendor then a clear strategy but that's beginning to change and there's a substantial opportunity out there for anyone to win so let's explore this a little bit and an exclusive sit-down with aunty Jessie prior to reinvent 2019 John Fourier got Jessie to talk about this trend here's what he said we have a large number of companies who have gone all-in on AWS and that's growing but there's gonna be other companies who decide that they're going to use multiple clouds for different reasons you wouldn't have to say that the vast majority of organizations pursuing cloud tend to pick a predominant provider that it's not a 50/50 scenario it's rather it's more like a 70/30 or 8020 or even a 90/10 faria went on to write somewhat paraphrasing I think Jesse in my view it's not hard to find the reasons for using multiple clouds right is M&A there's shadow IT there's developer preference but it's really not multi cloud by design it's just more of the same Enterprise IT mishmash that we've seen for decades so I generally have to say I agree with that but it is changing and I want to dig into that a bit so first let me recap the basic premise that we work off of first cloud is winning in the marketplace we know this building data centers is not the best use of capital unless you're a data center operator or a hyper scaler or you know maybe a SAS provider maybe so more and more work is going to continue to move to the cloud this was pretty much the first wave of cloud if you will a cloud of remote infrastructure services for very obvious workloads like web test dev analytics and certain SAS offerings the second wave of cloud which we've been talking about for 15 years was or should I say is a hybrid connecting remote cloud services to on-prem workloads and the third wave which is really hitting somewhat in parallel is this thing that we call multi cloud now it's not a perfect analogy but these multi generational waves remind us of the early days of networking now some of you may remember that years ago the industry was comprised of multiple dominant vendors that control their own proprietary network stacks for example IBM had SN a digital or deck had decnet all the many computer vendors had their own proprietary nets now in the early to mid-1980s the OSI model emerged with the objective of creating interoperability amongst all these different communication systems and the idea was we're going to standardize on protocols and the model had seven layers all the way from the physical layer through the application but really in reality was a pipe dream because we were way too complicated and and it sort of assumed that customers are gonna rip and replace their existing networks and then standardize on the OSI model now in reality that was never gonna happen however what it did is it open the door for new companies and you saw firms like Cisco and 3com emerged with tcp/ip and Ethernet becoming standardized and enabling connections between these systems and it totally changed the industry as we now know it so what does this have to do with multi-cloud well today you kind of have a similar situation with dominant public cloud leaders like AWS and azure and in this analogy they are the proprietary siloed networks of the past like IBM and digital they're more open obviously but still ultimately customers are going to put workloads on the right cloud for the right job and that includes putting work on Prem and connecting it to the public cloud with call it a substantially similar and ideally identical experience that's what we call hybrid now that's today's big wave and you're seeing it with Amazon's outposts and VMware and Amazon and Azure stack etc so while all this hybrid action is getting wired up customers are putting work into AWS and Azure and certainly Google and IBM cloud and the Oracle cloud and so forth now customers are wanting to connect across clouds with a substantially similar experience because that reduces cost and of course it speeds business outcomes that's what we call multi cloud now I'm not by any means suggesting that Amazon and Microsoft are gonna go the way of the mini computer vendors I don't believe that I think leaders today are much more savvy and tuned into how to surf the waves they're more paranoid and they're frankly just smarter than back in the 70s and 80s but it's not a rite of passage if they ignore the trends they will face challenges that could become driftwood so you're seeing the emergence of some of the moves from the vendor crowd the big whales connecting their infrastructure like AWS and VMware and Microsoft and Oracle quite interesting and IBM Red Hat with everybody cisco Dell HPE with everyone Google with anthos and a lot of other players all are trying to stake a claim in this hybrid and multi cloud world but you also have these emerging players that are innovators companies like CrowdStrike in security cumulant in the backup space and many dozens of well-funded players looking to grab a share of this multi cloud pie and it's worth pointing out that they're all kind of going gaga over kubernetes now of course this makes sense because kubernetes has emerged as a standard it's certainly very popular with developers why because it enables portability and allows them to package applications and of course all they're related to tendencies around those applications and then hand that app off for testing or deployment and it's gonna behave in the exact same way as when they ran it locally this we've seen and we know this but I want to share something I had a great conversation with Bernard golden yesterday and he made an excellent point about well you know kubernetes and containers he said this portability is a necessary but insufficient condition for multi cloud to succeed you still have to have an integrated management approach to security ID management monitoring performance reporting and end get into cross-training of people and skills etc ok I want to shift gears and as always I want to dig into these segments and bring in the et our perspective now pretty sure ETR is a lot of data on multi cloud from their ven meetings and other surveys but what I've done today is pulled some data that I'm using is indicators or proxies for multi cloud so I can't go out and buy me some multi cloud today it doesn't really exist in that form so what we have to do is highlight some of the trends in the data and draw some inferences from that so let's take a look at this chart what it shows is the relative position of a number of companies that my view are participating in the multi cloud arena the chart plots these companies showing net score or remember spending momentum on the y-axis and we've just opposed that to what's called market share on the x-axis market share is a measure of pervasiveness in the data set and what we've done is we've filtered on three sectors cloud container orchestration and container platforms using that as a proxy for multi cloud so these are buyers 791 of them as you can see by the end who are spenders in these three areas and we're isolating on select group of names and as a last filter we selected only companies with 50 or more results in the data set from this survey and we're using this as a multi cloud sector proxy so let me make a couple of comments here first I know kubernetes is not a company but ETR captures spending on kubernetes it's one of the hottest areas in the data set with a nearly 82% net score so we're capturing that as a reference point the next thing I want to say is you can see the big cloud players Azure and AWS and once again as in previous breaking analysis segments we see those two look they're leaders they're out the lead both companies showing very very strong momentum from a net score standpoint now AWS you might say why are you including a diversity if they don't explicitly have a multi cloud offering but in my view you cannot talk about multi cloud without including the leading cloud supplier you also see Google not so much in the market share of the big two but Google's showing strong net score we've talked about that before and they're very well positioned in multi cloud with anthos there behind their playing cloud agnostic to try to catch up again remember this is a proxy that we are running it's not necessarily a reflection of firms specific multi cloud offerings it's an indicator based on the filters that we've run now let's take a look at some of the others rubric the data protection specialists and CrowdStrike was a security darling they show some real strengths both have multi cloud offerings and they have strategies around their look at how she Corp they stand out as an important player in our view as they provide developer tooling to run secure and and deploy applications across clouds VMware cloud is I believe it's a vfc VMware cloud foundation and it's right there in the mix and you can also see fortunate in there as well executing from a security position I talked about them last week in my braking analysis they have a nice cloud portfolio and they're benefiting from execution strong execution let me call your attention to IBM in Red Hat Red Hat OpenShift look at their respective positions on this chart IBM spending velocity or net score is low but Red Hat has quite strong spending velocity and this is CEO Arvind Krishna's opportunity leverage IBM's large install based presence shown here as market share or pervasiveness and bring red hat to the right and leverage open shifts coolness to increase IBM's relevance and elevate it elevated spending velocity if arvind can make the kind of progress that i'm showing here in this picture he'll end up being CEO of the decade but that really is IBM's opportunity you can also see I put Oracle in the chart as well because of their multi cloud relationship with Microsoft which which I actually think has great potential for running mission-critical Oracle databases as I've noted many times I've you know IBM and Oracle both have clouds they're in the cloud game there are hyper scalar clouds but they have very large installed software franchises why is that important because it insulates them from the I ass ix knife fight and the pricing pressures that are putting forth by the hyper scalars the finally I have to mention Cisco I've said many times comes at multi cloud from a position of strength and networking and of course security they've got a huge market presence and not without challenges but they clearly are a player here ok now let's go on and look at some similar proxy data basically the same cut isolated on a few big players participating in multi cloud so again same cut as before but this is this shows a time series isolating on some of those Biggie's showing their net score or spending momentum in cloud and container related sectors that I talked about you got Azure leading GCP showing momentum IBM Red Hat with open shift and VMware all with solid net scores that are in the green cisco not as strong from a net score or spending velocity standpoint but it's shared in or presence in the data set is significant in this cut so two takeaways here really are one this is a wide-open race it's jump ball you really can't pick a winner yet and to each is gonna come at this from their own unique position of strength which brings me to how we see this space evolving this simple chart here really shows how we see the multi cloud infrastructure stack emerging starting at the bottom we show in the stack networking you gotta have networking to cross connect clouds and this is where cisco you has to win the day not optional for them some big players are going after the control plane including Microsoft arc Google with anthos VMware with tans ooh IBM Red Hat and we think eventually AWS is a possibility to enter that game on the data plane you got some big whales like Dell EMC you got NetApp you've got HPE at IBM the big storage players as well you have specialists like pure who's doing some interesting things in block in the cloud and cumulonimbus mention you have a bunch of companies like Veritas cohesive the rubric vMac TIFIA is gonna be in there CommVault I mentioned Klum EO before IBM is another one you got a whole bunch of folks in networking big portfolio plays from the likes of Cisco I said to network I met security from Cisco Palo Alto fortunate along with many of the security specialists we've highlighted in the past like CrowdStrike and there are many many others now on the leftmost side of this chart is really interesting we showed the full stack interconnects here we're referring to the direct cloud to cloud connections in functions up and down the entire stack examples here are AWS VMware yes that hybrid but also emerging at the edge and Microsoft and Oracle so the bottom line is we're seeing a battle brewing between the big companies with larger appetites gobbling up major portions of the market with integrated suites that are playing out within each layer of the stack competing with smaller and nimble players that are delivering best to breed function along those stack layers all right let me summarize so here are the questions that I said I would answer let's see how I did what the heck is multi cloud well let me first say it feels like everything in IT is additive what do I mean by that well we never get rid of stuff you keep things forever think about it the typical enterprise has multiple data centers they get many SAS providers more likely they have you know more than one Iast provider and they're starting to think about what should I do with the edge there is no standard for hybrid or multi cloud deployments you talk to 100 customers and you're gonna hear 120 or 150 or 300 different environments and several orders of magnitude of challenges that they face do we really need multi-cloud not an ideal world no we wouldn't need multi cloud but we talked about how we got here earlier how real is it how real is multi cloud now look companies use multiple clouds it's is it easy to do things across scope these clouds no so it's one of these problems that the industry is created that it can now make money fixing it's a vicious cycle I know but so goes the enterprise IT business what problems does it does multi-cloud solve and create look the goal of multi cloud should be that it creates more value than just the sum of the individual parts and that is clearly not happening yet in my opinion moving data around is a problem so ultimately the value comes from being able to bring cloud services to data that resides all over the place and as Bernard golden implied even with kubernetes the experience is far from seamless so we understand that technology created this problem and IT people processes and technology will be asked to clean up the crime scene as I often say it's a common story in enterprise tech we talked about how multi-cloud will evolve along a stack that it comprises specialists and big companies with very big appetites my opinion is that multi-cloud will evolve as a mishmash and vendor relationships the right tools for the right job the edge IT and OT tensions mergers and acquisitions these are gonna create even a bigger mess down the road we have well-funded companies that are exceedingly capable in this business and the leaders are gonna get their fair share cloud is a trillion-dollar market opportunity and there will not be in my opinion a winner-take-all and multi cloud so who wins like I've tried to lay out some of the leaders within different parts of the stack but there's way more to this story I do believe that the cloud players are well positioned why cuz they're they invented cloud EWS and others who followed right now Microsoft and Google are playing actively in that market but I definitely think AWS will I that space but I think VMware Red Hat IBM Cisco etc some of this from the respective positions of strength and I've sort of they have the added benefit of being cloud semi agnostic because generally they're not wed to a hyper scale cloud you know IBM as a cloud oracle as a cloud but it's on a hyper scale cloud and as always there's specialists that are gonna solve problems that are too small initially for the big whales to see so they get a leader lead bleed to market advantage but those opportunities can grow over time and allow these guys to reach escape velocity now so I'll say multi-cloud in and of itself is I believe an opportunity one that will be attacked from a position of strength within the stack and there are opportunities to be specialists up and down that stack the Akashi Corp alright this is Dave Volante for wiki bonds cube insights powered by ETR thanks for watching this breaking analysis and remember these episodes are available as podcasts you can check it out as you're driving your car wherever you listen to two podcasts you can connect with me at David Villante at Silicon angle calm or at D Volante on Twitter or please comment on my LinkedIn posts thanks for watching everyone we'll see you next time [Music]

Published Date : Feb 28 2020

**Summary and Sentiment Analysis are not been shown because of improper transcript**

ENTITIES

EntityCategoryConfidence
MicrosoftORGANIZATION

0.99+

JessiePERSON

0.99+

IBMORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

AWSORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

100 customersQUANTITY

0.99+

OracleORGANIZATION

0.99+

Dave VolantePERSON

0.99+

Arvind KrishnaPERSON

0.99+

DavidPERSON

0.99+

David VillantePERSON

0.99+

300QUANTITY

0.99+

3comORGANIZATION

0.99+

150QUANTITY

0.99+

120QUANTITY

0.99+

arvindPERSON

0.99+

yesterdayDATE

0.99+

Akashi CorpORGANIZATION

0.99+

JessePERSON

0.99+

last weekDATE

0.99+

John FourierPERSON

0.99+

Boston MassachusettsLOCATION

0.99+

two takeawaysQUANTITY

0.99+

todayDATE

0.99+

two podcastsQUANTITY

0.98+

VeritasORGANIZATION

0.98+

firstQUANTITY

0.98+

2019DATE

0.98+

15 yearsQUANTITY

0.98+

seven layersQUANTITY

0.98+

both companiesQUANTITY

0.98+

threeQUANTITY

0.98+

D VolantePERSON

0.98+

each layerQUANTITY

0.97+

oneQUANTITY

0.97+

first cloudQUANTITY

0.97+

EWSORGANIZATION

0.97+

M&AORGANIZATION

0.97+

SASORGANIZATION

0.97+

AzureTITLE

0.96+

trillion-dollarQUANTITY

0.96+

ETRORGANIZATION

0.95+

NetAppTITLE

0.95+

70sDATE

0.94+

dozens of well-funded playersQUANTITY

0.94+

third waveEVENT

0.94+

nearly 82%QUANTITY

0.94+

eachQUANTITY

0.94+

bothQUANTITY

0.93+

three sectorsQUANTITY

0.93+

decadesQUANTITY

0.93+

Breaking Analysis: Cyber Security Update: What to Expect at RSA 2020


 

>> From the SiliconANGLE Media office in Boston, Massachusetts, it's the cube. Now, here's your host, Dave Vellante. >> Hello everyone and welcome to this week's Wikibon cube insights powered by ETR. In this breaking analysis ahead of the RSA conference, we want to update you on the cyber security sector. This year's event is underlined by coronavirus fears, IBM has pulled out of the event and cited the epidemic as the reason and it's also brings to the front the sale of RSA by Dell to STG partners and private equity firm. Now in our last security drill down, we cited several mega trends in the security sector. These included the ever escalating sophistication of the attacker, the increased risk from the data economy, the expanded attack surface with the huge number of IP addresses that are that are exploding out there, and the lack of skills and the number of cyber tools that are coming to the market. Now, as you know, in these segments, we'd like to share insights from the cube. And I want you to listen to two American statesman and what they said, on The Cube. Here's general Keith Alexander, who's the former director of the NSA, along with Dr. Robert Gates, who's the former director of the CIA and former Secretary of Defense, play the clip. >> When you think about threats, you think about nation states, so you can go to Iran, Russia, China, North Korea, and then you think about criminal threats, and all the things like ransomware. Some of the nation state actors are also criminals at night, so they can use nation state tools and my concern about all the evolution of cyber threats is that the attacks are getting more destructive. >> I think cyber and the risks associated with cyber, and IT need to be a regular part of every board's agenda. >> So you hear General Alexander really underscore the danger, as well, Dr. Gates is articulating what we've said many times on the cube that cyber security is a board level agenda item. Now, the comments from both of these individuals represent what I would consider tailwinds for cyber technology companies. Now we're going to drill into some of those today. But it's not all frictionless. There are headwinds to in this market space, cloud migration, the shift from north south south to East West network traffic, its pressure traditional appliance based perimeter security solutions, increase complexity and lack of skills and other macro factors, including questions on ROI. CFO saying, hey, we spend all this cash, why aren't we more secure? Now, I want you to hear from two chief information security officers officers on both the challenges that they face and how they're dealing with them. Roll the clip. >> Lack of talent, I mean, we're starving for talent. Cybersecurity is the only field in the world with negative unemployment. We just don't have the actual bodies to actually fill the gaps that we have and in that lack of talent Cecil's are starving. >> I think that the public cloud offers us a really interesting opportunity to reinvent security right. So if you think about all of the technologies and processes and many of which are manual over the years, I think we have an opportunity to leverage automation to make our work easier in some ways. >> Now I featured Brian Lozada and Katie Jenkins before and breaking analysis segments, and you can hear it from the cyber leaders, we lack the talent, and cloud computing and automation are areas we're pursuing. So this challenges security companies to respond. But at the end of the day, companies have no no choice. In other words, organizations buying security solutions, the sophistication of the attacker is very high and the answer to my CFO and ROI is fear based. If you don't do this, you might lose billions in market cap. Now, I want you to take a listen to these cubilam talking about the attacker of sophistication and the importance of communication skills in order to fund cyber initiatives, really to keep up with the bad guys, please play the clip. >> The adversary is talented and they're patient, they're well funded okay, that's that's where it starts. And so, you know why why bring an interpreter to a host when there's already one there right? Why write all this complicated software distribution when I can just use yours. And so that's that's where the play the game starts. And and the most advanced threats aren't leaving footprints because the footprints already there, you know, they'll get on a machine and behaviorally they'll check the cash to see what's hot. And what's hot in the cash means that behaviorally, it's a fast they can go they're not cutting a new trail most of the time, right? So living off the land is not only the tools that they're using the automation, your automation they're using against you, but it's also behavioral. >> That's why the most the most important talent or skill that a security professional needs is communication skills. If you can't articulate technical risk into a business risk to fund your program, it's, you know, it's very hard for you to actually be successful in security. >> Now, the really insidious thing about what TK Keanini just said is the attackers are living off the land, meaning they're using your tools and your behaviors to sneak around your data unnoticed. And so as Brian Lozada said, as a security Pro, you need to be a great communicator in order to get the funding that you need to compete with the bad guys. Which brings me to the RSA conference. This is why you as a security practitioner attend, you want to learn more, you want to obtain new skills, you want to bring back ideas to the organization. Now one of the things I did to prepare for this segment is to read the RSA conference content agenda, which was co authored by Britta Glade and I read numerous blogs and articles about what to expect at the event and from all that I put together this word cloud, which conveys some of the key themes that I would expect you're going to hear at the shows. Look at skills jump right out, just like Brian was saying, the human element is going to be a big deal this year. IoT and the IT OT schism, everyone's talking about the Olympics, and seeing that as a watershed event for cyber, how to apply machine learning and AI is a big theme, as is cloud with containers and server less. phishing, zero trust and frameworks, framework for privacy, frameworks for governance and compliance, the 2020 election and weaponizing social media with deep fakes, and expect to hear a lot about the challenges of securing 5G networks, open source risks, supply chain risks, and of course, the need for automation. And it's no surprise there's going to be a lot of talk about cyber technology, the products and of course, the companies that sell them. So let's get into the market and unpack some of the ETR spending data and drill into some of these companies. The first chart I want to show you is spending on cyber relative to other initiatives. What this chart shows is the spending on cyber security highlighted in the green in relation to other sectors in the ETR taxonomy. Notice the blue dot. It shows the change in spending expected in 2020 versus 2019. Now, two points here. First, is that despite the top of my narrative that we always hear, the reality is that other initiatives compete for budget and you just can't keep throwing cash at the security problem. As I've said before, we spend like .014% percent of our global GDP on cyber, so we barely scratched the surface. The second point is there's there's there's a solid year on year growth quite high at 12% for a sector that's estimated at 100 to 150 billion dollars worldwide, according to many sources. Now let's take a look at some of the players in this space, who are going to be presenting at the RSA conference. You might remember to my 2020 predictions in that breaking analysis I focused on two ETR metrics, Net Score, which is a measure of spending velocity and Market Share, which measures pervasiveness in the data set. And I anointed nine security players as four star players. These were Microsoft, Cisco, Palo Alto Networks, Splunk, Proofpoint, Fortinet, Oka, Cyber Ark and CrowdStrike. What we're showing here is an update of that data with the January survey data. My four star companies were defined as those in the cyber security sector that demonstrate in both net scores or spending momentum, that's the left hand chart and market share or pervasiveness on the right hand chart. Within the top 22 companies, why did I pick 22? Well, seemed like a solid number and it fit nicely in the screen and allowed more folks. So a few takeaways here. One is that there are a lot of cyber security companies in the green from the standpoint of net score. Number two is that Fortinet and Cisco fell off the four star list because of their net scores. While still holding reasonably well, they dropped somewhat. Also, some other companies like Verona's and Vera code and Carbon Black jumped up on the net score rankings, but Cisco and Fortinet are still showing some strength in the market overall, I'ma talk about that. Cisco security businesses up 9% in the quarter, and Fortinet is breaking away from Palo Alto Networks from a valuation perspective, which I'm going to drill into a bit. So we're going to give Cisco and Fortinet two stars this survey period. But look at Zscaler. They made the cut this time their net score or spending momentum jumped from 38% last quarter to nearly 45% in the January survey, with a sizable shared in at 123. So we've added Zscaler to the four star list, they have momentum, and we're going to continue to watch that quarterly horse race. Now, I'd be remiss if I didn't point out that Microsoft continues to get stronger and stronger in many sectors including cyber. So that's something to really pay attention to. Okay, I want to talk about the valuations a bit. Valuations of cyber security space are really interesting and for reasons we've discussed before the market's hot right now, some people think it's overvalued, but I think the space is going to continue to perform quite well, relative to other areas and tech. Why do I say that? Because cyber continues to be a big priority for organizations, the software and annual recurring revenue contribution ARR continues to grow, M&A is going to continue to be robust in my view, which is going to fuel valuations. So Let's look at some of the public companies within cyber. What I've compiled in this chart is eight public companies that were cited as four star or two star firms, as I defined earlier, now ranked this by market value. In the columns, we show the market cap and trailing 12 month revenue in billions, the revenue multiple and the annual revenue growth. And I've highlighted Palo Alto Networks and Fortinet because I want to drill into those two firms, as there's a valuation divergence going on between those two names, and I'll come back to that in just a minute. But first, I want to make a few points about this data. Number one is there's definitely a proportional relationship between the growth rate and the revenue multiple or premium being paid for these companies. Generally growth ranges between one and a half to three times the revenue multiple being paid. CrowdStrike for example has a 39 x revenue multiple and is growing at 110%, so they're at the high end of that range with a growth at 2.8 times their revenue multiple today. Second, and related, as you can see a wide range of revenue multiples based on these growth rates with CrowdStrike, Okta and now Zscaler as the standouts in this regard. And I have to call at Splunk as well. They're both large, and they have high growth, although they are moving beyond, you know, security, they're going into adjacencies and big data analytics, but you you have to love the performance of Splunk. The third point is this is a lucrative market. You have several companies with valuations in the double digit billions, and many with multi billion dollar market values. Cyber chaos means cash for many of these companies, and, of course for their investors. Now, Palo Alto throw some of these ratios out of whack, ie, why the lower revenue multiple with that type of growth, and it's because they've had some execution issues lately. And this annual growth rate is really not the best reflection of the stock price today. That's really being driven by quarterly growth rates and less robust management guidance. So why don't we look into that a bit. What this chart shows is the one year relative stock prices of Palo Alto Networks in the blue and compared to Fortinet in the red. Look at the divergence in the two stocks, look at they traded in a range and then you saw the split when Palo Alto missed its quarter last year. So let me share what I think is happening. First, Palo Alto has been a very solid performance since an IPO in 2012. It's delivered more than four Rex returns to shareholders over that period. Now, what they're trying to do is cloud proof their business. They're trying to transition more to an AR model, and rely less on appliance centric firewalls, and firewalls are core part of the business and that has underperformed expectations lately. And you just take Legacy Tech and Cloud Wash and Cloud native competitors like Zscaler are taking advantage of this and setting the narrative there. Now Palo Alto Network has also had some very tough compares in 2019 relative to 2018, that should somewhat abate this year. Also, Palo Alto has said some execution issues during this transition, especially related to sales and sales incentives and aligning that with this new world of cloud. And finally, Palo Alto was in the process of digesting some acquisitions like Twistlock, PureSec and some others over the past year, and that could be a distraction. Fortinet on the other hand, is benefiting from a large portfolio refresh is capitalizing on the momentum that that's bringing, in fact, all the companies I listed you know, they may be undervalued despite, of all the company sorry that I listed Fortinet may be undervalued despite the drop off from the four star list that I mentioned earlier. Fortinet is one of those companies with a large solution set that can cover a lot of market space. And where Fortinet faces similar headwinds as Palo Alto, it seems to be executing better on the cloud transition. Now the last thing I want to share on this topic is some data from the ETR regression testing. What ETR does is their data scientists run regression models and fit a linear equation to determine whether Wall Street earnings consensus estimates are consistent with the ETR spending data, they started trying to line those up and see what the divergence is. What this chart shows is the results of that regression analysis for both Fortinet and Palo Alto. And you can see the ETR spending data suggests that both companies could outperform somewhat expectations. Now, I wouldn't run and buy the stock based on this data as there's a lot more to the story, but let's watch the earnings and see how this plays out. All right, I want to make a few comments about the sale of the RSA asset. EMC bought RSA for around the same number, roughly $2 billion that SDG is paying Dell. So I'm obviously not impressed with the return that RSA has delivered since 2006. The interesting takeaway is that Dell is choosing liquidity over the RSA cyber security asset. So it says to me that their ability to pay down debt is much more important to Dell and their go forward plan. Remember, for every $5 billion that Dell pays down in gross debt, it dropped 25 cents to EPS. This is important for Dell to get back to investment grade debt, which will further lower its cost. It's a lever that Dell can turn. Now and also in thinking about this, it's interesting that VMware, which the member is acquiring security assets like crazy and most recently purchased carbon black, and they're building out a Security Division, they obviously didn't paw on the table fighting to roll RSA into that division. You know maybe they did in the financial value of the cash to Dell was greater than the value of the RSA customers, the RSA product portfolio and of course, the RSA conference. But my guess is Gelsinger and VMware didn't want the legacy tech. Gelsinger said many times that security is broken, it's his mission to fix it or die trying. So I would bet that he and VMware didn't see RSA as a path to fixing security, it's more likely that they saw it as a non strategic shrinking asset that they didn't want any part of. Now for the record, and I'm even won't bother showing you the the data but RSA and the ETR data set is an unimpressive player in cyber security, their market share or pervasiveness is middle of the pack, so it's okay but their net score spending velocities in the red, and it's in the bottom 20th percentile of the data set. But it is a known brand, certainly within cyber. It's got a great conference and it's been it's probably better that a PE company owns them than being a misfit toy inside of Dell. All right, it's time to summarize, as we've been stressing in our breaking analysis segments and on the cube, the adversaries are very capable. And we should expect continued escalation. Venture capital is going to keep pouring into startups and that's going to lead to more fragmentation. But the market is going to remain right for M&A With valuations on the rise. The battle continues for best of breed tools from upstarts like CrowdStrike and Okta and Zscaler versus sweets from big players like Cisco, Palo Alto Networks and Fortinet. Growth is going to continue to drive valuations. And so let's keep our eyes on the cloud, remains disruptive and for some provides momentum for others provides friction. Security practitioners will continue to be well paid because there's a skill shortage and that's not going away despite the push toward automation. Got in talk about machine intelligence but AI and ML those tools, there are two edged sword as bad actors are leveraging installed infrastructure, both tools and behaviors to so called live off the land, upping the stakes in the arms race. Okay, this is Dave Vellante for Wikibon's CUBE Insights powered by ETR. Thanks for watching this breaking analysis. Remember, these episodes are all available as podcasted Spotfire or wherever you listen. Connect with me at david.vellante at siliconangle.com, or comment on my LinkedIn. I'm @dvellante on Twitter. Thanks for watching everybody. We'll see you next time. (upbeat music).

Published Date : Feb 24 2020

SUMMARY :

Massachusetts, it's the cube. and the lack of skills and the number of cyber tools and all the things like ransomware. and IT need to be a regular part Now, the comments from both of these individuals represent We just don't have the actual bodies to actually fill and many of which are manual over the years, and the answer to my CFO and ROI is fear based. And and the most advanced threats to actually be successful in security. highlighted in the green in relation to other sectors

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
CiscoORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

Keith AlexanderPERSON

0.99+

FortinetORGANIZATION

0.99+

Brian LozadaPERSON

0.99+

Dave VellantePERSON

0.99+

EMCORGANIZATION

0.99+

Legacy TechORGANIZATION

0.99+

CIAORGANIZATION

0.99+

IBMORGANIZATION

0.99+

2020DATE

0.99+

OkaORGANIZATION

0.99+

NSAORGANIZATION

0.99+

BrianPERSON

0.99+

2012DATE

0.99+

2019DATE

0.99+

Palo AltoORGANIZATION

0.99+

JanuaryDATE

0.99+

SplunkORGANIZATION

0.99+

12 monthQUANTITY

0.99+

GelsingerPERSON

0.99+

Katie JenkinsPERSON

0.99+

ProofpointORGANIZATION

0.99+

GatesPERSON

0.99+

2018DATE

0.99+

two firmsQUANTITY

0.99+

DellORGANIZATION

0.99+

25 centsQUANTITY

0.99+

Palo Alto NetworksORGANIZATION

0.99+

OlympicsEVENT

0.99+

Britta GladePERSON

0.99+

VMwareORGANIZATION

0.99+

2.8 timesQUANTITY

0.99+

two stocksQUANTITY

0.99+

CrowdStrikeORGANIZATION

0.99+

Cyber ArkORGANIZATION

0.99+

38%QUANTITY

0.99+

12%QUANTITY

0.99+

SDGORGANIZATION

0.99+

two namesQUANTITY

0.99+

SecondQUANTITY

0.99+

FirstQUANTITY

0.99+

twoQUANTITY

0.99+

Robert GatesPERSON

0.99+

two starQUANTITY

0.99+

second pointQUANTITY

0.99+

bothQUANTITY

0.99+

M&AORGANIZATION

0.99+

oneQUANTITY

0.99+

110%QUANTITY

0.99+

siliconangle.comOTHER

0.99+

three timesQUANTITY

0.99+

OktaORGANIZATION

0.99+

2006DATE

0.99+

OneQUANTITY

0.99+

two pointsQUANTITY

0.99+

ZscalerORGANIZATION

0.99+

firstQUANTITY

0.99+

Cloud WashORGANIZATION

0.99+

Breaking Analysis: RPA: Over-Hyped or the Next Big Thing?


 

from the silicon angle media office in Boston Massachusetts it's the queue now here's your host David on tape hello everyone and welcome to this week's episode of wiki bots cube insights powered by EGR in this breaking analysis we take a deeper dive into the world of robotic process automation otherwise known as RPA it's one of the hottest sectors in software today in fact Gartner says it's the fastest growing software sector that they follow in this session I want to break down three questions one is the RP a market overvalued - how large is the total available market for RP a and three who were the winners and losers in this space now before we address the first question here's what you need to know about RP a the market today is small but it's growing fast the software only revenue for the space was about 1 billion dollars in 2019 and it's growing it between 80 to a hundred percent annually RP a has been very popular in larger organizations especially in back-office functions really in regulated industries like financial services and healthcare RP a has been successful at automating the mundane repeatable deterministic tasks and most automations today are unattended the industry is very well funded with the top two firms raising nearly 1 billion dollars in the past couple of years they have a combined market value of nearly 14 billion now some people in the art community have said that RP a is hyped and looks like a classic pump and dump situation we're gonna look into that and really try to explore the valuation and customer data and really try to come to some conclusions there we see big software companies like Microsoft and sa P entering the scene and we want to comment on that a little later in this segment now RBA players have really cleverly succeeded in selling to the business lines and often a bypassed IT now sometimes that creates tension in or as I said customers are typically very large organizations who can shell out the hundred thousand dollar plus entry point to get into the RP a game the Tam is expanding beyond back office into broader on a broader automation agenda hyper automation is the buzzword of the day and there are varying definitions Gartner looks at hyper automation as the incorporation of RPA along with intelligent business process management I BPM and I pass or intelligent platform-as-a-service Gardner's definition takes a holistic view of the enterprise incorporating legacy on-prem app apps as well as emerging systems now this is good but I question whether the hyper term applies here as we see hyper automation as the extension of our PA to include process mining to discover new automations or new automation opportunities and the use of machine intelligence ml and a I applied to process data data where that combination drives intelligence analytics that further drives digital business process transformation across the enterprise so the point is that we envision a more agile framework and definition for hyper automation we see legacy BPM systems informing the transformation but not necessarily adjudicating the path forward we liken this to the early days of big data where legacy data warehouses and ETL processes provided useful context but organizations had to develop a new tech stack that broke the stranglehold of technical debt we're seeing this emerge in the form of new workloads powered by emerging analytic databases like redshift and snowflake with ml tools applied and cloud driving agile insights in that so-called Big Data space so we think a similar renaissance is happening here with with automation really driven by the money the mandate for digital business transformation along with machine intelligence and that tooling applied for a really driving automation across the enterprise in a form of augmentation with attended BOTS at scale becoming much much more important over time ok now let's shift gears a little bit question is the RP a market overhyped and overvalued now to answer this let's go through a bit of a thought exercise that we've put together and look at some data what this chart shows is some critical data points that will begin to help answer the question that we've posed in the top part of the chart we show the company the VC funding projected valuations and revenue estimates for 2019 and 2020 and as you can see uipath an automation any where are the hot companies right now they're private so much of this data is estimated but we know how much money they've raised and we know the valuations that have been reported so the RP a software market is around a billion dollars today and we have it almost doubling in 2020 now the bottom part of this chart shows the projected market revenue growth and the implied valuations for the market as a whole so you can see today we show a mark that is trading at about 15 to 17 times revenue which seems like a very high multiple but over time we show that multiple shrinking and settling in mid decade at just over 5x which for software is pretty conservative especially for high-growth software now what we've done on this next chart is we brought down that market growth and the implied valuation data and highlighted twenty twenty-five at seventy-five billion dollars the market growth will have slowed by then to twenty percent in this model and this thought exercise with a revenue multiple of five point four x for the overall market now eventually as growth slows RBA software will start to throw off profits at least it better so what we show here is a sensitivity analysis assuming a 20% 25% 30% and 35% for the market as a whole we're using that as a proxy and we show a 20/20 X even multiple which for a market growing the software market growing this fast you know we think is pretty reasonable consider the tech overall typically is gonna have a an even multiple of ten to fifteen you know X it really should be easy your enterprise value over a bit it's really a more accurate measure but but this is back in the Afghan on the balance sheet date and I'm a forecast all-out but we're trying to just sort of get to the question is is this market overvalued and as you can see in the Far column given these assumptions we're in the range of that seventy five billion dollar market valuation with that Delta now reality you're going to have some companies growing faster than the market overall and we'll see a lot of consolidation in this space but at the macro level it would seem that the company which can lead and when the Spoils is gonna really benefit okay so these figures actually suggest in my view that the market could be undervalued that sounds crazy right but look at companies like ServiceNow and work day and look at snowflakes recent valuation at twelve billion dollars so are the valuations for uipath and automation anywhere justified well in part it depends on the size of the market the TAM total available market in their ability to break out of back-office niches and deliver these types of revenue figures and growth you know maybe my forecasts are a little too aggressive in the early days but in my experience the traditional forecast that we see in the marketplace tend to underestimate transformative technologies you tend to have these sort of o guides where you know it takes off and really steep ins and it has a sharp curve and then tapers off so we'll see but let's take a closer look at the Tam but you know first I want to introduce a customer view point here's Eric's Lac Eric Lex who's an RPA pro at GE talking about his company's RPA journey play the clip I would say in terms of our journey 2017 was kind of our year to prove the technology we wanted to see if this stuff could really work long term and operate at scale given that I'm still here obviously we proved that was correct and then 2018 was kind of the year of scaling and operationalizing kind of a a sustainable model to support our business units across the board from an RPA standpoint so really building out a proper structure building out the governance that goes along with building robots and building a kind of a resource team to continue to support the bots that that you know we were at scale at that point so maintaining those bots is critically important that's the direction we're moving in 2019 we've kind of perfected the concept of the back office robot and the development of those and running those at scale and now we're moving towards you know a whole new market share when it comes to attended automation and citizen Development so this is a story we've heard from many customers and we've tried to reflect it in this graphic that we're showing here start small get some wins prove out the tech really in the back office and then drive customer facing activities we see this as the starting point for more SME driven digital transformations where business line pros are rethinking processes and developing new automations you know either in low code scenarios or with Centers of Excellence now this vision of hyper automation we think comes from the ability to do process mining and identify automation opportunities and then bring our PA to the table using machine learning and AI to understand text voice visual context and ultimately use that process data to transform the business this is an outcome driven model where organizations are optimizing on business KPIs and incentives are aligned accordingly so we see this vision as potentially unlocking a very large Tam that perhaps exceeds 30 billion dollars go now let's bring in some of these spending data and take a look at what the ETR data set tells us about the RPA market now the first thing that jumps out at you is our PA is one of the fastest growing segments in the data set you can see that green box and that blue dot at around 20% that's the change in spending velocity in the 2020 survey versus last year now the one caveat is I'm isolating on global 2000 companies in this data set and as you can see in in that red bar up on the left and remember our PA today is really hot in large companies but not nearly as fast growing when you analyze the overall respondent base and which includes smaller organizations nonetheless this chart shows net scores and market shares for our PA across all respondents remember net score is a measure of spending velocity and market share is a measure of pervasiveness in the survey and what you see here is that our PA net scores are holding steadily the nice rate and market shares are creeping up relative to other segments in the data set now remember this is across all companies but we want to use the ETR data understand who is winning in this space now what this chart shows is net score or spending velocity on the vertical axis and market share or pervasiveness on the horizontal axis for each individual player and as we run through this sequence from January 18 survey through today across the nine surveys look at uipath an automation anywhere but look at uipath in particular they really appear to be breaking away from the pack now here's another look at the data it shows net scores or spending velocity for uipath automation anywhere blue prism pegye systems and work fusion now these are all very strong net scores which are essentially calculated by subtracting the percent of customers spending less from those spending more the two leaders here uipath and automation anywhere August but the rest rest are actually quite good there in the green but look at this look what happens when you isolate on the 349 global 2,000 respondents in the survey uipath jumps into the 80 percent net score territory again spending velocity automation anywhere dips a little bit pegye systems interestingly jumps up nicely but look at blue prism they fall back in the larger global 2000 accounts which is a bit of a concern now the other key point on this chart is that 85% of UI customers and 70% of automation anywhere customers plan to spend more this year than they spent last year that is pretty impressive now as you can see here in this chart the global 2000 have been pretty consistent spenders on our PA for the past three survey snapshots uipath again showing net scores or spending intensity solidly in the 80% plus range and even though it's a smaller end you can see pay go with a nice uptick in the last two surveys within these larger accounts now finally let's look at what ETR calls market share which is a measure of pervasiveness in the survey this chart shows data from all 1000 plus respondents and as you can see UI path appears to be breaking out from the pack automation anywhere in pega are showing an uptick in the january survey and blue prism is trending down a little bit which is something to watch but you can see in the upper right all four companies are in the green with regard to net score or against pending velocity so let's summarize it and wrap up is this market overhyped well it probably is overhyped but is it overvalued I don't think so the customer feedback that we have in the community and the proof points are really starting to stack up so with continued revenue growth and eventually profits you can make the case that whoever comes out on top will really do well and see huge returns in this market space let's come back to that in a moment how large is this market I think this market can be very large at am of 30 billion pluses not out of the question in my view now that realization will be a function of RPAs ability to break into more use cases with deeper business integration RBA has an opportunity in our view to cross the chasm and deliver lower code solutions to subject matter experts in business lines that are in a stronger position to drive change now a lot of people poopoo this notion and this concept but I think it's something that is a real possibility this idea of hyper automation is buzzword e but it has meaning companies that bring RPA together with process mining and machine intelligence that tries process analytics has great potential if organizational stovepipes can be broken down in other words put process data and analytics at the core to drive decision-making and change now who wins let me say this the company that breaks out and hits escape velocity is going to make a lot of money here now unlike what I said in last week's braking analysis on cloud computing this is more of a winner-take-all market it's not a trillion dollar team like cloud it's tens of billions and maybe north to 30 billion but it's somewhat of a zero-sum game in my opinion the number one player is going to make a lot of dough number two will do okay and in my view everyone else is going to struggle for profits now the big wildcard is the degree to which the big software players like Microsoft and sa P poison the RPA well now here's what I think I think these big software players are taking an incremental view of the market and are bundling in RPA is a check off item they will not be the ones to drive radical process transformation rather they will siphon off some demand but organizations that really want to benefit from so-called hyper automation will be leaning heavily on software from specialists who have the vision the resources the culture in the focus to drive digital process transformation alright that's a wrap as always I really appreciate the comments that I get on my LinkedIn posts and on Twitter I'm at at D Volante so thanks for that and thanks for watching everyone this is Dave Volante for the cube insights powered by ETR and we'll see you next time

Published Date : Feb 15 2020

**Summary and Sentiment Analysis are not been shown because of improper transcript**

ENTITIES

EntityCategoryConfidence
January 18DATE

0.99+

MicrosoftORGANIZATION

0.99+

2019DATE

0.99+

twenty percentQUANTITY

0.99+

2018DATE

0.99+

2020DATE

0.99+

85%QUANTITY

0.99+

first questionQUANTITY

0.99+

30 billionQUANTITY

0.99+

80 percentQUANTITY

0.99+

seventy-five billion dollarsQUANTITY

0.99+

70%QUANTITY

0.99+

80%QUANTITY

0.99+

tens of billionsQUANTITY

0.99+

Dave VolantePERSON

0.99+

twelve billion dollarsQUANTITY

0.99+

GEORGANIZATION

0.99+

35%QUANTITY

0.99+

20%QUANTITY

0.99+

DavidPERSON

0.99+

30 billion dollarsQUANTITY

0.99+

two leadersQUANTITY

0.99+

three questionsQUANTITY

0.99+

GartnerORGANIZATION

0.99+

last yearDATE

0.99+

2017DATE

0.99+

last weekDATE

0.99+

hundred thousand dollarQUANTITY

0.99+

todayDATE

0.99+

AugustDATE

0.99+

DeltaORGANIZATION

0.99+

tenQUANTITY

0.99+

GardnerPERSON

0.99+

nine surveysQUANTITY

0.98+

EGRORGANIZATION

0.98+

Boston MassachusettsLOCATION

0.98+

januaryDATE

0.98+

twenty twenty-fiveQUANTITY

0.98+

around a billion dollarsQUANTITY

0.98+

first thingQUANTITY

0.98+

nearly 14 billionQUANTITY

0.98+

about 1 billion dollarsQUANTITY

0.97+

nearly 1 billion dollarsQUANTITY

0.97+

ServiceNowORGANIZATION

0.97+

80QUANTITY

0.97+

threeQUANTITY

0.97+

around 20%QUANTITY

0.96+

a lot of moneyQUANTITY

0.96+

this yearDATE

0.96+

one caveatQUANTITY

0.96+

Eric LexPERSON

0.96+

2000 companiesQUANTITY

0.95+

349QUANTITY

0.95+

seventy five billion dollarQUANTITY

0.95+

17 timesQUANTITY

0.95+

firstQUANTITY

0.95+

25%QUANTITY

0.95+

fiveQUANTITY

0.95+

2,000 respondentsQUANTITY

0.95+

this weekDATE

0.95+

oneQUANTITY

0.93+

two firmsQUANTITY

0.93+

30%QUANTITY

0.93+

ETRORGANIZATION

0.93+

D VolanteORGANIZATION

0.92+

each individual playerQUANTITY

0.92+

fifteenQUANTITY

0.91+

trillion dollarQUANTITY

0.9+

uipathORGANIZATION

0.9+

pegaLOCATION

0.89+

about 15QUANTITY

0.87+

1000 plus respondentsQUANTITY

0.86+

past couple of yearsDATE

0.85+

wikiTITLE

0.82+

LinkedInORGANIZATION

0.81+

over 5xQUANTITY

0.79+

number oneQUANTITY

0.78+

RP aORGANIZATION

0.77+

Centers of ExcellenceORGANIZATION

0.75+

AfghanLOCATION

0.72+

a hundred percentQUANTITY

0.72+

TwitterORGANIZATION

0.71+

Ed Walsh, IBM | | CUBE Conversation February 2020


 

(upbeat music) >> From the Silicon Valley Media Office in Boston Massachusetts, it's theCUBE. Now here's your host, Dave Vellante. >> Hello everyone, and welcome to this exclusive CUBE conversation. Here's the setup. The storage industry has been drowning in complexity for years. Companies like Pure Storage and Nutanix, you know they reached escape velocity last decade, primarily because they really understood well how to deliver great products, that were simpler to use. But as we enter the 2020's, virtually every player in the storage business is trying to simplify it's portfolio. And the mandate is coming from customers, that are under huge pressure to operationalize and bring to market their major digital initiatives. They simply can't spend time managing infrastructure that the way they used to. They have to reallocate resources up the stack, so to speak to more strategic efforts. Now, as you know post the acquisition of EMC by Dell, we have followed closely, and been reporting on their efforts to manage the simplification of the storage portfolio under the leadership of Jeff Clark. IBM is one of those leading companies, along with Dell EMC, NetApp, and HPE that are under tremendous pressure to continue to simplify their respective portfolios. IBM as a company, has declared the dawn of a new era. They call it Chapter II of Digital and AI. Whereas, the company claims it's all about scaling and moving from experimentation to transformation. Chapter II, I will tell you unquestionably is not about humans managing complex storage infrastructure. Under the leadership of General Manager, Ed Walsh, the companies storage division has aligned with this Chapter II vision, and theCUBE has been able to secure an exclusive interview with Ed, who joins me today. Great to see you my friend. >> Thanks very much for having me. >> So, you're very welcome. And you heard my narrative. How did we get here? How did the industry get so complex? >> I like the way you kicked it off, because I think you nailed it. It's just how the storage industry has always been. And there was a reason for it twenty years ago, but it's almost, it's run its course, and I could tell you what were now seeing, but everyone there's always a difference between high end solutions sets, and low end solution sets. In fact their different, there's custom silicon on the high end. So think about EMC Matrix in the day, it was the ultimate custom hardware and software combination. And then the low end storage, well it didn't have any of that. And then there's a mid tier. But we actually, everything is based upon it. So you think about the right availability, the right price port, feature function, availability features. It made sense that you had to have that unique thing. So, what's happened is, we're all doing sustaining innovation. So we're all coming out with the next high end array for you. EMC's next one is Hashtag, Next Generation storage, right, mid-range. So they're going to redo their midrange. And then low end, but they never come together, and this is where the complexity is, you're nailing it. So no one is a high end or a low end shop, they basically use it all, but what they're having to do, is they have to manage and understand each one of those platforms. How to maintain it, it's kind of specialized. How to report on it, how to automate, each the automation requirements are different, but different API to actually automate it. Now the minute you say, now help me modernize that and bring me to a hybrid multi-cloud, now you're doing kind of a complex thing over multiple ways, and against different platforms, which are all completely different. And the key thing is, in the past it made sense to a have high end silicon with high end software, and it made sense. And different low end, and basically, because of some of the innovation we've driven, no longer do you have to do that. There's one platform that allows you to have one platform to meet those different requirements, and dramatically simplify what you're doing for enterprises. >> So, we're going to talk a little bit more about what you guys are announcing. But how do you know when you get there, to this land of simple? >> One it's hard to get there, we can talk about that too. But it's a, when a client, so we just had a call this morning with our board advisor for storage, our division. And they're kind of the bigs of the bigs. Up on the need, more on the high end side, just so you know the sample size. But literally, in the discussion we were talking about the platform simplification, how do you get to hybrid cloud, what we're going to do with the cyber incident response type of capabilities have resiliency. And literally in the call they are already emailing their team, saying we need to do something more strategic, we need to do that, we need to look at this holistically. They love the simplicity. Everything we just went through, they can't do anymore. Especially in Chapter II, it's about modernizing your existing mission critical enterprises, and then put them in the context of Hybrid multi-cloud. That's hard, you can't do it with all these different platforms, so they're looking for, let me spend less. Like you said, to get my team to do up-stack things, they definitely don't want to be managing different disparate storage organizations. They want to move forward and use that freed up resource to do other things, so. When I see big companies literally jumping at it, and giving the example. You know I want to talk about the cyber resiliency thing, I've had four of those this week. That's exactly what we need to have done, so it's just, I haven't had a conversation yet that clients aren't actually excited about this, and it's actually pretty straightforward. >> So I'll give you the benefit of the doubt, and again we'll get there, but assuming your there. Why do you think it took you so long? You kind of mentioned it's hard. >> So, transformations are never easy, and typically whoever is the transformation engine, gets shot in the back of the head, right. So it's really hard to get teams to do something different. So imagine every platform, EMC has nine now, right. So it is through acquisition of others, you have VP's, you know. VP of development, offering and maybe sales, and then you have whole teams, where you have founders you've acquired. So you have real people, that they love their platform, and there's no way they're going to give it up. They always come up with the next generation, and how it's going to solve all ills, but it's a people transformation. How do you get we're going to take three and say, hey, it's one platform. Now to do that it's a operational transformation challenge. It's actually driving the strategy, you don't do it in matter of a week, there's development to make sure that you can actually meet all the different use cases, that will take you literally years to do, and have a new platform. But, I think it's just hard to do. Now, anyone that's going to do that, let's say you know EMC or HP wants to do it. They're going to have to do the same thing we did, which is going to take them years of development. But also, it's managing that transition and the people involved, or the founders you've acquired, or it just it's amazing. In fact, it's the most wonderful part of my job is dealing with people, but it can frustrate you. >> So we've seen this over the years, look at NetApp, right with waffle, it was one size fits all for years, but they just couldn't cover all markets. And then they were faced with TAM expansion, of course now the portfolio expands. Do you think -- >> And now they have three and -- >> And David Scott at HPE, Storage VP at the time used to talk about how complex EMC's portfolio was, and you see HPE has to expand the portfolio. >> We all did, including IBM. >> Do you think Pure will have to face the same sort of -- >> We are seeing Pure with three, right. And that's without the file, so I'm just talking about what we do for physical, virtual, and container workloads and cloud. If you start going to what we're going to scale up to object we all have our own there too. And I'm not even counting the three to get to that. So you see Pure doing the exact the same thing, because they are trying to expand their TAM. And you have to do some basic innovation to have a platform actually meet the requirements, of the high end requirements, the mid range, and the entry level requirements. It's not just saying, I'm going to have one, you're actually have to do a lot of development to do it. >> All right, let's get to the news. What are you guys announcing? >> So basically, we're announcing a brand new, a dramatic simplification of our distributed storage. So, everything for non-Z. If you're doing physical boxes, bare metal, Linux. You're doing virtual environments, VMware environments, hyper-V, Power VM, or if you're doing container workloads or into the cloud. Our platforms are now one. One software, one API to manage. But we're going to actually, we're going to do simplification without compromise. We're going to give you want you need. You're going to need an entry level packaging, midrange and high end, but it's going to be one software allows you to meet every single price requirement and functionality. And we'll be able to do some surprises on the upside for what we're bringing out to you, because we believe in value in automation. We can up the value we bring to our clients, but also dramatically take out the cost complexity. But one thing we're getting rid of, is saying the need, the requirement to have a different hardware software platform for high end, midrange and low end. It's one hardware and software platform that gets you across all those. And that's where you get a dramatic simplification. >> So same OS? >> Same OS? >> Normally, you'd do, you'd optimize the code for the high end, midrange and low end. Why are you able to address all three with one OS? How are you able to do that? >> It took us three and half years, it was actually, I will talk about a couple innovation pieces. So, on the high end you have customized silicon, we did, everyone does, we had a Texas Memory Systems acquisition. It was the flash drawer 2U, about 375 TB, uncompressed de dup, pretty big chunky, you had to buy big chunks. So it was on the high end. >> That was the unit of granularity, right. >> But it gave you great value, but also you had great performance, latency better than you get in NVMe today, before NVMe. But you get inline compression, encryption, so it was wonderful. But it was really ultra high end. What we did was we took that great custom silicon, and we actually made it onto what it looks like a custom, or to be a standard NVMe SSD. So you take a Samsung NVMe, or a WD and you compare it to what we call our flash core module. They look the same and they go interchangeably into the NVMe standard slot. But what's in there is the same silicon, that was on this ultra high end box. So we can give the high end, exactly what we've did before. Ultra low latency, better than NVMe, but also you can get inline compression de dup and the were leveling, and the stuff that you expect in the custom silicon level. But we can take this same NVMe drive and we can put it in our lowest end model. Average sale price $15,000. Allows you to literally, no compromise on the high end, but have unbelievable surprises on the midrange and the low end, where now we can get the latency and the performance and all those benefits, to be honest on a much lower box. >> Same functionality? >> Same functionality, so you lose nothing. Now that took a lot of work, that wasn't easy. You're talking about people, there was roadmaps that had to be changed. We had to know that we were going to do that, and stick to our guns. But that'll be one. Other things is, you know you're going to get some things on the upside that you're not expecting, right. Because it's custom silicon, right, I might have a unique price performance. But also cost advantages, so I'm going to have best price performance or density across the whole product line. But also, I'm going to do things like, on the high end you used to unbelievable operational resiliency. Two site, three site, hyper-swap, you know two boxes that would act like one. Have a whole outage, or a site outage and you don't really miss a transaction, or multi-sites. But we're going to be able to do that on the low end and the midrange as well. Cyber resiliency is a big deal. So I talked about Operational Resiliency. It's very different coming back when it's cyber. But cyber incident response becomes key, so we're going to give you special capabilities there which are not available for anyone in the industry. But is cyber incident response only a high end thing, or is it a low end thing. No, it's across everywhere. So I think we're going to shock on the upside a lot of it, was the development to make sure the code stack, but also the hardware, we can at least say no compromise if you want entry-level. I'm going to meet anyone at that mote. In fact, because the features of it, I'm able to compete at an unfair level against everyone on the low end. So you say, midrange and high end, but you're not losing anything because your losing the custom silicon. >> So let's come back to the cyber piece, what exactly is that? >> All right, so, listen, this is not for data breaches. So if a data breach happens, they steal your database or they steal your customer name, you have to report to, you know you have to let people know. But it's typically than I call the storage guy and say hey, solve it. It was stolen at a different level. Now the ones that doesn't hit the media, but happens all the time actually more frequently. And it definitely, gets called down to the operations team and the storage team is for cyber or malicious code. They've locked up your system. Now they didn't steal data, so it's not something you have to report. So what happens is call comes down, and you don't know when they got you. So it's an iterative process, you have to literally find the box, bring up, maybe it's Wednesday, oh, bring it up, give it to application group, nope, it's there. Bring up Tuesday... it's an iterative process. >> It's like drilling for oil, a 100 years ago, nope, not it, drill another hole. >> So what happens is, if it's cyber without the right tools, you use your backup, one of our board advisors, literally major bank, I had four of those, I'll give you one. It took me 33 hours to bring back a box. It was a large database 30 TB, 33 hours. Now why did you backup, why didn't he use his primary storage against DR copies of everything. Well they didn't have the right tool sets, so what we were able to do is, tape is great for this air gap, but it takes time to restore and come back up and running. The modern day protection we have like Veeam or Cohesity allows the recovery being faster, because your mounting backup copies faster. But the fastest is your primary snapshot and your replicated DR snapshots. And if you can leverage those, the reason people don't leverage it, and we came upon this, almost accidentally. We were seeing our services brethren from IBM doing, IBM SO or outsourcing GTS, when they did have a hit. And what they want to do is, bring up your snapshots, but if you bring up a snapshot and you're not really careful, you start crashing production workloads, because it looks like the VM that just came up. So you need to have, and we're providing the software that allows you to visualize what your recovery points are. Allows you to orchestrate bringing up environments but more importantly, orchestrate into a fenced network environment, so it's not going to step on production workloads and address this. But allows you to do that, and provide a URL to the different business users, that they can come and say yes, it's there or it's not. So even if you don't use this software before this incident, it gives you visibility, orchestration, and then more importantly a fence, a safe fence network, a sandbox to bring these up quickly and check it out, and easily promote to production. >> So that's your safe zone? >> Safe zone, but it's just not there. You know you start bringing up snapshots, it's not like a DR case, where you're bringing things up, you have to be really smart, because you bring it up, and checking out. So without that, they don't want to trust to use the snapshots, so they just don't use primary storage. With it, it becomes the first thing you do. Because you hope you got it within a week, or week and a half of your snapshots. And it's in the environment for ninety days, now you're going to tape. Now if you do this, if you put this software in place before an incident, now you get more values, you can do orchestrated DR testing. Because where doing this orchestrated, bring up application sets it's not a VM, it's sets of VM's. Fenced network, bring it up, does it work. You can use it for Test/Dev data, you can use it for automatic DR. But even if you don't set it up, we're going to make it available so you can actually come back from these cyber incidents much faster. >> And this is the capability that I get on primary storage. Because everybody's targeting you know the backup corpus for ransomware and things of that nature. This is primary storage. >> And we do put it on our backups. So our backups allows you to do the exact same thing and do the bootable copies. And so if you have our backup product, you could already do this on primary. But, what we're saying is, regardless of who your using, we're still saying you need to do backup, you need to air a cup your backup. 'cause you know Want to Cry was in the environment for 90 days, you know your snapshots are only for a week or two. So the fact of the matter is that you need it, but in this case, if you're using the other guys, you can also, we're going to give it just for this tool set. >> How does immutability does it factor? I know like for instance AWS Reinvent they announced an immutability capability. I think IBM may have that, because of the acquisition that you made years ago, Clever Safe was fundamental to that, their architecture. Is that a way to combat ransomware? >> So immutability is obviously not just changes. So ransomware and you know malware typically is either encrypting or deleting things. Encrypting is what they do, but they have the key, so. The fact of the matter is that they're deleting things. So if it's immutable, than you can't change it. Now if you own the right controls, you can delete it, but you can't change it, they can't encrypt it on you. That becomes critical. So what you're looking for, is we do like for instance all of our flash system allows you to do these snapshots, local or remote that allow you to have, go to immutable copies either in Amazon, we support that or locally on our object storage, or in IBM's cloud. It allows you to do that. So the different platforms have this immutability that our software allows you integrate with. So I think immutability is kind of critical. >> How about consumption models? The way in which your packaging and pricing. People want to, the cloud is sort of change the way we think about this, how have you responded to that? >> So, you hit upon our Chapter II. We, IBM, actually resonates to the clients. In Chapter I, we are doing some lift and shift, and we're doing some new use cases in the cloud. And they had some challenges but it worked in general. But we're seeing the next phase II, is looking at the 80% of your key workloads, your mission critical workloads, and basically how you transfer those in. So basically, as you look at your Chapter 2, you're going to do the modernization, and you might move those into the cloud. So if you're going to move into the cloud, you might say, I'd like to modernize my storage, free my team up, because it's simple, I don't have to do a lot of things. But you need to simplify so you can now, modernize so you can transform. But, I'm going to be in the cloud in 18 months, so I don't want to modernize my storage. So what we have, is of course we have so you can buy things, you can lease things, we have a utility model, that is great for three to five years. But we have now a subscription model, which think of just cloud pricing. No long term commitment. Use what you use, up and down, and if it goes to zero, call us we'll pick it up, and there's no expense to you. So, no long term commitments and returns. So in 14 months, I've done my modernization, you've helped me free up my team. Let me go, and then we'll come and pick it up, and your bill stops that day. >> Cancel at anytime? >> Yeah, cancel at anytime. >> Do you expect people to take advantage of that? Is there a ton of demand at this point in time? >> I think everyone is on their own cloud journey. We talk a lot about meeting the client where they are, right. So how do I meet them where they're at. And everyone is on their own journey, so a lot of people are saying, hey, why would I do anything here, I need to get there. But if they can modernize and simplify what they're doing, and again these are your mission critical. We're not talking, this is how you're running your business, if we can make it better in the mean time, and then modernize it, get it in containers, get it into a new platform, that makes all the sense in the world. And because if we can give them a flexible way, say it's cheaper than using cloud storage, like in Amazon or IBM cloud. But you can use it on-prem, free you up, and then at anytime, just return it, that's a big value that people say, you know what, you're right, I'm going to go do that. You're able to give me cloud based pricing, down to zero when I'm done with it. Now I can use that to free up my team, that's the value equation. I don't think it's for everyone. But I think for a segment of the market, I think it's critical. And I think IBM's kind of perfectly positioned to do it with a balance sheet to help clients out. >> So how do you feel about this? Obviously, you've put a lot of work into it. You seem pretty excited. Do you feel as though this is going to help re-energize your business, your customer base, and how do you think competitors are going to respond? >> Good question. So, I think simplification, especially we can talk about value equation. I think I can add more value to you Mr. Customer. I can bring things you're not expected, right, and we're get to this cyber in a second, that would be one of the things they would not expected. And reduce the costs and complexity. So we've already done this a couple of times, so we did it with our Mainframe storage launch in the fall. It bar none, the best box for that workload. Lowest latency, most integration, encrypt, pervasive encryption, encryption in flight. But also, we took it from nine variants, to two. Because we could. We go, why did you need all those, we'll there's reasons for it in the past, but no longer. We also got rid of all the hard disk drives. We also add a little non-volatile cache and allowed you to get rid of all those battery backups. All these custom things that you used to have on this high end box. And now it's dramatically simpler, better. And by the way, no one asked, hey what are my other seven variants went. It was simpler, it was better, faster, but then it was the best launch we've had in the history of the product line. It think we can add better value and simplify for our clients. So that's what we'll do. You asked about how people respond. Listen, they're going to have to go through the same thing we did, right. A product line has people behind it, and it's really hard, or a founder behind it. You mentioned a couple, they're acquiring companies. I think they're going to have to go this, it's a transformational journey, that they'll have to go through. It's not as simple as doing a PowerPoint. I couldn't come to you and say, I can simplify without compromise. I can help you on the low end, the midrange, high end with same platform unless I did a lot of fundamental design work to make sure I could do that. Flash core modules being one of them, right. So I think it's going to be hard. It'll be interesting, well, they're going to have to go through the same thing I did, how about that. >> Usually when you make a major release like that, you're able to claim Top Gun, at least for a while with things like latency, and bandwidth and IOP's and performance. Are you able to make that claim? >> So, basically you saw it in the launch today. But basically you saw the latency which is one, because we're bringing a custom silicon down, our latency you'll see like I'll give you Pure bragging on their websites, their lowest latency is 70 microseconds, which by the way is pretty, you know. It's gonna be 150 microseconds, pretty good bragging rights. We're at 70 microseconds, but that's on the X90 using storage class memory. So literally we are 2x faster than on latency, how fast can you respond to something. But we can do it not only on our high end box, but we can also do it on our average sale price $15,000 box. Because I'm bringing that silicon up and down. So we can do the latency, now EMC the highest and PowerMax box. Two big chassis put together, that can do 100 microseconds. Again, still we're 70 microseconds, so we're 30% faster. And that's epitomized of the high end custom silicon software. So latency we got it. IOP's, so look at the biggest baddest two boxes of EMC, they'll do you know 15 million IOPs on their website. We'll do 18 million IOPs, but instead of two racks, it's 8U. It is 12x better IOPs per rack space, if you want to look at it that way. Throughput, which if you could do, it's all about building for our businesses. It's all about journey of the cloud and building for our businesses, everyone's trying to do this. Throughput in analytics becomes everything, and we you can do analytics in everything. Your DBA's are going to run analytics, so throughput matters. Ours is for every one of our boxes, that you can kind of add up and cluster out, it's 45 Gb/s. Pure, for instance their bragging rights, is 18, and they can't cluster anymore. So what we're able to do is on any of the, and most of those are high end, but I'll say, I can do the same thing up and down my line, because of where I'm bringing the custom silicon. So on bragging rights, and that's just kind of website, big bragging rights, I think we got a cold, and if you look price performance, and just overall price per capacity, we're inline to be the most the cost effective across everyone. >> Yeah, up and down the line, it's very interesting, it's kind of unique. >> And then you mentioned resiliency, I'll tell you that's the hottest thing, so. You mentioned the cyber incident response, that is something that we did on the Mainframe. So, we did the last Mainframe cycle, we allow you to do the same thing, and it literally drove all the demand for the product sets. It's already the number one thing people want to talk about, because it becomes a you're right, I needed that this week, I needed it last week. So, I think that's going to really drive demand? >> What worries you? >> (laughs) On this launch, not much. I think it's how fast and far we can get this message out. >> Wow, okay, so execution, obviously. You feel pretty confident about that, and yeah, getting the word out. Letting people know. Well, congratulations Ed. >> No, thank you very much, I appreciate it. I appreciate you coming in. And thank you for watching everybody. This is Dave Vellante for theCUBE. We'll see you next time. (upbeat music)

Published Date : Feb 12 2020

SUMMARY :

From the Silicon Valley Media Office Great to see you my friend. And you heard my narrative. I like the way you kicked it off, But how do you know when you get there, about the platform simplification, how do you get So I'll give you the benefit of the doubt, there's development to make sure that you can actually meet Do you think -- and you see HPE has to expand the portfolio. And you have to do some basic innovation What are you guys announcing? and high end, but it's going to be one software allows you How are you able to do that? So, on the high end you have customized silicon, we did, So you take a Samsung NVMe, or a WD and you compare it on the high end you used to unbelievable and you don't know when they got you. It's like drilling for oil, a 100 years ago, nope, So you need to have, and we're providing the software With it, it becomes the first thing you do. Because everybody's targeting you know the backup corpus So the fact of the matter is that you need it, that you made years ago, Clever Safe was fundamental So if it's immutable, than you can't change it. we think about this, how have you responded to that? So what we have, is of course we have so you can buy things, that people say, you know what, you're right, and how do you think competitors are going to respond? I couldn't come to you and say, Are you able to make that claim? and we you can do analytics in everything. it's kind of unique. So, we did the last Mainframe cycle, we allow you I think it's how fast and far we can get this message out. and yeah, getting the word out. And thank you for watching everybody.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

NutanixORGANIZATION

0.99+

IBMORGANIZATION

0.99+

threeQUANTITY

0.99+

Ed WalshPERSON

0.99+

150 microsecondsQUANTITY

0.99+

100 microsecondsQUANTITY

0.99+

David ScottPERSON

0.99+

30%QUANTITY

0.99+

ninety daysQUANTITY

0.99+

80%QUANTITY

0.99+

90 daysQUANTITY

0.99+

70 microsecondsQUANTITY

0.99+

30 TBQUANTITY

0.99+

33 hoursQUANTITY

0.99+

HPEORGANIZATION

0.99+

February 2020DATE

0.99+

EdPERSON

0.99+

nineQUANTITY

0.99+

$15,000QUANTITY

0.99+

Jeff ClarkPERSON

0.99+

twoQUANTITY

0.99+

AmazonORGANIZATION

0.99+

12xQUANTITY

0.99+

DellORGANIZATION

0.99+

a weekQUANTITY

0.99+

SamsungORGANIZATION

0.99+

TuesdayDATE

0.99+

NetAppORGANIZATION

0.99+

2xQUANTITY

0.99+

45 Gb/sQUANTITY

0.99+

last weekDATE

0.99+

EMCORGANIZATION

0.99+

PowerPointTITLE

0.99+

Boston MassachusettsLOCATION

0.99+

Chapter IIOTHER

0.99+

two boxesQUANTITY

0.99+

two racksQUANTITY

0.99+

five yearsQUANTITY

0.99+

oneQUANTITY

0.99+

Pure StorageORGANIZATION

0.99+

WednesdayDATE

0.99+

one platformQUANTITY

0.99+

14 monthsQUANTITY

0.99+

18 monthsQUANTITY

0.99+

HPORGANIZATION

0.99+

this weekDATE

0.98+

zeroQUANTITY

0.98+

twenty years agoDATE

0.98+

AWSORGANIZATION

0.98+

Top GunTITLE

0.98+

seven variantsQUANTITY

0.98+

fourQUANTITY

0.98+

Chapter IOTHER

0.98+

todayDATE

0.98+

three siteQUANTITY

0.98+

nine variantsQUANTITY

0.98+

PureORGANIZATION

0.98+

Two siteQUANTITY

0.98+

18 million IOPsQUANTITY

0.98+

LinuxTITLE

0.97+

Dell EMC and The State of Data Protection 2020 | CUBE Conversation, February 2020


 

>> From the SiliconANGLE Media office in Boston, Massachusetts, it's theCUBE. Now, here's your host Dave Vellante. >> Hello everyone and welcome to this CUBE conversation. You know, data protection, it used to be so easy. You'd have apps, they'd be running on a bunch of servers, you'd bolt on a little backup and boom! One size fit all. It was really easy peasy. Now, business disruptions at the time, they were certainly not desired, but they were definitely much more tolerated and they were certainly fairly common place. Today, business disruptions are still fairly common occurrence but the situation is different. First of all, digital imperatives have created so much more pressure for IT organizations to deliver services that are always available with great consumer experiences. The risks of downtime are so much higher but meeting expectations is far more complex. This idea of "one size fits all" it really no longer cuts it. You got physical, virtual, public cloud, on-prim, hybrid, edge, containers. Add to this cyber threats, AI, competition from digital disrupters. The speed of change is accelerating and it's stressing processes and taxing the people skills required to deliver business resilience. These and other factors are forcing organizations to rethink how they protect, manage, and secure data in the coming decade. And with me, to talk about the state of data protection today and beyond, is a thought leader from one of the companies in data protection, Arthur Lent is the Senior Vice President and CTO of the Data Protection Division at Dell EMC. Arthur, good to see you again. Thanks for coming in. >> Great to see you, Dave. >> So, I'm going to start right off. This is a hot space and everybody wants a piece of your hide because you're the leader. How are you guys responding to that competitive threat? >> Well, so the key thing that we're doing is we're taking our proven products and technologies and we've recognized the need to transform and really modernize them and invest in a new set of capabilities and changing workloads. And our core part of that, with some changes in leadership, have been to shift our processes in terms of how we do stuff internally and so we've moved from a very big batch waterfall-style approach where things need to be planned one, two, three years out in advance, to a very small batch agile approach where we're looking a couple of weeks, a couple of months in advance of what we're going to be delivering into product. And this is enabling us to be far more responsive to what we're learning in the market in very rapidly changing areas. And we're at the spot where we now have several successive releases that have been taking place with our products in this new model. >> So, that's a major cultural shift that you're really driving. I mean, that allows you to track you know, younger people, you guys are a global organization so I mean, how is that sort of dynamic change? You know, people sometimes maybe think of you as this stodgy, you know, company been around for 20 plus years. What's it like when you walk around the hallways? What's that dynamic like? >> It's like we're the largest start-up in the data protection industry but we've got the backing of a Fortune 50 company. >> Nice. All right, well let's get into it. I talked in my narrative upfront about business disruptions and I said there's still you know, kind of a common occurrence today, is that what you're seeing? >> Absolutely! So, our latest data protection index research has 82% of the people we surveyed experienced downtime or data loss within the last 12 months and this survey was just completed within the last month or two. So, this is still very much a real problem. >> Why do you think it's still a problem today? What are the factors? >> So I would say the problem's getting worse and it's because complexity is only increasing in IT environments. Complexity around multi-platform, between physical servers, virtual servers, cloud, various flavors of hybrid cloud, data distribution between the core, edge and the cloud, growing data volumes, the amount of data, and the data that companies need to run their business is ever increasing, and a growing risk around compliance, around security threats, and many customers have multi-vendor environments and multi-vendor environments also increase their complexity and risk and challenges. >> Who was that talking about cloud? Because you know, we entered last decade. Cloud was kind of this experimental, throw some dev out in the cloud, and now as we enter this decade it's kind of a fundamental part of IT strategies. Every CIO, he or she has a cloud strategy. But it's also becoming clear that it's a hybrid world. So, in thinking about data protection, how does hybrid affect how your customers are thinking about protecting their data in the coming decade? >> So it produces a bunch of changes in how you have to think about things and today, we have over a thousand customers protecting over 2.5 exabytes of data in the public cloud. And it goes across a variety of use cases from longterm retention in the cloud, backup to the cloud, disaster recovery to the cloud, a desire to leverage the cloud for analytics and dev test, as well as production workloads in the cloud and the need to protect data that is born in the cloud. And we're in an environment where IT is spanning from the edge to the core to the cloud and the need to have a cohesive ability and approach to protect that data across its lifecycle for where it's born and where it's being operated on and where value is being added to it. >> Yeah, and people don't want to buy a thousand products to do that or even a dozen products to do that, right? They want a single platform. I want to talk about containers because Kubernetes, specifically, the containers generally one of the hottest areas. It's funny, containers have been around forever (laughs) but now they're exploding, people are investing much more in containers. IT organizations and dev organizations see it as a way to drive some of the agility that you maybe talked about earlier. But I'm hearing a lot about you know, protection, data protection for containers, and I'm thinking, "Well, wait a minute... "You know, containers come and go. "They're ephemeral. Why do I need to protect them?" Help me understand that. >> So, first I want to say yeah, we're seeing a lot of interest in enterprises deploying containers. Our latest survey says 57% of enterprises are planning on deploying it next year. And in terms of the ephemerality and the importance of protection, I have to admit, I started this job about a year ago and I was thinking almost exactly the same thing you were. I came in, we had an advanced development project going on around how to protect Kubernetes environments, both to protect the data and the infrastructure. And I was like, "Yeah, I see this "as an important advanced development priority, "but why is this important "to productize in the near future?" And then I thought about it some more and was talking to folks where the Kubernetes technologies, there's two key things with it. One: It's Kubernetes as a DevOps CI/CD environment, well if that environment is down... Your business is down in terms of being able to develop. So, you have to think about the loss of productivity and the loss of business value as you're trying to get your developer environment back up and running. But also, even though there might not be stateful applications running in the containers, there's generally production usage in terms of delivering your service that's coming out of that cluster. So, if your clusters go down or your Kubernetes environment goes down, you got to be able to bring it back up in order to be able to get it up and running. And then the last thing is in the last year or two, there's been a lot of investment in the Kubernetes community around enabling Kubernetes containers to be stateful and to have persistence with them. And that will enable databases to run in containers and stateful applications to run in to containers. And we see a lot of enterprises that are interested in doing that but... Now they can have that persistence but it turns out they can't go into production with the persistence because they can't back it up. And so, there's this chicken and egg problem in order to do the production you need both the state and the data protection. And the nice thing about the transformation that we've done is as we saw this trend materializing we were able to rapidly take this advanced development project and turn it into productization. And we're able to get to a tech preview in the summer and a joint announcement with Pat Gelsinger around our work together in the Kubernetes environment and being able to get our first... Product release out to market a couple of weeks ago and we're going to be able to really rapidly enhance the capabilities of that as we're working with our customers on where do they need the features added most and being able to rapidly integrate in with VMware's management ecosystem for container environments. >> So, you got a couple things going on there. You're kind of describing the dynamic of the developer and developers set to key... Strategic linchpin now. Because the time between you developing function and you get it to market I mean, it used to be weeks or months or sometimes even years. Today, it's like nanoseconds, right? "Hey, we need this function today. "Something's happening in the market, go push it." And if you don't have your data, you don't have the containers. The data and the containers are not protected, you're in trouble, right? Okay so, that's one aspect of it. The other is the technical piece so help us understand like, how you do that. What's the secret sauce conceptually behind you know, protecting containers? >> So, there's really two parts of what one needs to do for protecting the containers. There's the container infrastructure itself and the container configuration and knowing what's involved in the environment so that if your Kubernetes cluster goes down being able to restart it and being able to get your appropriate application environment up and running So, the containers may not be stateful but you've got to be able to get your CI/CD operate environment up and running again. And then the second part is we are seeing people use stateful containers and put databases in containers in development and they want to roll that into production. And so for there we need to backup not just the container definitions but backup the data that's inside the container and be able to restore them. And those are some of the things that we're working on now. >> One of the things I've learned from being around this industry for a while is people who really understand technology, they'll ask questions about, "What happens when something goes wrong?" so it's all about the recovery is really what you're talking about is that's the key. How does machine intelligence fit in... Stay on containers for a minute. Is machine learning and machine intelligence allowing you to recover more quickly, does it fit in there? >> So a key part of the container environment that's different from some of the environments in the past is just how dynamic it is and just how frequently containers are going to come and go and workloads mix, expand, and contract their usage of IT resources and footprint. And that really increases the need for automation and using some AI and machine learning techniques so that one can discover what is an application as it's containerized and what are all the resources it needs so that in the event of an interruption of service you know, all of the pieces that you need to bring together and automate its recovery and bring back. And in these environments you can no longer be in a spot to have people handcraft and tailor exactly what to protect and exactly how to bring it back after protection. You need these things to be able to protect themselves automatically and recover themselves automatically. >> So, I want to sort of, double click on that. Again, it's 2020 so I'm always going back to last decade and thinking about what's different. Beginning of last decade people were afraid of automation, they wanted knobs to turn. Even exiting the decade recently and even now, people are afraid about losing jobs. But the reality is things are happening so fast, there's so much data that humans just can't keep up. So, maybe you could make some comments about automation generally and specifically applying to data protection and recovery. >> Okay, so with the increasing amounts of data to be protected and the increasing complexity of environments, more and more of the instances of downtime or challenges in performing a recovery, tend to be because of the complexity of having deployed them and having the recovery procedures write and insuring that the SLAs that are needed are met and it's just no longer realistic... To expect people to have to do all of those things in excruciating detail. And it's really just necessary, in order to meet the SLAs going forward, to have the environments be automatically discovered, automatically protected, and have automated workflows for the recovery scenarios. And because of the complexities of changing, we need to reach the point of having AI and machine learning technologies help guide the people owning the data protection on data criticality and what's the right SLA for this and what's the right SLA for that and really get a human-machine partnership. So, it's not people or machines, but it's rather the people and machines working together in tandem with each doing what they do best to get the best outcome. >> Now that's great, you'd be helping people prioritize and the criticality applications... I want to change the conversation and talk about the edge a little bit. You sponsor off like, IDC surveys on how big the market is in terms of just zettabytes and it's really interesting and thank you from the industry standpoint for doing that. I have no doubt edge is coming into play now because so much data is going to be created at the edge, there's all this analog data that's going to be digitized, and it's just a big component of the digital future. In thinking about data at the edge, a lot of the data is going to stay at the edge, maybe it's got to be persisted at the edge. And obviously if it's persisted it has to be protected. So, how are you thinking about the evolution of edge, specifically around data protection? >> Okay, so the... I think you kind of caught it in the beginning. There's going to be a huge amount of data in the edge. Our analysis has us seeing that there's going to be more data generated and stored in the edge than in all the public clouds combined. So, that's just a huge shift in that three to five to ten year timeframe. >> Lot of data. >> Lot of data. You're not going to be able to bring it all back. You're just going to have elements of physics. So, there's data that's going to need to be persisted there. Some of that data will be transitory. Some of that data is going to be critical and need to be recovered. And a key part of the strategy around the edge is really, again going back to that, AI and machine learning intelligence and having a centralized control and understanding of what is my data in the edge and having what are the right triggers and understanding of what's going on of when is it an event occurred where I really need to protect this data? You can't afford to protect everything all the time. You got to protect the right things at the right time and then move it around appropriately. And so, a key part of being successful with the edge is getting that distributed intelligence and distributed control and recognizing that applications are going to span from core to edge to cloud and have just specific features and functions and capabilities that implement into various spots and then that intelligence to do the right thing at the right time with central policy control. >> So this is a good discussion. We've spanned a lot of territories but let's bring it back to the practical you know, uses for the IT person today saying, "Okay, Arthur, look. "Yeah, I'm doing cloud. I'm playing around with AI. "I've got my feet in containers "and my dev staff is doing that. "Yeah, edge. I see that coming. "But I just got some problems today that I have to solve." So, my question to you is, how do you address those really tactical day-to-day problems that your customers are facing today and still help them you know, plan for the future and make sure that they've got a platform that's going to be there for them and they're not going to just have to rip and replace in three or four years? >> Okay, and so that's like the $100,000 question as we look at ourselves in this situation. And the key is really taking our proven technologies and proven products and solutions and taking the agile approach for adding the most critical modern capabilities for new workloads, new deployment scenarios alongside them as we modernize those solutions themselves and really bringing our customers along in the journey with that and having a very smooth path for that customer transition experience on that path to our powered up portfolio. >> I mean, that's key because if you get that wrong and your customers get that wrong then maybe now it's a $100,000 problem it's going to be billions of dollars of problems. >> Fair. >> So, I want to talk a little bit about alternative use cases for data protection. We've kind of changed the parlance, we used to call it "backup". I've often said people want to get more out of their backup, they want to do other things with their backup 'cause they don't want just to pay for insurance, the CFO wants ROI. What are you seeing in terms of alternative use cases and the sort of expanding TAM, if you will, of backup and data protection? >> So, a core part of our strategy is to recognize that there is all of this data that we have as part of the data protection solutions and there's a desire on our customer's parts to get additional business value out of it and additional use cases from there. And we've explored and are investing in a variety of ways of doing that and the one that we see that's really hit a key problem of the here-and-now is around security and malware. And we are having multiple customers that are under attack for a variety of threats and it's hitting front page news. And a very large fraction of enterprises are having some amount of downtime due to malware or cyber attacks. And a key focus that we've had is around our cyber recovery solutions of really enabling a protected air gap solution so that in the event of some hidden malware or an intrusion, having a protected copy of that data to be able to restore from. And we've got customers who otherwise would have been brought down but were able to be brought back up very, very quickly by recovering out of our cyber vault. >> Yeah, I mean, it's a huge problem. Cyber has become a board-level issue, people are you know, scared to death of getting hit with ransomware, getting their entire data corpus encrypted so that air gap is obviously critical and increasingly it's becoming a fundamental requirement from a compliance standpoint. All right, I'll give you last word. Bring us home. >> Okay, so, the most important thing about the evolving and rapidly changing space of data protection at this point is that need for enterprises to have a coherent approach across their old and new workloads, across their emerging technologies, across their deployments in core, edge, and cloud, to be able to identify and manage that data and protect and manage that data throughout its lifecycle and to have a single coherent way to do that and single set of policies and controls across the data in all of those places. And that's one key part of our strategy of bringing that coherence across all of those environments and not just in the data protection domain, but there's also a need for this cross-domain coherence and getting your automation and simplification, not just in the data protection domain but up into higher levels of your infrastructure. And so we've got automation's taking place with our PowerOne Converged Infrastructure and we're looking across our Dell Technologies portfolio of how can we together, with our partners in Dell Technologies, solve more of our customer problems by doing things jointly. And so for example, doing data management that spans not just your protection storage but your primary storage as well. Your AI and ML techniques for full stack automation. Working with VMware around the full end to end Kubernetes management for VMware environments. And those are just a couple of examples of where we're looking to both be full across the data protection, but then expand into broader IT collaborations. >> You're seeing this across the industry. I mean, Arthur, you mentioned PowerOne. You're talking about microservices, API-based platform increasing, we're seeing infrastructure as a code which means more speed, more agility, and that's how the industry is dealing with all this complexity. Arthur, thank you so much for coming on theCUBE. Really appreciate it. >> Thank you. >> And thank you for watching, everybody. This is Dave Vellante and we'll see you next time. (electronic music)

Published Date : Feb 11 2020

SUMMARY :

From the SiliconANGLE Media office and taxing the people skills required So, I'm going to start right off. Well, so the key thing that we're doing I mean, that allows you to track you know, in the data protection industry and I said there's still you know, has 82% of the people we surveyed experienced downtime and the data that companies need and now as we enter this decade it's kind of and the need to protect data that is born in the cloud. Yeah, and people don't want to buy and to have persistence with them. of the developer and developers set to key... and being able to get your appropriate One of the things I've learned and just how frequently containers are going to come and go and recovery. and insuring that the SLAs that are needed are met a lot of the data is going to stay at the edge, in that three to five to ten year timeframe. and then that intelligence to do the right thing and they're not going to just have to rip Okay, and so that's like the $100,000 question it's going to be billions of dollars of problems. and the sort of expanding TAM, if you will, and the one that we see that's really and increasingly it's becoming a fundamental and to have a single coherent way to do that and that's how the industry is dealing And thank you

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

$100,000QUANTITY

0.99+

ArthurPERSON

0.99+

DavePERSON

0.99+

Pat GelsingerPERSON

0.99+

February 2020DATE

0.99+

57%QUANTITY

0.99+

82%QUANTITY

0.99+

Arthur LentPERSON

0.99+

second partQUANTITY

0.99+

Dell TechnologiesORGANIZATION

0.99+

next yearDATE

0.99+

firstQUANTITY

0.99+

threeQUANTITY

0.99+

fiveQUANTITY

0.99+

two partsQUANTITY

0.99+

TodayDATE

0.99+

todayDATE

0.99+

OneQUANTITY

0.99+

a dozen productsQUANTITY

0.98+

oneQUANTITY

0.98+

Boston, MassachusettsLOCATION

0.98+

bothQUANTITY

0.98+

Dell EMCORGANIZATION

0.98+

four yearsQUANTITY

0.98+

twoQUANTITY

0.98+

2020DATE

0.98+

last decadeDATE

0.98+

one aspectQUANTITY

0.97+

last monthDATE

0.97+

over a thousand customersQUANTITY

0.97+

ten yearQUANTITY

0.97+

PowerOneCOMMERCIAL_ITEM

0.96+

singleQUANTITY

0.96+

three yearsQUANTITY

0.95+

IDCORGANIZATION

0.95+

eachQUANTITY

0.95+

single platformQUANTITY

0.94+

billions of dollarsQUANTITY

0.93+

20 plus yearsQUANTITY

0.91+

over 2.5 exabytes of dataQUANTITY

0.91+

one key partQUANTITY

0.91+

last yearDATE

0.91+

The State of Data ProtectionTITLE

0.89+

last 12 monthsDATE

0.88+

couple of weeks agoDATE

0.88+

a minuteQUANTITY

0.88+

two key thingsQUANTITY

0.88+

KubernetesTITLE

0.87+

aboutDATE

0.87+

a thousand productsQUANTITY

0.86+

TAMORGANIZATION

0.85+

FirstQUANTITY

0.85+

One sizeQUANTITY

0.85+

a year agoDATE

0.8+

Data Protection DivisionORGANIZATION

0.78+

DevOpsTITLE

0.77+

SiliconANGLE MediaORGANIZATION

0.75+

coming decadeDATE

0.75+

FortuneORGANIZATION

0.75+

one sizeQUANTITY

0.74+

PowerOneORGANIZATION

0.64+

VMwareTITLE

0.62+

twoDATE

0.62+

InfrastructureCOMMERCIAL_ITEM

0.6+

Data Protection 2020 Cloud, VMware and Cyber | | CUBE Conversation, February 2020


 

>> From the SiliconANGLE Media office in Boston, Massachusetts. It's theCUBE. (upbeat music) Now, here's your host Dave Vellante. >> Hi everybody, welcome to this Cube Conversation on data protection. You know, I've been reporting for the last several months that spending on storage is reverting back to pre-2018 levels, but at the same time, it's not falling off a cliff. Now, one area of storage that is still very, very strong is the data protection segment. In the past 18 months, we've seen about a half a billion dollars in venture funding come into the market. We've just seen a big multi-billion dollar exit. And backup specifically in data protection, data management generally is where all the action is right now. And one of the leaders in data protection is Dell EMC. The company has the largest share of the market and the new entrants, believe me, want a piece of their pie. But anyone who follows this company knows that the firm is not likely to give up it's turf very easily. So much is changing in the market today. And I want to understand how Dell EMC's data protection division is responding to both the competitive threats and the changing market dynamics. With me are two experts from Dell EMC to address these issues. Nelson Hsu is Director of Solutions, Product Marketing for the data protection division at Dell EMC, and Colm Keegan is Senior Consultant, Product Marketing at Dell EMC. Gents, welcome to theCUBE. Great to see you again. >> Thank you for having us. >> Thanks, Dave. >> So you heard my intro. You guys are the leader. You got the biggest market share. You got all the upstarts coming at ya. What's your response? >> Want me to take that? >> Sure. >> Yeah. It's interesting, so we were talking about this before we came on set, you know and often times they want to poke holes at us 'cause you know we're perceived as being the old timers, or the stodgy ones of the group out there. And play a little jiu jitsu, you move in say you know well time in market counts for something. You know we've been solving data protection challenges for customers for literally decades now. You know and so, water under the boat and knowing the experience that we've derived from that allows us to bring solutions that are mature, that are proven. What we're doing is we're taking those proven solutions and pairing them with modern capabilities. So that, you know we look at it and say, hey, look, Mr. Customer. You have significant data protection challenges today because, as you said, the world's changing. It's changing rapidly. We can help you address those while also sowing the seeds for the foundation for the future. So we think that's a compelling message and we think that while some of our competitors, in particular the upstarts, have had some interesting things to say, big picture-wise, they don't know what they don't know. 'Cause they just don't have the time in the market. Their solutions are also largely absent upmarket, you know, when you look at the enterprise. So we're comfortable. We think we're in a very good spot right now. >> So cloud obviously was the huge mega trend of the past decade. You guys said from the beginning, it's going to be a hybrid world. Some of that was we hope it's going to be a hybrid world. Well you were right, it's a hybrid world. So how is cloud, hybrid cloud affecting your customer decisions around data protection, and how are you responding? >> Well, you know, there's no doubt that the growth in cloud and the growth in hybrid cloud is real. And it's there today. As we look, and as Colm mentioned, we've been protecting data across the enterprise, across the edge and in the cloud, and that growth continues. So today, we have over 1,000 customers that we're protecting their data in the cloud. To the tone of over 2.7 exabytes of data protected in the cloud by Dell EMC data protection. So there is absolutely no doubt that that growth is there. We have a lot of innovation that we're driving on, both in various ares of cloud native, cyber security and deep integration. >> Okay, so that's good, 1,000 customers. That's a pretty good observation space. But when you think about hybrid, what I think when I talk to customers is they want that same exact cloud experience. They don't want to have to context switch. They don't want to have to buy different platforms. So how are you specifically addressing that customer requirement? >> So there's a couple ways we look at that, right? For our customers, simplicity is very key in ease of use. So that's one of our core tenants as we go across both the edge, the core and the cloud. And the other aspect of that is consistency. So giving them and allowing them to use the tools that they know today to be able to protect their data, wherever that data resides. So with the cloud, with cloud native, your data becomes very, very distributed. And you have to be able to see all that data, and control and manage that data. So the whole aspect around cloud data management has now risen to the top as a major concern. We do that in a great way in a sense that we both have a hybrid strategy and a lot of that is working with Dell Technologies cloud. And it's based upon VMware. And so we have a very good deep relationship with VMware to utilize their tools that our customers use today. Whether it be vSphere or vcontrol that they can manage their data protection from one console, from one environment itself. >> Yeah, Dave, I think when you look at the split today, the latest cut of research is that roughly 52% of VM's are in the cloud, and 48 percent are on-prems so it's already hybrid, and as Nelson said, it's largely predicated on VMware. So as organizations start consuming cloud they're going to go with the platform that they've been operating under for years now. So it'll be VMware. We've always had very tight integration with VMware. We have a very strong partnership with them. And that's both on the existing portfolio as well as the agile portfolio that we're building out today under PowerProtect. So as that hybrid world evolves for the customers obviously we want to make sure they're protected from a virtual machine standpoint. And make that, as Nelson said, very simple for them because the last thing customers need is complexity particularly as their environments are becoming inherently more complex. Because now you look at most enterprises today, they're going to have a mix of workloads. It's physical, it's virtual, containers are unaccounted for. It's cloud native apps, it's SaaS. You know we were talking earlier about multi-clouds. Oftentimes it just kind of came up organically and now you've got this huge distribution of workloads and oftentimes, customers have been just sort of reactive to that. In other words, let me find a way to protect that and I'll worry about the details later. We're looking at that and saying, we have the portfolio to help you protect all your workloads, and as importantly, we'll help consolidate the management in that environment. It's going to start with VMware, but then longer term we're planning for things like a SaaS control plane so that we can give you a complete view of that environment and allow you to assign the policies you need in terms of SLA's, in terms of compliance. You're basically hitting all the security, hitting all the key things that you need and so directionally we think starting with VMware and building from there is probably the most realistic way we can get customers protected from a hyper cloud. >> So the vision is a single point of control that is SaaS based that lives in the cloud or lives wherever you want it to live? >> Right, it can be either. >> So one of our core tendencies here, right, is that we want and deliver the ability to protect our customer's data wherever it resides. Whether it's edge, core or cloud. >> So sticking on cloud for a second, and then sort of segue into the VMware conversation that I want to have is VMware is the sort of linchpin of your multi-cloud strategy. That makes a lot of sense. VMware is going to be a leader, if not the leader in multi-cloud. We'll see how that all shakes out. It's kind of jump ball right now but VMware is in pretty good position with 500,000 customers. But your perspective on cloud is different than say, take an AWS cloud provider, it's a place. Put your data in my cloud. You guys are talking about the experience. And that's really what you're trying to drive with VMware, whether is Ron-prem, whether it's in Google, Azure, AWS, wherever. The cloud, you name it. Is that the right way to think about your strategy? Specifically as it relates to multi-cloud. >> Yeah, so I think on the area of multi-cloud, it is a multi-cloud world. Years ago I was in a SaaS startup and we had customers that were looking to deploy to the cloud. And then that was the question. Okay, do we hedge on multi-cloud or not? As a SaaS provider, we actually implemented on both AWS and Azure at the time. Which became relevant, because now our customers are asking us, yes, my primary is with this particular hyper scaler. But do you also support this second hyper scaler? So the reality started to evolve. And so for us, yes, VMware is a very strategic aspect and partner with us, especially with Dell Technologies cloud. But we also have a multi-cloud relationship with AWS, with Azure and with Google. >> Yes, so the compatibility matrix, if you will, applies now to the cloud. >> Absolutely, absolutely. So now it's having that feature and functionality across multiple clouds. >> One of the things we obviously paid attention to is Project Tanzu with inside of VMware. All around bringing kind of Kubernetes and VMware together. How does that affect data protection? >> Well, I think it affects data protection in the sense that addressing the entire aspect of still your data is distributed now. And it's going to grow that way. I think that we've seen numbers upwards of 70% of applications will be container based. Some of that will be going forward to 2022 where there'll be multiple production applications that will be container based. I think what Tanzu will bring to the table is a cohesive way to manage and control that environment itself. >> Okay, and so maybe we could sort of drill into that a little bit. Containers, it's becoming more obvious that people want to persist some of that data. It's largely stateless, but you've got to figure out how to recover. So do you have solutions in that space, is that sort of more road mapping? You can talk about that a little bit. >> No, absolutely. So definitely we have concrete solutions with our Dell EMC PowerProtect data manager for Kubernetes. It's actually one of the first that was in the market to support cloud native environments. >> It is the first. >> Yeah, the first offering out there to support Kubernetes. And so the aspect there is that as cloud native has moved from DevOps, and now into production in the mission critical applications, now becomes the aspect of originally the DNA of DevOps was my data doesn't have to be persistent. Now when you move into a mission critical environment, you're entire environment needs to be protected. And to be able to bring those workloads back up should anything happen and to be able to protect that data that is critical to those workloads. >> Okay, and so you're saying you're first, and you see this as a differentiator in the marketplace, or is everybody going to have this, or it's one of these confusing ice cream cone of solutions. So why you guys? What's your big differentiation? Let's stick to containers. I have the same questions sort of overall come back to that. >> So great question, and the matter of fact is that with our experience across the edge, core and cloud, Kubernetes and containers will be prevalent throughout. And it'll be the way that applications will be developed. It's meeting the demands of the business and being agile. And I think that with our ability internally that would move to that agile emotion. We have that ability to address the customer's needs especially in the cloud native Kubernetes space. >> I think going back to what you said too about VMware, certainly our partnership there is differentiated. We even heard some echos of that during Vmworld. Pat Gelsinger usually doesn't give call outs on the main stage very frequently. And he said that they were working with us as a best-in-class partner for data protection with Tanzu. And so there is a very tight partnership there, so if I'm a customer and I'm looking at containers, I'm probably going to want to do it within the framework of VMware to start with. But it's important to point out that we're also not dependent on VMware. So we can still deliver protection for Kubernetes containers outside of say the VMware management domain. But I would say from a differentiation standpoint there are some real tight partnering going on to make these capabilities mature. >> Well it helps that your CEO owns 80% of the company. (laughing) But it's an interesting point you're making because again, dial back 10 years ago, VMware had much more of a Switzerland strategy under Maritz, almost to, at the time, EMC's detriment. I think Michael Dell is very clearly, as is Jeff Clarke, said look, we're going to do more integration. And Pat Gelsinger has been, look, I love all my partners. It's true but we're entering sort of a new era. And that integration is key, you know, again, because of the ownership structure, and your long history there. It's got to confer some advantages in the marketplace. >> Yeah, and he's also got to remove some of the headwinds to adoption of VMware cloud. And data protection, as we discussed often times can be a headwind if customers are concerned that they're not going to be able to protect their data, chances are they're going to stand pat for a while. So I mean you need to find ways to take some of those objections off the table. >> Yeah, and not to take anything away from your competitors. Look, it's an open API world, and again, people are going to compete. But at the end of the day this stuff is still really complex and if you can do some core engineering together it's definitely an advantage. Let's talk a little bit about cyber. I often say it's become a board level topic. It's not a matter of if, it's a matter of when. SecOps teams are overtaxed. I think I put out a stat lately, I got it from Robert Herjavec actually. He said think about this. The worldwide economy is 86 trillion and we spend .014% on cyber, that's it. We're barely scratching the surface. And that's part of the problem. Okay, but with that limited resource we have to be as smart as possible. You've got this ransomware coming in. So what are your customers asking you for and how are you responding? >> So it's interesting, right, because it is top of mind, cyber and cyber attacks, and it takes many forms. The attacks can be malware, they could be encryption, they could be deletion. Which is ultimately the worst case scenario. And I think as you go forward and you look at it cyber is the number one concern for any CIO, CISO or anyone that's worried about their security infrastructure. >> Which is everybody >> Which is everybody, right, exactly. I think that we have delivered for the cloud data protection area a first and best offering with an air gap data protection solution. So inherently, we can insulate and protect our customer's data from cyber threats. So when a ransom event occurs you can recover your data without having to pay that ransom. Or not be concerned that in most severe cases your data gets deleted. I think most recently there was a healthcare provider who was threatened about their data being deleted. And that was the worst case. We were able to protect their data in the sense that with our cyber recovery offering they protected their data in an air gap vaulted solution. And they didn't have to pay for that ransom. >> So what I'm hearing from you guys is okay, cloud, very important. Hybrid cloud, multi-cloud, fundamental to our strategy. VMware, they say bet on sure things. VMware is pretty much a sure thing. Large customer base, leader in the space. And then cyber as a key concern of customers, you want to expand the notion of backup and data protection to really point it at cyber as well. >> Absolutely, in fact with this recent research, it's called the Global Data Protection Index Survey and we just refreshed it. And what customers identified as the most compelling reasons to adopt cloud is for better performance, better data protection, and better security. Not necessarily in that order but those were the top three. So we look at that and say, you know we've got plays there. Certainly we have capabilities protecting workloads in the cloud whether they be virtual machines, cloud native, containers. But the security aspect of it is huge. Because oftentimes customers, and Dave, you and I were talking about this, they make some broader assumptions about once data is in the clouds they can kind of wash their hands and walk away. Not so fast, because certainly there is a shared responsibility model that extends not only to data protection, but also to security. Look, don't get me wrong, the cloud service providers have fantastic security capabilities, have a great perimeter. But as you said, it's not a question of if, it's a question of when. And when something happens, are you ready for it? So these solutions extend not only to on-prem but into the cloud. So it's that ability wherever the workload lives that you can get the right protection and what we're really now referring to as safeguarding data. Because it's a combination of data protection and security that's embedded and doing it wherever the workload resides. >> I'm glad you brought that up Colm. I have a follow up on that, but Nelson, did you want to add something? >> Well, I just want to mention that one of the biggest concerns is making sure that that data you vaulted is actually clean and safe. So we have a cyber sense capability within our cyber recovery product, that when you vault that data it does about 100 analytics on that data to make sure that there's no malware. That it's not infected. And it does it automatically and even on incremental using machine learning. >> That's really important because mistakes happen really fast. (laughing) So if you're vaulting corrupted data, >> What do you do? >> Oops. >> Yeah, exactly. >> I want to come back, I think the shared responsibility model is not well understand and there's a lot of confusion in the industry. At a conference this year, AWS' CISO Stephen Schmidt was saying, look all this talk about security is broken it's not really productive. The state of security in the cloud is actually really good and to your point Colm, yeah, he's right about that. Then you hear Pat Gelsinger saying, he's told me many times in theCUBE security is a do-over. To my point, you know the 86 trillion. And so I kind of lean, when I talk to IT people what Pat is saying. So you say okay, where is the dissidence there? Well, the reality is is the cloud service providers and the shared security model, they'll secure the physical infrastructure. But it's up to the customer to be responsible for everything else. You know, the edicts of the organization are applied. We were talking to the CISO of a large insurance company and she said to us, oh no, shared responsibility means it's our responsibility. So you're not going to go after the cloud service provider, you're going to go after the insurance company, or the financial service institution. Their brand is the one that's going to get hurt. So that's misunderstood. My question, very long winded rant, but what role do you guys play in that shared responsibility model? >> Well, ultimately it comes down to the customer. And the shared responsibility model really is admissible, as you mentioned, right? And so at the end of the day, you as the customer own and are responsible to protect that data. So your data protection strategy, your cyber resilience strategy has to be sound. And it has to be secured by those that can actually do it across multiple distribution models and platforms, whether it's edge, core or cloud. Whether it's VM's, containers. It doesn't change. You're still ultimately responsible for it. >> I think maybe what you might be driving at the question, Dave, is empowering the customers to maintain control of their data. And having the tools in place so that they feel comfortable. And part of it too is moving more towards automation. Because as their applications grow, and as Nelson said, become more distributed, as the data grows exponentially, this just fundamentally isn't a task that humans can manage very much longer. >> I'm glad you brought that up, because you ask a CISO, what's your number one problem? And he or she will tell you the skill sets to keep up with all this complexity. And that's where automation comes in. >> Correct, it does. So that's where we're taking it. Is trying to make things more automated and take tasks away from humans that they just can't keep up with. >> All right guys, I'll give you the last word. We go back a decade or so ago and backup was a whole different situation. And we saw the rise of virtualization and now cloud and all these other things that we have been talking about. Edge, the cyber threats, et cetera. So bring us home, where do you see the future and how does Dell EMC data protection fit in? >> It's an exciting time, it really is. It's kind of like the coming of that second storm as you mentioned. Businesses have that demand of needing more services to load more quickly in an agile fashion. And as they pair that with the growth of their data which is distributed, they really have that challenge overall of how do I manage this environment? So you have to have the observability to understand where your data is and to be able to monitor it. You have to be able to orchestrate your workloads so that they're automated, and the data protection of those workloads are automated as well. And so the imperative that aspects like Tanzu are addressing with cloud native, that Kubernetes brings to the table to deliver containerized applications. That's really quite honestly is the biggest evolution I've seen in my last 20 to 30 years. This is definitely a different paradigm shift. >> Yeah, you know, six months ago I was with a competitor and was taking a look at EMC, sorry, I should say Dell EMC, and I was wondering, should I make a move over here? And really what convinced me was the fact that the company was willing to basically solve internally the innovator's dilemma. You're making so much money on your existing portfolio, now you're going to start investing in what appears to be almost internal competition to your portfolio. It's not, it's complimentary. So that's what drove the decision for me to come here, but I will also say it's great to be a part of an organization that has a long-term vision. You remember, I think the phrase that was being used, being held captive to the 90-day shot clock. You know, the earnings reports and stuff. And that drives behavior. Well, if your organization is looking at decade-long goals, that means that you can actually plan to do things that over time are going to actually bring real value to customers. So I think we're doing the right things. We're obviously innovating, we're on this agile software development cadence gives us the ability to solve the problems incrementally over time so customers can see that value instead of waiting for large batch releases. But is also gives us the ability to say, hey, when we've made mistakes or when we hadn't seen certain things come around the corner, we're agile enough to change with that. So I think the combination of having that vision and putting in the investments, and we've kind of likened ourselves to the biggest startup in the industry with the backing of a Fortune 50. And so from a customer standpoint you got to look at that and think, you know, that's interesting, because I need to solve my current problems today. I need to have a path forward for the future. And who am I betting on to deliver that? And the other thing I'll leave on is customers are trying to work with fewer suppliers, not more suppliers. Because they want to reduce the complexity. Well who has the ability to not only bring data protection to bear, but a whole portfolio of technology is really end to end. That can snap into those environments to again reduce complexity and drive more business value. >> That's a really interesting point you make about consolidations. Ever since I've been in this industry people want to deal with less suppliers and reduce the complexity. But you still see startups and VC's funding things. And what's happened is this consolidation, the big guys, you guys are the biggest consolidator. And I always say the rich get richer. There's always this tension between sort of, do I go out and buy the spoke, best of breed tools, or do I get them from somebody who can help me across the portfolio? That's really where your strength is. Guys, thank you so much. This is really a very important topic. Data protection is one of the most important areas that we've been covering. I've been reporting on it a lot. As I said, a lot of venture money has been flowing in. So I really appreciate you guys coming in, sharing your perspectives. And best of luck in the marketplace. >> Appreciate it, Dave. >> Thanks, this was great. >> You're welcome. All right, and thank you for watching, everybody. This is Dave Vellante for theCUBE. We'll see you next time. (upbeat music)

Published Date : Feb 11 2020

SUMMARY :

From the SiliconANGLE Media office that the firm is not likely You got the biggest market share. and knowing the experience Some of that was we hope that the growth in cloud So how are you specifically addressing And the other aspect of that is consistency. so that we can give you is that we want and deliver the ability Is that the right way So the reality started to evolve. Yes, so the compatibility matrix, So now it's having that feature and functionality One of the things we obviously paid attention to And it's going to grow that way. So do you have solutions in that space, It's actually one of the first that was in the market And so the aspect there is that in the marketplace, or is everybody going to have this, and the matter of fact is that I think going back to what you said too And that integration is key, you know, again, some of the headwinds to adoption of VMware cloud. And that's part of the problem. And I think as you go forward and you look at it And they didn't have to pay for that ransom. So what I'm hearing from you guys as the most compelling reasons to adopt cloud I'm glad you brought that up Colm. is making sure that that data you vaulted So if you're vaulting corrupted data, Their brand is the one that's going to get hurt. And so at the end of the day, And having the tools in place And he or she will tell you the skill sets that they just can't keep up with. So bring us home, where do you see the future the coming of that second storm as you mentioned. the ability to say, hey, when we've made mistakes And best of luck in the marketplace. All right, and thank you for watching, everybody.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavePERSON

0.99+

Dave VellantePERSON

0.99+

Pat GelsingerPERSON

0.99+

AWSORGANIZATION

0.99+

Jeff ClarkePERSON

0.99+

PatPERSON

0.99+

EMCORGANIZATION

0.99+

AWS'ORGANIZATION

0.99+

80%QUANTITY

0.99+

.014%QUANTITY

0.99+

Dell EMCORGANIZATION

0.99+

February 2020DATE

0.99+

ColmPERSON

0.99+

NelsonPERSON

0.99+

90-dayQUANTITY

0.99+

86 trillionQUANTITY

0.99+

Colm KeeganPERSON

0.99+

DellORGANIZATION

0.99+

48 percentQUANTITY

0.99+

70%QUANTITY

0.99+

todayDATE

0.99+

2022DATE

0.99+

Michael DellPERSON

0.99+

GoogleORGANIZATION

0.99+

1,000 customersQUANTITY

0.99+

Nelson HsuPERSON

0.99+

Stephen SchmidtPERSON

0.99+

VMwareORGANIZATION

0.99+

two expertsQUANTITY

0.99+

one consoleQUANTITY

0.99+

Robert HerjavecPERSON

0.99+

500,000 customersQUANTITY

0.99+

firstQUANTITY

0.99+

TanzuORGANIZATION

0.99+

Boston, MassachusettsLOCATION

0.99+

bothQUANTITY

0.99+

over 1,000 customersQUANTITY

0.99+

oneQUANTITY

0.98+

six months agoDATE

0.98+

DevOpsTITLE

0.98+

OneQUANTITY

0.98+

one environmentQUANTITY

0.98+

Dell TechnologiesORGANIZATION

0.98+

over 2.7 exabytesQUANTITY

0.98+

about a half a billion dollarsQUANTITY

0.97+

vSphereTITLE

0.97+

this yearDATE

0.97+

PowerProtectTITLE

0.96+

about 100 analyticsQUANTITY

0.96+

SwitzerlandLOCATION

0.96+

VmworldORGANIZATION

0.95+