Image Title

Search Results for Cosby:

John Maddison. Fortinet | CUBEConversation, July 2020


 

>>From the cube studios in Palo Alto, in Boston, connecting with thought leaders all around the world. This is a cute conversation. >>Everyone. Welcome to the cube conversation here from our Palo Alto studios. I'm John furrier, host of the cube. We're here with our remote crew, getting all the interviews, getting all the stories that matter during this time were all sheltering in place during the COVID crisis. We've got a great returning guest, John Madison, EVP of products and chief marketing officer. Fordanet John. Great to see you, uh, looking good with the home studio. They're getting used to it. Yeah, indeed. Good to be here again, John. Thanks for coming. I really appreciate it. We're hearing a lot about sassy, which has a secure access network adjuncts, zero trust network access. Uh, what does that all mean now these days? What does this sassy? Well, there's definitely a lot of hype around the word sassy, which is the security of the age. Uh, for us actually it confirms a strategy that we've had since the beginning of the company. >>And two important concepts. One is, uh, the coming together of, uh, networking and security. We could refer to it as security driven networking, and we've been doing it using ACX and appliances for a long time. Uh, we're now going to expand it to a cloud as well as that's one concept, again, bringing together networking and security or converging them in a way. And then the second concept is more around a platform approach. So if you look at the definition of sassy, it includes, it includes web gateway as a service you a trust Caz B, a wife, et cetera. And so bringing those together in a platform approach, we refer to it as the fabric. So we're actually really happy about those two concepts coming together. Maybe the name itself could be, could be different, but definitely the concepts and the technologies play really well to our strategy. >>Yeah, it's sassy. S a S E not two ways, not like SAS softwares of service. Wait for one noses cloud. Yeah. I tried using the full name and I've reverted back to sassy again. So short and sassy, keep it short and sweet. Um, okay, well this is a super important relevant topic for multiple reasons. One is COVID is kind of accelerated the future for everybody. And you know, we've been kind of riffing on Twitter and throughout the industry I've been calling it the big IOT, uh, experiment because the unforecasted disruption of COVID is forced everyone to work at home. So the notion of work changes workplace is now home workforce, the people, how their interaction with the networks, workloads, workflows, all changing new expectations, new experiences. This is the real deal. And the edge is where the action is. That's the big, new obvious architectural highlight here. >>Yeah, so we talked last time. I think it would just be getting this work from home, uh, element, but, um, we're still here. And I think what it says is that what is forced is that, uh, enterprises and customers need to look at their edges and they're increasing. So we always, the one edge was a new one over the last two years. As we introduced us the, when they had a data center edge, they had an endpoint edge and now you have a home edge. And so you've got to apply security as a cloud edge as well. You've got to apply security to these edges. And the key is the flexibility to apply the security you want and you need against this agent. And so we're seeing some customers right now, look at setting up mini enterprise networks to protect that home age again, in that, in the homes of their executives or developers. >>And we reported with the news. You guys had a couple of months ago around just as such been a feeding frenzy for hackers and bad actors to go after the home environment. Um, as well as the it guys who are working from home, you have the cloud consumption's shifted as well. You're seeing the cloud players doing extremely well because now you have more cloud, you have more vulnerabilities at the edge with the home. This is changing completely increasing the attacks. >>Yeah. The tack factors, you know, predominantly, still actually, you know, a lot of fishing, but then if you're on the network, that attack factor is very important. So for us, and, you know, we did an acquisition last week of opaque networks because that gave us an additional consumption model and different additional form factor. So if somebody going from the home straight into the cloud, or the pairing off a branching off an SD Wang connection straight into the cloud, we can now apply that cloud edge security throughout our sassy capabilities. And so again, the ability to have security at all, these edges has become very important going forward. So for us now we've got appliances, we've got virtual machines, we've got cloud delivery, and this is becoming very important to customers. I'm not saying, and customers are not saying they're going to go to just cloud only going forward. They're going to be hybrid. And so having those options is very important. >>You mentioned opaque networks, we reported that acquisition. Congratulations. What does that mean for Fordanet and where does that technology fit? And you mentioned software. Can you just take a minute to explain the acquisition impact Affordanet and where does the tech fit? >>Well, as I said, we've been driving a lot of this conversion, sassy conversions through our appliances. Um, but it's sometimes makes sense to put that security closer to the cloud during points or wherever. And so opaque, we really liked their model of building out these hyper hearing stations and making sure they got high-speed security there as well as edges. And so, um, we bring, we're going to bring that inside our environment, uh, update it to include some of our technology, uh, but it gives us now great flexibility, uh, of applying that security at the SD wan edge, the data center agent now without edge or longer-term roadmaps will integrate orchestration capabilities. It also includes a zero trust network access capability as well. So really when we looked at our, uh, of sassy framework, uh, we had most of the things in place. This now adds firewall as a service as well as zero trust network access, giving us the most complete sassy framework in the marketplace. >>What is the security component of the work at home? You mentioned earlier, there's more networks and companies are looking to kind of up level the capabilities. Can you give an example and take us through what that like and what companies are thinking about, because it's not just, here's some extra money for your home bandwidth, your people are working there. It's like, it's gotta be industrial strength edge. Now it's not just, um, you know, temporary and their kids are home too. So you got they're gaming, they're watching Netflix, people zooming in and doing WebExes all day long. >>Yeah, it can be as simple as putting a zero trust network access, you know, an agent on there and doing some security locally, and then going back through a proxy in a, we believe actually that it's, it can be even better than that. That can apply many enterprise security in your house through a next gen firewall, give high availability through SD wan, uh, then, you know, expand out their secure access and switching and end points. And we can do that today. I think what's going to be key going forward is as you're dealing as it, uh, teams have to deal with more of a consumer approach remotely in the homes, we're gonna have to simplify the way things get set up, such that you can easily separate out, maybe home usage from corporate enterprise users. So that will be something we'll be working on over the next 18 months. >>I mean, just the provisioning, the hardware, okay, here you go. Plug it in it. Should it be plug and play? And this is kind of back to the future of where SAS is going. I mean, the old days was plug and play was the technology. Now you've hit that concept. It has to be auto configured. You have to provision pretty quickly. What's the future of sassy in your mind. >>Yeah. And so, you know, if you think about, you know, coming back to the home usage, then people have dumbed down those routers and the security is very simplistic. So we, people can just plug and play. If you, it needs to be a bit more sophisticated. Uh, you're going to need to put some tools in place. We believe longterm that the sassy model, once you've got the platforms in place, once you've got SD wan in place, your Cosby or your sassy zero trust and longterm, you're going to need an orchestration system. That's more AI driven. So we've done a lot of work on AI around security and making sure we can see things very quickly. Um, but the longterm goal, I think will be around AI ops, AI network ops, uh, where the system and the big data systems are looking across your network, across these different components to see where there may be an issue. Maybe there's a certain length has gone down across a certain ISP. We need to bring that back up. Maybe there's a certain cure or as to an application in the cloud somewhere. So we need to change the OnRamp. Uh, so once everything's in place and you have that console and policy engine that can look across everything, and then we need to get smarter by looking at the data and the logs, et cetera, and applying some of that AI technology. >>You know, John, we've been following Fordanet as you know, for many, many years and watching the evolution of you guys as a company. And also as the industry, the new waves are coming in. Um, a lot of the stuff you're doing with the fabric and now the secure driven networking has been kind of on the playbook. So I want to get your thoughts before we get into those topics and define them and kind of unpack them. But generally customers are looking at, um, a slew of vendors out there and you have 10 of two approaches. You have a platform, and then you have the we're an application or fully full stack or SAS or something. And this there's trade offs between the two. And how should customers understand the difference? Because there's different value propositions for each platforms, more enabling out of the box, SAS or point solution can solve a particular thing, but it may not have that breadth. How should customers think about a platform approach or fabric and how should they think about the value and how to engage with that longterm? >>Yeah, I'm definitely seeing more customers look towards a platform going forward. They just can't manage all the different point solutions and you don't have to train an individual in that product. You have to have a separate management console, you have to integrate it. And so more and more I'm finding customers wanting to converge, which is the basis of sassy consolidate applications onto a platform of security applications. What's important over that platform is that the consumption model is flexible enough to be an appliance, to be a virtual machine and to be cloud delivery does as a customer's networks move and their orchestration systems move into different, more cloud, or they've got their IP enabling their factories, for example, then they need that security to be flexible. So yes, you need to be a platform as the way forward. Um, but two things. One is you need a flexible consumption model for it. You know, clients, virtual machine and cloud. And also that platform needs to be very open. It needs to have connectors into the main orchestration systems that needs to allow people to build API and automation. So, uh, yes, you, you need a platform, but it needs to be open and it needs to be flexible. >>Great, great insight there. And that's exactly what the marketing, especially with cloud the kind of scale, second follow up question to that is how do you tell the difference between a tool camouflage is a platform. So I have a tool I want to sell you a tool, but no, it's a platform. So a lot of people are peddling tools and saying their platforms. How do you know the difference? >>Well, to me, a platform that has much greater scope across the attack surface festival, they attack factors whether that be email or application the network, the end point. So platforms not just of a specific attack back to go across the complete surface. And then also a platform is Wednesday organically built, allows those products to communicate. So then you can build automation across it. It's very hard to build automation across two or three different vendors. They have different scripts. So been able to build that automation. And then of course, on top of that, to have a single view, single visibility capability, as well as longterm applied that AI ops across it. So platform is very, very different from the, some of the tools I've seen in the marketplace. >>I want to get to your reaction to a comment that your CEO said about security driven, networking, and underscores what we've been saying for years, blah, blah, blah. He goes on in this era of hyperconnectivity and expanding networks with the network edge stretching across the entire digital infrastructure, um, networking and security have to be kind of be their, their convergence. You mentioned describe how you view hyper-connectivity and expanding networks and how the edge stretches across the digital infrastructure. What's what does that look like? Can you share your vision of that? >>Well, when you think about networking, if you go back 20 years, when you have these 10 megabit per second connections, learning, networking, and routing and switching, they haven't really changed that much over the last eight years, 20 years, they've just got a lot faster, gone to now to 400. You give us a second, but the basic functionality is the same. And so it's allowed them to go a lot faster. Um, security is very different, even though it started off with firewalling than VPN, and then next gen firewall, SSL inspection, all these functionalities IPS have been added, making a lot harder for it to keep up in the network. And so one of the fundamental principles of security and networking is bringing these two things together, but accelerating them either using a six and now cloud through our acquisition, uh, to allow those to run in a converged format. >>And that's very important because as I said, there's now more, you can look at it two ways. You can say the perimeter has expanded because it used to be a very narrow perimeter. The data center across these areas, or at the edges have formed as well. There's new edges sitting at the OT environment, sitting at the wan edge, sitting at the home mattress. I talked about seeing the cloud edge. And so the ability to apply that security in very high performance, very high quality security, not just a small sampling of security, a full enterprise stack, but those edges is going to be critical going forward. And the flexibility to apply in different ways is going to be very important. >>I think the convergence piece is totally relevant and honestly it consolidating into a platform is very key point there. Um, while I got you here, I would just like you I'd like you to define what is security driven networking and what does it mean to be security driven? So define security, driven, networking, and give an example of what it means. >>Yeah. And so I think it's, I think the one edge was one of the best examples of it. I mean, actually go before that next gen Fila was where you bought firewalling and then content inspection to go there. But I think the latest one is definitely the one edge or secure SD land where you had a networking function, which was to get the users to the right applications. And so they got this application now steering that goes out through there. Well, you also want to apply security to that because security into the wham, you've also got to protect the land. And so the ability to run a security stack there, whether it be IDs, right, patient control is very important. So getting all those networking functions, working at high speed, getting all the security functions, working at high speed, uh, is that it's the kind of the Genesis of security driven networking, and you can apply it there. We can also apply it in other places at the age, in the cloud. Now the home, uh, it's a very, very important concept, uh, to be able to run networking and security together. But high speed, >>Everyone has their own kind of weird definition of sassy, depending on when you're building your own or different analyst firms. Uh, I noticed you guys have a different take on this. Even Gartner has a different view on this. How do you guys diff differ from that, that definition and what should people be aware of when they hear that? What is the right definition? >>Yeah. You know, it's unfortunate. I mean, I think Ghana does some good work there and that they define it and I've come up with sassy, but this is like acronym soup. And, you know, I want a bit of next gen firewall on my sassy. It's just, it's just so many different terms. It confuses the customer. Then what makes it more confusing is that vendors look at their portfolio and go, Oh, sassy is a hot topic. I've got a sassy as well. And really, it should be very clear what the definition from Gardner is. It is bringing together security and networking. Now their definition is that they, uh, you should do that in the cloud, which we agree with as well, but it can only be in the cloud. The reason it's in the cloud is because not many people have got the ability to run on an appliance very fast. >>So we believe our different stairs that you should be able to run it on an appliance virtual machine in cloud. And then the second kind of differences that they've defined the components of Sassies being Estee, wagon, Cosby, firewalls, a service zero trust. We also think that the land age is very important. So we would add into that definition, that secure access of wifi and Ethan at switching as well. And so we try and point out, you know, the gun definition and we also point out where we differ and I think that's fair to the customer can make a good decision. >>I think it is fair. And I think one of the things I've been saying for years, and I love garden, I love the guys over there and gals. I just don't think that their business model is real time as much, but they ended up kind of getting it right down the road. But you brought up a good point. And again, I've been saying this for years, cloud changes Gartner's model because there's, if you have quadrants, it implies silos and implies categories. And one of the best things about cloud is it does horizontally scale. So some of the best vendors actually have multiple capabilities that might fall on different quadrants that may or may not be judged on a criteria that meets what cloud's doing. So, yeah, for instance, Asics, you mentioned right. That's in there too. You get cloud and ACX is that where they've got two different categories? You add the edge in there. If you do all three, really great as an integrated, converged and consolidated platform, you're technically awesome, but you might not fit in the quadrant. >>Yes. That's a really good point. I have this conversation with them all the time in that traditionally enterprises have a networking teams and security teams, and they've been in silos or I've had a networking team that just does switching or just this routing, just this SD wan. And I have a security team that does web gateway, and then they like to separate them all into different components. When you look inside those Nike quadrants, they're all different, even at the same vendor, the different products. And what we like to do is bring it all together. You a single operating system, a single appliance or cloud virtual machine. Sometimes it's not quite, it doesn't quite fit the model, but in the end, you're trying to do the same thing. Know, and COVID-19 >>One of the real realities that everyone's dealing with is it does expose everything and an expose. And again, it's been a disruption unforecasted, but it's not like an outage or a flood or a hurricane. If it happened and it's happening, it really puts the pressure on looking at the network. It's looking at how you can have continuous operations. How are you working with your people and workloads, workforces apps. You got to have it all there. And if you're not digitally enabled, you're going to be on the wrong side of history. This is what companies are facing every day. And they've got to come back and double down on the right project. So every CXO I talk about, that's the number one challenge I need to come out of the pandemic with a growth strategy and an architecture. That's going to allow me to take advantage of the new realities. Hey, it's really good for people to work at home. That's cool. Some people are going to continue to do that. Maybe that's normal. Maybe that's a new tactic >>And it's going to vary by industry as well. So if I'm a retail outlet, I absolutely need it 100% of the time, but those retail outlets cause people are ordering online and then they're driving up. And so it has changed the dynamics. It's for me working at home, I have to be on all the time. And so the ability to do really good, high quality networking, high availability, high IQ of as, with this integrated security across the different edges is super critical. >>I was talking with a network friend of mine. Again, we were having a few zoom cocktails and do a little social networking online. And we were like, and we've, and we've mentioned it before in the queue, but we keep coming back to the land is the new land. And meaning that it's in the old days, land was everything, everything, the local area network, and you were inside the data center, everything was great on premises. When is the new land? So if you think about it that way you go, okay, when edge I got a, now Atlanta at home, you got to SD wan and your house, of course you worked for Fournette. So it's a little bit beneficial for you, your, your, your, your geek there, but this is the new normal where it's all one network. It's not just a land link, it's a system. Can you react to that? What's your take on that? When is the new land kind of ref, >>First of all, it can't be too picky. He goes on the CMO as well. So there's no talk about the geekiness. Um, but, um, it's just, it just makes as a skip saying, it's, it's, it's making sure that wherever you may be, uh, you know, you're doing less traveling these days, but that may come back at some point or where they are at a branch office or a campus environment or wherever applications, and then moving around in different clouds, in different areas, in terms of consumption of workloads, um, wherever that's happening, you gotta be able to be flexible and applying that security to the different edges, land edge, one edge home edge data center edge. And so the ability to do that, uh, while providing high speed and connectivity, uh, is very important. And then again, as you go forward and you implement that platform approach. So not just the point product now, three or four products working together, uh, being able to apply that policy orchestration and AI ops is going to make sure that they get that user in the end. It's all about the user experience. Do I have a high quality of experience, whatever application I'm using? That's the key measurement in the end? >>You know, one observation I would have, if you look back at the whole virtualization trend, going back to the early days of VMware, that kind of enabled Amazon and kind of having a large scale kind of infrastructure, hyperconvergence really kind of collapsed everything together. And now you seeing things with Amazon, like outposts, you seeing, you know, these non premises devices, which is basically one cloud operations kind of highlights what you're saying here. And I want to get your thoughts on this because the combination of Asics with cloud, it's not a bug, it's a feature for you guys. That's a value proposition and it's kind of consistent with some of the big players like AWS. When you look at what they're doing and apprenticeships, for instance, what they're putting in the servers, having that combination of horsepower Asex with cloud is a guiding principle of the future architecture. Can you share your thoughts was also, you guys are, are announcing that and have that feature. >>Yeah, well, w another reason why I like the opaque acquisition as they were their major appearing pubs into the different cloud service providers that were using hardware and that hardware, uh, we, we can run hardware and with our Asics almost 50, a hundred times faster than equipment CPU. So I've got a firewall application I've gone on appliance. There, I may need a hundred virtual machines and, and CPU they're running the same thing. So again, we're coming back to our definition of security driven, networking in our minds. It can be basic, it can be virtual machine and it can be cloud. Now, imagine if we can take the best benefits of basic and combine that with cloud, uh, that's a great model going forward again, given that flexibility. So when people think cloud something has to run on something, it doesn't run in fresh air. So, you know, the big cloud vendors are putting in some Asex to accelerate some of the AI stuff, and we're going to use the same thing in some of our major, what we call 40 sassy. You know, our naming methodology is 40, whatever it does or going forward to provide us that performance and high availability now. Yeah. So you're always going to need some flexibility of virtual machines in certain areas, but we think the combination of both, it gives us a great advantage. Yeah. >>And there's definitely evidence that, I mean, there's a, there's kind of two schools of thought on hardware. Are you a box mover, you know, commodity general purpose, or are you using the hardware and a system architecture, acceleration has been a huge advantage, whether I've seen companies doing accelerated Kubernetes processing, you know, for clusters and some, you know, see GPS are out there. It's, it's, it's how you use the hardware. Yeah. That's the, really the key it's and again, back to the architecture. So, okay. So wrapping up, if you, if you believe that, and you look at the fabric that you guys are having out there, and as it evolves, what's the, what's the next level for 400. How do you see this going forward? You've got security driven networking, and you got the fabric. What's next? What are you guys working on the product side? >>I know you're public, you can't reveal any future earnings, but give us a taste of kind of the direction on the roadmap. I think, you know, we've got now all the, all the kind of component that underlying components of the platform in terms of the ability to apply appliances, deliver it by appliances or virtual machine or cloud. Um, we've got a very broad portfolio from endpoint, uh, all the way into, to the cloud and the networks, all those things that are in place. Obviously you always need some features here and there as you go forward and nest it when and next gen firewall, et cetera. Um, but I think the longterm, I think a goal for his nine is to, again, to apply a bit more intelligence, uh, both from a security perspective and from a network perspective, such that we can predict things, we can automatically change things. >>We can build automation and react to things much more quickly. So I think the building blocks are in place. Now. I think it's the ability to provide a bit more smarts across it, uh, which of course takes big data and very specific application programming. And I think, uh, definitely our customers are asking us about that. And we look very closely with our customers to build out that, to make sure it meets their needs going forward while it's great to see the platform continue to grow and, and fill in a holistic view of the, of the landscape from edge to throughout the enterprise. So a great strategy and thanks for the update, John Madison, the VP of product and CMR for that. John. Great to have you on. Thanks for coming on extra. Okay. This is the cube conversation here in Palo Alto studios. I'm Chad for a year hosting the cube. Thanks for watching.

Published Date : Jul 30 2020

SUMMARY :

From the cube studios in Palo Alto, in Boston, connecting with thought leaders all around the world. I'm John furrier, host of the cube. So if you look at the definition of sassy, it includes, And you know, flexibility to apply the security you want and you need against this agent. You're seeing the cloud players doing extremely well because now you have more cloud, And so again, the ability to have security at all, And you mentioned software. Um, but it's sometimes makes sense to put that security closer to the cloud during points or wherever. So you got they're gaming, uh, then, you know, expand out their secure access and switching and end points. I mean, just the provisioning, the hardware, okay, here you go. and you have that console and policy engine that can look across everything, and then we need to get smarter by And also as the industry, the new waves are coming in. You have to have a separate management console, you have to integrate it. So I have a tool I want to sell you a tool, but no, it's a platform. So then you can build automation across it. Can you share your vision of that? And so one of the fundamental principles of security and networking is bringing these two things together, And so the ability to apply that security in very high performance, very high quality security, Um, while I got you here, I would just like you I'd like you to define what is security driven networking And so the ability Uh, I noticed you guys have a different take on this. The reason it's in the cloud is because not many people have got the ability to So we believe our different stairs that you should be able to run it on an appliance virtual machine in cloud. And one of the best things about cloud is it does horizontally scale. And I have a security team that does web gateway, that's the number one challenge I need to come out of the pandemic with a growth strategy and And so the ability to do really good, high quality networking, And meaning that it's in the old days, land was everything, And so the ability to do that, And now you seeing things with Amazon, So, you know, the big cloud vendors are putting in some Asex to accelerate some of the AI stuff, you know, for clusters and some, you know, see GPS are out there. I think, you know, we've got now all the, all the kind of component Great to have you on.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

twoQUANTITY

0.99+

AmazonORGANIZATION

0.99+

John MaddisonPERSON

0.99+

AsicsORGANIZATION

0.99+

Palo AltoLOCATION

0.99+

100%QUANTITY

0.99+

John MadisonPERSON

0.99+

10QUANTITY

0.99+

July 2020DATE

0.99+

BostonLOCATION

0.99+

AWSORGANIZATION

0.99+

EthanPERSON

0.99+

second conceptQUANTITY

0.99+

GartnerORGANIZATION

0.99+

AtlantaLOCATION

0.99+

threeQUANTITY

0.99+

one conceptQUANTITY

0.99+

two thingsQUANTITY

0.99+

NikeORGANIZATION

0.99+

COVID-19OTHER

0.99+

two waysQUANTITY

0.99+

20 yearsQUANTITY

0.99+

bothQUANTITY

0.99+

OneQUANTITY

0.99+

AffordanetORGANIZATION

0.99+

last weekDATE

0.98+

two conceptsQUANTITY

0.98+

Fordanet JohnPERSON

0.98+

20QUANTITY

0.98+

each platformsQUANTITY

0.98+

FordanetORGANIZATION

0.98+

two important conceptsQUANTITY

0.98+

400QUANTITY

0.98+

oneQUANTITY

0.98+

todayDATE

0.98+

zero trustQUANTITY

0.97+

secondQUANTITY

0.96+

a secondQUANTITY

0.96+

second kindQUANTITY

0.96+

FournetteORGANIZATION

0.95+

one edgeQUANTITY

0.95+

sixQUANTITY

0.95+

almost 50QUANTITY

0.94+

single applianceQUANTITY

0.94+

three different vendorsQUANTITY

0.94+

TwitterORGANIZATION

0.94+

two different categoriesQUANTITY

0.93+

single operating systemQUANTITY

0.93+

FirstQUANTITY

0.93+

WebExesTITLE

0.93+

two approachesQUANTITY

0.93+

nineQUANTITY

0.92+

single viewQUANTITY

0.9+

COVIDOTHER

0.89+

a yearQUANTITY

0.89+

10 megabit per secondQUANTITY

0.88+

GardnerORGANIZATION

0.87+

GhanaORGANIZATION

0.86+

last two yearsDATE

0.86+

WednesdayDATE

0.85+

Caz BORGANIZATION

0.85+

pandemicEVENT

0.85+

two schoolsQUANTITY

0.85+

one networkQUANTITY

0.83+

couple of months agoDATE

0.83+

a hundred timesQUANTITY

0.81+

single visibilityQUANTITY

0.8+

AsexORGANIZATION

0.79+

SASORGANIZATION

0.78+

Breaking Analysis: CIOs & CISOs Discuss COVID 19 Budget Impact


 

from the cube studios in Palo Alto in Boston connecting with thought leaders all around the world this is a cube conversation CIOs and CISOs of industries that have been hard hit see significant near term and many permanent shifts to their IT and security strategies this was the consensus of four technology executives at leading companies that are feeling the brunt of the corona virus pandemic welcome to this week's cube insights powered by ETR my name is Dave Volante and in this breaking analysis we want to accomplish three things first we want to tap into a new piece of research from ETR it involves an intimate focus group like set up via an open discussion with leading technology executives we interviewed Eric Bradley the managing director of et ours then program and we'll bring him into this discussion the next thing we want to do is we want to drill in to the various sector commentaries from the four leaders third we're gonna comment an hour take try to add some color and then share with you some of the specific vendor commentary that was called out by the executives let's start by looking at what et our event is et our van is a roundtable discussion it applies a tried-and-true methodology similar to a focus group or in-depth interviews what we sometimes in the research business call ID is ETR invites execs in from its community to participate in a private but open conversation et our clients get to listen in the names of the execs and their companies are transparent but the cube is only allowed to refer to them generically as shown on this slide now we can validate these participants they are legit CIOs and CISOs some and very well-known firms now what I want to do is summarize the CIO and seaso sentiment from this then discussion the overall budget impact for these four organizations is very very severe essentially large project projects are being put on hold although digital transformation initiatives remain a priority there were really four significant areas of emphasis that were cited by these execs cloud-first on-prem is losing out to cloud SAS and of course remote access solutions in fact the best comment on the panel was as a service is saving our SAS traditional networking is shifting to SD win especially rigid MPLS networks securing endpoints and zero trust solutions are the winners and there are a number of vendors rising to the occasion that will talk about it let's see how Eric Bradley of ETR summarizes the venn to summarize what we're seeing here was the real winners and losers are clear not everyone was prepared to have it work from home strategy not everyone was prepared to send their workers out there VPN wasn't didn't have enough bandwidth so there was a real quick uptick in spending but longer-term we're starting to see that these changes will be become more permanent so the real winners and losers right now we're going to see on the losers side traditional networking the MPLS networking isn't a lot of trouble according to all the data and the commentary that we see it's expensive it's difficult to ramp up bandwidth as quickly as you need and it doesn't support remote ok what I want to do now is I want to take a look at some of the verbatim comments and I'll just I'll read them from this slide all spending is shut down 70% of big projects are cut all next-gen projects have been shelled the relationship with our SAS vendor has been a miracle we're accelerating from MPLS to sd when on top of secure gateway technologies these will win this was interesting our business continuity plans were way too DR focused essentially we weren't prepared now let's unpack the cloud first commentary and give you some additional color I feel like all we do around here sometimes is talk about the cloud but it's clear from the data in the ETR data set surveys and the venn that in other data from the cube that that the cloud is only going to be accelerated we said this in 2008 in the 2009 downturns have been good to cloud one of the execs literally said I would like to see my data centers completely deleted Wow let's listen to Erik Bradley's take on this comment I was also shocked about that comment that gentleman also stated that his executives outside of the eyeteeth area the CEO the CFO had never ever ever wanted to discuss cloud they did not want to discuss work from home they did not want to discuss remote access he said that conversation has changed immediately so we've been talking a lot about those aspects of people and process and technology that might be permanent post kovat and clearly you see c-level execs as having a bit of an awakening for things like cloud and work from home not that they didn't see them before but these things are gonna accelerate in our view I want to spend a minute talking about networks SAS and bring cloud again into the discussion I gotta say the panel members really trashed MPLS networks in a big way let me explain MPLS stands for multi-protocol label switching you find this type of infrastructure in big telecom networks and it's there to route traffic and pls is used to create dedicated and and essentially reliable connections it enables things like VPNs quality a service management traffic engineering or shaping but well MPLS is definitely cheaper than t1 it's more expensive than Ethernet now I came into prominence well before the cloud and these execs see it is as outdated and inflexible and this is where SD wind comes into play software-defined wide area networks they're gaining popularity especially with the Sassa fication of applications and of course the general trend toward cloud here's Eric Bradley again explaining what the panel members said from his perspectives winners there or in the SD web space it's gonna be impossible to ignore that going forward and some of our CIO and even CISO panelists said that change will be also we're seeing at the same time what they were calling a on on SAS and cloud now we know these trends obviously were already happening but there be they're being exacerbated they're happening even more quickly and more strong and I don't see that changing anytime soon that of course is at the expense of network sorry data centers whether it be your own or hosted which has huge ramifications on from on from Hardware even the firewall providers so and it really seems as if as networking refresh starts to come up and it's coming up with a lot of large in writes when your network refresh comes up people are going to do an RFP for SD web they are sick and tired of paying MPLS network vendors and they really want to look at something else that was even prior to this situation now what we're hearing is this is a permanent change I particularly had one person say I wanted to find this quote real quickly by then but basically they were basically saying that from a permanency perspective the freedom from MPLS will reduce our network spend by over half while more than doubling or tripling or bandwidth now the challenge of course is customers have multiple MPLS contracts with several different vendors and often they just rubber-stamp the renewal but what customers are gonna start doing is layering in SD win and letting those agreements expire ok I want to talk about secure endpoints in this notion of zero trust solutions as I've said in the cube many many times the idea of digging a moat around the castle doesn't protect your queen anymore because the Queen ie the data has left the castle so companies that can secure gateways and secure endpoints they are going to have more momentum during and post kovat now in the panel Z scalar came up a lot in this context as well as fortunate who as I've reported has done a good job in getting its cloud products to market and of course the et our data shows that fortunate and Z scalar both have strong net scores or spending momentum and fort net especially has really strong pervasiveness in the et our dataset as I've reported previously I've also analyzed that there's been evaluation divergence between Palo Alto Networks and fortunate and house II scalar as well is a disruptor in this space I want you to listen to what Eric Bradley said specifically about Z scalar in Palo Alto Networks roll the clip yes it is and I'm glad you brought up Z scalar to very recently by client request we did a very in-depth research on Z scale and versus Palo Alto charisma access and they were very interested this is before all this happened you know does Palo Alto have a chance of catching up taking share from Z scalar and I've had the pleasure myself personally hosting J the CEO of Z scalar at an event here at City and I have nothing but incredible respect for the company but what we found out through this research is Z scalar at the moment their technology is still ahead according to their and there is no doubt however there doesn't seem to be any real secret sauce that will stop palo alto from inching up so if I had to choose that in a year from now Palo Alto might have had a better chance so in this panel as you brought up Z scalar was mentioned numerous times as just the wave of the future along with Cosby brokers right whether you're talking about a net scope or a force point they're all those people that also play in The Cosby space to secure your access zero Trust is no longer a marketing hype term it is real and it is becoming more real by the week now I personally agree with Eric that palo alto is is definitely going to be in the mix customers that we've talked to they want to work with palo alto networks but there's a sea change going on and it's being driven by sass and cloud and now accelerating because a co vid of course that the trend of remote workers is we think here to stay now i want to end by talking about some specific vendor mentions in addition to the ones we've talked about already and this chart shows some of the vendors and their logos that were called out as either being really really helpful during the this pandemic or super important to the CIOs and CISOs these executives really stressed how thankful they are to these companies and that the fact that these companies have worked very closely with them they've been flexible on pricing and payments and they also specifically mentioned how off-put they were by you know this notion of ambulance-chasing for example trials that required them to make some kind of commitment or swipe a credit card they just don't have time for that right now and then of the patience for it now let me call out a few of the companies that were cited in a positive light look at microsoft is all for the ETR data set in so many sectors Microsoft teams security solutions cloud really came up a lot on on this ven IBM was mentioned as being a great partner as what's oracle many many times we talked about fortunate and Z scalar already Cisco was called out as a strategic vendor was very helpful both the networking and with Cisco teams for collaboration CrowdStrike came up a number of times from CISOs as did Trend Micro and carbon black got a mention that's the VMware acquisition insecurity of course MobileIron that makes sense as well because they're securing and managing remote worker devices now finally interesting Lee Salesforce was brought up many times as a critical vendor one exec said that before coronavirus multiple workers could share a Salesforce license by you know sharing passwords but with the spike and work from home they had to purchase more licenses now one last thing that I want to bring up is start ups I got this question the other day from a client who said how a start-ups fair you might think that in this climate especially among for hard-hit customers that there might be risk-averse as it pertains to using startups once cio however said the following paraphrasing you always hear about the guy that says we'll pick three companies in the upper right hand corner the Gartner Magic Quadrant will test them out and this C so said that one of the things that he's always done is picked two from the upper right and one from the lower left one of the emerging techs and he gives them a shot let's listen to how Eric Bradley describes this dynamic roll the clip it's a great comment and honestly if you're in charge of procurement you'd be stupid not to do that not only just to see what the technology is but now I can play you off the big guys because I have negotiating leverage and I could say oh well I could always just take their contract so it's silly not to do it from a business perspective so it's really interesting and somewhat non-intuitive these comments on startups which of course means despite all the consolidation and acquisitions that you see in the industry you know there's still gonna be a lot of fragmentations a fragmentation especially as I've said many many times in the security space people still want best to breed and innovation and if it can drive business value they're gonna they're gonna go for it ok so look I realize that these are narrow comments from for CIOs and CISOs but they give us some added texture and flavor and color to the core ETR data set and we're going to continue to report on these trends and share more details as they become available both from the ETR data set and from other vents and remember we're gonna be digging into the latest ETR survey over the over the coming weeks as ETR exits its self-imposed quiet period so you can always check out ETR dot plus I publish weekly on wiki bang calm and on Silicon angle calm and of course our YouTube library has all these videos that's youtube.com slash silicon angle by the way these segments are also available as podcasts you can DM me or tweet me at devil ante and please by all means comment on my LinkedIn posts or email me at David Galante at Silicon angle com always appreciate the feedback thanks for watching everybody this is breaking analysis brought to you by the cube powered by ETR this is Dave Volante and we'll see you next time thanks for watching [Music]

Published Date : Apr 17 2020

SUMMARY :

that the cloud is only going to be

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Eric BradleyPERSON

0.99+

Dave VolantePERSON

0.99+

2008DATE

0.99+

Erik BradleyPERSON

0.99+

Eric BradleyPERSON

0.99+

David GalantePERSON

0.99+

70%QUANTITY

0.99+

MicrosoftORGANIZATION

0.99+

2009DATE

0.99+

Palo AltoLOCATION

0.99+

CiscoORGANIZATION

0.99+

twoQUANTITY

0.99+

IBMORGANIZATION

0.99+

EricPERSON

0.99+

ETRORGANIZATION

0.99+

microsoftORGANIZATION

0.99+

CosbyORGANIZATION

0.99+

palo altoORGANIZATION

0.99+

YouTubeORGANIZATION

0.99+

BostonLOCATION

0.99+

Palo Alto NetworksORGANIZATION

0.99+

three companiesQUANTITY

0.98+

Trend MicroORGANIZATION

0.98+

first commentaryQUANTITY

0.98+

oneQUANTITY

0.98+

Palo Alto NetworksORGANIZATION

0.98+

four leadersQUANTITY

0.97+

Z scalarTITLE

0.97+

bothQUANTITY

0.96+

Palo AltoORGANIZATION

0.96+

one last thingQUANTITY

0.96+

one personQUANTITY

0.95+

firstQUANTITY

0.95+

JPERSON

0.95+

this weekDATE

0.94+

Z scalarTITLE

0.93+

pandemicEVENT

0.92+

PaloORGANIZATION

0.92+

an hourQUANTITY

0.91+

GartnerORGANIZATION

0.91+

over halfQUANTITY

0.91+

thirdQUANTITY

0.91+

AltoORGANIZATION

0.9+

three thingsQUANTITY

0.9+

LinkedInORGANIZATION

0.9+

youtube.comORGANIZATION

0.87+

carbon blackORGANIZATION

0.86+

corona virus pandemicEVENT

0.86+

ZORGANIZATION

0.86+

a minuteQUANTITY

0.86+

four technology executivesQUANTITY

0.84+

SalesforceTITLE

0.83+

one ofQUANTITY

0.81+

waveEVENT

0.8+

futureEVENT

0.79+

Silicon angle comORGANIZATION

0.78+

Lee SalesforcePERSON

0.78+

thingsQUANTITY

0.77+

coronavirusTITLE

0.76+

a yearQUANTITY

0.75+

CEOPERSON

0.75+

CFOPERSON

0.7+

MobileIronTITLE

0.7+

many timesQUANTITY

0.68+

Silicon angleORGANIZATION

0.67+

more than doublingQUANTITY

0.64+

zeroQUANTITY

0.64+

SASORGANIZATION

0.62+

four organizationsQUANTITY

0.62+

QueenPERSON

0.61+

ZTITLE

0.6+

zero trustQUANTITY

0.6+

devil antePERSON

0.59+

scalarTITLE

0.58+

wikiTITLE

0.57+

Magic QuadrantCOMMERCIAL_ITEM

0.55+

Around theCUBE, Unpacking AI | Juniper NXTWORK 2019


 

>>from Las Vegas. It's the Q covering. Next work. 2019 America's Do You buy Juniper Networks? Come back already. Jeffrey here with the Cube were in Las Vegas at Caesar's at the Juniper. Next work event. About 1000 people kind of going over a lot of new cool things. 400 gigs. Who knew that was coming out of new information for me? But that's not what we're here today. We're here for the fourth installment of around the Cube unpacking. I were happy to have all the winners of the three previous rounds here at the same place. We don't have to do it over the phone s so we're happy to have him. Let's jump into it. So winner of Round one was Bob Friday. He is the VP and CTO at Missed the Juniper Company. Bob, Great to see you. Good to be back. Absolutely. All the way from Seattle. Sharna Parky. She's a VP applied scientist at Tech CEO could see Sharna and, uh, from Google. We know a lot of a I happen to Google. Rajan's chef. He is the V p ay ay >>product management on Google. Welcome. Thank you, Christy. Here >>All right, so let's jump into it. So just warm everybody up and we'll start with you. Bob, What are some When you're talking to someone at a cocktail party Friday night talking to your mom And they say, What is a I What >>do you >>give him? A Zen examples of where a eyes of packing our lives today? >>Well, I think we all know the examples of the south driving car, you know? Aye, aye. Starting to help our health care industry being diagnosed cancer for me. Personally, I had kind of a weird experience last week at a retail technology event where basically had these new digital mirrors doing facial recognition. Right? And basically, you start to have little mirrors were gonna be a skeevy start guessing. Hey, you have a beard, you have some glasses, and they start calling >>me old. So this is kind >>of very personal. I have a something for >>you, Camille, but eh? I go walking >>down a mall with a bunch of mirrors, calling me old. >>That's a little Illinois. Did it bring you out like a cane or a walker? You know, you start getting some advertising's >>that were like Okay, you guys, this is a little bit over the top. >>Alright, Charlotte, what about you? What's your favorite example? Share with people? >>Yeah, E think one of my favorite examples of a I is, um, kind of accessible in on your phone where the photos you take on an iPhone. The photos you put in Google photos, they're automatically detecting the faces and their labeling them for you. They're like, Here's selfies. Here's your family. Here's your Children. And you know, that's the most successful one of the ones that I think people don't really think about a lot or things like getting loan applications right. We actually have a I deciding whether or not we get loans. And that one is is probably the most interesting one to be right now. >>Roger. So I think the father's example is probably my favorite as well. And what's interesting to me is that really a I is actually not about the Yeah, it's about the user experience that you can create as a result of a I. What's cool about Google photos is that and my entire family uses Google photos and they don't even know actually that the underlying in some of the most powerful a I in the world. But what they know is they confined every picture of our kids on the beach whenever they whenever they want to. Or, you know, we had a great example where we were with our kids. Every time they like something in the store, we take a picture of it, Um, and we can look up toy and actually find everything that they've taken picture. >>It's interesting because I think most people don't even know the power that they have. Because if you search for beach in your Google photos or you search for, uh, I was looking for an old bug picture from my high school there it came right up until you kind of explore. You know, it's pretty tricky, Raja, you know, I think a lot of conversation about A They always focus the general purpose general purpose, general purpose machines and robots and computers. But people don't really talk about the applied A that's happening all around. Why do you think that? >>So it's a good question. There's there's a lot more talk about kind of general purpose, but the reality of where this has an impact right now is, though, are those specific use cases. And so, for example, things like personalizing customer interaction or, ah, spotting trends that did that you wouldn't have spotted for turning unstructured data like documents into structure data. That's where a eyes actually having an impact right now. And I think it really boils down to getting to the right use cases where a I right? >>Sharon, I want ask you. You know, there's a lot of conversation. Always has A I replace people or is it an augmentation for people? And we had Gary Kasparov on a couple years ago, and he talked about, you know, it was the combination if he plus the computer made the best chess player, but that quickly went away. Now the computer is actually better than Garry Kasparov. Plus the computer. How should people think about a I as an augmentation tool versus a replacement tool? And is it just gonna be specific to the application? And how do you kind of think about those? >>Yeah, I would say >>that any application where you're making life and death decisions where you're making financial decisions that disadvantage people anything where you know you've got u A. V s and you're deciding whether or not to actually dropped the bomb like you need a human in the loop. If you're trying to change the words that you are using to get a different group of people to apply for jobs, you need a human in the loop because it turns out that for the example of beach, you type sheep into your phone and you might get just a field, a green field and a I doesn't know that, uh, you know, if it's always seen sheep in a field that when the sheep aren't there, that that isn't a sheep like it doesn't have that kind of recognition to it. So anything were we making decisions about parole or financial? Anything like that needs to have human in the loop because those types of decisions are changing fundamentally the way we live. >>Great. So shift gears. The team are Jeff Saunders. Okay, team, your mind may have been the liquid on my bell, so I'll be more active on the bell. Sorry about that. Everyone's even. We're starting a zero again, so I want to shift gears and talk about data sets. Um Bob, you're up on stage. Demo ing some some of your technology, the Miss Technology and really, you know, it's interesting combination of data sets A I and its current form needs a lot of data again. Kind of the classic Chihuahua on blue buried and photos. You got to run a lot of them through. How do you think about data sets? In terms of having the right data in a complete data set to drive an algorithm >>E. I think we all know data sets with one The tipping points for a I to become more real right along with cloud computing storage. But data is really one of the key points of making a I really write my example on stage was wine, right? Great wine starts a great grape street. Aye, aye. Starts a great data for us personally. L s t M is an example in our networking space where we have data for the last three months from our customers and rule using the last 30 days really trained these l s t m algorithms to really get that tsunami detection the point where we don't have false positives. >>How much of the training is done. Once you once you've gone through the data a couple times in a just versus when you first started, you're not really sure how it's gonna shake out in the algorithm. >>Yeah. So in our case right now, right, training happens every night. So every night, we're basically retraining those models, basically, to be able to predict if there's gonna be an anomaly or network, you know? And this is really an example. Where you looking all these other cat image thinks this is where these neural networks there really were one of the transformational things that really moved a I into the reality calling. And it's starting to impact all our different energy. Whether it's text imaging in the networking world is an example where even a I and deep learnings ruling starting to impact our networking customers. >>Sure, I want to go to you. What do you do if you don't have a big data set? You don't have a lot of pictures of chihuahuas and blackberries, and I want to apply some machine intelligence to the problem. >>I mean, so you need to have the right data set. You know, Big is a relative term on, and it depends on what you're using it for, right? So you can have a massive amount of data that represents solar flares, and then you're trying to detect some anomaly, right? If you train and I what normal is based upon a massive amount of data and you don't have enough examples of that anomaly you're trying to detect, then it's never going to say there's an anomaly there, so you actually need to over sample. You have to create a population of data that allows you to detect images you can't say, Um oh, >>I'm going to reflect in my data set the percentage of black women >>in Seattle, which is something below 6% and say it's fair. It's not right. You have to be able thio over sample things that you need, and in some ways you can get this through surveys. You can get it through, um, actually going to different sources. But you have to boot, strap it in some way, and then you have to refresh it, because if you leave that data set static like Bob mentioned like you, people are changing the way they do attacks and networks all the time, and so you may have been able to find the one yesterday. But today it's a completely different ball game >>project to you, which comes first, the chicken or the egg. You start with the data, and I say this is a ripe opportunity to apply some. Aye, aye. Or do you have some May I objectives that you want to achieve? And I got to go out and find the >>data. So I actually think what starts where it starts is the business problem you're trying to solve. And then from there, you need to have the right data. What's interesting about this is that you can actually have starting points. And so, for example, there's techniques around transfer, learning where you're able to take an an algorithm that's already been trained on a bunch of data and training a little bit further with with your data on DSO, we've seen that such that people that may have, for example, only 100 images of something, but they could use a model that's trained on millions of images and only use those 100 thio create something that's actually quite accurate. >>So that's a great segue. Wait, give me a ring on now. And it's a great Segway into talking about applying on one algorithm that was built around one data set and then applying it to a different data set. Is that appropriate? Is that correct? Is air you risking all kinds of interesting problems by taking that and applying it here, especially in light of when people are gonna go to outweigh the marketplace, is because I've got a date. A scientist. I couldn't go get one in the marketplace and apply to my data. How should people be careful not to make >>a bad decision based on that? So I think it really depends. And it depends on the type of machine learning that you're doing and what type of data you're talking about. So, for example, with images, they're they're they're well known techniques to be able to do this, but with other things, there aren't really and so it really depends. But then the other inter, the other really important thing is that no matter what at the end, you need to test and generate based on your based on your data sets and on based on sample data to see if it's accurate or not, and then that's gonna guide everything. Ultimately, >>Sharon has got to go to you. You brought up something in the preliminary rounds and about open A I and kind of this. We can't have this black box where stuff goes into the algorithm. That stuff comes out and we're not sure what the result was. Sounds really important. Is that Is that even plausible? Is it feasible? This is crazy statistics, Crazy math. You talked about the business objective that someone's trying to achieve. I go to the data scientist. Here's my data. You're telling this is the output. How kind of where's the line between the Lehman and the business person and the hard core data science to bring together the knowledge of Here's what's making the algorithm say this. >>Yeah, there's a lot of names for this, whether it's explainable. Aye, aye. Or interpret a belay. I are opening the black box. Things like that. Um, the algorithms that you use determine whether or not they're inspect herbal. Um, and the deeper your neural network gets, the harder it is to inspect, actually. Right. So, to your point, every time you take an aye aye and you use it in a different scenario than what it was built for. For example, um, there is a police precinct in New York that had a facial recognition software, and, uh, victim said, Oh, it looked like this actor. This person looked like Bill Cosby or something like that, and you were never supposed to take an image of an actor and put it in there to find people that look like them. But that's how people were using it. So the Russians point yes, like it. You can transfer learning to other a eyes, but it's actually the humans that are using it in ways that are unintended that we have to be more careful about, right? Um, even if you're a, I is explainable, and somebody tries to use it in a way that it was never intended to be used. The risk is much higher >>now. I think maybe I had, You know, if you look at Marvis kind of what we're building for the networking community Ah, good examples. When Marvis tries to do estimate your throughput right, your Internet throughput. That's what we usually call decision tree algorithm. And that's a very interpretive algorithm. and we predict low throughput. We know how we got to that answer, right? We know what features God, is there? No. But when we're doing something like a NAMI detection, that's a neural network. That black box it tells us yes, there's a problem. There's some anomaly, but that doesn't know what caused the anomaly. But that's a case where we actually used neural networks, actually find the anomie, and then we're using something else to find the root cause, eh? So it really depends on the use case and where the night you're going to use an interpreter of model or a neural network which is more of a black box model. T tell her you've got a cat or you've got a problem >>somewhere. So, Bob, that's really interested. So can you not unpacking? Neural network is just the nature of the way that the communication and the data flows and the inferences are made that you can't go in and unpack it, that you have to have the >>separate kind of process too. Get to the root cause. >>Yeah, assigned is always hard to say. Never. But inherently s neural networks are very complicated. Saito set of weights, right? It's basically usually a supervised training model, and we're feeding a bunch of data and trying to train it to detect a certain features, sir, an output. But that is where they're powerful, right? And that's why they basically doing such good, Because they are mimicking the brain, right? That neural network is a very complex thing. Can't like your brain, right? We really don't understand how your brain works right now when you have a problem, it's really trialling there. We try to figure out >>right going right. So I want to stay with you, bought for a minute. So what about when you change what you're optimizing? Four? So you just said you're optimizing for throughput of the network. You're looking for problems. Now, let's just say it's, uh, into the end of the quarter. Some other reason we're not. You're changing your changing what you're optimizing for, Can you? You have to write separate algorithm. Can you have dynamic movement inside that algorithm? How do you approach a problem? Because you're not always optimizing for the same things, depending on the market conditions. >>Yeah, I mean, I think a good example, you know, again, with Marvis is really with what we call reinforcement. Learning right in reinforcement. Learning is a model we use for, like, radio resource management. And there were really trying to optimize for the user experience in trying to balance the reward, the models trying to reward whether or not we have a good balance between the network and the user. Right, that reward could be changed. So that algorithm is basically reinforcement. You can finally change hell that Algren works by changing the reward you give the algorithm >>great. Um, Rajan back to you. A couple of huge things that have come into into play in the marketplace and get your take one is open source, you know, kind of. What's the impact of open source generally on the availability, desire and more applications and then to cloud and soon to be edge? You know, the current next stop. How do you guys incorporate that opportunity? How does it change what you can do? How does it open up the lens of >>a I Yeah, I think open source is really important because I think one thing that's interesting about a I is that it's a very nascent field and the more that there's open source, the more that people could build on top of each other and be able to utilize what what others others have done. And it's similar to how we've seen open source impact operating systems, the Internet, things like things like that with Cloud. I think one of the big things with cloud is now you have the processing power and the ability to access lots of data to be able to t create these thes networks. And so the capacity for data and the capacity for compute is much higher. Edge is gonna be a very important thing, especially going into next few years. You're seeing Maur things incorporated on the edge and one exciting development is around Federated learning where you can train on the edge and then combine some of those aspects into a cloud side model. And so that I think will actually make EJ even more powerful. >>But it's got to be so dynamic, right? Because the fundamental problem used to always be the move, the computer, the data or the date of the computer. Well, now you've got on these edge devices. You've got Tanya data right sensor data all kinds of machining data. You've got potentially nasty hostile conditions. You're not in a nice, pristine data center where the environmental conditions are in the connective ity issues. So when you think about that problem yet, there's still great information. There you got latent issues. Some I might have to be processed close to home. How do you incorporate that age old thing of the speed of light to still break the break up? The problem to give you a step up? Well, we see a lot >>of customers do is they do a lot of training on the cloud, but then inference on the on the edge. And so that way they're able to create the model that they want. But then they get fast response time by moving the model to the edge. The other thing is that, like you said, lots of data is coming into the edge. So one way to do it is to efficiently move that to the cloud. But the other way to do is filter. And to try to figure out what data you want to send to the clouds that you can create the next days. >>Shawna, back to you let's shift gears into ethics. This pesky, pesky issue that's not not a technological issue at all, but right. We see it often, especially in tech. Just cause you should just cause you can doesn't mean that you should. Um so and this is not a stem issue, right? There's a lot of different things that happened. So how should people be thinking about ethics? How should they incorporate ethics? Um, how should they make sure that they've got kind of a, you know, a standard kind of overlooking kind of what they're doing? The decisions are being made. >>Yeah, One of the more approachable ways that I have found to explain this is with behavioral science methodologies. So ethics is a massive field of study, and not everyone shares the same ethics. However, if you try and bring it closer to behavior change because every product that we're building is seeking to change of behavior. We need to ask questions like, What is the gap between the person's intention and the goal we have for them? Would they choose that goal for themselves or not? If they wouldn't, then you have an ethical problem, right? And this this can be true of the intention, goal gap or the intention action up. We can see when we regulated for cigarettes. What? We can't just make it look cool without telling them what the cigarettes are doing to them, right so we can apply the same principles moving forward. And they're pretty accessible without having to know. Oh, this philosopher and that philosopher in this ethicist said these things, it can be pretty human. The challenge with this is that most people building these algorithms are not. They're not trained in this way of thinking, and especially when you're working at a start up right, you don't have access to massive teams of people to guide you down this journey, so you need to build it in from the beginning, and you need to be open and based upon principles. Um, and it's going to touch every component. It should touch your data, your algorithm, the people that you're using to build the product. If you only have white men building the product, you have a problem you need to pull in other people. Otherwise, there are just blind spots that you are not going to think of in order to still that product for a wider audience, but it seems like >>they were on such a razor sharp edge. Right with Coca Cola wants you to buy Coca Cola and they show ads for Coca Cola, and they appeal to your let's all sing together on the hillside and be one right. But it feels like with a I that that is now you can cheat. Right now you can use behavioral biases that are hardwired into my brain is a biological creature against me. And so where is where is the fine line between just trying to get you to buy Coke? Which somewhat argues Probably Justus Bad is Jule cause you get diabetes and all these other issues, but that's acceptable. But cigarettes are not. And now we're seeing this stuff on Facebook with, you know, they're coming out. So >>we know that this is that and Coke isn't just selling Coke anymore. They're also selling vitamin water so they're they're play isn't to have a single product that you can purchase, but it is to have a suite of products that if you weren't that coke, you can buy it. But if you want that vitamin water you can have that >>shouldn't get vitamin water and a smile that only comes with the coat. Five. You want to jump in? >>I think we're going to see ethics really break into two different discussions, right? I mean, ethics is already, like human behavior that you're already doing right, doing bad behavior, like discriminatory hiring, training, that behavior. And today I is gonna be wrong. It's wrong in the human world is gonna be wrong in the eye world. I think the other component to this ethics discussion is really round privacy and data. It's like that mirror example, right? No. Who gave that mirror the right to basically tell me I'm old and actually do something with that data right now. Is that my data? Or is that the mirrors data that basically recognized me and basically did something with it? Right. You know, that's the Facebook. For example. When I get the email, tell me, look at that picture and someone's take me in the pictures Like, where was that? Where did that come from? Right? >>What? I'm curious about to fall upon that as social norms change. We talked about it a little bit for we turn the cameras on, right? It used to be okay. Toe have no black people drinking out of a fountain or coming in the side door of a restaurant. Not that long ago, right in the 60. So if someone had built an algorithm, then that would have incorporated probably that social norm. But social norms change. So how should we, you know, kind of try to stay ahead of that or at least go back reflectively after the fact and say kind of back to the black box, That's no longer acceptable. We need to tweak this. I >>would have said in that example, that was wrong. 50 years ago. >>Okay, it was wrong. But if you ask somebody in Alabama, you know, at the University of Alabama, Matt Department who have been born Red born, bred in that culture as well, they probably would have not necessarily agreed. But so generally, though, again, assuming things change, how should we make sure to go back and make sure that we're not again carrying four things that are no longer the right thing to do? >>Well, I think I mean, as I said, I think you know what? What we know is wrong, you know is gonna be wrong in the eye world. I think the more subtle thing is when we start relying on these Aye. Aye. To make decisions like no shit in my car, hit the pedestrian or save my life. You know, those are tough decisions to let a machine take off or your balls decision. Right when we start letting the machines Or is it okay for Marvis to give this D I ps preference over other people, right? You know, those type of decisions are kind of the ethical decision, you know, whether right or wrong, the human world, I think the same thing will apply in the eye world. I do think it will start to see more regulation. Just like we see regulation happen in our hiring. No, that regulation is going to be applied into our A I >>right solutions. We're gonna come back to regulation a minute. But, Roger, I want to follow up with you in your earlier session. You you made an interesting comment. You said, you know, 10% is clearly, you know, good. 10% is clearly bad, but it's a soft, squishy middle at 80% that aren't necessarily super clear, good or bad. So how should people, you know, kind of make judgments in this this big gray area in the middle? >>Yeah, and I think that is the toughest part. And so the approach that we've taken is to set us set out a set of AI ai principles on DDE. What we did is actually wrote down seven things that we will that we think I should do and four things that we should not do that we will not do. And we now have to actually look at everything that we're doing against those Aye aye principles. And so part of that is coming up with that governance process because ultimately it boils down to doing this over and over, seeing lots of cases and figuring out what what you should do and so that governments process is something we're doing. But I think it's something that every company is going to need to do. >>Sharon, I want to come back to you, so we'll shift gears to talk a little bit about about law. We've all seen Zuckerberg, unfortunately for him has been, you know, stuck in these congressional hearings over and over and over again. A little bit of a deer in a headlight. You made an interesting comment on your prior show that he's almost like he's asking for regulation. You know, he stumbled into some really big Harry nasty areas that were never necessarily intended when they launched Facebook out of his dorm room many, many moons ago. So what is the role of the law? Because the other thing that we've seen, unfortunately, a lot of those hearings is a lot of our elected officials are way, way, way behind there, still printing their e mails, right? So what is the role of the law? How should we think about it? What shall we What should we invite from fromthe law to help sort some of this stuff out? >>I think as an individual, right, I would like for each company not to make up their own set of principles. I would like to have a shared set of principles that were following the challenge. Right, is that with between governments, that's impossible. China is never gonna come up with same regulations that we will. They have a different privacy standards than we D'oh. Um, but we are seeing locally like the state of Washington has created a future of work task force. And they're coming into the private sector and asking companies like text you and like Google and Microsoft to actually advise them on what should we be regulating? We don't know. We're not the technologists, but they know how to regulate. And they know how to move policies through the government. What will find us if we don't advise regulators on what we should be regulating? They're going to regulate it in some way, just like they regulated the tobacco industry. Just like they regulated. Sort of, um, monopolies that tech is big enough. Now there is enough money in it now that it will be regularly. So we need to start advising them on what we should regulate because just like Mark, he said. While everyone else was doing it, my competitors were doing it. So if you >>don't want me to do it, make us all stop. What >>can I do? A negative bell and that would not for you, but for Mark's responsibly. That's crazy. So So bob old man at the mall. It's actually a little bit more codified right, There's GDP are which came through May of last year and now the newness to California Extra Gatorade, California Consumer Protection Act, which goes into effect January 1. And you know it's interesting is that the hardest part of the implementation of that I think I haven't implemented it is the right to be for gotten because, as we all know, computers, air, really good recording information and cloud. It's recorded everywhere. There's no there there. So when these types of regulations, how does that impact? Aye, aye, because if I've got an algorithm built on a data set in in person, you know, item number 472 decides they want to be forgotten How that too I deal with that. >>Well, I mean, I think with Facebook, I can see that as I think. I suspect Mark knows what's right and wrong. He's just kicking ball down tires like >>I want you guys. >>It's your problem, you know. Please tell me what to do. I see a ice kind of like any other new technology, you know, it could be abused and used in the wrong waste. I think legally we have a constitution that protects our rights. And I think we're going to see the lawyers treat a I just like any other constitutional things and people who are building products using a I just like me build medical products or other products and actually harmful people. You're gonna have to make sure that you're a I product does not harm people. You're a product does not include no promote discriminatory results. So I >>think we're going >>to see our constitutional thing is going applied A I just like we've seen other technologies work. >>And it's gonna create jobs because of that, right? Because >>it will be a whole new set of lawyers >>the holdings of lawyers and testers, even because otherwise of an individual company is saying. But we tested. It >>works. Trust us. Like, how are you gonna get the independent third party verification of that? So we're gonna start to see a whole terrorist proliferation of that type of fields that never had to exist before. >>Yeah, one of my favorite doctor room. A child. Grief from a center. If you don't follow her on Twitter Follower. She's fantastic and a great lady. So I want to stick with you for a minute, Bob, because the next topic is autonomous. And Rahman up on the keynote this morning, talked about missed and and really, this kind of shifting workload of fixing things into an autonomous set up where the system now is, is finding problems, diagnosing problems, fixing problems up to, I think, he said, even generating return authorizations for broken gear, which is amazing. But autonomy opens up all kinds of crazy, scary things. Robert Gates, we interviewed said, You know, the only guns that are that are autonomous in the entire U. S. Military are the ones on the border of North Korea. Every single other one has to run through a person when you think about autonomy and when you can actually grant this this a I the autonomy of the agency toe act. What are some of the things to think about in the word of the things to keep from just doing something bad, really, really fast and efficiently? >>Yeah. I mean, I think that what we discussed, right? I mean, I think Pakal purposes we're far, you know, there is a tipping point. I think eventually we will get to the CP 30 Terminator day where we actually build something is on par with the human. But for the purposes right now, we're really looking at tools that we're going to help businesses, doctors, self driving cars and those tools are gonna be used by our customers to basically allow them to do more productive things with their time. You know, whether it's doctor that's using a tool to actually use a I to predict help bank better predictions. They're still gonna be a human involved, you know, And what Romney talked about this morning and networking is really allowing our I T customers focus more on their business problems where they don't have to spend their time finding bad hard were bad software and making better experiences for the people. They're actually trying to serve >>right, trying to get your take on on autonomy because because it's a different level of trust that we're giving to the machine when we actually let it do things based on its own. But >>there's there's a lot that goes into this decision of whether or not to allow autonomy. There's an example I read. There's a book that just came out. Oh, what's the title? You look like a thing. And I love you. It was a book named by an A I, um if you want to learn a lot about a I, um and you don't know much about it, Get it? It's really funny. Um, so in there there is in China. Ah, factory where the Aye Aye. Is optimizing um, output of cockroaches now they just They want more cockroaches now. Why do they want that? They want to grind them up and put them in a lotion. It's one of their secret ingredients now. It depends on what parameters you allow that I to change, right? If you decide Thio let the way I flood the container, and then the cockroaches get out through the vents and then they get to the kitchen to get food, and then they reproduce the parameters in which you let them be autonomous. Over is the challenge. So when we're working with very narrow Ai ai, when use hell the Aye. Aye. You can change these three things and you can't just change anything. Then it's a lot easier to make that autonomous decision. Um and then the last part of it is that you want to know what is the results of a negative outcome, right? There was the result of a positive outcome. And are those results something that we can take actually? >>Right, Right. Roger, don't give you the last word on the time. Because kind of the next order of step is where that machines actually write their own algorithms, right? They start to write their own code, so they kind of take this next order of thought and agency, if you will. How do you guys think about that? You guys are way out ahead in the space, you have huge data set. You got great technology. Got tensorflow. When will the machines start writing their own A their own out rhythms? Well, and actually >>it's already starting there that, you know, for example, we have we have a product called Google Cloud. Ottawa. Mel Village basically takes in a data set, and then we find the best model to be able to match that data set. And so things like that that that are there already, but it's still very nascent. There's a lot more than that that can happen. And I think ultimately with with how it's used I think part of it is you have to start. Always look at the downside of automation. And what is what is the downside of a bad decision, whether it's the wrong algorithm that you create or a bad decision in that model? And so if the downside is really big, that's where you need to start to apply Human in the loop. And so, for example, in medicine. Hey, I could do amazing things to detect diseases, but you would want a doctor in the loop to be able to actually diagnose. And so you need tohave have that place in many situations to make sure that it's being applied well. >>But is that just today? Or is that tomorrow? Because, you know, with with exponential growth and and as fast as these things are growing, will there be a day where you don't necessarily need maybe need the doctor to communicate the news? Maybe there's some second order impacts in terms of how you deal with the family and, you know, kind of pros and cons of treatment options that are more emotional than necessarily mechanical, because it seems like eventually that the doctor has a role. But it isn't necessarily in accurately diagnosing a problem. >>I think >>I think for some things, absolutely over time the algorithms will get better and better, and you can rely on them and trust them more and more. But again, I think you have to look at the downside consequence that if there's a bad decision, what happens and how is that compared to what happens today? And so that's really where, where that is. So, for example, self driving cars, we will get to the point where cars are driving by themselves. There will be accidents, but the accident rate is gonna be much lower than what's there with humans today, and so that will get there. But it will take time. >>And there was a day when will be illegal for you to drive. You have manslaughter, right? >>I I believe absolutely there will be in and and I don't think it's that far off. Actually, >>wait for the day when I have my car take me up to Northern California with me. Sleepy. I've only lived that long. >>That's right. And work while you're while you're sleeping, right? Well, I want to thank everybody Aton for being on this panel. This has been super fun and these air really big issues. So I want to give you the final word will just give everyone kind of a final say and I just want to throw out their Mars law. People talk about Moore's law all the time. But tomorrow's law, which Gardner stolen made into the hype cycle, you know, is that we tend to overestimate in the short term, which is why you get the hype cycle and we turn. Tend to underestimate, in the long term the impacts of technology. So I just want it is you look forward in the future won't put a year number on it, you know, kind of. How do you see this rolling out? What do you excited about? What are you scared about? What should we be thinking about? We'll start with you, Bob. >>Yeah, you know, for me and, you know, the day of the terminus Heathrow. I don't know if it's 100 years or 1000 years. That day is coming. We will eventually build something that's in part of the human. I think the mission about the book, you know, you look like a thing and I love >>you. >>Type of thing that was written by someone who tried to train a I to basically pick up lines. Right? Cheesy pickup lines. Yeah, I'm not for sure. I'm gonna trust a I to help me in my pickup lines yet. You know I love you. Look at your thing. I love you. I don't know if they work. >>Yeah, but who would? Who would have guessed online dating is is what it is if you had asked, you know, 15 years ago. But I >>think yes, I think overall, yes, we will see the Terminator Cp through It was probably not in our lifetime, but it is in the future somewhere. A. I is definitely gonna be on par with the Internet cell phone, radio. It's gonna be a technology that's gonna be accelerating if you look where technology's been over last. Is this amazing to watch how fast things have changed in our lifetime alone, right? Yeah, we're just on this curve of technology accelerations. This in the >>exponential curves China. >>Yeah, I think the thing I'm most excited about for a I right now is the addition of creativity to a lot of our jobs. So ah, lot of we build an augmented writing product. And what we do is we look at the words that have happened in the world and their outcomes. And we tell you what words have impacted people in the past. Now, with that information, when you augment humans in that way, they get to be more creative. They get to use language that have never been used before. To communicate an idea. You can do this with any field you can do with composition of music. You can if you can have access as an individual, thio the data of a bunch of cultures the way that we evolved can change. So I'm most excited about that. I think I'm most concerned currently about the products that we're building Thio Give a I to people that don't understand how to use it or how to make sure they're making an ethical decision. So it is extremely easy right now to go on the Internet to build a model on a data set. And I'm not a specialist in data, right? And so I have no idea if I'm adding bias in or not, um and so it's It's an interesting time because we're in that middle area. Um, and >>it's getting loud, all right, Roger will throw with you before we have to cut out, or we're not gonna be able to hear anything. So I actually start every presentation out with a picture of the Mosaic browser, because what's interesting is I think that's where >>a eyes today compared to kind of weather when the Internet was around 1994 >>were just starting to see how a I can actually impact the average person. As a result, there's a lot of hype, but what I'm actually finding is that 70% of the company's I talked to the first question is, Why should I be using this? And what benefit does it give me? Why 70% ask you why? Yeah, and and what's interesting with that is that I think people are still trying to figure out what is this stuff good for? But to your point about the long >>run, and we underestimate the longer I think that every company out there and every product will be fundamentally transformed by eye over the course of the next decade, and it's actually gonna have a bigger impact on the Internet itself. And so that's really what we have to look forward to. >>All right again. Thank you everybody for participating. There was a ton of fun. Hope you had fun. And I look at the score sheet here. We've got Bob coming in and the bronze at 15 points. Rajan, it's 17 in our gold medal winner for the silver Bell. Is Sharna at 20 points. Again. Thank you. Uh, thank you so much and look forward to our next conversation. Thank Jeffrey Ake signing out from Caesar's Juniper. Next word unpacking. I Thanks for watching.

Published Date : Nov 14 2019

SUMMARY :

We don't have to do it over the phone s so we're happy to have him. Thank you, Christy. So just warm everybody up and we'll start with you. Well, I think we all know the examples of the south driving car, you know? So this is kind I have a something for You know, you start getting some advertising's And that one is is probably the most interesting one to be right now. it's about the user experience that you can create as a result of a I. Raja, you know, I think a lot of conversation about A They always focus the general purpose general purpose, And I think it really boils down to getting to the right use cases where a I right? And how do you kind of think about those? the example of beach, you type sheep into your phone and you might get just a field, the Miss Technology and really, you know, it's interesting combination of data sets A I E. I think we all know data sets with one The tipping points for a I to become more real right along with cloud in a just versus when you first started, you're not really sure how it's gonna shake out in the algorithm. models, basically, to be able to predict if there's gonna be an anomaly or network, you know? What do you do if you don't have a big data set? I mean, so you need to have the right data set. You have to be able thio over sample things that you need, Or do you have some May I objectives that you want is that you can actually have starting points. I couldn't go get one in the marketplace and apply to my data. the end, you need to test and generate based on your based on your data sets the business person and the hard core data science to bring together the knowledge of Here's what's making Um, the algorithms that you use I think maybe I had, You know, if you look at Marvis kind of what we're building for the networking community Ah, that you can't go in and unpack it, that you have to have the Get to the root cause. Yeah, assigned is always hard to say. So what about when you change what you're optimizing? You can finally change hell that Algren works by changing the reward you give the algorithm How does it change what you can do? on the edge and one exciting development is around Federated learning where you can train The problem to give you a step up? And to try to figure out what data you want to send to Shawna, back to you let's shift gears into ethics. so you need to build it in from the beginning, and you need to be open and based upon principles. But it feels like with a I that that is now you can cheat. but it is to have a suite of products that if you weren't that coke, you can buy it. You want to jump in? No. Who gave that mirror the right to basically tell me I'm old and actually do something with that data right now. So how should we, you know, kind of try to stay ahead of that or at least go back reflectively after the fact would have said in that example, that was wrong. But if you ask somebody in Alabama, What we know is wrong, you know is gonna be wrong So how should people, you know, kind of make judgments in this this big gray and over, seeing lots of cases and figuring out what what you should do and We've all seen Zuckerberg, unfortunately for him has been, you know, stuck in these congressional hearings We're not the technologists, but they know how to regulate. don't want me to do it, make us all stop. I haven't implemented it is the right to be for gotten because, as we all know, computers, Well, I mean, I think with Facebook, I can see that as I think. you know, it could be abused and used in the wrong waste. to see our constitutional thing is going applied A I just like we've seen other technologies the holdings of lawyers and testers, even because otherwise of an individual company is Like, how are you gonna get the independent third party verification of that? Every single other one has to run through a person when you think about autonomy and They're still gonna be a human involved, you know, giving to the machine when we actually let it do things based on its own. It depends on what parameters you allow that I to change, right? How do you guys think about that? And what is what is the downside of a bad decision, whether it's the wrong algorithm that you create as fast as these things are growing, will there be a day where you don't necessarily need maybe need the doctor But again, I think you have to look at the downside And there was a day when will be illegal for you to drive. I I believe absolutely there will be in and and I don't think it's that far off. I've only lived that long. look forward in the future won't put a year number on it, you know, kind of. I think the mission about the book, you know, you look like a thing and I love I don't know if they work. you know, 15 years ago. It's gonna be a technology that's gonna be accelerating if you look where technology's And we tell you what words have impacted people in the past. it's getting loud, all right, Roger will throw with you before we have to cut out, Why 70% ask you why? have a bigger impact on the Internet itself. And I look at the score sheet here.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff SaundersPERSON

0.99+

SharonPERSON

0.99+

MicrosoftORGANIZATION

0.99+

RogerPERSON

0.99+

AlabamaLOCATION

0.99+

MarkPERSON

0.99+

Sharna ParkyPERSON

0.99+

Robert GatesPERSON

0.99+

GoogleORGANIZATION

0.99+

Garry KasparovPERSON

0.99+

SeattleLOCATION

0.99+

January 1DATE

0.99+

Gary KasparovPERSON

0.99+

15 pointsQUANTITY

0.99+

SharnaPERSON

0.99+

BobPERSON

0.99+

20 pointsQUANTITY

0.99+

ChinaLOCATION

0.99+

Jeffrey AkePERSON

0.99+

400 gigsQUANTITY

0.99+

New YorkLOCATION

0.99+

CharlottePERSON

0.99+

JeffreyPERSON

0.99+

RahmanPERSON

0.99+

ChristyPERSON

0.99+

RajanPERSON

0.99+

Bill CosbyPERSON

0.99+

Las VegasLOCATION

0.99+

California Extra GatoradeTITLE

0.99+

MayDATE

0.99+

70%QUANTITY

0.99+

100 yearsQUANTITY

0.99+

FacebookORGANIZATION

0.99+

tomorrowDATE

0.99+

Northern CaliforniaLOCATION

0.99+

ShawnaPERSON

0.99+

first questionQUANTITY

0.99+

yesterdayDATE

0.99+

ZuckerbergPERSON

0.99+

17QUANTITY

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

last weekDATE

0.99+

todayDATE

0.99+

Coca ColaORGANIZATION

0.99+

MarvisORGANIZATION

0.99+

Friday nightDATE

0.99+

MoorePERSON

0.99+

IllinoisLOCATION

0.99+

FiveQUANTITY

0.99+

1000 yearsQUANTITY

0.99+

OttawaLOCATION

0.99+

80%QUANTITY

0.99+

GardnerPERSON

0.99+

100QUANTITY

0.98+

fourth installmentQUANTITY

0.98+

each companyQUANTITY

0.98+

millions of imagesQUANTITY

0.98+

University of AlabamaORGANIZATION

0.98+

15 years agoDATE

0.98+

three previous roundsQUANTITY

0.98+

10%QUANTITY

0.98+

100 imagesQUANTITY

0.98+

one algorithmQUANTITY

0.98+

WashingtonLOCATION

0.98+

RomneyPERSON

0.98+

50 years agoDATE

0.97+

single productQUANTITY

0.97+

firstQUANTITY

0.97+

next decadeDATE

0.96+

Vittorio Viarengo, McAfee | AWS re:Inforce 2019


 

live from Boston Massachusetts it's the cube covering AWS reinforced 2019 brought to you by Amazon Web Services and its ecosystem partners hey welcome back everyone's cute live coverage here in Boston Massachusetts for AWS Amazon Web Services reinforced this is in our roll call for an RO conference for security this is the first event Amazon's dedicating to security I'm Jeffrey day Volante Dave reinvents the big show reinforced will be the big show for security 12,000 people we have Vittorio for Arango who's the VP of Marketing cloud business unit McAfee formerly of sky-high networks great to see you again on the cube I am happy to be here you guys had an institution so delighted to be here with you guys super excited been big fan of your work but finally work at VMware sky high networks now McAfee you've seen the big company of the startup real change is going on in cloud the McAfee certainly the expertise and the antivirus and security been there check now cloud comes into the equation with sky-high networks gives the update what's that what it's all about sky high comes in to McAfee you got a cloud business unit they leave you alone you get to do your own thing but take advantage of the McAfee goodness it give us the what's going on tell us well you know when you wake an acquisition usually you do it for two reasons why one is I sit at the table in a new market acquiring the skills of the people those are the two two main reasons so Skye McAfee when they acquire sky high in January 2018 they kept the sky high as a separate business unit to keep the momentum and if you think about the the investment thesis there is that today works gets done on endpoints that are attached to the cloud increasingly the network now is used to be the control point for everything security but now we run applications in on infrastructure we don't own that traverses network we don't operate and so the our strategy is secured data what works get gets done which is in on the device which that's the Mac of you know heritage and then in the cloud that's where the McAfee the with the sky-high acquisition what will bring it I'm usually exclusive they both work together because once an endpoint one's kind of a in transit data and cloud all that stuff happening there are two different things but they work together yeah it's it to me device is mobile devices and laptops are the the the land endpoints to the cloud right and so I think we are and then on top of it IT ones complete disability and so McAfee has this great footprint with the device the cloud and then EPO which is our management management layer on top of it it gives you visibility across everything so you guys are making mad mcafee with the cloud business unit which is sky-high enactment a big investment at this show you guys look at reinforces an opportunity why are you making such a big investment in reinforce this show this community what's the big move well if you look at the what the enterprise data is increasingly it's in the cloud so we recently ran a report of the live system so we have a run a thousand customers using our cloud solutions so we know exactly what data is and around thirty five percent is in SAS office CCC five boss Dropbox twenty five percent is in structured application like Salesforce ServiceNow and twenty four percent is in iis and pass and that's the area that is growing the most and so in the past if you look at the evolution of cloud security there have been a lot of different point solution to solve these different problems we're trying to bring it all together so we have a single point for visibility and control of your data in a cloud so I is and pass is where data is growing the fastest and the show like this is the perfect opportunity for a hard question on to you right now because this is what everyone's been asking us see shows and CIOs run or running or managing or trying to figure out the security equation we love our vendors giving us alerts we don't need more alert anymore if there's a really video more alerts we need our suppliers to help us fix the problem yes that's the big focus of this show we're hearing a lot of that and a lot of help my people be better so not just tell me what the problem is fix it yeah what's your view on that absolutely so once you get visibility and you set your policies our system enforces those policies in real time and so it doesn't require human intervention for the most part plus there is another aspect if you look at the number of incident that happens in the cloud there are one order of magnitude higher than on-prem so what we do we bring the users into the picture as a solution so let me give you an example so it said that you look use the cloud to collaborate right and that makes us productive we found that 85% I didn't have a percent of people to go to the cloud find business acceleration in their business and so why because people working collaborate freely but sometimes collaborating they share a document that contains confidential information so when we detect that instead of we let IT know but instead of asking IT to fix it we inform the user and we say hey mr. user did you know that you just share a document that contains credit card information and healthcare information and we show them what it is so they can fix it in most cases people don't do it maliciously like that just trying to get their job done and so we make the user be part of the solution instead of just creating the problem why our instance ray internet rates so much higher in the cloud material because the just the number of peopie definition the moment you start to put your data in the cloud to collaborate you collaborate with many more people right and so that's why the number of incident is so much higher against that the stuff is all out there and the number of people that I have access to your data is much larger so when you think of risk you think of you know the probability of an event and then the impact of that event so we just heard that the probability goes up when you're collaborating in the cloud you have any data on the impact in terms of specific to the cloud is the cloud doing a better job than say on Prem is it more higher impact is it not there's not as enough enough high value data in the cloud yet more data's on Prem do you have any sort of senses first of all there is our actual use of the cloud we know that confidential data is in the cloud and we also know that over time 50% of and confidential data or computational documents in the cloud gets shared in the process all right here's the the good news is that we believe that with the proper tools like an visual cloud and the proper Cosby platform in place the cloud can be more secure than on pram and this is why first these cloud providers AWS and others they put more resources in security that any comprend company ever could right but then you still have the share responsibility model it's a part of the the security puzzle that the end-user is in charge of and if you put in place a cosmic platform we love for people to use ours but any costly platform I think eventually the cloud will become more secure than on Prem ever was yeah so that shared responsibility you talk about endpoints data user access right and you start from SAS the your responsibility is really device security and user access so if an end user logs in with their credential and start stealing your data AWS or Microsoft they're not gonna be responsive to take care of that when you're doing going to pass your responsibility goes deeper because now you're running your own applications there so you have to make sure that the applications the infrastructure that the application runs on is properly configured and the data going in and out of the application and the container are secure and then you're going to I is your responsibility goes even deeper but these are problems now that can be solved well understood it can be solved by leveraging the underlying platform and then building your own infrastructure or your security solution gobbled it sorry I talk about the most important story that that's that should be told in technology security industry today or that media should tell are not being told what is the most important story for first customers to to know about and or the media should be covering more of that's uh putting me on the spot well I think I the thing that I'm most excited right now in NIT is DevOps I think about every technology transition for the last 25 years was driven by one set of people developers and so over the years developers had all these roadblocks or I need a server or now I need the security clearance now I did compliance clearance and so we always got in the way of them until they figured out in you a new platform and your way to be more agile and I think right now in the cloud is with DevOps is the ultimate of expression of that so I think it's very exciting and I think as security vendors instead of this is my pet peeve with security is you have to scare people into buying your stuff I hate that right you know if you don't buy this you're gonna get fired you're gonna get breached all true but the reason why people go to the cloud is business agility the ability to unleash the developers to build new differentiating applications and so to me a better way to sell insecurity and build a security solution is to cater to that need and build security that that is transparent to the users and now transparent to the developers and also here what you're really saying there is you want to increase the speed of security for that slot that is lagging behind the agility of DevOps yeah if I get faster so it's in line with the developer in fact today we just announced that this shift left right instead of like make it easier to deploy application then put security on top of it how about we look at your development process and trying to identify flaws they may end up into a non secure runtime environment and so last goes along the lines of like let's forget about security that doesn't create friction let's put build security in the code it's a shift left by that you mean security is code exactly talk about you now last time we talked to you the cube you were an engineer yeah now you're in marketing what happened well I'm seeing engineer so what happened was you know I I never planned my career I always look for smart people and we're smart people kind of aggregate there's some good stuff to do and when I was at I when I left VMware I joined MobileIron and the only spot that they helped that was open was CMO and so once I got the job I had to learn it I well you're a builder I mean Amazon love Zion generic mindset then you're gonna build our mindset how are you going to build out your cloud division because you have some big tail winds big demand for security price to be sold in a new way yeah and consumed with services so good opportunities for you what's your strategy what are you gonna do our strategy is to keep growing this business right now the cloud as you will expect is the fastest growing business at McAfee and so from from my perspective within the cloud business unit when we're trying to inject energy and the vision for cloud and and that's that's what I think McAfee needs from us so obviously you're a fan of agile scrum I mean you know modern modern development techniques are you bringing that to marketing in any way yeah absolutely so when I made a transition to marketing I realized that whenever you have an environment where you have to ship something in engineering is shipping software in marketing is shipping a new webpage or a new campaign and you a video or something and where there is a lot of unknown and market the moves fast scrum and agile is the perfect solution for it so basically what I do I take the priority from the company we make these plans like a year out right who knows what's gonna happen in here our recipe take these goals and then break them down in two weeks interval and every two weeks here are the priorities the map to those and then every two weeks you have you moved the needle I just talked to some people and and AWS you know they told me maybe it's confidential information or not they told me two weeks it's too long we have it weekly so sometimes when somebody new comes to my team and they see this mechanism workers who always on the treadmill take all this this guy's insane and they may have a point but then you look at the companies that are changing the world and guess what they are doing weekly it's a graph it's like a task week once you get on that cadence you're in shape and you get the team rolling because success is a great motivator yeah it has that kind of success when you're agile and you can respond faster yeah because look at this our counterpart is sales right and if you engage with sales you talk to sales everything is an emergency that was needed yesterday and that's okay they're bringing the money so we like them but with agile would these two weeks print what allows me and my team to do is to say hey what you're asking for is it more important than these things that were shipping in average a week from now and be answers typically no or can you wait the two weeks and you're not and then I can take the whole team and focus on whatever is that do your best work you bring in the best of cloud ethos yep into marketing and then again look if we do believe that engineers make the work around I truly believe that in Silicon Valley Engineers change the world to make the workaround let's take some of those best practices and apply them to other part of the organization why not sorry I've great to chat with you love your vision thanks for coming on the cube and sharing hi thank you for insights great insights here that we're driving all the data here inside the cube for reinforced Amazon Web Services first security conference its inaugural we're excited to be here two days of live cover staying with us for more after this short break

Published Date : Jun 25 2019

SUMMARY :

on the cube I am happy to be here you

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Amazon Web ServicesORGANIZATION

0.99+

McAfeeORGANIZATION

0.99+

January 2018DATE

0.99+

MicrosoftORGANIZATION

0.99+

AWSORGANIZATION

0.99+

85%QUANTITY

0.99+

two reasonsQUANTITY

0.99+

two daysQUANTITY

0.99+

two weeksQUANTITY

0.99+

DropboxORGANIZATION

0.99+

50%QUANTITY

0.99+

Vittorio ViarengoPERSON

0.99+

AmazonORGANIZATION

0.99+

Boston MassachusettsLOCATION

0.99+

MacCOMMERCIAL_ITEM

0.99+

12,000 peopleQUANTITY

0.99+

Amazon Web ServicesORGANIZATION

0.99+

twenty five percentQUANTITY

0.99+

DevOpsTITLE

0.98+

two different thingsQUANTITY

0.98+

2019DATE

0.98+

yesterdayDATE

0.98+

SkyeORGANIZATION

0.98+

around thirty five percentQUANTITY

0.98+

twenty four percentQUANTITY

0.97+

Salesforce ServiceNowTITLE

0.97+

todayDATE

0.97+

VittorioPERSON

0.96+

VMwareORGANIZATION

0.95+

agileTITLE

0.94+

firstQUANTITY

0.94+

first customersQUANTITY

0.94+

ZionORGANIZATION

0.94+

first eventQUANTITY

0.93+

a weekQUANTITY

0.93+

Silicon ValleyLOCATION

0.93+

Jeffrey dayPERSON

0.92+

single pointQUANTITY

0.92+

every two weeksQUANTITY

0.92+

five bossQUANTITY

0.91+

bothQUANTITY

0.9+

MobileIronORGANIZATION

0.9+

oneQUANTITY

0.87+

two two main reasonsQUANTITY

0.84+

PremORGANIZATION

0.83+

one set of peopleQUANTITY

0.83+

first security conferenceQUANTITY

0.82+

mcafeeORGANIZATION

0.81+

last 25 yearsDATE

0.79+

pramORGANIZATION

0.78+

one orderQUANTITY

0.77+

SASORGANIZATION

0.77+

CCCORGANIZATION

0.77+

NITORGANIZATION

0.75+

a thousand customersQUANTITY

0.72+

EPOORGANIZATION

0.7+

more peopleQUANTITY

0.66+

Volante DavePERSON

0.62+

ArangoPERSON

0.6+

CosbyTITLE

0.6+

lotQUANTITY

0.56+

John Maddison, Fortinet | Fortinet Accelerate 2019


 

live from Orlando Florida it's the cube covering accelerate nineteen brought to you by important welcome back to the cubes continuing coverage of forty net accelerate 2019 live from Orlando Florida Lisa Martin with Peter verse and we're pleased to welcome back to the key one of our alumni John Madison the executive vice president of products and solutions from forty met John it's great to have you back on the cube it's great to be here again lots of momentum that forty minutes coming into 2019 with I can't believe we're in April already lots of growth in revenue product revenue was up you guys talked about the expansion of the partner network we've had some of your fabric ready partners on already today yeah you talked about this third generation and security how fourteen it is is uniquely delivering that for our viewers who were didn't have the opportunity to attend your keynote kind of talk to us about that in this hybrid world how is putting that delivering this third generation what makes you guys different yeah so we talk about the third generation now everyone has different generations that's fine we call it what we are the security driven networking and it's really the genesis of 14f for a long time in bringing together networking and security into one place I think these days or in the past people have built out the networks with a network layer then they try and connect users and applications I think oh wait a minute and this put some security over here and a bit over here and over there in our minds start with both start with a security driven networking concept make sure it works end to end and that will be the most sophisticated most secure application and network you can have and what enables porting that to deliver this uniquely because a number of times today and Ken's keynote I think patrice as well and i can't recall if yours competition came up where the audience was shown the strength in numbers that 14 that has so what makes you guys unique and what you're delivering what are key differentiators from the start has been making sure we can run routing stacks sometimes today referred to as st wayne stacks also security stacks in a very small footprint and to do you need to spend a lot of money what we call security processes which go inside our appliances to make sure that runs very fast but having said that I definitely think customers are gonna be in a high weight world forever for a long time at least anyway we're not only appliances but also personal machines an API security and we also talk about this fabric concept they're able to cover the complete digital attack surface so there's a very important point and we're finding a lot of customers now agree that they want to consolidate they want to make it simpler they need to move faster to this digital world and the only way you have to do that is through a consolidated approach so let's build on this they want to consolidate they want to make it simpler more common and how they in policies and management now along comes the edge what's the dynamic there what's happening is all people refer to the perimeter disappearing okay that's happening to a certain extent because data is moving into cloud you've got different one implementations but what's happening when you do that is you're creating new edges a really good example is sd1 which used to be very closed off the wound used to be something that connects branch offices back to the data center but nobody got involved in that well now you're opening up that when two different types of transport mechanism you're creating an edge I always refer to these edges as being created by different trust levels there is a may be a secure trust level here less trust here it creates an edge and you absolutely need to protect all those edges but give us an example of that so for example when you say differentiated trust levels my edge might be at a customer location is that kind of what versus my edge might be at a branch office is that what you mean by a different trust level push that concept force you know it's more for example if I got a branch office and I've got one connectivity going back to my data center that's encrypted and secure but I've also opened up connectivity to the internet the trust level between that encrypted link and my connection to the to the internet is very different the Internet's open anyone can see there so that trust level between those two is very different and that's what creates the edge and so therefore that becomes a key feature in how we design diff edge implementations it is it's also a key requirement on what type of deployment mode you use we have appliances we have virtual machines we have clouds containers API is going forward I'm finding that customers are still very reluctant to put software implementations of firewalls against the Internet appliances are harden they run faster having said that inside the cloud obviously inside software-defined data centers virtuals fine what are some of those customer concerns that you're hearing well I think what happens is you know if you putting a piece of software against the internet it's open to all sorts of attack it's the same as giving IP addresses to anything it's like a factory that creates an edge as well and you need to harm that edge against that phone how can st when helped why is this such a crucial component of digital transformation you know sometimes markets are overhyped I remember that the Cosby marketplace a few years ago it just was a feature to be honest I think sd1 is extremely important the reason it's important is the SD one controller that controller eventually tells users and devices how to get to the applications and so I tell customers that investment for you is extremely important you need to own it you need to make sure it's flexible you need to make sure it's secure and so I think the SD web marketplace or one edge is the kind of larger term for it is extremely important investment for customers do you anticipate that I mean you guys invested you guys put forward a lot of products we made a number of different announcements again going back to that notion of simplicity that notion of consolidation what is the breaking point for your typical IT group in terms of the complexity of that they can accommodate and absorb when we start adding additional function within the overall network especially from a security standpoint well I think it's a bit broken already they're really struggling to keep up from one perspective no today we announced our forty OS 6.2 is our major operating system and what we try and do is consolidate functionality as much as possible inside our fabric through a single console so there were single operations capability so it's easier for the operations people for the security people to implement things and we're also implementing automated mechanisms like security ratings which do a background run of best practices for example that make it gain easier for those cut those teams to run a full analysis of what's going on so was it about three hundred features roughly laughs I counted them individually okay good yeah well do a recount of a tremendous amount of feature addition to forty OS announced today what are some of the things business outcomes Peter and I we're talking about outcomes with several of our guests earlier business outcomes new revenue streams new products going to market faster the also being able to become less reactive maybe more proactive in terms of security cuts can you walk us through some of the outcomes that 14 that customers can expect to achieve from some of the OS announcements and enhancements yeah I already talked about one which was the consolidation which means they can do multiple things with the single platform that's an important one for them also some of those some of the cost savings around that some of the operational cost savings I think also for our partners for example they like the fact that we're keep that we keep adding services on top of that fabric they can take those services then apply them to their customers and make sure they can add value inside there as well so there's two angles to it the one is making sure our customers are better protected they can consolidate save money invest better training and then to our partners so that they can provide more value to their customers so one of the things we were talking to Ken about is the fact that you have invested in a six and security processing units and content processing units etc that are capable of accelerating the rate of which these crucial security algorithms run that opens up that creates additional capacity to add more function both for you as well as your partners are you starting to see some of your ecosystem grow faster as they better exploit that inherent power and performance that you have within your appliances and devices definitely I think we're seeing new partners come from new areas it also fragments a bit and that's why we announced this new partner initiative going forward which is a bit more customizable but I you know I do think that going forward both our customers and our partners are looking for more of an architecture approach you know again if you go back five years here's a box and off you go and there's install it and we're good and again when you saw those security threats yes we produce a point solution to fix it normal we keep moving on there now looking at architectures over the next five years a known only just cyber security architectures but networking architecture storage architectures and all coming together so we definitely need to train our partners I think here we had over fifty of our what we call networks a network security expert eight it's the highest level of architecture and half and the partners but going forward we see much more partner involvement in an architecture approach and our customers want that because they don't want to have a point solution that's out-of-date in a year's time or a new threat comes along and makes it redundant so how are you you mentioned you mentioned network security and storage what other things are starting to inform that architectural approach that you're taking it's everything now so we know the factories now are completely automated all the different utilities have IP addresses are running almost all the way down to the end point just everything has more flexibility and is more open and so definitely all of that informations bouncing around inside IOT devices inside the wires like data centers and all that data needs protecting that's the key of protecting the data and to do that again we keep saying you need to have an integrated approach to networking and security how does the customer work with 40 net and your partner ecosystem to achieve that integrated approach assuming that there's a you know an enterprise out there that's got a spectrum of hybrid multi cloud environment with a spectrum of security Point solutions pointed it you know different components of an infrastructure how do you help them on that journey of taking the many disparate security solutions and leveraging the power of cortina and your partners to get that integrated truly integrated consolidate consolidated view it's a couple of steps maybe maybe many steps the first one is customers don't want to throw everything else straight away and so what they want to do is be able to integrate and connect and so we have some of our partners here for example of fabric ready partners we have connectors we build into their platforms and orchestration systems and that's their first step once they get there they start looking across to see what they can consolidate so can they take a specific solution from this and I'm bringing inside and then eventually they start to look at the long-term architecture if they're moving apps to the cloud or they want to open up their where or they want to provide kind of SD functionality inside their branch but so it's definitely a phase approached I don't see many customers some customers would take an application and create from scratch inside the cloud they can't do that with their infrastructure they can't just completely wipe it clean start again it's definitely more of a phased approach so as you think about the phase approach and you talked we heard from we heard from the sales port side the notion that the SPS the service providers want greater customization the enterprise wants a different level of access to the core technologies so that they can do not customization not exactly I remember exactly what the term was but what degree will customers retain control over how that architecture gets implemented versus what degree is it going to get baked into the stack itself a bit of both I think you know for most customers they're running towards a digital platform and they need to own that digital platform if they give up complete control you know how do they control that their destiny going forward so they want to own the digital platform but they haven't got the resources to do everything so they'll outsource some to service providers and carriers some of the partners for example but again I keep coming back to this they want to get to a point in five years time where they've got a digital footprint it's very flexible but they also want to make sure it's very secure because as you open up that digital footprint you're opening up all these different edges inside the network and it's coherent which is the architected approach yes because if they don't have a coherent approach to doing it they don't know what the interfaces are or are not competent and that includes interfaces with partners yeah they have to look forward and say I'm gonna implement X amount in the cloud I'm now gonna have some edge compute going on here I want to shape make sure my branches have the best quality of service for these certain applications that go back to this so they look at all those parameters and then architect something from there so I know that security network security app security info security cloud security is in our imperatives for every industry but I didn't notice that the breakouts today feature I think there's a couple of vertical features healthcare financial services retail I'm just curious are those just great use cases that show the potential and the power of 14x technologies or are those industries that are either early adopters or maybe more leading-edge because they have such a tremendous amount of data that needs to be secured as their ecosystem does this yeah so the industry verticals I think I think for the very large ones they're very similar all of them have IOT that's expanding or don't want to have a flexible wand system all them I've got something some compute power and the cloud and the edge going forward so I know there's differences in industries for the very large enterprises it's the problem seems the same these huge organizations and they have all of these things going on in each trying corner I'd you come down to mid enterprise I think there's more reason to consolidate but then you see more differences in the way they approach things like a healthcare they're really focused on that healthcare kind of security of devices inside the hospitals etc education oh they need to connect in these big data banks and transfer the research information so big organizations I say pretty much the same problem midsize organizations become more relevant to a specific industry well John thank you so much for carving out some time speak with Peter and me today we appreciate that and it's exciting to see and feel the momentum that 49 is bringing into 2019 wealth I'm say inviting me our pleasure we want to thank you for your time as well for Peter Burris I am Lisa Martin you're watching the cube [Music]

Published Date : Apr 12 2019

SUMMARY :

the data and to do that again we keep

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

Peter BurrisPERSON

0.99+

2019DATE

0.99+

Lisa MartinPERSON

0.99+

JohnPERSON

0.99+

John MadisonPERSON

0.99+

PeterPERSON

0.99+

two anglesQUANTITY

0.99+

first stepQUANTITY

0.99+

John MaddisonPERSON

0.99+

forty minutesQUANTITY

0.99+

FortinetORGANIZATION

0.99+

AprilDATE

0.99+

Orlando FloridaLOCATION

0.99+

KenPERSON

0.99+

first oneQUANTITY

0.98+

Peter versePERSON

0.98+

five yearsQUANTITY

0.98+

todayDATE

0.98+

twoQUANTITY

0.98+

sixQUANTITY

0.98+

forty OS 6.2TITLE

0.97+

bothQUANTITY

0.97+

single platformQUANTITY

0.97+

third generationQUANTITY

0.96+

over fiftyQUANTITY

0.96+

14QUANTITY

0.96+

nineteenQUANTITY

0.92+

single consoleQUANTITY

0.92+

about three hundred featuresQUANTITY

0.92+

40 netQUANTITY

0.91+

third generationQUANTITY

0.91+

eachQUANTITY

0.89+

halfQUANTITY

0.89+

forty OSTITLE

0.87+

a yearQUANTITY

0.86+

singleQUANTITY

0.86+

49ORGANIZATION

0.85+

oneQUANTITY

0.84+

fourteenQUANTITY

0.83+

few years agoDATE

0.82+

eightQUANTITY

0.81+

couple of stepsQUANTITY

0.81+

14xQUANTITY

0.79+

CosbyORGANIZATION

0.78+

executive vice presidentPERSON

0.73+

fortyQUANTITY

0.71+

one edgeQUANTITY

0.69+

one perspectiveQUANTITY

0.68+

lot of customersQUANTITY

0.67+

lotQUANTITY

0.64+

moneyQUANTITY

0.61+

five yearsDATE

0.61+

coupleQUANTITY

0.46+

patricePERSON

0.46+

nextQUANTITY

0.41+