Dan Havens, Acronis | Acronis Global Cyber Summit 2019
>>From Miami beach, Florida. It's the queue covering a chronics global cyber summit 2019 brought to you by Acronis. >>Okay, welcome back. Everyone's the cubes covers two days here in Miami beach. The Fontainebleau hotel for the Kronos has global cyber summit 2019. It's inaugural event around a new category emerging called cyber protection. Um, this isn't a wave that's going to be part of the modernization a week we've been calling cloud 2.0 or whatever you want to call it. A complete modernization of the it technology stack and development environment includes core data center to the edge and beyond. Our next guest is Dan havens, chief growth officer per Chronis. Dan, thanks for coming on. Appreciate it. And thank you for having me, Dan. So, uh, what does chief growth officer mean? You guys obviously are growing, so obviously we see some growth there. Yeah, numbers are there. What she, what she, we have a couple of divisions in the company where we see we can really accelerate the business. >>So we came in and we wanted to make some large investments here. One of those areas was sports. You're seeing race cars out here on the floor, you're seeing all kinds of baseball teams, soccer teams, and we're talking to everybody. We have 40 teams now that are using our technology for competitive advantage on the field. Uh, the other areas, OEM, so, uh, original equipment manufacturers, everybody from making a camera to a server somewhere, having a Cronus be embedded, that's a big angle for us and we just didn't have a lot of focus. So I came into to build those divisions. I've actually joined the CEO before in a prior life in his last company and did something similar for him on a similar, uh, back there and we had violent success. So yeah, it's been a lot of fun. I've been here a year and a half and we're killing it. >>We got triple digit growth in the sporting category and similar in the OEM. It's interesting, you know, I look at a lot of these growth companies and the kind of a formula. You see, you guys have a very efficient and strong product platform engineering group. A lot of developers, a lot of smart people in the company, and a strong customer facing for the lack of a better word, field. The group you're in, you're involved, this is not, and you got marketing supporting it in the middle. Yep. So nice, efficient organizational structure on a massive way. But cyber, because this isn't your grandfather's data projection, this is a platform. What's the pitch? So the key here for us is we have to always say, and, and it, it's, it's hard to simplify and we're easy. In fact, we're cost-effective. Sometimes I'll even say I'm cheap and I'm easy. >>And that does not go out of style for an enterprise, right? So our ability to take good old fashioned backup and these things that other people need and basically extend that across. Now I can have one window where I can control, keep 'em out. If somebody gets in or from the inside or a disaster happens. I from this one place can recover my data. I'm secure with my data. I have the ability to notarize my data. So this one, and by the way, key simple interface. Customers love simple. This one simple interface to be able to do that. Now it takes a lot of engineering that goes behind that. I have plenty of, I have fancy engineering degrees and all that, but I try forget that when I'm talking to a customer because at the end of the day it's gotta make sense. A mind that doesn't know, says no. >>And I think we do a pretty good job of simplifying the message, but as they get under the covers and they roll it out, they recognize that there's, you know, we, we, we have more engineers per employee capita than any company that would have 1600 employees. Simple, easy to use. It reduces the steps it takes to do something as a winning business model. You kind of come from that school you mentioned, you know, cheap and easy. That's what is key. Yeah. But we're in a world where complexity is increasing and costs are increasing. Yep. These are two dynamics that are facing every enterprise, cyber it everywhere. What's your story when you want to educate that person so they can get to that? Yes. I want to work with you guys. What's that? What's that getting to? Yes. Processed motion look like. So the beautiful part is is we sell software right now. >>Software can be purchased complex. You install it, you can figure, you do everything yourself. We also can sell that from a cloud standpoint. So now you consume it like a service. Just like you consume Netflix at home, right? I can now consume this protection as a service. You have bolts spectrums covered. Most enterprises are somewhere in the middle. We call that hybrid. So the idea here is that there's going to be components where this data's not leaving these four walls. It might be government agency, it might be some compliance factor, but the ability to be able to say yes anywhere on that spectrum, it makes it very easy for an executive to say, okay, but we have a very, as you leverage the cloud, the OnRamp for this can be as simple as turning on the surface and pointing it at a data source. I mean, you're a student of history, obviously even in this business for awhile, you've done been there longer than you'd think. >>Data protection was kind of like that. Afterthought, backup data recovery all based upon, yeah, we might have an outage or a flood or hurricane Sandy who knows what's going to happen. You know, some force majority out there might happen, but security is a constant disrupter of business continuity. The data's being hijacked and ransomware to malware attacks. This is a major disruption point of a world that was supposed to be a non disruptive operational value proposition. Yeah, so the world has changed. They went from a niche, well, we've got their architecture of throwing back up. You've got to think about it from day one at the beginning. This seems to be your, your story for the company. You think about security from the beginning with data protection. There's only one club in the bag, so to speak. Talk about that dynamic and how's that translating into your customer's storytelling customer engagements to show you, you used an interesting word at the beginning, disaster recovery years ago, I started my tech industry in 1992 right? >>Disaster recovery is when we're going to have a flood or a hurricane and the building's going to burn down. What we find is most of our customers, that's certainly happens, but that's not the driver. The driver now is somebody after my data because the world has changed. Not only has the amount of data we're collecting change, but the ability to illegally monetize somebody else's data has become reality and you have social media that is socializes if you get breached and so forth. So there's a number of drivers. Number one, I don't want to be turned out of business. Number two, I don't want to be ransom. Then number three, I certainly don't want to do the cover of the wall street journal tomorrow morning as a top executive who looked past data. We literally watch brands, I won't mention the brand now, but a very large fortune 1000 what's called out yesterday. >>We see it every few days and we watched the carnage of their brand get deluded because they weren't protected. So I think it's the perfect storm up. I've got a ton of data, so it's coming in from all directions. Secondly, I I'm concerned about, you know, my brand and been able to protect that data and then you know, what do I do? And the disaster in this case is not necessarily flood or fire. It's that somebody from the inside or outside got in the gym. Pretend that I'm a decision maker. I'm like, my head's exploding. I'm got all this carnage going on. I don't want to get fired yet. I know I'm exposed. Nothing's yet happened yet. Maybe I settled the ransomware thing, but I know I'm not in a good place. What's your story to any, what's your pitch to me? What's in it for me? Tell me. >>Tell me the posture and the, well, we're halfway home. If you say, I know I'm not in a good place, right? Cause oftentimes somebody has to get bit first or they have to see their neighbor get bit first and then they say, Hey come in. One of my first plays would be let's find out what place you really are. I can do that very quickly and an assessment, we can gather your systems, we can get a sense for our, where's your data? Where it's flowing from. What are you doing? What are you doing to protect it? We typically will come back and there's going to be spots where there's blind spots. Sometimes they're fully naked, right? But the good news is is now we know the problem, so let's not waste any time, but you can get onboard and baby steps or you know, we can bandaid it or we can really go into full surgery however you want to move forward. >>But the idea is recognizing this has to be addressed because it's a beast. Every single device that's out there on the floor, in any enterprise, any company is a way in and a POC are critical for your business model. You want to get them certainly candy taste, show the value quickly has a POC, gets structured unit assessment. You come in on a narrow entry nail something quick, get a win. What's the, what's the playbook? Love PLCs because we're so fast and easy meaning oftentimes you do PLCs cause you're complex software and you're trying to prove your point and so forth. I love to push a POC cause I can do it inside of days, but I get the customer to take the drive. It's just on the car lot. If I get you to drive it down the block, you're not bringing it back. You're bringing it home to the neighbors. >>Right. That is the case with our software and our hit rate is key. But again it's because it's straightforward and it's easy. So though most sales cycles don't push for pilot. I can't wait to get a pilot but we don't need 30 days to do it in a couple of days. They're going to recognize I can do this too. You have a good track record of POC. If I get, this is going to be the most conceding. You might have to edit this out. If I get an audience, I will win. That is the most conceited statement on the planet. And if I get the audience and they will look, and this is why we use the sports teams. Sports teams are the cool kids using this. And if I get an executive to say, what are you guys doing with the red Sox? If I could get him or her to look, it's game over. >>Hey being bad ass and having some swagger. It's actually a good thing if you got the goods to back it up. That's not fun. Piece here is that the product works well and it's not this massive mountain to hurdle. It is. We can get started today and take bites as we go, but you mentioned sports. Let's get into that talk track. As we have been covering sports data for now six years on the cube in San Francisco. We were briefly talking about it last night at the reception, but I think sports teams encapsulates probably the most acute use case of digital transformation because they have multiple theaters that are exploding. They got to run their business, they got a team to manage and they got fan experience and their consumers, so you've got consumerization of it. You got security of your customers either in a physical venue from a potential terrorist disaster could happen to just using analytics to competitive venture from the Moneyball model to whatever sports really encapsulates what I call the poster child of using digital into a business model that works. >>You've been successful with sports. We interviewed Brian shield yesterday. Yup. Red Sox, vice-president technology. He was very candid. He's like, look it, we use analytics. It helps us get a competitive, not going to tell you the secrets, but we have other issues that people not thinking about drone strikes while the games going on, potential terrorist attacks, gathering the people, you know, adding on East sports stadium to Fenway park. They have a digital business model integrating in real time with a very successful consumer product and business in sports. This has been a good market for you guys. What's been the secret to success? >> Explosive market? Couple things. First off, you summarized well, sports teams are looking for competitive advantage, so anything that can come in under that guys is gonna get some attention plus data, fan data, system data, ticket data. Um, in baseball, they're studying every single pitch of pictures ever thrown. >>They have video on everything. This is heavy lift data, right? So a place to put it saved money, a place to protect it, a pace to access it so that all of my Scouts that are out in the field with a mobile device have the ability to upload or evaluate a player while they're out still on them and on the field somewhere maybe in another country. And then add the added caveat in our sexiest piece. And that's artificial intelligence. You mentioned Moneyball, right? Uh, the, the entire concept of, of stat of statistics came out in the Moneyball concept and you know, we all saw the movie and we all read the book, but at the end of the day, this is the next step to that, which is not just written down statistics. Now we can analyze data with machine learning and we have very, we have unique baseball examples where there's absolutely no doubt they have the data. >>It's the ability to, how do I turn that to where I can be more competitive on our racing team. So we're actually working with teams improving, changing the car on the track during the race, using our software fact. We always look forward to opportunities where somebody says, Hey, come in and talk about that because it's incredibly sexy to see. Um, but sports are fun because first off they're the cool kids. Secondly, they're early adopters. If it's gonna give competitive advantage, uh, and third, they hit all the vectors. Tons of data have to protect it. >> It's our life in the business models digital too. So the digital transformation is in prime time. We cannot ignore the fact that people want wifi. They got Instagram, Facebook, all of these, they're all conscious of social media. There are all kinds of listening sports club, they have to be, they have to be hip, right? >>And being out front like that, think about the data they have come in at. And so not just to be smart on the field, they have to be smart with our customer. They're competing with that customer for four of their major sports or whatever. Major sports in the, in the, in the, in our case in this fashionable to be hip is cool for the product, but now you think about how they run their business. They've got suppliers, um, that have data and trusting suppliers with data's. There's a difficult protection formula. They've got national secure security issues. They have to protect, well they have to protect as a big part, but they have to protect, well first off these, these archives of data that are of 20 races ago or of this pitcher pitched three years ago and I have a thousand of his pitches and I'm looking for towels. >>That is, that's mission critical. But also, uh, to boot you have just business functions where I'm a, I'm a team and I have a huge telco sponsor and we are shifting back and forth and designing what their actual collateral is going to be in the stadium. They're actually using a Chronis to be able to do that up in the cloud where they can both collaborate on that. Not only doing it, but being able to protect it that way. It's, it's more efficient for them. It's interesting. I asked Brian shield this question, I asked her how does baseball flex and digital with the business model of digital with the success of the physical product or their actual product baseball. And he said an interesting thing. He's like the ROI models just get whacked out because what's the ROI of an investment in technology? It used to be total cost of ownership. >>The class that's right under the under the iceberg to sharpen whatever you use, you use that. We don't use that. We think about other consequences like a terrorist attack. That's right. So so the business model, ROI calculation shifting, do you have those kinds of conversations with some of these big teams and these sports teams? Because you know they win the world series, their brand franchise goes up if they win the national championship, but whatever their goal is has real franchise value. There's numbers on that. There's also the risk of say an attack or some sort of breach. >> Well, I won't mention the names, I won't mention the teams by name, but I have a half a dozen teams right now and two that are actually rolling out that are doing facial recognition just for security, a fan's entering their stadium. So they are taking the ownership of the safety of their fan to the level of doing visual or facial recognition coming into their stadium. >>Obviously the archive to measure against is important and we can archive that, but they're also using artificial intelligence for that. So you're absolutely right. They owe their fan a safe experience, not only a safe experience with good experience and so forth. And we love to be associated whenever we can with wins and losses. But to your point, how do you get, or how do you show a TCO on a disaster and nobody wants to, and by the way, we've seen enough of that to know it's looming. And there's also the supply chain too. I can buy a hotdog and a beer from Aramark, which is the red socks. They say supplier that's not owned by the red Sox. They have a relationship. But my data's in, I'm a consumer of the red Sox. I'm procuring a, you know, some food or service from a vendor. Yeah, yeah. My data's out there. >>So who protects that? Well, these are unique questions that come up all the time. Again, that's a business decision for the customer. The idea is with cloud collaboration, it's technically quite easy, but again, they have to decide where they're gonna commingle their data, how they're going to share. But the idea here is, again, back to the spectrum, fully cloud and accessible and locked down airtight government's scenario where we have a, you know, a lock bottom line is you get to pick where you want to be on there and there's going to be times where my example of talking to the, uh, the telco vendor, we're, we're actually going to share our data together and we're going to make us faster, make a quicker return and design this collateral for our stadium faster. Those are business decisions, but they're allowed because it, Coronas can be as hybrid as you need to be along the site. >>And again, that resonates with an executive. They never want to be wearing handcuffs and they don't want to pay overpay for stuff to not use our stuff. And if you decide to consume cloud, you, you just pay as you go. It's like your electricity bill. All right. So the red Sox are a customer of you guys. You have or they use your service. What other sports teams have you guys engaged with who you're talking to? Give a taste of some of the samples. So European, we have a couple of formula one teams. We have a racing point. We have the Williams team and formula E we have to cheetah the dragon team. We have a adventury, we also have Neo. So we have a good presence in the racing clubs. We have a ton of a world rally cars and, and, and motorcycle motorcross and so forth. >>Then you step over into European football. So we, we, we started in cars and recognize this is hot. So then we got our first, uh, European team, uh, and we had arsenal. As a matter of fact, we have one of the legends here signing with us today. And you know, I mean, they're rock stars, right? People follow them. Anyway, so we have arsenal and we did man city. Um, and we just landed, uh, Liverpool just did that this quarter, two weeks ago. I literally just, the ink is still drying. Um, and then you move into the United States, which I brought the, you know, I brought the circus to town on January one, 2019. First when was the Boston red Sox. We quickly followed that up. You'll see us on the home run fence at San Diego Padres. Volts bought for different reasons, but both very sexy reasons. So it's the reason. >>What were the main drivers? So in the case of the Boston red Sox, it was, it was a heavy lift on video. A lot of on the protection side. Um, the, uh, San Diego was file sync and share. So the example I was giving of, um, being able to share with your largest telco vendor or with your largest investors slash sponsor for your stadium, um, that was the driver. Now what's funny about both is as they get started, he's always expanding, right? So we have the baseball teams, we did land this quarter, the Dallas stars. So that's our first hockey club. I really want. And my goal is to try to get a couple in each of the main four categories and then some of the subs, um, just cause you get the cool kids, you get a tipping point. Everybody then wants to know what's going on. I have a hundred and play. >>And so we, we typically try to qualify regional where it makes sense. Um, uh, we're, you know, we're very close with a team here in the region. So, you know, they, in the feedback from, from the, from the successes you had implementations, why, what's uh, what's been the feedback from the customers. So here's the file in this. Sounds like I'm just tripping with sales guy and I apologize. Warning signs. Okay. If they use it, we're home free. So when you get Brian or any one of these guys that are using it, all I have to do is make sure that a new customer hears this person who has no reason to say anything else and just expose them to it. Because it's this unknown, scary thing that we're trying to protect against and being able to do that and have the freedom of how aggressive or you know, what metaphor am I going to cover that? >>And then also, uh, you know, the, obviously the economics work is you pay as you go. Um, it's, you know, it's a good story. Well, Dan, congratulations on the success. Um, great to see you guys really digging in and getting those PLCs and being successful. We watching your growth. Final question for you yes. Is all the data and the patterns that you see and all of customers. What's the number one reason why a Cronus is selected and why you women? I think that's an interesting question and I think that it's a couple of reasons. Number one, we work, we're easy. We have an enormous footprint. So there's a lot to reference from. Many people have already used us on the consumer side, so we're safe. So that's one reason I would also tell you however, that we have a great ecosystem because a Kronos is different than most software companies. >>Most software companies have a huge outside sales force that sells direct to customer a Chronis. Everybody here is a partner. We sell through a service provider to a channel member through a, through a, a, a, an ISV. Um, and then we have some direct enterprise. But the idea is there's a variety of solutions that can be baked on this foundation. And I think people like that variety. I, they, they like the, like the freedom of I'm not just trapped with this one thing. I can buy it and all options are available and I will tell you an it, nobody wants to be locked down. Everybody wants options, safety in numbers. They want their data protected with the whole cyber land lens. And they know everything's changing every six months. Something's different. And I don't want to be handcuffed in my desk. I want all options available. I think that's our best value from all right, Dan, thanks for coming on. Dan havens, chief growth officer, but Krohn is weird. The Chronis global cyber summit. I'm John Ford. Stay tuned for more cube coverage after this short break.
SUMMARY :
global cyber summit 2019 brought to you by Acronis. A complete modernization of the it technology So I came into to build those divisions. So the key here I have the ability to notarize my data. So the beautiful part is is we sell software right now. So the idea here is that there's going to Yeah, so the world has changed. is most of our customers, that's certainly happens, but that's not the driver. And the disaster in this case is not necessarily flood or fire. But the good news is is now we know the problem, But the idea is recognizing this has to be addressed because it's a beast. And if I get an executive to say, what are you guys doing with the red Sox? Piece here is that the product works well and it's not this massive What's been the secret to success? First off, you summarized well, sports teams are looking for competitive advantage, have the ability to upload or evaluate a player while they're out still on them and on the field somewhere maybe It's the ability to, how do I turn that to where I can be more competitive on our racing team. So the digital transformation is the field, they have to be smart with our customer. But also, uh, to boot you have just So so the business model, ROI calculation shifting, So they are taking the ownership of the safety of their fan to the Obviously the archive to measure against is important and we can archive that, but they're also using artificial intelligence for But the idea here is, again, back to the spectrum, fully cloud and accessible and So the red Sox are a customer of you guys. So it's the reason. the subs, um, just cause you get the cool kids, you get a tipping point. So here's the file in this. What's the number one reason why a Cronus is selected and why you women? I can buy it and all options are available and I will tell you an it,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dan | PERSON | 0.99+ |
Brian shield | PERSON | 0.99+ |
1992 | DATE | 0.99+ |
Red Sox | ORGANIZATION | 0.99+ |
Brian | PERSON | 0.99+ |
January one, 2019 | DATE | 0.99+ |
30 days | QUANTITY | 0.99+ |
40 teams | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
John Ford | PERSON | 0.99+ |
Fenway park | LOCATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Dan Havens | PERSON | 0.99+ |
two days | QUANTITY | 0.99+ |
six years | QUANTITY | 0.99+ |
red Sox | ORGANIZATION | 0.99+ |
tomorrow morning | DATE | 0.99+ |
1600 employees | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
Aramark | ORGANIZATION | 0.99+ |
Acronis | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
one reason | QUANTITY | 0.99+ |
a year and a half | QUANTITY | 0.99+ |
arsenal | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.98+ |
two dynamics | QUANTITY | 0.98+ |
two weeks ago | DATE | 0.98+ |
three years ago | DATE | 0.98+ |
one window | QUANTITY | 0.98+ |
First | QUANTITY | 0.98+ |
ORGANIZATION | 0.98+ | |
one club | QUANTITY | 0.97+ |
Dan havens | PERSON | 0.97+ |
Secondly | QUANTITY | 0.97+ |
telco | ORGANIZATION | 0.97+ |
last night | DATE | 0.96+ |
ORGANIZATION | 0.96+ | |
Fontainebleau | ORGANIZATION | 0.96+ |
Kronos | ORGANIZATION | 0.96+ |
Krohn | PERSON | 0.96+ |
one | QUANTITY | 0.96+ |
Netflix | ORGANIZATION | 0.95+ |
first plays | QUANTITY | 0.95+ |
Miami beach, Florida | LOCATION | 0.95+ |
Miami beach | LOCATION | 0.94+ |
day one | QUANTITY | 0.94+ |
Williams | ORGANIZATION | 0.94+ |
third | QUANTITY | 0.94+ |
European | OTHER | 0.94+ |
each | QUANTITY | 0.93+ |
Moneyball | TITLE | 0.93+ |
Acronis Global Cyber Summit 2019 | EVENT | 0.93+ |
four | QUANTITY | 0.92+ |
first hockey club | QUANTITY | 0.91+ |
20 | DATE | 0.91+ |
four categories | QUANTITY | 0.91+ |
Dallas | ORGANIZATION | 0.91+ |
half a dozen teams | QUANTITY | 0.9+ |
Tons of data | QUANTITY | 0.89+ |
San Diego Padres | LOCATION | 0.87+ |
OnRamp | ORGANIZATION | 0.87+ |
Boston red Sox | ORGANIZATION | 0.87+ |
one place | QUANTITY | 0.86+ |
one thing | QUANTITY | 0.84+ |
this quarter | DATE | 0.84+ |
Volts | ORGANIZATION | 0.83+ |
six months | QUANTITY | 0.83+ |
Chronis global cyber summit | EVENT | 0.82+ |
cyber summit 2019 | EVENT | 0.79+ |
ton of data | QUANTITY | 0.77+ |
East sports stadium | LOCATION | 0.77+ |
Serguei Beloussov, Acronis | Acronis Global Cyber Summit 2019
>>from Miami Beach, Florida It's the Q covering a Cronus Global Cyber Summit 2019. Brought to you by a Cronus. >>Welcome back with Cubes Coverage here for two days at the Cronus Global Cyber Sum of 2019. I'm John Courier, Post keeper in Miami Beach at the Fontainebleau Hotel, and I am here with the CEO and chairman of Cronus SP Sergei, known as SP. >>Yeah, joining that, that's fine. It's fine. >>So your inaugural event of the Global Cyber Summit What you're what you're feeling so far like it's >>very good to have exceeded the expectations. In terms of a dangerous with high quality audience. Everything is organized quite well. It's our first event of a kind. It's a first marks a transformation of the company from being data protection company to be decided protection company from the application company to be a platform. >>Talk about the vision and we're how you got here. Because again, the market's changing cloud computing, Internet of things, more threats than ever before data seems to be at the center of all this. >>Don't think about the team in terms of data, will look at 18 terms of foreclose, so workload could be day to put the application for the system. We also look at the team, not from the standpoint large passed him a small fast mark, but from the standpoint off and point, like your computer right here on the table or a mobile device from step with authority, which is a large that the center of a gentle price. Or it is a cloud like Amazon, like Google, like Microsoft. And from the standpoint of something in the middle, which we call EJ, and it's growing very rapidly, that's a small data center. That more door is that a small office that's also specialized vacations, like practically my hospital, like a railway station like restaurants. Like any retail location where you actually have specialized computers. Detective Lee servers running the infrastructure, for example. Every Starbucks location is actually 12 and those computers edge and then point. Need protection, need complete protection. And our mission is to provide a complete protection from the standpoint of safety, accessibility, privacy, authenticity of security that something which will go for any of us. >>You know, I think your divisions right on. In fact, when you think about data protection, my observation is it was because of disruption and operations. Somehow an event happened. Hurricane flood the operation of destructive. They gotta roll back and get the snapshots and bring it back. But security is now causing a disruption. I think you guys are honing in on with disruptions coming from a security vector way. Official mechanisms have to change a little bit. That seems a bit your success here with. >>I think we look at this holistically way, don't see really different, so safe its accessibility, privacy of authenticity and security. A love. This vectors are a problem, you know, perhaps authenticity. He's not yet visible as march, and privacy is new, So privacy is not the bad guys. You know, it's a good guys, guys. It's maybe yours. Employees. Maybe your partner. Or maybe maybe it's your customer. One. You don't want to see the information about somebody else and so alone. This is a threat, and you really don't want your infrastructure to be damage to your business to yourself. Unintentional damage. If you want to break something, you better break it, wasting your decision and you better be able to roll back so you know it comes from data protection, but it goes to security and privacy and authenticity. All of this together is important for defensive your idea. Infrastructure is functional and old times controlled by you. >>In your opinion, has ransomware provided a wake up call to I t around this area? Because that seems to be a theme. A lot with Ransomware. People realize that they're stuck highlights >>a problem somewhere is an interesting trend. I wouldn't really be happy about Ransomware around somewhere is a scene. So we help people to be protected against run somewhere. But that doesn't mean we like Ransomware. So yeah, >>extortion. Not really. Well, like, yeah, you're the one being extorted. >>Nice. But it's one of the wake up calls in reality again. It comes from all the directions. I think Ransomware is just very, very easy to understand. >>People can see and understand it. Explain You mentioned s a P A s. What does that explain that acronym? What does it mean? What's the vision behind >>Sabba says is safe Accessibility, privacy else intensity and security combined in a single product. That's what it means. It means that you know, don't lose in using everything is accessible at all times with the right people have access and you can control the access. Nothing is mortified in such ways that you don't know it was modified and no bad guys can break into your tea or into your date or NT applications >>you mentioned. The platform platforms are well known concept and computer science and certainly the Internet. You've seen great successes with platforms, enable something. How would you describe the enablement that comes from Cronus platform, Cyber platform. >>I think it comes back to what you start at the waist. There is a lot of new friends and part of this new Frances. The world for a while maybe 20 years ago looked like the world which is consolidating. And you can one vendor which provide solutions to watch majority of problems. Which was Michael, right? So you remember 1999. It looked like pretty much everybody is gonna use windows. Mark is not going to be there. Microsoft was making some inroads in Mobile was in C and so on and so forth. Well, now the water is consolidating. You have thousands of different types of workers. You have different systems. You have different applications. You have different cloud applications. You need to protect them in a very different way. That's another thing you need to integrate a lot about. You cannot do it all. So we opened our applications and our black from certain parties. Was event like this toe actually build on top of the platform to provide the functionality, which we don't >>You say that word system a few times, and I think this is interesting platform validation systems Thinking is like an operating system. It's a lot of consequences and systems The old system that seems that systems thinking is back in in the front lines of I t and technology because you got a cloud you got on premises, you got I ot way networks. It's a system, and so realistically thinking about it's interesting. Do you think people are getting their are you get the right thing to do? I think like a system >>wear simple people in a Cronus. We look at the world and we don't see anything but data by zeros and ones way don't look it everywhere, and I don't see anything but more clothes and these workers they could be in the cloud that could be on prayer. Music would be a partner location. It could be on your mobile device. It could be the whole device apart with. And we also see the world in terms of partners. And from our point of view, you know, it's it's was that people realize that, you know, people have idea needs to work on their partners to help him. So if I did, that work can do, innit? They cannot call their friends. They can communicate is a relative word possible head of the world. And so what we provide is a protection to make sure that it works a full time, no matter what is a possible challenge. >>That's me. Thank you for taking the time to answer some questions. I want to get one final question to you. News today Opening AP Eyes up Trading Developer network and a portal New New things. What's your message to the folks that want developing on your platform? What's the guiding principles with what's the simple value proposition of why I'm a developer? I wouldn't want to work on The Cronus is Global Platform >>so way might look relatively small. We're only 1.5000 people and we're only several $100 million. They were growing very rapidly. We have 6000 partners who can sell your products, and this number is going. Read it after you have 30,007 years. And so you have also a lot of data on the management. Five exabytes of data on the management and this amount of it is growing very rapidly. If you build applications for protection of this data, this number of workloads, this number off partners to sell it, you can sell your products successfully. Ultimately, for developers, it's It's about doing something which makes money and doing something which makes sense. And with our partner network, with our workload and they reach, they get to make sense and they get to make money. >>And it's a hot area. Cyber protection of a new Category Emerging out of the old data protection If you had to describe someone, the old waivers of the New way data protection the old way. Cyber Protection New Way. What's the difference between the two? >>Well, the difference is that includes security, privacy management, know sadistic management in one package. The difference is that it's designed to work in the world which is in parenting secure. It designed to work in the world where if you connect a network, you don't trust this network. And so if you have a cyber protection application cyber protection car where it has to be protected itself, that's >>thank you. Come on. Cue and taking the time out of your busy schedule to talk to us. Thank you. Very welcome. Appreciate it to give coverage here in Miami Beach across Global Cyber 7 2019 I'm John. Four year. Thanks for watching two days of coverage here. Be right back.
SUMMARY :
Brought to you by a Cronus. I'm John Courier, Post keeper in Miami Beach at the Fontainebleau Hotel, It's fine. protection company to be decided protection company from the application company Talk about the vision and we're how you got here. And from the standpoint of something in the middle, which we call EJ, and it's growing very rapidly, I think you guys are honing in on with disruptions coming from a security vector and you really don't want your infrastructure to be damage to your business to Because that seems to be a theme. But that doesn't mean we like Ransomware. Well, like, yeah, you're the one being extorted. It comes from all the directions. What's the vision behind It means that you know, don't lose in using everything is accessible at all times How would you describe I think it comes back to what you start at the waist. their are you get the right thing to do? And from our point of view, you know, Thank you for taking the time to answer some questions. this number of workloads, this number off partners to sell it, you can sell your products successfully. protection If you had to describe someone, the old waivers of the New way data It designed to work in the world where if you connect Cue and taking the time out of your busy schedule to talk to us.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Michael | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
John Courier | PERSON | 0.99+ |
Serguei Beloussov | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
30,007 years | QUANTITY | 0.99+ |
1999 | DATE | 0.99+ |
two days | QUANTITY | 0.99+ |
6000 partners | QUANTITY | 0.99+ |
Miami Beach | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
18 terms | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
Miami Beach, Florida | LOCATION | 0.99+ |
Four year | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Mark | PERSON | 0.99+ |
Starbucks | ORGANIZATION | 0.99+ |
$100 million | QUANTITY | 0.99+ |
Cronus | ORGANIZATION | 0.99+ |
Lee | PERSON | 0.99+ |
first event | QUANTITY | 0.98+ |
12 | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
1.5000 people | QUANTITY | 0.98+ |
Global Cyber Summit | EVENT | 0.98+ |
Cronus Global Cyber Summit 2019 | EVENT | 0.98+ |
EJ | ORGANIZATION | 0.97+ |
Global Cyber 7 2019 | EVENT | 0.96+ |
Acronis | ORGANIZATION | 0.96+ |
20 years ago | DATE | 0.96+ |
Sabba | PERSON | 0.96+ |
windows | TITLE | 0.95+ |
one final question | QUANTITY | 0.95+ |
one pack | QUANTITY | 0.95+ |
one vendor | QUANTITY | 0.93+ |
single product | QUANTITY | 0.93+ |
zeros | QUANTITY | 0.89+ |
Cronus Global Cyber Sum of 2019 | EVENT | 0.88+ |
Acronis | EVENT | 0.87+ |
One | QUANTITY | 0.85+ |
Cronus SP | ORGANIZATION | 0.84+ |
AP | ORGANIZATION | 0.84+ |
Frances | PERSON | 0.83+ |
Sergei | PERSON | 0.82+ |
Global Cyber Summit 2019 | EVENT | 0.8+ |
thousands of | QUANTITY | 0.8+ |
Five exabytes of data | QUANTITY | 0.76+ |
types | QUANTITY | 0.63+ |
ransomware | TITLE | 0.54+ |
Fontainebleau | ORGANIZATION | 0.52+ |
The Cronus | TITLE | 0.51+ |
Hotel | LOCATION | 0.49+ |
SP | ORGANIZATION | 0.49+ |
Ransomware | TITLE | 0.41+ |
Pat Hurley, Acronis | Acronis Global Cyber Summit 2019
>>From Miami beach, Florida. It's the cube covering a Cronus global cyber summit 2019. Brought to you by Acronis. >>So Ron, welcome back to the keeps coverage of kronas cyber global cyber summit 2019. I'm John furrier here in Miami beach. Our next guest is Pat Hurley, vice president, general manager of the Americas in sales and customer relationships. Get Debbie Juan. Hey, thanks for having me. Welcome to Miami beach. Lovely place to have an event. So I hear ya. You got a lot of competition going on between the U S America's in the AMIA teens and it's very competitive group. >> The European team is very confident. I think we'll show them tomorrow what we're made of. We've been recruited very hard for some players that are Latin American. I think we'll show them a finger too. You've got a big soccer story there. We do. Yeah. We've, uh, we've got a few sports partnerships that we have across the globe. Uh, some of the first partnerships we had were actually within formula one. >>And we really try to correlate the story of the importance of, uh, data protection and cyber protection in the sporting industry because a lot of people don't think about the amount of data that's actually being generated in the space. A formula one car generates between, you know, two and three terabyte through three gigabytes of data on every lap, tons of telemetry devices that are kicked, collecting information from the car, from the road service, from the, the general environment. They're taking that data and then sending it back to the headquarter, analyzing it and making very small improvements to the car to make sure that they can qualify faster, run a faster lap, make the right type of angle into a turn, uh, which can really differentiate them from being, you know, first, second, third, 10th in a qualifying session. On the soccer side. We do have some partnerships with uh, arsenal, Manchester city, inter Milan, and we just signed a partnership as well with Liverpool. >>So we are very popping in that space here in the U S we have some other sports that we're big fans of. I'm personally a big Boston red Sox fan, being a Boston native and we do have a sports partnership with the red Sox, which has been an unbelievable partnership with them. And learning more about the use cases that they solve and using our technology has been really cool. >> You know, Patty, you bring up the sports thing and we were kidding before we on camera around the trading, you know how people do sports deals and they trade, you know, merchandise for consumer benefit or customer benefits. But really what is happening is sports teams encapsulate really the digital transformation in a nutshell because most sports franchises are, have been traditionally behind. But now with the consumerization of it and digital can go back to 2007 since the mobile phone. >>Really, I mean it's iPhone. Yeah. Since that time, sports and capsulates every aspect of it, consumer business fan experience. And it really has every, every, almost every element of what we see now as a global IOT problem opportunity. So it really encapsulates the use case of an integrated and and needed solution. Oh yeah, absolutely. I mean, if you think about the amount of data that's, that's out there today and the fast way that it's growing, you know, the explosion of, uh, of data in the, in the world today, sports have different unique challenges. So obviously they have large fan bases that need to be able to access the data and understand what's going on with their favorite sports teams. Um, for us it's really, you know, these technology partnerships that we have with these guys, it runs through all these different areas of, you know, in many cases we didn't really understand that they were using it for. >>So, you know, the red Sox for example, they've got Fenway park and iconic stadium, you know, the Mecca of baseball. If you haven't been there yet, I suggest all your viewers that they go and check it out, give me a call, we'll try and get you set up there. But, um, you know, the, the, the experience that the fans have there is all around their data experienced there. Right? And it's not just baseball games. It could be hockey games that Fenway park, it could be a concert that they're having. A phone buys a lot of different events. These stadiums are open year round and the ability to move, share access, protect the data in that stadium is really important to how they're functioning as an organization. We talked to their I-Team quite regularly about how they're using our solutions. They're talking about uh, different aspects of artificial intelligence, different ways they can use our products and machine learning. >>Obviously with the new solutions that we have in the market today around cybersecurity or helping them to address other challenges that they face. Um, as an organization, these are realtime challenges in their physical locations, national security issues, terrorist attacks could happen. There are venues, there are public gathering places too. Absolutely. We announced our partnership with them back in may and I was shocked to hear them on the main stage announcing that they had this great partnership with the Kronos was talking about their unique cyber security needs. They started talking about drone technology and I'm thinking, all right, a drone flies in the stadium. Maybe at breaks and it falls on a player and we're paying $20 million for one of these pitchers to be out there on the Hill or an interest, a fan or maybe they're collecting some video data to then share it out. >>And that's red Sox IP. No, they're talking about cybersecurity threats in the sense that a drone, a remotely controlled device could come in and lightened incendiary device in the, in the stadium and that to them as a real security server. And that's frontline for the it guys. That's what keeps them up at night. Yeah. And that's really an attack take time. Oh yeah, absolutely. What are the use cases that are coming out of some of your customers, cause you guys have a unique integrated solution with a platform as an end to end component too. You have a holistic view on data, which is interesting and unique. People are kind of figuring this out, but you guys are ahead of the game. What are some of the use cases that you've seen in the field with customers that highlight the benefits of taking a holistic view of the data? >>Yeah, absolutely. So we look at it as kind of backups dead, right? We have, we've combined the old world of backup and disaster recovery with the new world of cybersecurity and we combine that to a term we're calling cyber protection because it really requires an end to end solution and a lot of different things need to be working properly to prevent these attacks from happening. Uh, you need to be very proactive in how you're going about that. We address it with what we call 'em, the Kronos cyber platform. And what this is, is a unique, multi-tiered multi-tenant offering that's designed specifically for service providers. We have just under 6,000 servers, providers actively selling our cyber protection solutions today and they use this for are for a multiple different aspects. And usually the beachhead has something like backup. Every company needs backup. It's more of a commodity type solutions, a lot of different players in the game out there, but they take it a step further, use that same backup technology to then do disaster recovery. >>They can do files, they can share, they can do monitoring. We have notary solutions based on blockchain technologies. Now, this whole suite of cybersecurity solutions, all of this is with a single pane of glass, one platform that of a service provider can go in and work with their customers and make sure that their data is protected, make sure that their physical machines are virtual machines, they're PCs, their Macs are all protected, that data's protected, it's secure, but it's also accessible, which is an important part of you can take your data wrapping a nice bow buried a hundred feet underground, but then you can't use it, right? So you want to be able to make sure that you can actually, uh, leverage the technology there. Um, we've seen explosive growth, especially in, in my market. I think the numbers are pretty crazy. It's something like 90% of the market today in the U S has served in some capacity by a service provider. >>And this could be a small to medium size business that's served by local service fire to those really big guys that are out there. Let's on with how large your target audience, you mentioned search probably multiple times when you're out selling your target persona, your target audience, and you're trying to reach into, so we touch, everybody know, you equate it to kind of what we do with the red Sox, right? You walk into that city and the 38,000 people that, well, some of those people are just, you know, regular Joe's, right? They, they go to work every day. They have a computer at home, they have a mobile device. They probably have multiple mobile devices. We protect that for them. We call them a consumer. Slash. Prosumers. We work at a lot of very large retail organizations. If you walk into some of those shops today, you'll be able to see our software on a shelf there. >>You work with one of those tech squads where they're starting to attach services to it and you get more of a complete offering there. We then scale up a little bit further to some OEM providers. You work with companies like Honeywell and Emerson that are manufacturing devices that embed our software on there. They white label it and deliver it out. These are connected devices. You think about the, you know the, the explosion of IOT devices in the market today. We're protecting that stuff as well. We work with very large enterprises, so some of the, the major players that you see in the manufacturing space are standing up standardizing on Acronis process control process automation vendors are using our Chronis and we can deliver the solution because of the way it's so flexible in a very consumable way for them. Those enterprises can actually act as a service provider for their employees so we can actually take our technology, deploy the layer in their infrastructure where they have complete control. >>They might not want to be in an Uber cloud, they might not want to work with Chrome OS data center. They want to have and hold that data. They want to make sure it's on site. We enable that type of functionality and then the fastest growing area for us is what I hit on earlier within the service provider community. We're recruiting hundreds of service providers every quarter. We've got some great partners here. Give you an example of a service provider. You mentioned the red size, I'm assuming is that a vendor that might be working within that organization, but still it sounds like that's a supplier to the red Sox. How, how broad is that definition? It gives us many points. Yeah, it's a really good point. So we work with hosting providers. Look, can be regional hosting providers to multinational hosting providers. Some of the very big names that you've, you're probably familiar with. >>We work with, uh, we work with, uh, telco providers who work with ISV providers or sorry, ISP providers, um, kind of regional telco providers that provide a myriad of different services all the way down to your kind of local mom and pop type service providers where you've got a small business, maybe they've got 30 to 50 employees, they're servicing probably 200 to 300 customers and they want to provide a very secure, safe, easy to use complete solution to their customers. Uh, those could be focused on certain verticals so they could be focused on healthcare, financial services, construction, et cetera. Um, we have some that are very niche within like dental services or chiropractice offices, small regional doctor's offices. Uh, and the, the beauty of that, and I was getting the partners earlier, is we have partnerships with companies like ConnectWise where those are tools that service providers are using on a very daily basis. >>So essentially the platform gives you that range and that's the typical typical platform. So you have that broad horizontally scalable capability and the domain expertise either be what solution from you guys or can ISV or someone within your ecosystem is that they get that. Right? Absolutely. And that's what really differentiates us is our ability to integrate into that plat, into our platform, into their platform and make those connections. So you don't need to learn 12, 14, 15 different technologies. You've got a small suite of offerings in a single pane of glass, very easy to use, very intuitive. Um, the integrations that we have with these partners like ConnectWise, like Ingram micro, really differentiate us because what they do is they provide open API capabilities. They provide software development kits where these partners can go ahead and build it the way they want to sell it. >>You know, it's interesting when the cloud came out and as on premise has changed to a much more agile dev ops kind of mindset that forced it to think like a service provider. I think like an operating system, it's an operating environment basically. So that service provides an interesting angle and I want to get your thoughts on this because I think this is where you guys have such a unique opportunity to just integrate solution because you could get into anything and you got ISV to back that up. So I guess the question I would have is for that enterprise that's out there that's looking to refactor and replatform their entire operation, or it could be a large enterprise, it has a huge IOT opportunity or challenge or a service provider is looking at having a solution. What's the pitch that you would give me if I'm the one of those customers? >>Say, Hey Pat, what's the pitch? So you need a, you need a trusted provider that's been in the business for a number of years that understands the data protection and security markets that Kronos has that brand. We've been doing this for about 16 years. We were founded in Singapore, we're headquartered out of Switzerland and we've got a lot of really smart guys in the back room. Was building good technologies that our partners were able to use. Um, we look at it a lot of different ways. I mentioned our go to market across a lot of different verticals and a lot of different um, kind of routes for those. The way we deliver our solution. It provides the flexibility for an enterprise to a classic reseller to um, you know, a VAR or a service, right? It's delivering services. It can be delivered to those guys how they want to consume it. >>So as an example, we may work with a smaller service provider that doesn't have any colo capabilities. We provide data centers so they could have a very quick turnkey solution, allows them to get up and running with their business, selling backup within minutes to their customers. We can also work with very large enterprises where we can deliver the complete platform to them and then they have complete control over it. We sprinkle in some professional services to make sure that we're giving them the support that they need and then they're running the service for themselves. What we've really seen in terms of a trend is that a lot of these VARs, we have about 4,500 of them in North America and they're starting to look at their businesses differently. Say, I gotta adapt or die here. I gotta figure out what my next business model is. >>How am I going to be the next one that's in the news flash that says, Hey, they've been acquired, or Hey Thoma Bravo made a big investment in me. Right? They need to convert to this services business or Kronos enables that transformation to happen. I mean, I can see you guys really making money for channel partners because they want solutions. They want to touch the customer, they want to maybe add something they could bring into it or have high service gross profits around services. Absolutely. So, yeah, our solution is unique in the sense that allows partners to sell multiple offerings to, you're getting an additional layer of stickiness providing multiple solutions to a customer. You're using the same technology, so your it team is very familiar with what they're using on a daily basis. Um, you're reducing the amount of churn for your customers because you're selling so much additional there that they're really stuck with you. >>That's a good thing. Uh, and beyond that, your increasing ARPU, average revenue per user is a key metric that all of our partners are looking at. And these guys are owner operators, right? They're business owners. They're looking at the bottom line. I mean, it's interesting the operating leverage around the consistent platform just lowers, it gives them software economic model. They can get more profit over time as they make that investment look at at the end of the day, channel partners care about a couple things, money, profit and customer happiness. Absolutely. And it helps to have them want to have a lot of one offs and a lot of, you know, training, you know, anything complicated, anything confusing, anything that requires a lot of resources, they're not going to like a, it's also great to have events like this where you're able to, to press the flesh with these guys and, and being face to face and understand their real world challenges that they're dealing with on a daily basis. >>How has the sport's a solution set that you've been involved in? How has that changed the culture of Acronis? Is that, has that, has that changed as, you know, sports is fun. People love sports, they have real problems. It's a really great use case as well. How's that change the culture? It's been amazing. I, so one from a branding perspective, we are a lot more recognized, right? Um, the most important thing about these partnerships for us is that they're actually using the technology. So, you know, we've got the red Sox here with us today. We've got arsenal represented, we've got Williams, we've got Roush racing, we've got a NASCAR car back here. Um, they use our technology on a daily basis and for each one of them we solve different types of use cases. Whether it's sending them large amount of video data from an essence studio over to Fenway park, or if it's a scout out in the field that needs to send information back and their laptop crashes, how do they recover? >>A lot of these different use cases, you can call them right back to a small business owner. You don't have to be a multibillion dollar sports organization with the same challenge. Well, I'm smiling because we've been called the ESPN of tech to they bring our set. We do let the game day thing. We certainly could love to come join you in all these marquee events that you have. We'd love to have it. Yeah, so if you follow us on social, we're out there and that, that's a big part of it. You mentioned one of ours looking for what our partners looking for. They want a personal relationship too. A lot of that goes away with technology nowadays and being able to really generate that type of a, of a personal relationship. These partnerships enable that to happen and they're very anything, I don't know anything about cars. >>We started partnering with formula one. All of a sudden I know everything about 41 I go to these races. I tell everybody I don't know anything about cars and I ended up being the, the subject matter export for him over over the weekend. So we'd love to have you guys join us. We'd love all of our partners. They get more engaged in the sports aspect of it because for us, it really is something that, um, again, they're using us in real life scenarios. We're not paying to put a sticker on a car that's going 300 miles. It's not traveling as a real partnership. Exactly. Pat, congratulations on your success and good luck on people owning away the numbers. Congratulations. Thank you very much. Just the cube coverage here at the Chronis global cyber summit 2019 I'm John furry. More coverage after this short break.
SUMMARY :
Brought to you by Acronis. You got a lot of competition going on between the U S America's Uh, some of the first partnerships we had were They're taking that data and then sending it back to the headquarter, And learning more about the use cases that they solve and using You know, Patty, you bring up the sports thing and we were kidding before we on camera around the trading, that we have with these guys, it runs through all these different areas of, you know, in many cases we didn't really understand that they protect the data in that stadium is really important to how they're functioning as an organization. that they had this great partnership with the Kronos was talking about their unique cyber security needs. What are some of the use cases that you've seen in the field with customers that a lot of different players in the game out there, but they take it a step further, use that same backup technology to then that data's protected, it's secure, but it's also accessible, which is an important part of you can take your data wrapping a nice so we touch, everybody know, you equate it to kind of what we do with the red Sox, right? the major players that you see in the manufacturing space are standing up standardizing on Acronis process control Some of the very big names that you've, you're probably familiar with. maybe they've got 30 to 50 employees, they're servicing probably 200 to 300 customers and they want to provide a So essentially the platform gives you that range and that's the typical typical platform. What's the pitch that you would give It provides the flexibility for an enterprise to a classic reseller to We provide data centers so they could have a very quick turnkey solution, allows them to get up and running with their business, the customer, they want to maybe add something they could bring into it or have high service gross And it helps to have them want to have a lot of one offs and a lot of, you know, or if it's a scout out in the field that needs to send information back and their laptop crashes, We certainly could love to come join you in all these marquee events that you have. So we'd love to have you guys join us.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Honeywell | ORGANIZATION | 0.99+ |
Liverpool | ORGANIZATION | 0.99+ |
Pat Hurley | PERSON | 0.99+ |
Debbie Juan | PERSON | 0.99+ |
Singapore | LOCATION | 0.99+ |
30 | QUANTITY | 0.99+ |
Switzerland | LOCATION | 0.99+ |
ESPN | ORGANIZATION | 0.99+ |
Kronos | ORGANIZATION | 0.99+ |
Ron | PERSON | 0.99+ |
90% | QUANTITY | 0.99+ |
Pat | PERSON | 0.99+ |
2007 | DATE | 0.99+ |
$20 million | QUANTITY | 0.99+ |
arsenal | ORGANIZATION | 0.99+ |
12 | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Patty | PERSON | 0.99+ |
200 | QUANTITY | 0.99+ |
300 miles | QUANTITY | 0.99+ |
Miami beach | LOCATION | 0.99+ |
Emerson | ORGANIZATION | 0.99+ |
iPhone | COMMERCIAL_ITEM | 0.99+ |
Acronis | ORGANIZATION | 0.99+ |
North America | LOCATION | 0.99+ |
red Sox | ORGANIZATION | 0.99+ |
Fenway park | LOCATION | 0.99+ |
10th | QUANTITY | 0.99+ |
one platform | QUANTITY | 0.99+ |
38,000 people | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
first partnerships | QUANTITY | 0.99+ |
14 | QUANTITY | 0.98+ |
Uber | ORGANIZATION | 0.98+ |
first | QUANTITY | 0.98+ |
John furrier | PERSON | 0.98+ |
today | DATE | 0.98+ |
about 16 years | QUANTITY | 0.98+ |
NASCAR | ORGANIZATION | 0.98+ |
third | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
Chrome OS | TITLE | 0.98+ |
U S | LOCATION | 0.97+ |
tomorrow | DATE | 0.97+ |
Cronus global cyber summit 2019 | EVENT | 0.97+ |
Chronis global cyber summit 2019 | EVENT | 0.97+ |
50 employees | QUANTITY | 0.97+ |
Boston | LOCATION | 0.97+ |
three terabyte | QUANTITY | 0.97+ |
Miami beach, Florida | LOCATION | 0.97+ |
may | DATE | 0.96+ |
Joe | PERSON | 0.96+ |
15 different technologies | QUANTITY | 0.96+ |
under 6,000 servers | QUANTITY | 0.96+ |
300 customers | QUANTITY | 0.96+ |
a hundred feet | QUANTITY | 0.95+ |
Manchester city | ORGANIZATION | 0.95+ |
John furry | PERSON | 0.94+ |
each one | QUANTITY | 0.94+ |
single pane | QUANTITY | 0.94+ |
41 | QUANTITY | 0.93+ |
European | OTHER | 0.92+ |
kronas cyber global cyber summit 2019 | EVENT | 0.92+ |
Latin American | OTHER | 0.92+ |
Macs | COMMERCIAL_ITEM | 0.92+ |
hundreds of service providers | QUANTITY | 0.91+ |
Thoma Bravo | PERSON | 0.9+ |
tons of telemetry devices | QUANTITY | 0.89+ |
ConnectWise | ORGANIZATION | 0.86+ |
inter Milan | ORGANIZATION | 0.86+ |
three gigabytes of | QUANTITY | 0.85+ |
about 4,500 of them | QUANTITY | 0.84+ |
Mecca | LOCATION | 0.81+ |
U S America | ORGANIZATION | 0.8+ |
Ingram micro | ORGANIZATION | 0.8+ |
single pane of glass | QUANTITY | 0.79+ |
Gaidar Magdanurov, Acronis | Acronis Global Cyber Summit 2019
>>from Miami Beach, Florida It's the >>Q covering >>a Cronus Global Cyber Summit 2019. Brought to you by a Cronus. Welcome back to the cubes coverage here in Miami Beach of the Blue Hotel. I'm John Kerry. Hosting the Cube for Cronus is global Cyber. Summit 2019. We're here with the chief marketing officer CMO Guide. Our magnet. Nora. Welcome to the Cube. Thanks for having us. And thanks for coming on. Thank you for talking to me. Not a bad venue. Miami Beach People like it here. It's got a good vibe. >>Yes, a lot of entertainment, actually. For an event perspective, having people in such a nice place is very tough because you have to keep them inside somehow. And you cannot lock their doors. So we have to have really good content. >>People are feeling good. I can see a lot of people smiling people very happy. Congratulations. Take us through the event. Why the event here? What's the main theme? What's the top story that you're telling here at the global Cyber summit? 2019? Sure. So >>way were talking about cyber protection for quite a while. And cyber protection is simple. Terms is combining data protection of cyber security because what we see is happening in the digital world is that traditional data protection, not enough anymore cannot really protect you against all of the threats that you have out there and the number of messages growing. So cyber protection super important and we're developing and selling it for quite a while. But now it is time to keep off really a big push for cyber protection because we have the products that can enable our partners, resellers, service providers, enable and customers and enterprise I t. To deliver seven protection to their work clothes. What we do here at the Summit way, announcing three major things One is a furnace cyber infrastructure, which is a secure, hyper converged infrastructure for running cyber protection. That's external port on the edge workloads because when you run something in the data center, you have the perimeter security. You can protect you with moment. You get out of the data center, you need something really secure and easy to use and also cost efficient because the number of foreclosures growing outside of data center rapidly. So we have this cyber infrastructure way prevented here. Second piece is cyber platform. Cyber is the way for any third party to customize, integrate or extend cyber protection so they can take parts and pieces and integrated into their applications, for they can integrate an application support for customers so they can expand the portfolio of solutions. So that's another picnic. It's a huge thing. No, everybody can integrate cyber protection in any solution and support any type of work. And the third thing going on here is the product, according Cyber Protect, which is basically combination off back up, just a recovery. Cyber security. We have a non to virus. We have anti malware capabilities, but we also have vulnerability assessment, Hatch management, remote management. So it's a combination of multiple tools into one package. So that's really designed for a guy who is already tied off agent for teeth. They don't lots of obligations and doing different things. Tired of managing many things so way, offering them a tool that combines everything that they need to manage outside of the data center. >>You know, I've been really impressed with you guys and do my research for this. Two things jumped out at anyone recover cybersecurity, most from the enterprise space, but also from a data space. You guys have been around for a long time. Great growth, a lot of customers. Great channel relationship with Go to market, which has been successful for you guys in cyber. So cyber security has been your wheelhouse is company, but it's interesting. This theme of the enterprise is coming into focus. So to me, I think it's a huge opportunity. From a market standpoint on the enterprise, you're Tim has traditionally been cyber security. But story is interesting. Your since you're telling an i t story with cyber telling a data story in context to cyber these air coming together, these worlds are here. Talk about that dynamic in the market because that's a market you're targeting specifically. >>So, first of all, a little correction. We do cyber protection, and it's an important difference between several protection of several security, because what we do wait combined data protection so traditional backup disaster recovery file, sink and share all those tools with security. That's vision what is needed for the border protection. So Christ was a traditional data protection company for quite a while, and then we realized that there is this need for security integrated with data protection way started to implement that. So now we're introducing to the market a new type of solution that everybody now recognizes integrated solution between data protection and cyber security. So the market without solution is virtually anybody. But when you talk about the enterprise, the key workloads where you really need that is the edge. So everything outside of the data center edge and end points. And the thing here is that you have just a tiny fraction of all of the devices in your data center. Everything is outside and protecting it, managing it. It's really complicated. That's what we offer now. So you can start protecting those workloads and the edge, what it's like for clothes and >>talk about the product specifically because this platform enabling is interesting. You have a P eyes. You're opening up your developer network of S, V S and M S P's and your customer base. How is that platform going to help that EJ problem and simplify the protection has taken years. >>That helps in a different expects. So in one hand, way as a company would never be able to support all types of work clothes because there's so many different applications and people want to have application and wear protection. So any third party, any eyes via have the expertise with a particular application, they can develop their own workload support so they can support more loads that can support different type of stores. Destinations they can create. Different service is on top off the data so they can process the data. So, for example, they can deliver a malware scanner on top of the back of that will be integrated in the backup solution right so they can extend the platform in that sense. But also it's an opportunity for service providers because full service provided they trying thio differentiate. They all look for something that I will help them to tell the story that they different from the others because the major problem is that if you a service provider you have multiple customers for them, it's very easy to switch to another service providers. So the old for those differentiators and without blood when they can customize they can integrate it with a particular systems and they can focus on specific application. So let's say electronic medical records they can support that for their particular customers. And the customers are going to switch to another provider because they have this customization. And they have a lot of expertise that they can implement through the platform and create a custom my solution, that only them can develop and deliver. So that's That's another aspect of the platform. Only four eyes, these wonderful service providers. Then we talk about resellers and distributors. They can integrate the plot, thicken, integrated with their market places they can. Cell service is directly from the tools that they're building already or the solution marketplace ability. >>Talk about the difference between data protection and cyber protection, because those are kind of now coming together. As you're pointing out target persona for I t. Has been C i o or T buyer on, then you have a C so chief of security from large firms way, Who's buying? Who's using the product, is it? See I owe with staffers in the sea so and because it's like a data protection the old way, it's like, OK, storage, that's the I t. Fire down the list. Five. Storage, both on data protection. That's the old way. The new way is kind of bring it together. Who's that? Is a very good >>question. So I would think about the traditional data center, and we think about the rows of people who work with the data center, their storage guys, working guy, security guys. They may have different goals, different budget. They can be separate. Organization may not even be talking to each other. So selling a combination integrate solution to the data percent. It's complicated, and we've seen that stories many times. C'mon taken very. They try to sell security together. They failed just because it's very difficult to do that. But what we do is we go to the other type of person to the edge guy, the guy who's responsible for the whole infrastructure outside of a data center. Usually it's one team of one person, and they cover everything and they have a problem. They have multiple solution. They have to manage more solutions. You have people, you have to hire more training you have to make, and the reliability of this is just going down because you have to manage multiple tools. Update on different schedules and it's a disaster for a lot of companies. So we go to that guy with the department and tell them, Hey, here's a solution. Now we'll cover most of your knees >>and the number one problem you're solving. What? What's the problem? Statement. Take the high order bid on the promise the >>protection of the device So you protect data application and system that device. Talk >>aboutthe. Range the platform protection. Get the core platform protection infrastructure. Cloud backup. You've got core areas in the model, which one is the most popular in terms of where customers start to rethink their architecture when they start thinking platform versus tools? Because a lot of custom that we talk to and we pull in our community are all in the sea, so specifically are hard core way Don't want another tool way have a lot of tools in the tool shed, so to speak way want to get data horizontally scalable? We don't want to have an enabling platform software, but they have a machine learning and may I be very specific in service is that we use so trying to balance that architecture is what's on there. That's essentially what you guys are doing. So why that's important and why it's important for the customer. >>Exactly. And I I would take a step back here. So a lot of people want to think about protection of data, sleeping in traditional terms, data protection back up. I have a coffee somewhere. So in case something bad happens, I will be able to get back to that coffee. But now people started to understand it's not enough. First of all, they want to get value from the data, so data should be available. It should be fresh, and it should be authentic, So they want to make sure that they have the data they can trust. So the moment the shift from traditional having a coffee to having data that I can use and get Mellie from the data we start thinking about how they can make it work in a way that you always have data available. You don't wasting time, you know, losing anything. And you have a proof that you have that regional data thistles where we play. So we come to them and tell them that simple story. So in the past, you hit by run somewhere for you hit by malware. Attack somebody. A Texas system. You would say, OK, I'll go back to my backup, I'll find those files. I'll recover them. I would hope that they're not too old way offer them is the automatic recovery. They get everything back and they have everything. That was the most fresh data that they need. And we have guarantee that this is the original data they have because what's happening now in the cyber security market? And there were a lot of people Aquino they were talking about it and security experts. Is that the hackers Not on Lee, corrupting a day of stealing your data, the old so mortifying in a way, to influence your decisions. So they do like small, tiny modification, and you're sending your paychecks to somebody else. That's what they basically trying to do all the time. So you have to be able to trust the day of the job. So the moment you think about the chocks enough in the city of the Data, you think, OK, it's not just back up anymore. I need cyber protection. I need something that will actually help me to trust my data. >>You see in the examples everywhere you pointed out visual threats, you know the automation of cyber crime. You're seeing Ransomware. That's killer. And then just personal attacks. This is a really key area. I gotta ask you a question that came up on Twitter the other day. We were talking to folks. This comes up a lot with C. Sosa's well on. This is a quote from acute conversation I had with C. So said, Lookit my environment becoming more complex and costly going up. So that's one killer problem that he has in terms of what he's dealing with his environment. So complexity is going up. You mentioned the edge. It's a big one, right of other things out there wearables and then costs too many vendors, not enough sharing data. So again, this is a very complex and nuanced point. But how did you guys answer that question? So I see it costs. I want cost to go down. I want Plus, he's never gonna go down your abstract thataway. >>Yeah, even more. It's only complexity and cost is also security. More complexity that surfaces. Attack of attack is getting bigger, so you have to find a way to protect it. So answer is integrated type of protection. So what we do. We address five acres of protection and in the digital world, way we call him a Comsat passes safety. You have a copy, you can recover accessibility. You have a copy that you can access when you need it, where you need it. On privacy. You have control where your data is and who can access the data. That authenticity. You have a way to prove that. This is your reach, Dana. And then security. You have protection against external attacks. So we combine it all together into one solution. So you deploy one single agent that will provide backup just recovery. Crossing in. Sure. Hold the service that you need to work with your data Creative copy of the data to share your data, but also its integrated security. So we'll ensure that we passed your system. You have up to date Aly update installed. You have everything up to date. Everything's protected. Then we have an antivirus we have on tomorrow where we have the ability to manage the system. So everything is packed, packaged into one solution. So you don't have multiple agents that are incompatible. Multiple agencies have to update on different schedules multiple people who have to support different types of agents. Everything is combined. So that way we decrease the complexity and then increase the security because security is already integrated. And then the last final piece of the cost is the infrastructure solution that way. So what? We have a current seven infrastructure. It's either a softer applying to heart of our clients that is designed specifically for cyber protection were close, so it can't replace your standard H c I. But it gives you an ability to store data in the mosque obstetrician way. You get our appliance like in the hardware. You have a cheap stories for your secondary data for disaster. Recovery you can do that is to recover that appliance, or you can take our soccer appliance and deployed to commodity hardware. You don't have to buy a very expensive story track. You just deployed to the hard way that you have and use it on there. So that way we sold. It caused problems >>to get multiple options basically on that. Okay, so I gotta ask you the hard question that's going through everyone's mind is okay. I hear this story is too good to be true. Everyone must be. It must be a platform from wars are out there, sees this. They're pandering to customers. What makes you different? Prove that you're valuable to me. Show some evidence Where your differentiation How do you answer the differentiation? What makes you guys different? >>I would say the answer to that is innovation. So everybody has a platform. Everybody's building a glass from I. D. C was proclaiming its in Europe platforms probably three or four years ago. So everybody's talking about it, right? So way do they have the platform about the core differentiation is the innovation that we have Where the first company to use Blockchain for authenticity so we can record way hash coats Oh, files to change And then you can use it to get the verification that you have the original copy of the file in a time step where the 1st 1 to integrate the anti ransomware protection into the back so you don't really have to recover after my run somewhere you get all the files back, it will be the most recent files that you had. So you're getting it all back and it works there, So those innovation they already implemented off platform. So the moment you get a lot from you have all that you need. Old basics. You have user management quarter management so you can deploy and feel for you. Can you? Can? >>Was interesting is you have a holistic view on data, not just narrow view on day that Zach Lights and the I think the integrated is killer customer success. Anecdotal sound bites you can share. What are some of that? Some of feedback you hear from customers on this >>so feedback from customers. The best feedback is that we're hearing from our customers have issues, right? That's the best thing to d'oh. So when things go right with customers happy and you can go online and check out the mosque. Interesting case that >>we have with our scores partnerships because sports of becoming digital so >>everything's difficult depends on data. When you think Formula One isn't data, they lose data, they lose the race, so they have a tremendous amount of data and they have to transfer to a different location to transfer from the track to the headquarters. So we had implemented our cyber protection for a few teams in Formula One and you can just go online and check out that way. Ken Story, Williams Formula One. Great story. They actually tell people how they use it, how it helps them way. Have a bunch of those stories. >>You know, industrial I o. T. Is a huge area. I think you guys have a great opportunity there. People talk about digital threats and getting hacked as individuals. Equipment, machinery can get back to a device on your car. Certainly sports betting on it. Certainly someone's gonna want to manipulate it everything >>now, because we have our separate protects Operation center. We have engineers and security expert watching What's going on. We're collecting feedbacks from our customers and partners. We kill some crazy story all the time. Like what hikers now do. They would have into your email start fortifying your e mails and your documents that you had there because it's digital. There is no trace. You don't really know what was their original documents, so they eventually it will get you to transfer money to wrong account or do something with your assets. You will not going todo and it's just becoming more and more prominent because every digital. Now you don't even have a cocky or a document that's stating how much money you have in your bank. What if you wake up tomorrow instead of $1,000,000? You see $1000 you have no proof that you actually had something else, right? >>Cyber protections of data problem. You guys tackling with creative platform? Yes. Congratulations. Better. Thanks for coming on the Cube. Thanks for your insights. It's a cube jumper. You're watching us here at Miami Beach of the Crows Global Cyber Summit 2019. More coverage after this short break.
SUMMARY :
Brought to you by a Cronus. place is very tough because you have to keep them inside somehow. What's the top story that you're telling here at the global That's external port on the edge workloads because when you run something in the data You know, I've been really impressed with you guys and do my research for this. about the enterprise, the key workloads where you really need that is the edge. How is that platform going to help that EJ problem and simplify So the old for those differentiators or T buyer on, then you have a C so chief of security from large firms way, You have people, you have to hire more training you have and the number one problem you're solving. protection of the device So you protect data application and system that device. That's essentially what you guys are doing. So the moment you think about the chocks enough in the city of the Data, you think, OK, it's not just back up anymore. You see in the examples everywhere you pointed out visual threats, you know the automation of cyber crime. You have a copy that you can access when you need it, Okay, so I gotta ask you the hard question that's So the moment you get a lot from you have all that you need. Was interesting is you have a holistic view on data, not just narrow view on day that Zach Lights and the I think the That's the best thing to d'oh. a few teams in Formula One and you can just go online and check out that way. I think you guys have a great opportunity there. so they eventually it will get you to transfer money to wrong account or do something with your assets. Thanks for coming on the Cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dana | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
John Kerry | PERSON | 0.99+ |
Gaidar Magdanurov | PERSON | 0.99+ |
$1,000,000 | QUANTITY | 0.99+ |
$1000 | QUANTITY | 0.99+ |
Nora | PERSON | 0.99+ |
Ken Story | PERSON | 0.99+ |
Miami Beach | LOCATION | 0.99+ |
tomorrow | DATE | 0.99+ |
Miami Beach, Florida | LOCATION | 0.99+ |
Texas | LOCATION | 0.99+ |
Second piece | QUANTITY | 0.99+ |
Acronis | ORGANIZATION | 0.99+ |
one package | QUANTITY | 0.99+ |
Christ | ORGANIZATION | 0.99+ |
five acres | QUANTITY | 0.98+ |
three | DATE | 0.98+ |
Zach Lights | PERSON | 0.98+ |
one solution | QUANTITY | 0.98+ |
one team | QUANTITY | 0.98+ |
One | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
C. Sosa | PERSON | 0.97+ |
third thing | QUANTITY | 0.97+ |
Two things | QUANTITY | 0.97+ |
Tim | PERSON | 0.97+ |
Cronus | ORGANIZATION | 0.96+ |
one person | QUANTITY | 0.96+ |
C. So | PERSON | 0.96+ |
Acronis Global Cyber Summit 2019 | EVENT | 0.95+ |
Formula One | ORGANIZATION | 0.95+ |
first company | QUANTITY | 0.94+ |
Crows Global Cyber Summit 2019 | EVENT | 0.94+ |
I o. T. | LOCATION | 0.94+ |
four years ago | DATE | 0.94+ |
Aquino | PERSON | 0.93+ |
Cyber Protect | ORGANIZATION | 0.93+ |
2019 | DATE | 0.92+ |
First | QUANTITY | 0.92+ |
Comsat | ORGANIZATION | 0.91+ |
one | QUANTITY | 0.91+ |
ORGANIZATION | 0.91+ | |
four eyes | QUANTITY | 0.88+ |
Five | QUANTITY | 0.86+ |
one single agent | QUANTITY | 0.86+ |
I. D. C | LOCATION | 0.84+ |
Cronus Global Cyber Summit 2019 | EVENT | 0.84+ |
Blue Hotel | ORGANIZATION | 0.82+ |
seven infrastructure | QUANTITY | 0.8+ |
1st 1 | QUANTITY | 0.79+ |
Cyber | EVENT | 0.72+ |
CMO Guide | ORGANIZATION | 0.68+ |
seven protection | QUANTITY | 0.68+ |
Cyber. Summit 2019 | EVENT | 0.66+ |
three major things | QUANTITY | 0.64+ |
M | ORGANIZATION | 0.58+ |
years | QUANTITY | 0.55+ |
Lee | PERSON | 0.53+ |
first | QUANTITY | 0.52+ |
Formula One | EVENT | 0.5+ |
One | EVENT | 0.5+ |
Mellie | PERSON | 0.49+ |
Williams Formula | ORGANIZATION | 0.47+ |
P | ORGANIZATION | 0.41+ |
William Toll, Acronis | Acronis Global Cyber Summit 2019
>>from Miami Beach, Florida It's the key. You covering a Cronus Global Cyber Summit 2019. Brought to you by a Cronus. >>Hello, everyone. Welcome to the Cube coverage here in Miami Beach Front and Blue Hotel with Cronus Global Cyber Summit 2019 2 days of coverage. Where here, Getting all the action. What's going on in cyber tools and platforms are developing a new model of cybersecurity. Cronus Leader, Fast growing, rapidly growing back in here in the United States and globally. We're here. William Toll, head of product marketing Cronus. Thanks for coming. I appreciate it. >>Thanks, John. I'm excited. You're >>here so way were briefed on kind of the news. But you guys had more news here. First great key notes on then special guest Shark tank on as well. That's a great, great event. But you had some news slip by me. You guys were holding it back. >>So we've opened our A p I, and that's enabling a whole ecosystem to build on top of our cyber protection solutions. >>You guys have a platform infrastructure platform and sweet asserts from backup all the way through protection. All that good stuff as well. Partners. That's not a channel action platforms are the MoD has been rapidly growing. That's 19 plus years. >>And now, with the opening of our AP, eyes were opening the possibility for even Maur innovation from third parties from Eyes V's from managed service providers from developers that want to build on our platform and deliver their solutions to our ecosystem. >>You guys were very technical company and very impressed with people. Actually, cyber, you gotta have the chops, you can't fake it. Cyber. You guys do a great job, have a track record, get the P I. C B Also sdk variety, different layers. So the FBI is gonna bring out more goodness for developers. You guys, I heard a rumor. Is it true that you guys were launching a developer network? >>That's right. So the Cronus developer network actually launches today here in the show, and we're inviting developed officials. That's official. Okay. And they can go to developers that Cronus dot com and when they go in there, they will find a whole platform where they can gain access to forums, documentation and logs, and all of our software development kids as well as a sandbox, so developers can get access to the platform. Start developing within minutes. >>So what's the attraction for Iess fees and developers? I mean, you guys are here again. Technical. What is your pitch developers? Why would they be attracted to your AP eyes? And developer Resource is >>sure it's simple. Our ecosystem way have over 50,000 I t channel partners and they're active in small businesses. Over 500,000 business customers and five million and customers all benefit from solutions that they bring to our cyber cloud solutions >>portal. What type of solutions are available in the platform today? >>So their solutions that integrate P s a tools professional service is automation are mm tools tools for managing cloud tools for managing SAS applications. For example, one of our partners manages office 3 65 accounts. And if you put yourselves in the shoes of a system administrator who's managing multiple SAS applications now, they can all be managed in the Cronus platform. Leverage our user experience. You I s t k and have a seamless experience for that administrator to manage everything to have the same group policies across all of this >>depression. That success with these channel a channel on Channel General, but I s freeze and managed service ROMs. Peace. What's the dynamic between Iess, freeze and peace? You unpack that? >>Sure. So a lot of m s peace depend on certain solutions. One of our partners is Connectwise Connectwise here they're exhibiting one sponsors at at this show and their leader in providing managed to lose management solutions for M s. He's to manage all of their customers, right? And then all the end points. >>So if I participate in the developer network, is that where I get my the FBI's someone get the access to these AP eyes? >>So you visits developer data cronies dot com. You come in, you gain access to all the AP eyes. Documentation way Have libraries that'll be supporting six languages, including C sharp Python, java. Come in, gain access to those documentation and start building. There's a sandbox where they could test their code. There's SD K's. There's examples that are pre built and documentation and guides on how to use those s >>So customer the end. You're in customers or your channel customers customer. Do they get the benefits of the highest stuff in there? So in other words, that was the developer network have a marketplace where speed push their their solutions in there. >>Also launching. Today we have the Cronus Cyber Cloud Solutions portal and inside there there's already 30 integrations that we worked over the years to build using that same set of AP eyes and SD case. >>Okay, so just get this hard news straight. Opening up the AP eyes. That's right. Cronus Developer Network launched today and Cloud Solutions Portal. >>That's right, Cyber Cloud Solutions Portal Inside there there's documentation on all the different solutions that are available today. >>What's been the feedback so far? Those >>It's been great. You know, if we think about all the solutions that we've already integrated, we have hundreds of manage service providers using just one solution that we've already integrated. >>William, we're talking before we came on camera about the old days in this business for a long time just a cube. We've been documenting the i t transformation with clouds in 10 years. I've been in this in 30 years. Ways have come and gone and we talked to see cells all the time now and number one constant pattern that emerges is they don't want another tour. They want a solid date looking for Jules. Don't get me wrong, the exact work fit. But they're looking for a cohesive platform, one that's horizontally scaled that enables them to either take advantage of a suite of service. Is boy a few? That's right. This is a trend. Do you agree with that? What you're saying? I totally agree >>with that, right? It makes it much easier to deal with provisioning, user management and billing, right? Think about a man of service provider and all of their customers. They need that one tool makes their lives so much easier. >>And, of course, on event would not be the same. We didn't have some sort of machine learning involved. How much his machine learning been focused for you guys and what's been some of the the innovations that come from from the machine. I mean, you guys have done >>artificial intelligence is critical today, right? It's, uh, how we're able to offer some really top rated ransomware protection anti malware protection. We could not do that without artificial intelligence. >>Final question for you. What's the top story shows week If you have to kind of boil it down high order bit for the folks that couldn't make it. Watching the show. What's the top story they should pay attention to? >>Top story is that Cronus is leading the effort in cyber protection. And it's a revolution, right? We're taking data protection with cyber security to create cyber protection. Bring that all together. Really? Democratize is a lot of enterprise. I t. And makes it accessible to a wider market. >>You know, we've always said on the Q. Go back and look at the tapes. It's a date. A problem that's right. Needed protection. Cyber protection. Working him, >>Cronus. Everything we do is about data. We protect data from loss. We protect data from theft and we protect data from manipulation. It's so critical >>how many customers you guys have you? I saw some stats out there. Founded in 2003 in Singapore. Second headquarters Whistle in 2000 a global company, 1400 employees of 32 offices. Nice nice origination story. They're not a Johnny come lately has been around for a while. What's the number? >>So five million? Any customers? 500,000 business customers. 50,000 channel partners. >>Congratulations. Thanks. Thanks for having us here in Miami Beach. Thanks. Not a bad venue. As I said on Twitter just a minute ago place. Thanks for Thanks. All right, John. Just a cube coverage here. Miami Beach at the front in Blue Hotel for the Cyber Global Cyber Security Summit here with Cronus on John Kerry back with more coverage after this short break.
SUMMARY :
Brought to you by a Cronus. Welcome to the Cube coverage here in Miami Beach Front and Blue Hotel with Cronus Global You're But you guys had more news here. to build on top of our cyber protection solutions. You guys have a platform infrastructure platform and sweet asserts from backup all the way through from developers that want to build on our platform and deliver their solutions to So the FBI is gonna bring out more So the Cronus developer network actually launches today here in the show, I mean, you guys are here again. and customers all benefit from solutions that they bring to What type of solutions are available in the platform today? experience for that administrator to manage everything to have the same group policies What's the dynamic between One of our partners is Connectwise Connectwise here they're exhibiting one So you visits developer data cronies dot com. So customer the end. Today we have the Cronus Cyber Cloud Solutions portal and inside there That's right. documentation on all the different solutions that are available today. You know, if we think about all the solutions that we've already integrated, We've been documenting the i t transformation with clouds in 10 years. It makes it much easier to deal with provisioning, user management that come from from the machine. We could not do that without artificial intelligence. What's the top story shows week If you have to kind of boil it down high order bit for the folks Top story is that Cronus is leading the effort in cyber protection. You know, we've always said on the Q. Go back and look at the tapes. and we protect data from manipulation. What's the number? So five million? Miami Beach at the front in Blue Hotel for the Cyber
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
William Toll | PERSON | 0.99+ |
Singapore | LOCATION | 0.99+ |
2003 | DATE | 0.99+ |
Miami Beach | LOCATION | 0.99+ |
32 offices | QUANTITY | 0.99+ |
William | PERSON | 0.99+ |
five million | QUANTITY | 0.99+ |
2000 | DATE | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
John Kerry | PERSON | 0.99+ |
30 integrations | QUANTITY | 0.99+ |
Miami Beach, Florida | LOCATION | 0.99+ |
United States | LOCATION | 0.99+ |
Cronus | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
1400 employees | QUANTITY | 0.99+ |
Cyber Global Cyber Security Summit | EVENT | 0.99+ |
Today | DATE | 0.99+ |
First | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
over 50,000 | QUANTITY | 0.99+ |
Cronus Developer Network | ORGANIZATION | 0.99+ |
2 days | QUANTITY | 0.99+ |
30 years | QUANTITY | 0.99+ |
java | TITLE | 0.99+ |
Jules | PERSON | 0.99+ |
hundreds | QUANTITY | 0.99+ |
six languages | QUANTITY | 0.99+ |
Acronis | ORGANIZATION | 0.99+ |
10 years | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
one solution | QUANTITY | 0.98+ |
Cronus Global Cyber Summit 2019 | EVENT | 0.98+ |
Cloud Solutions Portal | TITLE | 0.98+ |
19 plus years | QUANTITY | 0.98+ |
Cronus Global Cyber Summit 2019 | EVENT | 0.97+ |
Johnny | PERSON | 0.97+ |
Over 500,000 business customers | QUANTITY | 0.96+ |
500,000 business customers | QUANTITY | 0.95+ |
one tool | QUANTITY | 0.95+ |
Blue Hotel | LOCATION | 0.95+ |
Eyes V | ORGANIZATION | 0.95+ |
one sponsors | QUANTITY | 0.95+ |
50,000 channel partners | QUANTITY | 0.92+ |
Acronis Global Cyber Summit 2019 | EVENT | 0.9+ |
3 65 accounts | QUANTITY | 0.9+ |
Connectwise Connectwise | ORGANIZATION | 0.9+ |
Cloud Solutions Portal | TITLE | 0.89+ |
C sharp Python | TITLE | 0.88+ |
a minute ago | DATE | 0.88+ |
Second headquarters | QUANTITY | 0.87+ |
Cronus dot com | ORGANIZATION | 0.85+ |
Cronus | PERSON | 0.83+ |
Cube | ORGANIZATION | 0.82+ |
Whistle | ORGANIZATION | 0.76+ |
Channel General | ORGANIZATION | 0.76+ |
ORGANIZATION | 0.74+ | |
P I. | TITLE | 0.72+ |
Cyber Cloud Solutions | TITLE | 0.69+ |
Cronus | TITLE | 0.65+ |
Cyber | ORGANIZATION | 0.62+ |
t | QUANTITY | 0.52+ |
Shark tank | ORGANIZATION | 0.44+ |
Blue | ORGANIZATION | 0.44+ |
SAS | TITLE | 0.43+ |
Linda Babcock, Carnegie Mellon University | Acronis Global Cyber Summit 2019
>>from Miami >>Beach, Florida It's the Q covering a Cronus Global Cyber >>Summit 2019. Brought to you by a Cronus. >>Welcome to the Qi. We are in Miami, Florida, for the Cronus Global Cyber Summit. 2019 John for your host of the Cube. We're here for two days of coverage around cybersecurity and the impact to the enterprise in society in a great guest here to kick off the event. Linda Babcock, professor of economics at Carnegie Mellon University, author of the book, Ask for It, and she has a new book she's working on, and we'll get into that. Thanks for joining me. Thanks for coming on. >>Really happy to be here. >>Thanks. So Carnegie Mellon. Great. Great. Uh, University. They stole a bunch of people when I was in school, in the computer science department. Very well known for that as well. Economics, math, machine learning. I was good stuff there. What's going on in Carnegie Mellon? What's new in your world? >>Well, it's just actually just a great place to be because of the focus on interdisciplinary work. You know, problems in the world don't come as disciplines. They come with multiple perspectives needed and So it's just a place where people can flourish, attack ideas from all kinds of angles. And so it's a really great >>one of the things I hear a lot about, and we cover a lot about the the skills gap. Certainly this is Maur job openings than there are jobs and interesting. A lot of the jobs that are new haven't been skilled, important in the classic university setting. So a lot of these jobs, like cybersecurity, cloud computing, Blockchain, crypto economic token economics, all kind of have a maths economic steam to him. So you know your computer science, you got economics and policy. I seem to be the key areas around from these new skills and challenges. Way faces a society which your take on all this >>Well, actually, there's a lot going on in this area at Carnegie Mellon. Actually, the economics group at Carnegie Mellon ISS is been proposing a new major that really focuses on this interface between economics, machine learning and technology. And I think it's going to train our students just for the next generation of problems that the world of tech is gonna have. So it's very exciting. >>So let's talk about your book. Ask for it. Okay. Um, it's not a new book that's been around for a while, but you give a talk here. What's what's the talking talking track here at the event? >>Yeah, so I have a couple of themes of research, and it focuses on women's Berries to advancement in organizations. And so most of the work that I did with this book and my first book, Women Don't Ask, was looking about how men and women approached negotiation differently. And kind of the bottom line is that women are what less likely to negotiate than men over all kinds of things, like pay like opportunities for advancement like the next promotion. And it really harms them in the workplace because men are always out there asking for it and organizations reward that. And so the book is was really about shedding light on this disparity and what organizations could do about it and what women can do about it themselves, how they can learn to negotiate more effectively. >>What did you learn when you were writing the book around? Some of the use cases of best practices that women were doing in the field was it. Maura aggressive style has a more collaborative. You're seeing a lot more solidarity amongst women themselves, and men are getting involved. A lot of companies are kind of talking the game summer walking, the talk. What the big findings that you've learned >>well, I'd say that the approach is that women use are a lot different than the approaches that menus. And it's because our world lets men do a lot of different things. It lets them engage in a cooperative way, lets them be very competitive. But our world has a very narrow view about what's acceptable behavior for women. I often call it a tight rope because women are kind of balancing that they need to go out and assert themselves. But they have to do it in a way that our side, a society finds acceptable, and that that tight rope constrains women and doesn't allow them to be their authentic Selves on DSO. It makes it difficult for women to navigate that. What's your >>take on the the balancing of being aggressive and the pressure companies have to, you know, keep the women population certainly pipeline in tech. We see it all the time and the whole me to thing and the pressure goes on because norms were forming, right? So is there any new data that you can share around how, with norms and for forming and what men can do? Particularly, I get this question a lot, and I always ask myself, What am I doing? Can I do something different? Because I want to be inclusive and I want to do the right thing. But sometimes I don't know what to do. >>Yeah, of course. And it's really important that men get involved in this conversation as allies and, like you said, sometimes men but don't know what to do because they feel like maybe they don't have standing to be in the conversation when it's about women and weigh all need men, his allies. If women are gonna try to reach equality, ATT's some point. But the new data really suggests negotiation may be playing a role. The work that show Sandberg lean in, But the newest work that we have shows that actually the day to day things that happen at work that's holding women back. So let me tell you about that. So what we find is if you think about your calendar and what you do all day there a task that you can classify as being promotable, that is, they're really your core job. Responsibility there noticed, rewarded. But there's glass of other things that happen in your organization that are often below the surface that are important to dio valued but actually not rewarded. And what our research finds is that men spend much more time than women at the tasks that are these promotable task that rewarded women spend much more time than men on these tasks that we call non promotable that are not rewarded. And it's really holding women back. And how men can help is that the reason that women are doing these tasks is because everyone is asking them to do these tasks. And so what men can do is start asking men to do some of these things that are important but yet not rewarded because the portfolio's now are really out of balance and women are really shouldering the burden of these tasks disproportionately. >>So get on the wave of the promotional off the promotional oriented things that Maura and the man can come and pick up the slack on some of the things that were delegated to the women because they could order the kitchen food or whatever >>or help others with their work. Someone has to hire the summer intern. Someone has to organize events. Someone has to resolve underlying conflicts. Those are all really important things. Women get tasked with them, and that really doesn't allow them to focus on their core job responsibilities. And so men can step up to the blade, stop, do it, start doing their fair share of that work, and really then allow women to reach their full >>potential. I've been thinking a lot about this lately around how collaboration software, how collaborative teams. You started to see the big successful coming like Amazon to pizza team concept. Smaller teams, Team Orient. If you're doing it, you're in a teen. These things go. You've given you get so I think it's probably a better environment. Is that happening or no? It's >>unclear how teams kind of shake out for women in this setting, because there's actually some research that shows when a team produces an output and the supervisor trying to figure out, like who really made the output? Who was the valued player on the team. They often overvalue the contributions of men and undervalued the contributions of women. So actually, team projects can be problematic if women don't get their fair share of >>bias. Is everywhere >>biases everywhere. And you know it's not that people are trying discriminate against women. It's just that it's a subconscious, implicit bias and so affects our judgments in ways that we don't even realize. >>It's actually probably amplifies it. You know, the game are gaining a lot of things on digital indigenous communities. We see a lot where people are hiding behind their avatars. Yeah, that's also pretty bad environment. So we've been doing a lot of thinking and reporting around communities and data. I want to get your thoughts is I never really probed at this. But is there any economic incentives? And after you're an economics professor, you seeing things like crypto economics and tokens and all kinds of new things is a potential path towards creating an incentive system that's cutting edge what's progressive thinking around any kind of incentive systems for organizations or individuals. >>Well, when you think about incentives and maybe an economist, I think about those a lot, and I emerged that with my work on various to women's advancement, I think incentives is one area that you can actually play a big role. And that is that Organizational leaders should be incentive fied incentivized to see that they have equal advancement for their male and female employees in their workforce. Because if they don't it means they're losing out on this potential that women have, that they aren't able to fully be productive. And so that's, I think, the place. I think that incentives can really be important, >>a great leader and he said, and I'm quoting him. But I feel the same way says. Our incentive is business. Get a better outcome with them. We include women, give data, goes Yeah, we make software and have people that use our software with women I don't wanna have. So I'm like, Oh, that makes a lot of sense. Biases should be in there. Four Women for women by women for women >>and women spend more money as consumers than men. And so having women on teams allows them to see perspectives that men may not see, and so it can really add two new innovative thinking that hadn't been there before by including women. >>Well, I'm excited that this there's a little bit of movement in tech we're starting to see, certainly in venture capital, starting to see a lot more when you come into the board room work to do. But I think there's a nice sign that there's more jobs that are computer related that aren't just coding. That's male dominant pretty much now and still still is for a while. But there's a lot more skills, all kinds of range now in computer science. It's interesting. How is that affecting some of the new pipeline ing? >>Yeah, well, I think the good news is that there are is increasing levels of women's attainment in stem fields. And so there are more and more female workers entering the labor market today. Way just have to make sure that those workers are valued and feel included when they do doing tech companies. Otherwise they will leave because what happens unfortunately, sometimes in tech is it doesn't feel inclusive for women. And the quick rate for women in tech is over over twice the rate for men, and some of the reasons are is they're not feeling valued in their positions. They're not seeing their advancement. And so with this new wave of female workers, we have to make sure that those workplaces are ready to accept them and include them. >>That's great. Well, ask for it is a great book. I went through it and it's great handbook. I learned a lot. It really is a handbook around. Just standing up and taken what you can. You got some new, but you got a new book you're working on. What's that gonna look like? What if some of the themes in the new book >>Yeah. So the new book is on these promotable tasks, and the way I like to think about it is there's so much attention toe work, life balance, you know? How do you manage both of those with your career, your family? How does that work? But our work actually focuses on work, work, balance, and what remains is paying attention to the things that you do at work. Making sure that those things that you're doing are the things that are most valuable for your employer and are gonna be most valuable for your career. So it's a really different focus on the day to day ways that you spend your time at work and how that can propel women to the next level. >>That's awesome, Linda. Thanks for coming. I appreciate it. What do you think of the event here? Cronies? Global cyber security summit. >>Well, I got to say it's not my typical event, but I'm having a good time learning more about what's happening in the tech industry today. >>Cyber protection, Certainly a cutting edge issue. And certainly on the East Coast in Washington D certainly with national defense and all kinds of things happening, Ransomware is a big topic that kicked around here absolutely getting taken out like, Oh, my God. Yeah. Bitcoin in return for taking your systems out, >>all kinds of new stuff to add to my tool kit. >>Great to have you on. Thanks for your insight. Thanks for sharing. Appreciate it. I'm John for here at the Cube. We're here in Miami Beach for the Cronus Cyber Protection Conference. Thank you for watching
SUMMARY :
professor of economics at Carnegie Mellon University, author of the book, in the computer science department. Well, it's just actually just a great place to be because of the focus on interdisciplinary work. A lot of the jobs that are new haven't been skilled, important in the classic university setting. And I think it's going to train our students just been around for a while, but you give a talk here. And so most of the work that I did with this book and my first book, Women Don't Ask, Some of the use cases of best practices that women were doing in the field But they have to do it in a way that our side, a society finds acceptable, and that that tight the pressure companies have to, you know, keep the women population certainly pipeline in tech. how men can help is that the reason that women are doing these tasks is because Someone has to hire the summer intern. You started to see the big successful coming like Amazon to pizza team concept. the contributions of men and undervalued the contributions of women. Is everywhere And you know it's not that people are trying discriminate against women. You know, the game are gaining a lot of things on digital indigenous communities. that they aren't able to fully be productive. But I feel the same way says. And so having women on teams allows is that affecting some of the new pipeline ing? And the quick rate for women in tech is over over twice the rate for men, What if some of the themes in the new book So it's a really different focus on the day to day What do you think of the event here? happening in the tech industry today. And certainly on the East Coast in Washington D certainly with I'm John for here at the Cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Linda Babcock | PERSON | 0.99+ |
Carnegie Mellon | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
Miami Beach | LOCATION | 0.99+ |
Maura | PERSON | 0.99+ |
two days | QUANTITY | 0.99+ |
Miami | LOCATION | 0.99+ |
Carnegie Mellon University | ORGANIZATION | 0.99+ |
first book | QUANTITY | 0.99+ |
Washington D | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Ask for It | TITLE | 0.99+ |
Women Don't Ask | TITLE | 0.99+ |
Beach, Florida | LOCATION | 0.99+ |
Linda | PERSON | 0.99+ |
Miami, Florida | LOCATION | 0.99+ |
Cronus Cyber Protection Conference | EVENT | 0.98+ |
Four | QUANTITY | 0.98+ |
both | QUANTITY | 0.97+ |
Team Orient | ORGANIZATION | 0.97+ |
Sandberg | PERSON | 0.97+ |
2019 | DATE | 0.97+ |
Cronus Global Cyber Summit | EVENT | 0.97+ |
ATT | ORGANIZATION | 0.96+ |
East Coast | LOCATION | 0.96+ |
Acronis Global Cyber Summit 2019 | EVENT | 0.96+ |
Cronies | EVENT | 0.94+ |
Cronus | ORGANIZATION | 0.92+ |
one | QUANTITY | 0.92+ |
Cronus Global Cyber | EVENT | 0.91+ |
one area | QUANTITY | 0.88+ |
today | DATE | 0.86+ |
Carnegie Mellon ISS | ORGANIZATION | 0.84+ |
workers | EVENT | 0.83+ |
Global cyber security summit | EVENT | 0.82+ |
over twice | QUANTITY | 0.82+ |
two new innovative | QUANTITY | 0.81+ |
Summit 2019 | EVENT | 0.81+ |
Cube | ORGANIZATION | 0.78+ |
wave of | EVENT | 0.66+ |
over | QUANTITY | 0.64+ |