Breaking Analysis: Cyber Firms Revert to the Mean
(upbeat music) >> From theCube Studios in Palo Alto in Boston, bringing you data driven insights from theCube and ETR. This is Breaking Analysis with Dave Vellante. >> While by no means a safe haven, the cybersecurity sector has outpaced the broader tech market by a meaningful margin, that is up until very recently. Cybersecurity remains the number one technology priority for the C-suite, but as we've previously reported the CISO's budget has constraints just like other technology investments. Recent trends show that economic headwinds have elongated sales cycles, pushed deals into future quarters, and just like other tech initiatives, are pacing cybersecurity investments and breaking them into smaller chunks. Hello and welcome to this week's Wikibon Cube Insights powered by ETR. In this Breaking Analysis we explain how cybersecurity trends are reverting to the mean and tracking more closely with other technology investments. We'll make a couple of valuation comparisons to show the magnitude of the challenge and which cyber firms are feeling the heat, which aren't. There are some exceptions. We'll then show the latest survey data from ETR to quantify the contraction in spending momentum and close with a glimpse of the landscape of emerging cybersecurity companies, the private companies that could be ripe for acquisition, consolidation, or disruptive to the broader market. First, let's take a look at the recent patterns for cyber stocks relative to the broader tech market as a benchmark, as an indicator. Here's a year to date comparison of the bug ETF, which comprises a basket of cyber security names, and we compare that with the tech heavy NASDAQ composite. Notice that on April 13th of this year the cyber ETF was actually in positive territory while the NAS was down nearly 14%. Now by August 16th, the green turned red for cyber stocks but they still meaningfully outpaced the broader tech market by more than 950 basis points as of December 2nd that Delta had contracted. As you can see, the cyber ETF is now down nearly 25%, year to date, while the NASDAQ is down 27% and change. Now take a look at just how far a few of the high profile cybersecurity names have fallen. Here are six security firms that we've been tracking closely since before the pandemic. We've been, you know, tracking dozens but let's just take a look at this data and the subset. We show for comparison the S&P 500 and the NASDAQ, again, just for reference, they're both up since right before the pandemic. They're up relative to right before the pandemic, and then during the pandemic the S&P shot up more than 40%, relative to its pre pandemic level, around February is what we're using for the pre pandemic level, and the NASDAQ peaked at around 65% higher than that February level. They're now down 85% and 71% of their previous. So they're at 85% and 71% respectively from their pandemic highs. You compare that to these six companies, Splunk, which was and still is working through a transition is well below its pre pandemic market value and 44, it's 44% of its pre pandemic high as of last Friday. Palo Alto Networks is the most interesting here, in that it had been facing challenges prior to the pandemic related to a pivot to the Cloud which we reported on at the time. But as we said at that time we believe the company would sort out its Cloud transition, and its go to market challenges, and sales compensation issues, which it did as you can see. And its valuation jumped from 24 billion prior to Covid to 56 billion, and it's holding 93% of its peak value. Its revenue run rate is now over 6 billion with a healthy growth rate of 24% expected for the next quarter. Similarly, Fortinet has done relatively well holding 71% of its peak Covid value, with a healthy 34% revenue guide for the coming quarter. Now, Okta has been the biggest disappointment, a darling of the pandemic Okta's communication snafu, with what was actually a pretty benign hack combined with difficulty absorbing its 7 billion off zero acquisition, knocked the company off track. Its valuation has dropped by 35 billion since its peak during the pandemic, and that's after a nice beat and bounce back quarter just announced by Okta. Now, in our view Okta remains a viable long-term leader in identity. However, its recent fiscal 24 revenue guide was exceedingly conservative at around 16% growth. So either the company is sandbagging, or has such poor visibility that it wants to be like super cautious or maybe it's actually seeing a dramatic slowdown in its business momentum. After all, this is a company that not long ago was putting up 50% plus revenue growth rates. So it's one that bears close watching. CrowdStrike is another big name that we've been talking about on Breaking Analysis for quite some time. It like Okta has led the industry in a key ETR performance indicator that measures customer spending momentum. Just last week, CrowdStrike announced revenue increased more than 50% but new ARR was soft and the company guided conservatively. Not surprisingly, the stock got absolutely crushed as CrowdStrike blamed tepid demand from smaller and midsize firms. Many analysts believe that competition from Microsoft was one factor along with cautious spending amongst those midsize and smaller customers. Notably, large customers remain active. So we'll see if this is a longer term trend or an anomaly. Zscaler is another company in the space that we've reported having great customer spending momentum from the ETR data. But even though the company beat expectations for its recent quarter, like other companies its Outlook was conservative. So other than Palo Alto, and to a lesser extent Fortinet, these companies and others that we're not showing here are feeling the economic pinch and it shows in the compression of value. CrowdStrike, for example, had a 70 billion valuation at one point during the pandemic Zscaler top 50 billion, Okta 45 billion. Now, having said that Palo Alto Networks, Fortinet, CrowdStrike, and Zscaler are all still trading well above their pre pandemic levels that we tracked back in February of 2020. All right, let's go now back to ETR'S January survey and take a look at how much things have changed since the beginning of the year. Remember, this is obviously pre Ukraine, and pre all the concerns about the economic headwinds but here's an X Y graph that shows a net score, or spending momentum on the y-axis, and market presence on the x-axis. The red dotted line at 40% on the vertical indicates a highly elevated net score. Anything above that we think is, you know, super elevated. Now, we filtered the data here to show only those companies with more than 50 responses in the ETR survey. Still really crowded. Note that there were around 20 companies above that red 40% mark, which is a very, you know, high number. It's a, it's a crowded market, but lots of companies with, you know, positive momentum. Now let's jump ahead to the most recent October survey and take a look at what, what's happening. Same graphic plotting, spending momentum, and market presence, and look at the number of companies above that red line and how it's been squashed. It's really compressing, it's still a crowded market, it's still, you know, plenty of green, but the number of companies above 40% that, that key mark has gone from around 20 firms down to about five or six. And it speaks to that compression and IT spending, and of course the elongated sales cycles pushing deals out, taking them in smaller chunks. I can't tell you how many conversations with customers I had, at last week at Reinvent underscoring this exact same trend. The buyers are getting pressure from their CFOs to slow things down, do more with less and, and, and prioritize projects to those that absolutely are critical to driving revenue or cutting costs. And that's rippling through all sectors, including cyber. Now, let's do a bit more playing around with the ETR data and take a look at those companies with more than a hundred citations in the survey this quarter. So N, greater than or equal to a hundred. Now remember the followers of Breaking Analysis know that each quarter we take a look at those, what we call four star security firms. That is, those are the, that are in, that hit the top 10 for both spending momentum, net score, and the N, the mentions in the survey, the presence, the pervasiveness in the survey, and that's what we show here. The left most chart is sorted by spending momentum or net score, and the right hand chart by shared N, or the number of mentions in the survey, that pervasiveness metric. that solid red line denotes the cutoff point at the top 10. And you'll note we've actually cut it off at 11 to account for Auth 0, which is now part of Okta, and is going through a go to market transition, you know, with the company, they're kind of restructuring sales so they can take advantage of that. So starting on the left with spending momentum, again, net score, Microsoft leads all vendors, typical Microsoft, very prominent, although it hadn't always done so, it, for a while, CrowdStrike and Okta were, were taking the top spot, now it's Microsoft. CrowdStrike, still always near the top, but note that CyberArk and Cloudflare have cracked the top five in Okta, which as I just said was consistently at the top, has dropped well off its previous highs. You'll notice that Palo Alto Network Palo Alto Networks with a 38% net score, just below that magic 40% number, is healthy, especially as you look over to the right hand chart. Take a look at Palo Alto with an N of 395. It is the largest of the independent pure play security firms, and has a very healthy net score, although one caution is that net score has dropped considerably since the beginning of the year, which is the case for most of the top 10 names. The only exception is Fortinet, they're the only ones that saw an increase since January in spending momentum as ETR measures it. Now this brings us to the four star security firms, that is those that hit the top 10 in both net score on the left hand side and market presence on the right hand side. So it's Microsoft, Palo Alto, CrowdStrike, Okta, still there even not accounting for a Auth 0, just Okta on its own. If you put in Auth 0, it's, it's even stronger. Adding then in Fortinet and Zscaler. So Microsoft, Palo Alto, CrowdStrike, Okta, Fortinet, and Zscaler. And as we've mentioned since January, only Fortinet has shown an increase in net score since, since that time, again, since the January survey. Now again, this talks to the compression in spending. Now one of the big themes we hear constantly in cybersecurity is the market is overcrowded. Everybody talks about that, me included. The implication there, is there's a lot of room for consolidation and that consolidation can come in the form of M&A, or it can come in the form of people consolidating onto a single platform, and retiring some other vendors, and getting rid of duplicate vendors. We're hearing that as a big theme as well. Now, as we saw in the previous, previous chart, this is a very crowded market and we've seen lots of consolidation in 2022, in the form of M&A. Literally hundreds of M&A deals, with some of the largest companies going private. SailPoint, KnowBe4, Barracuda, Mandiant, Fedora, these are multi billion dollar acquisitions, or at least billion dollars and up, and many of them multi-billion, for these companies, and hundreds more acquisitions in the cyberspace, now less you think the pond is overfished, here's a chart from ETR of emerging tech companies in the cyber security industry. This data comes from ETR's Emerging Technologies Survey, ETS, which is this diamond in a rough that I found a couple quarters ago, and it's ripe with companies that are candidates for M&A. Many would've liked, many of these companies would've liked to, gotten to the public markets during the pandemic, but they, you know, couldn't get there. They weren't ready. So the graph, you know, similar to the previous one, but different, it shows net sentiment on the vertical axis and that's a measurement of, of, of intent to adopt against a mind share on the X axis, which measures, measures the awareness of the vendor in the community. So this is specifically a survey that ETR goes out and, and, and fields only to track those emerging tech companies that are private companies. Now, some of the standouts in Mindshare, are OneTrust, BeyondTrust, Tanium and Endpoint, Net Scope, which we've talked about in previous Breaking Analysis. 1Password, which has been acquisitive on its own. In identity, the managed security service provider, Arctic Wolf Network, a company we've also covered, we've had their CEO on. We've talked about MSSPs as a real trend, particularly in small and medium sized business, we'll come back to that, Sneek, you know, kind of high flyer in both app security and containers, and you can just see the number of companies in the space this huge and it just keeps growing. Now, just to make it a bit easier on the eyes we filtered the data on these companies with with those, and isolated on those with more than a hundred responses only within the survey. And that's what we show here. Some of the names that we just mentioned are a bit easier to see, but these are the ones that really stand out in ERT, ETS, survey of private companies, OneTrust, BeyondTrust, Taniam, Netscope, which is in Cloud, 1Password, Arctic Wolf, Sneek, BitSight, SecurityScorecard, HackerOne, Code42, and Exabeam, and Sim. All of these hit the ETS survey with more than a hundred responses by, by the IT practitioners. Okay, so these firms, you know, maybe they do some M&A on their own. We've seen that with Sneek, as I said, with 1Password has been inquisitive, as have others. Now these companies with the larger footprint, these private companies, will likely be candidate for both buying companies and eventually going public when the markets settle down a bit. So again, no shortage of players to affect consolidation, both buyers and sellers. Okay, so let's finish with some key questions that we're watching. CrowdStrike in particular on its earnings calls cited softness from smaller buyers. Is that because these smaller buyers have stopped adopting? If so, are they more at risk, or are they tactically moving toward the easy button, aka, Microsoft's good enough approach. What does that mean for the market if smaller company cohorts continue to soften? How about MSSPs? Will companies continue to outsource, or pause on on that, as well as try to free up, to try to free up some budget? Adam Celiski at Reinvent last week said, "If you want to save money the Cloud's the best place to do it." Is the cloud the best place to save money in cyber? Well, it would seem that way from the standpoint of controlling budgets with lots of, lots of optionality. You could dial up and dial down services, you know, or does the Cloud add another layer of complexity that has to be understood and managed by Devs, for example? Now, consolidation should favor the likes of Palo Alto and CrowdStrike, cause they're platform players, and some of the larger players as well, like Cisco, how about IBM and of course Microsoft. Will that happen? And how will economic uncertainty impact the risk equation, a particular concern is increase of tax on vulnerable sectors of the population, like the elderly. How will companies and governments protect them from scams? And finally, how many cybersecurity companies can actually remain independent in the slingshot economy? In so many ways the market is still strong, it's just that expectations got ahead of themselves, and now as earnings forecast come, come, come down and come down to earth, it's going to basically come down to who can execute, generate cash, and keep enough runway to get through the knothole. And the one certainty is nobody really knows how tight that knothole really is. All right, let's call it a wrap. Next week we dive deeper into Palo Alto Networks, and take a look at how and why that company has held up so well and what to expect at Ignite, Palo Alto's big user conference coming up later this month in Las Vegas. We'll be there with theCube. Okay, many thanks to Alex Myerson on production and manages the podcast, Ken Schiffman as well, as our newest edition to our Boston studio. Great to have you Ken. Kristin Martin and Cheryl Knight help get the word out on social media and in our newsletters. And Rob Hof is our EIC over at Silicon Angle. He does some great editing for us. Thank you to all. Remember these episodes are all available as podcasts. Wherever you listen, just search Breaking Analysis podcast. I publish each week on wikibond.com and siliconangle.com, or you can email me directly David.vellante@siliconangle.com or DM me @DVellante, or comment on our LinkedIn posts. Please do checkout etr.ai, they got the best survey data in the enterprise tech business. This is Dave Vellante for theCube Insights powered by ETR. Thanks for watching, and we'll see you next time on Breaking Analysis. (upbeat music)
SUMMARY :
with Dave Vellante. and of course the elongated
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Alex Myerson | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
December 2nd | DATE | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
Delta | ORGANIZATION | 0.99+ |
Ken Schiffman | PERSON | 0.99+ |
Zscaler | ORGANIZATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Cheryl Knight | PERSON | 0.99+ |
Adam Celiski | PERSON | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
August 16th | DATE | 0.99+ |
April 13th | DATE | 0.99+ |
Rob Hof | PERSON | 0.99+ |
NASDAQ | ORGANIZATION | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
93% | QUANTITY | 0.99+ |
Kristin Martin | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Arctic Wolf Network | ORGANIZATION | 0.99+ |
38% | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
71% | QUANTITY | 0.99+ |
January | DATE | 0.99+ |
Palo Alto | ORGANIZATION | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
50% | QUANTITY | 0.99+ |
February of 2020 | DATE | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
7 billion | QUANTITY | 0.99+ |
six companies | QUANTITY | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
2022 | DATE | 0.99+ |
Barracuda | ORGANIZATION | 0.99+ |
34% | QUANTITY | 0.99+ |
24% | QUANTITY | 0.99+ |
February | DATE | 0.99+ |
last week | DATE | 0.99+ |
last Friday | DATE | 0.99+ |
SailPoint | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
more than 50% | QUANTITY | 0.99+ |
85% | QUANTITY | 0.99+ |
each week | QUANTITY | 0.99+ |
44% | QUANTITY | 0.99+ |
35 billion | QUANTITY | 0.99+ |
70 billion | QUANTITY | 0.99+ |
Ken | PERSON | 0.99+ |
KnowBe4 | ORGANIZATION | 0.99+ |
27% | QUANTITY | 0.99+ |
56 billion | QUANTITY | 0.99+ |
Netscope | ORGANIZATION | 0.99+ |
October | DATE | 0.99+ |
Next week | DATE | 0.99+ |
one factor | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
hundreds | QUANTITY | 0.99+ |
44 | QUANTITY | 0.99+ |
dozens | QUANTITY | 0.99+ |
BeyondTrust | ORGANIZATION | 0.99+ |
David.vellante@siliconangle.com | OTHER | 0.99+ |
24 billion | QUANTITY | 0.99+ |
Jason Cook, Cyber Defense Labs & Mike Riolo, CrowdStrike | CrowdStrike Fal.Con 2022
(upbeat music) >> Welcome back to Fal.Con 2022. My name is Dave Vallante. We're here with my co-host Dave Nicholson. On the last earnings call George Kurts made a really big emphasis on the relationship with managed service providers. CrowdStrike has announced a new service provider capability. The powered service provider program. Jason Cook is here. He is the president of cyber defense labs. He's joined by Mike Riolo. Who's the vice president of global system integrators and service providers at CrowdStrike gents. Welcome to TheCube. Good to see you. >> Thank you very much. >> Thank you >> Jason, tell us about cyber defense labs. What do you guys do? Give us the bumper sticker, please. >> Cyber defense labs uses the best technology in the world to put together services that help protect our clients >> Simple. Like it. What's XDR? (people laughing) >> I've not heard of that before, sorry. >> So Mike, we've seen the rise of service providers. I saw a stat, I don't know, six, seven months ago that 50% of us companies don't even have a SOC. We're talking about mid to large companies. So service providers are crucial. What's the CrowdStrike powered service provider program all about? >> Well, it's an evolution for us. We've been dealing with this market for some time. And the idea is, is like how do we expand the opportunity to stop reaches? I mean, that's what it's all about. Like how more routes to market, more partners like cyber defense labs that can really go in and bring our technology coupled with their services to power their offerings to their customers and just help us reach every end user out there, to stop reaches. >> So Jason, how do you guys differentiate? Cause I see, you know, as an analyst, I'll look back, I'll read the press releases and they'll see, okay. They just look so similar. So how do you differentiate from the competition? What do you tell customers? >> So when it comes to our selection of technology we test it, we work it, we literally put it into real world situations with our clients. And then we differentiate ourselves with expert services. It's a white glove service from us. We embed ourselves right in with our clients. That's why we call 'em our client partners. And they see us as part of their team and extension of their team. They don't have the time to play with technology and work out what's best. They don't know the time to select it or even then the expertise to use it effectively in the environment. So that's where the trust comes in with us. And then for us, likewise, we are the technology provider such as CrowdStrick, we need to know the technology works and it does what it says. >> I always ask CISOs; What's your number one challenge? And they'll say lack of talent. The only time I didn't get that answer was at... The Mongo DB CISO at reinforced. I'm like yeah, it's cause you're Mongo, I guess reinforced or AWS doesn't have the same problem, but do you... Obviously you see that problem. And you compliment that, is that a fair? >> Yeah, absolutely. Many, many companies mid-market enterprises are really struggling to find talent and then retain the talent. So for us where that's all we are about and then we are there to enable your business to do what your business does. It is just working and I think more and more so you're going to see an industry clearly CrowdStrike's going in that direction. That it's the service provider that becomes a critical element of that trusted circle. >> Does that translate into a market segment by size of organization typically or? You mentioned the ever never ending quest for talent which is critical regardless of size but what does your target market look like? >> So I, I think the biggest gap in the market frankly, is still the mid-market. Many smaller companies still are really just struggling with 'what is the problem.' At least in the mid-market, in the enterprises they really beginning to understand the problem and want to invest and lean in. And here's the irony. They now want to partner to solve the problem cause they recognize they can't do it on their own. >> So Mike, what are the critical aspects of this program? I mean, got the press release out there, but put some meat on the bone for us. >> So if you look at what we were doing to enable managed service providers to go in and, and be powered by CrowdStrike before it was in a corporate market segment it was a specific set of product from us to really enable MDR, you know, sort of that, that generation of services that a lot of customers looked at MSPs for. And what the big message about this is is we are now expanding that. We're taking it out of corporate, we're going upmarket, we're going enterprise. We can leverage partners like cyber defense labs to package our software into their offering and help them power them more than just endpoint. Right? We've had a lot of exciting announcements and probably more to come around identity, you know XDR, the new buzz, right? Like what does it mean? And in, if you look at our approach, it's a very platform centric approach and that's something that partners can monetize. That's something that partners can really help clients grow with is that it's not just about endpoint. It's more about how do I make sure that I'm in a position with a partner that allows me to grow as a market decides it's necessary. So things like identity, cloud on and on and on, that we're investing in and continuing to grow. We are making that available to the CrowdStrike powered service about our marketplace. >> So Jason, service providers historically outsourcing, okay. And it used to be a lot of; 'okay, you know, I'll take over your mess for less kind of thing.' Right? And so the pattern was you would have one of everything and then, that limited your scale. The bigger you got, you had this economies of scale. So am I hearing that, like how do you partner with CrowdStrike? Are you kind of standardizing on that platform or not necessarily cause you have to be agnostic. What's your posture on that? >> So there's a level of, you have to be technology agnostic. We pride ourselves in just using the best technology that's out there. But at the same time, very much with the Fal.Con platform they're building out and maturing in a way that's making significant risk mitigation abilities for a solution provider like us to say we'll take one of those, one of those and put our service around it because that's the best fit service to reduce the risk of this particular client. And having that flexibility for us to do that really allows us then to stay within the same sort of product suite rather than going outside when integration is still one of the biggest challenges that you have. >> So you're one of those organizations that's consolidating a bevy of point tools. Is that right? I mean, you're going through that transformation now. Have you already gone through that? What's your journey look like there? >> Oh, we help companies do that. That's how they mitigate and reduce their risk. >> Okay. But you're using tools as, as well. Are you not? So I mean, you've got to also I mean you're like an extension of those clients. >> Absolutely. So it comes down to a lot of the time do you have the right team? We have a team of experts that deliver expert services. You get to a level of skillset and experience, which goes what's just the best tool out there. And it becomes that's our insight. So one of the reasons why we like the Fal.Con product is because regardless of what the mess is, that's happening you can rapidly deploy stuff to make a difference. And then you then work out how to fix the mess which is quite a change from how traditionally things are done, which is let's analyze the problem. Let's look at options around it. And by the time you've done that time has passed and you can't afford to just allow time to pass these days. So having the right technology allows you to rapidly deploy. Of course, we use what we sell. So we are proud to say that we use a number of the Fal.Con products to protect ourselves and consolidate onto that technology as we then offer that out as a service to our clients. >> So Mike, I'm thinking about the program in general and specifically how you are implementing this program thinking about the path to bringing the customer on board. There are a finite number of strategic seats at any customer's table. So who is at the customer's table? Is it CDL saying; 'Hey, I'm going to bring in my folks from CrowdStrike to have a conversation with you.' Is it CrowdStrike saying; 'Hey, it looks like a service provider might be the best solution for you. Let's go talk to CDL.' How does that work? >> It's a great question. And I think we talk a lot about how there's a gap in people to support cyber efforts inside of companies. But we don't talk about the gap in like experts that can go in and actually sit down with CISOs, with CIOs, with CFOs. And so for us, like it's all about the flexibility. It's it's what do you need in the moment? Because at the end of the day, it comes down to the people. If Jason has a great trusted relationship, he's like; 'Hey I just need some content.' 'Help me push why we're powered by CrowdStrike in this moment.' Great, go run. If we have an opportunity where we know that cyber defense labs has a presence then we go in together, right? Like that flexibility is there. We've done a lot. When you build a program like this, like it's easy to tell the market what they need. It's easy to tell everybody, but it's also you're looking at a cultural shift and how CrowdStrike goes to market, right? Like this is all about how do we get every possible route to market to stop reaches for customers of all size. >> I would echo that. there's three ways that that's working for our two companies at the moment. Many times a lot of the relationships that we have are trusted advisor at the owner or board level of these mid-market and enterprise companies. They're looking to ask for a number of things. And one of the things that we then say is, Hey for your technology roadmap, hey we want to bring in co-present coded us, co-discuss co-strategize with you what your roadmap is. And so we often bring CrowdStrike into the conversations that cyber defense lab is having at the board level. Then on the other side, CrowdStrike obviously has a significant sales force and trusted advisors. They go in with the product and then it's apparent that the you know, the client wants way more than just the product. They say, this is great. I love it. I've made my decision, but I can't operate it effectively. And so we then get pulled in from that perspective >> You get to all the time from product companies, right? It's like, okay, now what? How do I do this? And you go, oh, I'll call somebody. So this is going to accelerate. You go to market. >> Well, and everybody looks at it like, you know how does your sales play with their sales, right? Everyone's going after the same thing. And I'm, you know, that's important, but you have to look at CrowdStrike as more than sales, right? We have an amazing threat intel group that are helping clients understand the risk factors and what bad people are trying to do to them. We can bring so many experts to the side of a cyber defense labs in, in that realm. You know, we've been doing this a long time. >> This is what's interesting to me when I think about your threat hunting, because you guys are experts and you guys are experts. But the... Correct me if I'm wrong. But the advantage I see at the CrowdStrike has is your cloud platform allows you to have such a huge observation space. You got a ton of data and you bring that to the relationship as well and then you benefit from that? >> It's two way. It's absolutely two way. CrowdStrike has a whole bunch of experts and expertise in this space. So do cyber defense labs. We call it for us because we're providing a service to multiple clients. Many of them have a global presence. We call it our global threat view. And absolutely we are exchanging real time threat telemetry data with, with our friends at CrowdStrike Which is impacting the value that we have and the ability to respond extremely quickly when something's happening to one of our clients. >> Well, I just add to that, you know if you look at all of our alliances, right? We've got solution providers, tech reliant, everything. The one thing that's really interesting about the CrowdStrike powered service provider program; it lives in alliances, It's a partnership program, but they're our customer. They have chosen to standardize on our platform, right. To help drive the best results for their customers. And so we treat them like a partner because it's not for internal use. There's unlimited aspect to it. And so as that treating like partnership we have to enable them with more than just product. Right? We want to bring the right experts. We want to bring the right, you know, vision of where the market's going the threats out there, things of that nature. And that's something that we do every day with you guys. >> And it was even expressed earlier with the keynote speech that George gave. Look there's an ecosystem of very good technologies, very good providers. And there there's that sort of friend-of-me view here. You put the best thing together for the client at the end of the day. And if we all acknowledge, which I think is the maturity of our partnership, that one plus one equals, I always say at 51 now, if you play it right, then the partner sees... That the client sees the value of the partnership. And so they want more of that. >> So it sounds like... We got to wrap, but I wonder if we could close on this. It sounds like this was happening just organically in the field. Now you've codified it. So my question to each of you is; What's your vision for the future? Where do you guys want to take this thing? >> What a wrap question right there. I love it. Honestly, like we look at it in... Look at what does it mean to be a CrowdStrike powered service provider. It is more than just the platform. It's the program in general, offering them tools to go in and do early assessments. One thing about service providers, they're in there before vendors, right? We're still a vendor at the end of the day. And so they have that relationship, like how do we enable them to leverage our platform leverage our tools, leverage our programs in order to help a client understand, like, what is your risk factor Could a breach come, things of that nature. And so it's really building in really enabling a partner like cyber defense labs to take on the full suite of programs, services, platform that we can provide to them as a customer, treated them like a partner. >> And Jason, from your perspective, bring us on if you would. >> So our partnership with CrowdStrike is really enabling cyber defense labs to increase our share of wallet, our presence in very specific market segments; The mid-market to enterprise especially around banking, financial services auto dealerships, healthcare, manufacturing, where last year we saw a significant progress there. And we think we're going to double it between this year and next year. >> Jason Cook, Mike Riolo. thanks for coming in TheCube. Great story. >> Thank you for having us >> Alright, thank you for watching. Keep it right there. Dave Vallante and Dave Nicholson will be back right after this short break from Fal.Con 22. You're watching TheCube. (soft electronic music)
SUMMARY :
He is the president of cyber defense labs. What do you guys do? What's XDR? What's the CrowdStrike And the idea is, is like So how do you differentiate They don't have the time to play And you compliment that, is that a fair? to do what your business does. And here's the irony. I mean, got the press release out there, and probably more to come And so the pattern was you would have one of the biggest challenges that you have. Have you already gone through that? Oh, we help companies do that. Are you not? So it comes down to a lot of the time and specifically how you are and how CrowdStrike goes to market, right? And one of the things So this is going to accelerate. We can bring so many experts to the side and then you benefit from that? and the ability to Well, I just add to that, you know of the partnership. So my question to each of you is; It is more than just the platform. bring us on if you would. And we think we're going to double it Jason Cook, Mike Riolo. Alright, thank you for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Mike Riolo | PERSON | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Jason | PERSON | 0.99+ |
Jason Cook | PERSON | 0.99+ |
George | PERSON | 0.99+ |
Mike | PERSON | 0.99+ |
Dave Vallante | PERSON | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
two companies | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
50% | QUANTITY | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
CrowdStrick | ORGANIZATION | 0.99+ |
George Kurts | PERSON | 0.99+ |
last year | DATE | 0.99+ |
next year | DATE | 0.99+ |
Cyber Defense Labs | ORGANIZATION | 0.99+ |
two way | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
three ways | QUANTITY | 0.99+ |
this year | DATE | 0.99+ |
Mongo | ORGANIZATION | 0.99+ |
each | QUANTITY | 0.98+ |
CDL | ORGANIZATION | 0.97+ |
Fal.Con 2022 | EVENT | 0.97+ |
Fal.Con 22 | EVENT | 0.96+ |
seven months ago | DATE | 0.91+ |
TheCube | ORGANIZATION | 0.89+ |
CrowdStrike | EVENT | 0.85+ |
six, | DATE | 0.79+ |
one thing | QUANTITY | 0.78+ |
One thing | QUANTITY | 0.7+ |
MDR | ORGANIZATION | 0.69+ |
Fal.Con | TITLE | 0.67+ |
Fal.Con | ORGANIZATION | 0.65+ |
TheCube | TITLE | 0.62+ |
things | QUANTITY | 0.58+ |
one challenge | QUANTITY | 0.58+ |
ton of | QUANTITY | 0.49+ |
51 | OTHER | 0.35+ |
CrowdStrike | TITLE | 0.28+ |
Breaking Analysis: Are Cyber Stocks Oversold or Still too Pricey?
>> From theCUBE Studios in Palo Alto in Boston, bringing you data driven insights from theCUBE and ETR. This is Breaking Analysis with Dave Vellante. >> Cybersecurity stocks have been sending mixed signals as of late, mostly negative like much of tech, but some such as Palo Alto Networks, despite a tough go of it recently have held up better than most tech names. Others like CrowdStrike, had been out performing Broader Tech in March, but then flipped in May. Okta's performance was pretty much tracking along with CrowdStrike for most of the past several months, a little bit below, but then the Okta hack changed the trajectory of that name. Zscaler has crossed the critical billion dollar ARR revenue milestone, and now sees a path to five billion dollars in revenue, but the company stock fell sharply after its last earnings report and has been on a down trend since last November. Meanwhile, CyberArk's recent beat and raise, was encouraging and the stock acted well after its last report. Security remains the number one initiative priority amongst IT organizations and the spending momentum for many high flying cyber names remain strong. So what gives in cyber security? Hello, and welcome to this week's Wikibon CUBE insights powered by ETR. In this breaking analysis, we focus on security and will update you on the latest data from ETR to try to make sense out of the market and read into what this all means in both the near and long term, for some of our favorite names in cyber. First, the news. There's always something happening in security news cycles. The big recent news is new President Rodrigo Chavez declared a national emergency in Costa Rica due to the preponderance of Russian cyber attacks on the country's critical infrastructure. Such measures are normally reserved for natural disasters like earthquakes, but this move speaks to the nature of today's cyber threats. Of no surprise is modern superpower warfare even for a depleted power like Russia almost certainly involves cyber warfare as we continue to see in Ukraine. Privately held Arctic Wolf Networks hired Dustin Williams as its new CFO. Williams has taken three companies to IPO, including Nutanix in 2016, a very successful IPO for that company. Whether AWN chooses to pull the trigger this year or will wait until markets are less choppy or obviously remains to be seen. But it's a pretty clear sign the company is headed to IPO at some point. Now, big point of discussion this week at Red Hat Summit in Boston and the prior week at Dell technologies world was security. In the case of Red Hat, securing the digital supply chain was the main theme. And from Dell building, many security features into its storage arrays and cyber resilience services into its as a service offering called Apex. And we're seeing a trend where buyers want to reduce the number of bespoke tools they use if they, in fact can. Here's IDC's Jim Mercer, sharing data from a recent survey they conducted on the topic. Play the clip. >> Interestingly, we did a survey, I think around last August or something. And one of the questions was around where do you want your security, right? Where do you want to get your DevSecOps security from? Do you want to get it from individual vendors, right? Or do you want to get it from like your platforms that you're using and deploying changes in Kubernetes? >> Great question. What did they say? >> The majority of them, they're hoping they can get it built into the platform. That's really what they want-- >> Now, whether that's actually achievable is debatable because you have so much innovation and investment going on from the likes of startups and for instance, lace work or sneak and security companies that you see even trying to build platforms, you've got CrowdStrike, Okta, Zscaler and many others, trying to build security platforms and put it all under their umbrella. Now the last point will hit here is there was a lot of buzz in the news about Okta. The reaction to what was a relatively benign hack was pretty severe and probably overblown, but Okta's stock is paying the price of what is generally considered a blown communications plan versus a technical failure. Remember, identity is not an easy thing to rip and replace and Okta remains a best-of-breed player and leader in the space. So we're going to look at some ETR data later in this segment to try and make sense of the recent action in the market and certain names. Speaking of which let's take a look at how some of the names in cybersecurity have fared relative to some of the indices and relative indicators that we like to look at. Here's a Google finance comparison for a number of stocks and names in the bottom there you can see we plot the hack ETF which tracks security stocks. This is a year to date view. And so we don't show it here but the tech heavy NASDAQ is off around 26% year to date whereas the cyber ETF that we're showing is down 18%, okay. So cyber holding up a little bit better than broader tech as we've reported earlier, was actually much better and still seems to be a gap there, but the data are mixed. You can see Okta is way off relative to its peers. That's a combination of the breach that we talked about but also the run up in the stock since COVID. CrowdStrike was actually faring better but broke this month, we'll see how it's upcoming earnings announcements are received when it announces on June 2nd after the close. Palo Alto in the light blue has done better than most and until recently was holding up quite well. And of course, Sailpoint is another identity specialist, it is kind of off the charts here because it's going private with the acquisition by Thoma Bravo at nearly seven billion dollars. So you see some mixed signals in cyber these past several months and weeks. And so we're trying to understand what that all means. So let's take a look at the survey data and see how spending momentum is holding up. As we've reported IT spending forecast, at the macro level, they've come off their 8% highs from the end of the year, the ETRS December survey, but robust tech spending is still there. It's expected at nearly seven percent and this is amongst 1200 ETR respondents. Here's a picture from the ETR survey of the cybersecurity landscape. That y-axis that's net score or a measure of spending momentum and that horizontal access is overlap. We used to talk about it as a market share which is a measure of pervasiveness in the data set. That dotted red line at 40% indicates an elevated spending momentum level on the vertical axis and we filter the names and limited to only those with a hundred or more responses in the ETR survey. Then the pictures still pretty crowded as you can see. You got lots of companies above the red dotted line, including Microsoft which is up into the right, they're so far off the chart, it's just amazing. But also Palo Alto and Okta, Auth0, which of course is now owned by Okta, Zscaler, CyberArk is making moves. Sailpoint and Cloudflare, they're all above that magic 40% line. Now, you look at Cisco, it shows a very large presence in the horizontal axis in the data set. And it's got pretty respectable momentum and you see Splunk doing okay, no before and tenable just below that 40% line and a lot of names in the very respectable 20% zone. And we've included some legacy names just for context that fall below the zero percent line with a negative net score. And that means a larger proportion, that negative net score means a larger proportion of their customers in the survey are spending less than those that are spending more. Now, typically for these legacy names you're going to have a huge proportion of customers who have flat spending that kind of fat middle and that's why they sort of don't have that highly elevated score, but they're still viable as they get the recurring revenue each year. But the bottom line is that spending remains robust for some of the top names that we've talked about earlier despite their rocky stock performance. Now, let's filter this data a bit more to make it a little bit easier to read. So to do that, we take out Microsoft because they're just so dominant and we cherry pick some names to make the data more consumable and scannable. The other data point we've added is Okta's net score breakdown, the multicolored rows there, that row in the bottom right. Net score, it measures the percent of customers that are adding the platform new, that's the lime green, at 18% for Okta. The forest green is at 42%. That's the percent of customers in the survey that are spending six percent or more. The gray is flat spending. That's 32% for Okta, this past survey. The pink is customers that are spending less, that's three percent. They're spending six percent or worse in the survey, so only three percent for Okta. And the bright red at three percent is decommissioning the platform. You subtract the reds from the greens and you get a net score, well, into the 50s for Okta and you can see. We highlight Okta here because it's a name that we've been following for quite some time and customers have given us really solid feedback on the technology and up until the hack, they're affinity to Okta, but that seems to be continuing. We'll talk more about that. This recent breach to Okta has caused us to take a closer look. And you may recall, we reported with our ETR colleague, Eric Bradley. The breach was announced right in the middle of ETR collecting data in the last survey. And while we did see a noticeable downtick right after the announcement, the exposure of the hack and Okta's net score just after the breach was disclosed, you can see the combination of Okta and Auth0 remains very strong. I asked Eric Bradley this morning what he thought about Okta, and he pointed out that you can't evaluate this company on its price to earnings ratio. But it's forward sales multiple is now below 7X. And while attractive, these high flyers at some point, Eric says, they got to start making a profit. So you going to hold that thought, we'll come back to that. Now, another cut of the ETR data to look at our four star security names here. A while back we developed a methodology to try and cut through the noise of the crowded security sector using the ETR data to evaluate two key metrics; net score and shared N. Net score again is, spending momentum, the latter is an indicator of presence in the data set which is a proxy for market presence. Okay, we assigned those companies that cracked the top 10 in both net score and shared N, we give them four stars, okay, if they make the top 10. This chart here shows the April survey data for those companies with an N that's greater than, equal to a hundred responses. So again, we're filtering on those with a hundred or more responses. The table on the left that you see there, that's sorted by net score, okay. So we're sorting by spending momentum. And then the one on the right is sorted by shared N, so their presence in the data set. Seven companies hit the top 10 for both categories; Palo Alto Network, Splunk, CrowdStrike Okta, Proofpoint, Fortinet and Zscaler. Now, remember, take a look, Okta excludes Auth0, in this little methodology that we came up with. Auth0 didn't make the cuts but it hits the top 10 for net score. So if you add in Auth0's 112 N there that you see on the right. You add that into Okta, we put Okta in the number two spot in the survey on the right most table with the shared N of 354. Only Cisco has a higher presence in the data set. And you can see Cisco in the left lands just below that red dotted line. That's the top 10 in security. So if we were to combine Okta and Auth0 as one, Cisco would make the cut and earn four stars. Now, some other notables are CyberArk, which is just below the red line on the right most chart with an impressive 177 shared N. Again, if you combine Auth0 and Okta, CyberArk makes the four star grade because it's in the top 10 for net score on the left. And Sailpoint is another notable with a net score above 50% and it's got a shared N of 122, which is respectable. So despite the market's choppy waters, we're seeing some positive signs in the survey data for some of the more prominent names that we've been following for the last couple of years. So what does this mean for the markets going forward? As always, when we see these confusing signs we like to reach out to the network and one of the sharpest traders out there is Chip Simonton. We've quoted him before and we like to share some of his insights. And so we're going to highlight some of that here. So technically, almost every good tech stock is oversold. And as such, he suggested we might see a bounce here. We certainly are seeing that on this Friday, the 13th. But the right call tactically has been to sell into the rally these past several months, so we'll see what happens on Monday. The key issue with the name like Okta and some other momentum names like CrowdStrike and Zscaler is that when money comes back into tech, it's likely going to go to the FAANG stocks, the Facebook, Apple, Amazon, Netflix, Google, and of course, you put Microsoft in there as well. And we'll see about Amazon, by the way, it's kind of out of favor right now, as everyone's focused on the retail side of the business meanwhile it's cloud business is booming and that's where all the profit is. We think that should be the real focus for Amazon. But the point is, for these momentum names in cybersecurity that don't make money, they face real headwinds, as growth is slowing overall and interest rates rise, that makes the net present value of these investments much less attractive. We've talked about that before. But longer term, we agree with Chip Simonton that these are excellent companies and they will weather the storm and we think they're going to lead their respective markets. And in cyber, we would expect continued M&A activity, which could act as a booster shot in the arms of these names. Now in 2019, we saw the ETR data, it pointed to CrowdStrike, Zscaler, Okta and others in the security space. Some of those names that really looked to us like they were moving forward and the pandemic just created a surge in these names and admittedly they got out over their skis. But the data suggests that these leading companies have continued momentum and the potential for stay in power. Unlike the SolarWinds hack, it seems at this point anyway that Okta will recover in the market. For the reasons that we cited, investors, they might stay away for some time but longer term, there's a shift in CSO security strategies that appear to be permanent. They're really valuing cloud-based modern platforms, these platforms will likely continue to gain share and carry their momentum forward. Okay, that's it for now, thanks to Stephanie Chan, who helps with the background research and with social, Kristen Martin and Cheryl Knight help get the word out and do some great work as well. Alex Morrison is on production and handles all of our podcast. Alex, thank you. And Rob Hof is our Editor in Chief at SiliconANGLE. Remember, all these episodes, they're available as podcast, you can pop in the headphones and listen, just search "Breaking Analysis Podcast." I publish each week on wikibon.com and SiliconANGLE.com. Don't forget to check out etr.ai, best in the business for real customer data. It's an awesome platform. You can reach me at dave.vellante@siliconangle.com or @dvellante. You can comment on our LinkedIn posts. This is Dave Vellante for the CUBEinsights powered by ETR. Thanks for watching. And we'll see you next time. (bright upbeat music)
SUMMARY :
in Palo Alto in Boston, and the prior week at Dell And one of the questions was around What did they say? it built into the platform. and a lot of names in the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Amazon | ORGANIZATION | 0.99+ |
Dustin Williams | PERSON | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Netflix | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Microsoft | ORGANIZATION | 0.99+ |
Jim Mercer | PERSON | 0.99+ |
2016 | DATE | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
Stephanie Chan | PERSON | 0.99+ |
Eric Bradley | PERSON | 0.99+ |
Eric | PERSON | 0.99+ |
Rob Hof | PERSON | 0.99+ |
March | DATE | 0.99+ |
Alex Morrison | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Cheryl Knight | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
May | DATE | 0.99+ |
Nutanix | ORGANIZATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
April | DATE | 0.99+ |
June 2nd | DATE | 0.99+ |
Arctic Wolf Networks | ORGANIZATION | 0.99+ |
six percent | QUANTITY | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
8% | QUANTITY | 0.99+ |
AWN | ORGANIZATION | 0.99+ |
Zscaler | ORGANIZATION | 0.99+ |
Proofpoint | ORGANIZATION | 0.99+ |
Kristen Martin | PERSON | 0.99+ |
Monday | DATE | 0.99+ |
CyberArk | ORGANIZATION | 0.99+ |
Ukraine | LOCATION | 0.99+ |
Palo Alto Network | ORGANIZATION | 0.99+ |
Seven companies | QUANTITY | 0.99+ |
Williams | PERSON | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
President | PERSON | 0.99+ |
Sailpoint | ORGANIZATION | 0.99+ |
20% | QUANTITY | 0.99+ |
Alex | PERSON | 0.99+ |
five billion dollars | QUANTITY | 0.99+ |
50s | QUANTITY | 0.99+ |
32% | QUANTITY | 0.99+ |
ETR | ORGANIZATION | 0.99+ |
dave.vellante@siliconangle.com | OTHER | 0.99+ |
40% | QUANTITY | 0.99+ |
last November | DATE | 0.99+ |
42% | QUANTITY | 0.99+ |
three percent | QUANTITY | 0.99+ |
18% | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
zero percent | QUANTITY | 0.99+ |
Auth0 | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
three companies | QUANTITY | 0.99+ |
Costa Rica | LOCATION | 0.99+ |
Chip Simonton | PERSON | 0.99+ |
Sally Eaves, Global Foundation for Cyber Studies & Research | Women in Tech: Int. Women's Day
>>Yeah. Hello and welcome to the Cubes Presentation of Women in text. Global event Celebrating International Women's Day I'm John for a host of the Cube were with Sally E. Senior Policy Advisor Global Foundation for Cyber Studies and Research. Sally, great to see you. Thanks for coming on the cue for International Women's Day. Appreciate it. >>Pleasure, John. Great speech again. >>Love your title. Global Foundation for Cyber Studies. Um, global is a big part of the theme this year. Uh, cyber studies. We're seeing a lot of cyber activity all around the world, networks, communities coming together, the role of data. I mean, everything is touching our lives. There are no boundaries anymore. What does it all mean? There's so much to talk about your in the middle of it before we get into it. Tell us about your career and your history. How you got interested in tech and what you're working on. >>Absolutely. I love it. Kind of this age of convergence coming together right now, isn't it? That's how I would describe it. And that's kind of a bit like my career. I think in many ways as well. So for the audience, really great to be here and share about that today, and I kind of say, three main palace, so one would be emergent technologies. So, you know, I started off right through from coding to advisory to CTO type roles as well also change management. And now I'm more advisors right across from a I to five G to to Iot and security, for example as well. Also passionate about education checking education for me. They always go hand in hand, some a professor at a number of universities and in my non for profit, we really do a lot of outreach around educational opportunities as well. And that third pillar opponent hinted at it already will be social impact. So really passionate about how we can use tech as a force for good things around sustainability right at the heart of that, but also around diversity equity and inclusion. So we do a lot of pro project your locally and globally around kind of reframing what a tech career looks like, giving people more democratised access. Those tech opportunities outside of that a bit like yourself, you know, podcast host and writer and speaker and things as well, so very much going to building that community around key tech topics. >>Well, folks watching should check it out on Twitter. She's that great content you mentioned Mobile World Congress. Before we get on camera, you mentioned convergence. I mean, we're at a time now. I got to ask you while I got you here before we get into the whole schools and career tech thing, we've seen this movie before, but never at this scale. The convergence and the confluence of education and scale of cloud computing, the ability to level up and get, um, I won't say democratised. That's kind of overused. But I'm just talking about like with cloud computing could be educated and in market with a job instantly. Um, the barriers just seem to be moving away because of the the openings and the roles are changing. So, more than ever, this whole new tech scene comes together in a way. Can you share your thoughts and vision because to me, we're seeing this happening at such a scale unprecedented in my career? >>It is. And that's one of those words that the part had been overused, unprecedented, but right now it really, really is. It's not just a speed of change. I think it's a scale of change as well. You know, I think previously we've talked about disciplines in silos to a certain extent. Haven't we know in terms of like, an AI special is, um or five g one or other disciplines as well? But really, now that convergence about what one tech enables another, it really is that smart technology coming together for more and more different use cases, but that residents around how important education is alongside that alongside process alongside culture and shared values as well it really is. It's kind of holistic integration of everything that matters at the moment. And it's evolving business models as well. You know, shared values rights centre stage around that MWC just come back from that, And the key topics there weren't just by G, it was the importance of ecosystem collaboration. For example, there are less tracks that were isolated on one technology. It was more this conflation of these different technologies coming together and what we can achieve from that from business but also for society so really exciting focus areas now things that maybe once or a few years ago, more than periphery. They're now absolutely centre stage. So it's good to see that progress in that area. And I love to advocate around that. >>And the education piece is so important, and we always stay here in Cuba. It's a data problem, right? Everything's a data problem when you look at schools and education is structured and unstructured data kind of our our systems right, So structured as schools, institutions, those kinds of career paths or education pathways. And then you haven't structured freeform communities, seeing a lot more education going on within groups. Um, off structured environments like schools, Can you and you do a lot with schools? Can you share more how you're doing? Um uh, work with schools specifically on the structured side to get girls into careers faster and tech? And then can you also comment on the other side? What's going on in the communities because it's it's kind of going on in parallel, but they're not mutually exclusive. >>No, absolutely community, absolutely key word that I love that, and I think when we're talking about diversity and technology, it's not just what we're doing now with what we're looking at is looking ahead, but also looking at future pipeline as well. So for me, I use this express a little bit. But change the narrative. That's what springs to mind for me when we're talking about that, and particularly for girls going into technology but also more broadly, diversity of experience. More broadly, we do have these drop offs, so UK is one example, but it is really representative of the global trends that we're seeing. Now. We get a drop off of girls in particular, taking ice subjects at GCSE level so kind of that subject choice choice at 12 to 14, that kind of area. We get the same thing at a level that's equivalent of 16 to 18 and then even safer university or even apprenticeships, whichever both equally valid. But even if people are taking those types of skills, they're not then choosing to apply them in their careers. So we're seeing these kind of three pillars where we need to intervene earlier. So for me, the more that we can do things you know from dedicated educational offers, but equally partnering with tech companies to do outreach around this area. We need to go in younger and younger is so important to address that. Why? Why are people thinking they can't? Why is his career not for me, for example, so addressing that is huge. And that's one of the things we do with my nonprofit that's called aspirational futures. We go into schools and two universities, but equally do things with older adults and re Skilling and up Skilling as well. Because again, we can't leave that behind either. There's something for all different kind of age groups and backgrounds here, but specifically, I think, in terms of getting people interested in this career, curiosity matters. You know, I think it's an underrated skills. So it's changing the narrative again. And what the tech career actually is, what skills are valid? You know, I mentioned, I have a coding background as a starter. But not all tech careers involve coding, particularly the rise of low code or no code, for example as well. So really valued skill. But so many other skills are valid as well, you know, creativity or emotional intelligence problem solving skills. So for me, I like to drive forward. All those skills can make a difference as an individual, as a team, so your you know your tech career. All those skills are valid and you can make a huge difference. And I also think, you know, just kind of really bringing to the fore what different types of projects you can be involved in in tech as well. And I found really resonating when you can talk about tech for good projects and show how you're making a difference about some of those big challenges. Um, that's kind of really kind of resonating responsible people as well. So again, the more we can show tangible projects where you can make a difference and the whole range of skills that are involved in that it really helps people to think differently and gain that skills confidence. So it's like, >>Well, that's awesome insight. I want to just double click on that for a second, because one the drop off. Can you just repeat the ages where you see the drop off with the drop offs are >>absolutely yeah, no problem, John. So it's kind of when you're making your first choices around your first kind of qualifications. Between that 12 to 14 age group, 16 to 18 and then 18 to 21 I think we've really got to tackle that So again the earlier we can go in the better and again supporting people within organisations as well. So I do a lot of work like internally, with organisations as well people looking to up skill and re skill. You mentioned about data and the importance of data literacy earlier on in the conversation as well. For example, going into organisations and really helping to support people in all roles, not just tech facing roles develop that skills, confidence as well. So for me it's access to skills really bringing forward the difference. You can make that holistic range of skills that makes a difference, but also the confidence to apply them as well. You know, we talk about agility, of organisations, a lot areas, one of those kind of words in the last 12 months. But maybe we don't talk about personal agility and team agility as well. So I kind of talked about it. This little toolbox, if we can give people more and more things to draw from it, the only constant is this rate of change. If you've got more things in your armoury to cope with that and be an agile to that. It takes that fear away about what happens next because you feel you've got more skills to dip into it and to apply. So for me, it's that that confidence, not just the access to the skills >>and the other thing, too, I thought was insightful. I want to just reiterate and bring to the surface again as skills, right? So you don't have to be a coder. And I see I have two daughters just with my family. Yeah, I do python. They kind of put their toe in the water cause it's cool. Maybe that's a path, and they kind of don't like, maybe get into it. But it's not about coding anymore because you said low code, no code. Certainly. Maybe AI writes the code. We all see that happening. It's problem solving. It's you could be in health care and you could be nerd native, as we say, as on some of the other interviews of that year at the problem, solving the aperture of skills is much broader now. Can >>you share more than >>more than because with your with your programme and your nonprofit, I know you're in the middle of it, and this is important to get that out there. >>Absolutely so skills. You know, I think we need to change the focus on what skills make a difference if you see what I mean. I think you're absolutely right. There's some misconceptions about, you know, you want to go into tech, you need to be a coda. And you're right with the upscale around low Skilling. Sorry, Low code and the code opportunities. Um, I think the niches around being a specialist. Koda. We're gonna get more roles in that area, but in other areas, we need to look at different skills gap. So I'm advising people to look at where the gaps are now. So cyber security is a key example of that testing architecture. Those gaps are getting bigger. Their amazing skills, opportunities. They're so focused on a particular discipline. But it's all those skills that surround that that make a difference as well. So as I mentioned, you know, e Q creativity, communication skills, because it's not just about having the skills to build the future, knew that imagination to refocus about what that could even be. You know, that was one of the MWC 20 to refrain, reimagine and I love to kind of galvanise that spirit and people that you can be part of that, you know, wherever you are now. And I actually run a little series called 365, and you mentioned something right at the start of our conversation about International Women's Day being such an important focus area. But also we need to think about this beyond that as well. So hence that's the title of the series that I run because it's a focus on that every single day of the year. You know, I interviewed people that could be a C suite roles, but equally I've had some amazing interviews with 12 to 14 year olds, even younger, the youngest of the seven year old. He's doing like an amazing project in their kitchen with a three D printer working with local school or a hospice doing something around Ukraine. Another project we're doing at the moment, actually, and it's so resonating it's trying to show people wherever you are now, wherever you want to be, there's somebody relatable that you can make. You can see whatever sector, in whatever age, whatever background, and I think it's to give that inspiration. Hey, you know what I can do that that can be me. So visibility of role models, it really matters. And to really broaden out what role model looks like, you know? >>And then I think people out there you see yourself. I mean, this is what we been >>proven right? >>It's proven I want to get into the aspirational futures thing that you have going on, and I know this is important to you, but also something else you said was, is that there's more jobs open and say cybersecurity than ever before. And you're seeing this trend where all these new roles are emerging because of the tech that weren't around years ago, right? And so we've been having conversations in the Cube saying, Hey, all these roles are new, but also problems are new to these New new problems are surfacing because of the this new environment we're in. So these new roles still have to solve problems, so we need people to solve those problems. This is the future. This is the conversation that people are trying to get zero in on misinformation, cybersecurity, you name it. Society is changing with >>new. You >>have new new problems and new opportunities. Could you share your aspirational future? How you vector into that? >>Yeah, absolutely. And for me it's just again that we're convergence around people in technology and partnership, and that's what we aim to do. We do projects at a very local level, but equally we do them at national and international level as well. And one of our kind of people assume I'm talking pillars a lot, but I like it as a framework. So one of those esteem learning. So putting an equal value on the arts as well as science, technology, engineering, mathematics because I think they are. You know, as I mentioned before, hand that imagination, creativity, curiosity, collaboration, skills. They're equally valid as a different types of tech skills as well. We need an equal value and all of them. I think that's hugely important, important today. I think over the last 5 to 10 years, maybe there's been less of a focus within curriculums on the arts area than the other areas. So for me, putting that equal focus back is hugely important to navigate change, you know, I think that's that's that's absolutely key. So we focus on that area and we do a whole range of tech for good projects, and that's the way we help people to learn, you know, for example, data 90% at the moment of data isn't touched again when it's archived after three months. How can we turn that into a learning opportunity? For example? Some of the projects we use some of this is not going to be used again. We do it in a very safe, secure way, but we use that as one of our training aids, and then we apply them for local projects. We have initiatives from hackathons and ideation right through to very tangible hubs that we've actually built out where people can go, learn up skill and kind of learn through play and experimentation as well. Because again, I think that sometimes under explored that type of value and that freedom to be able to do that. And we also do things, change management skills. We talk about agile learning, agile technology need agile change management as well. So it's a very holistic skills. Look at what you need to navigate that future and have the confidence to apply them. So steam is very much our focus, applying them for tech for good projects and doing that externally, but also within organisations as well. So that very much is shared value approach to good business, but good for society as well. So yes, that this toolbox, that technology I applied earlier we really try and give people that support. To be able to do that, to move forward with confidence and optimism. >>I think adding the aid to stem really for steam is really smart because entrepreneurship or any problem solving creativity is the spark of innovation. >>And that's a super >>important skill. And we've seen it, whether it's startup or in a big company or in society, so super, super insightful. So I got to ask you, as a policy senior policy advisor on cyber studies globally, what are the core issues you're looking at right now? What are you shutting the light on and what's the most important thing you're working on? And then what's the most important thing you're working that people aren't talking about, that people should pay attention to >>Absolutely so. One of my key roles of the foundation is is kind of share of global trust. Essentially, um, and again trust is that one of the key issues of our time? One thing that people are talking about so much that relates with that actually is there's there's research from a group called The Woman. They've been looking at this for about 17 years or so. The research that came out most recently and I've got some original research that kind of support this as well is that for the first time ever, consumers are looking at organisations like tech organisations and other large organisations, in particular the enterprise level, really, as the bastions of trust to a bigger extent than NGOs or even governments. And that's the first time we've seen it at that level. So trust really really matters. It's one of the biggest differentiators of our time, so we're trying to help people. How do you establish trust? How do you build transparency, commitment and accountability, particularly in areas where there's currently confusion, so as one example going back Security zero Trust That phrase is used an awful lot, isn't it? But it's sometimes causing some confusion. Actually, it against what it's trying to deliver if you see what to me. So now I just do something recently with SMB s in particular and there is a confusion that effectively, you know, you could You could buy off the shelf and it's once and done. Um, And then we're sorted for the zero Trust security. And obviously it's not like that. It's an ongoing journey, and there's so many different constituent parts. So there's some things I'm seeing at the moment in the market with there's confusion around around certain language, for example. So again it goes back to backing things up with the technology but also research and awareness so we can see where those skills gaps are. You can see where there's awareness gaps are we can help to fill them. So that's an important part of that particular role bringing the technology in the culture and the education hand in hand together. So it's something I'm really passionate about, and for me sort of related to this, Um, I do a lot of work around S G, um, to the sustainable development goals. In particular, environmental and social governance is something that's becoming much more of a bigger kind of centre stage conversation. I'm an action point in a moment which is fantastic because this is something I've been involved in kind as long as I can remember. So I work directly with organisations like, um Unesco, lots of different professional bodies. It's kind of a huge driver for me. So one thing to kind of look out for that's coming very soon. I'm seeing an issue around around measurement in this area. You know, we're seeing consumers becoming more and more conscious and employees, you know you want to work for by from advocate organisations that have that same value alignment that you have personally and professionally, hugely important. We're seeing some great reports coming out around better e S g measurement. But it can be hard to compare between different organisations, so we are getting more transparency. But it's difficult sometimes to make fare comparisons. Um, so what I'm trying to do a lot of work on at the moment is how you go beyond that transparency to commitment to accountability and that deeper level and that comparability. So I would say kind of to the audience moment, Look out for a bit of a new index. It's going to help people, I think, make those conscious choices make informed choices. So it's something I'm super, super passionate about. I want to try and take that to next level in terms of its actualisation. >>That's awesome. And certainly we'll link to it on our site. All the work you're doing on interviews will put links there as well. We'll make sure we'll follow up on that. Great to have you on. You're such an inspiration. Amazing work, cutting edge work. And I'm I'm super impressed with the cyber studies, and I think this is really important. I have to ask you a final question because you're in the middle of it again with covid and the unfortunate situations we've been living with Covid. And now, obviously with this Ukraine situation that the cyber has been pulled to the front of the agenda and you're seeing a cultural shift. You certainly got Web three. Cyber is now part of everyone's life, and they can see it. They've been seeing it living it. Everything's been pulled forward as a cultural shift happening, okay, and and it's really interesting right now, and I want to get your thoughts because this now people are now aware what cyberwar means cyber security cyber. At home, I have remote work. Cyber has become front and centre or digital. However you want to call it in our lives pulled forward. >>So I'm not even sure in some >>cases, maybe rightfully so, and others. What's your view on this whole cultural cyber being pulled forward? >>It is. It's really, really interesting. And so one of the things I do is I am now ready to a Cyber Insights magazine as well. So we're developing a lot of content pieces around this and lots of things I'm seeing here. So your covid point, I think one of the most interesting things there is around literacy. For example, you remember when we went back to 18 months ago? We're having daily briefings, whether that's from from UK Parliament or the U. S. Equivalent. And different phrases were coming into everyday language driven by the curve or driven by the data. And they're coming into everyday life and people family kitchen table. It was something that hasn't been spoken about before, but suddenly it was driving everyday decision making and what you could and couldn't do. And that's raised awareness. And I think it helped people to ask better questions and to challenge things that they're seeing. And where has that data come from? How has it been presented to have seen that there? I think similarly, where we're having that same understanding and raise of questioning around what we're hearing around cyber as well. You're looking at where that source has come from, and how can we look at that in a different way? So again, I think it's raising that awareness, which is really, really crucial, >>the >>other thing as well around cyber security in particular. And again, I don't think this is talked about as much. When we talk about aspects around inclusion, we talk about diversity equity. Um, I'll see inclusion. I talk about belonging a lot as well. I think there's other aspects around sustainability that Inter relate as well, because when we find, for example, communities that are not included, they tend to be more adversely affected by, for example, climate factors as well. There's an interrelation. They're equally We find that people that haven't got, for example, the same level of cybersecurity protection are also in that same. There's an interrelation across all those elements were not talking about that either. So that's the other thing. I want to kind of bring attention to their again. They aren't separate conversations is a huge crossover between these different conversations and actions that we can do to make a difference. So there's some positive aspects about things that have happened over the last period of time and also some challenges that if we're aware of them, we can work together again, that collaboration piece to be able to overcome them. You know, I've got I've got a book coming out, all for charity called Tech for Good and one of my kind of tag lines. There is around contagion of positive change. Again, let's reframe the language around what's been happening. And let's kind of put that together is something that's far more positive. >>Language is super important, great >>content here. So >>thanks so much for coming. I really appreciate all the great insight and taking the time out of your busy day to to join us here in the Cube. Women in tech Global Event. Thank you so much. >>My absolute pleasure. Thank you. Thank you all for watching. >>Okay. The cubes presentation of women in text. Global event Celebrating International Women's Day. I'm John for a host of the Cube. Thanks for watching
SUMMARY :
of the Cube were with Sally E. Senior Policy Advisor Global Foundation for Cyber Studies and of the theme this year. So for the audience, I got to ask you while I got you here before we get into the whole schools and career tech thing, we've seen this It's kind of holistic integration of everything that matters at the moment. And the education piece is so important, and we always stay here in Cuba. So for me, the more that we can do things you know from dedicated educational offers, Can you just repeat the ages where you see the drop off with the drop offs are So again the earlier we can go in the better and again supporting people within organisations as well. So you don't have to be a coder. more than because with your with your programme and your nonprofit, I know you're in the middle of it, and this is important to You know, I think we need to change the focus on what skills make a difference if you see And then I think people out there you see yourself. So these new roles still have to solve problems, You Could you share your aspirational future? of tech for good projects, and that's the way we help people to learn, you know, for example, data 90% I think adding the aid to stem really for steam is really smart because entrepreneurship or any So I got to ask you, as a policy senior policy advisor on And that's the first time we've seen it at that level. that the cyber has been pulled to the front of the agenda and you're seeing a cultural shift. What's your view on this whole cultural cyber being pulled forward? And so one of the things I do is I am now ready to a Cyber Insights magazine So that's the other thing. So I really appreciate all the great insight and taking the time out of your busy day to to join us Thank you all for watching. I'm John for a host of the Cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Sally | PERSON | 0.99+ |
12 | QUANTITY | 0.99+ |
Ukraine | LOCATION | 0.99+ |
John | PERSON | 0.99+ |
16 | QUANTITY | 0.99+ |
Cuba | LOCATION | 0.99+ |
seven year | QUANTITY | 0.99+ |
two daughters | QUANTITY | 0.99+ |
International Women's Day | EVENT | 0.99+ |
Sally E. | PERSON | 0.99+ |
Unesco | ORGANIZATION | 0.99+ |
18 | QUANTITY | 0.99+ |
365 | TITLE | 0.99+ |
Tech for Good | ORGANIZATION | 0.99+ |
two universities | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Global Foundation for Cyber Studies | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
14 | QUANTITY | 0.99+ |
first choices | QUANTITY | 0.99+ |
90% | QUANTITY | 0.99+ |
Global Foundation for Cyber Studies & Research | ORGANIZATION | 0.99+ |
14 year | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
18 months ago | DATE | 0.99+ |
python | TITLE | 0.98+ |
UK Parliament | ORGANIZATION | 0.98+ |
MWC 20 | EVENT | 0.98+ |
about 17 years | QUANTITY | 0.98+ |
2 | QUANTITY | 0.98+ |
Global Foundation for Cyber Studies and Research | ORGANIZATION | 0.98+ |
Sally Eaves | PERSON | 0.97+ |
one example | QUANTITY | 0.97+ |
Mobile World Congress | EVENT | 0.96+ |
this year | DATE | 0.96+ |
UK | LOCATION | 0.96+ |
third pillar | QUANTITY | 0.96+ |
today | DATE | 0.95+ |
three main palace | QUANTITY | 0.93+ |
one thing | QUANTITY | 0.92+ |
Women's Day | EVENT | 0.92+ |
Covid | PERSON | 0.91+ |
one technology | QUANTITY | 0.91+ |
Cube | ORGANIZATION | 0.91+ |
three pillars | QUANTITY | 0.91+ |
U. S. Equivalent | ORGANIZATION | 0.9+ |
The Woman | ORGANIZATION | 0.89+ |
10 years | QUANTITY | 0.88+ |
agile | TITLE | 0.87+ |
ORGANIZATION | 0.87+ | |
MWC | EVENT | 0.86+ |
first kind | QUANTITY | 0.85+ |
Cyber Insights | TITLE | 0.84+ |
last 12 months | DATE | 0.83+ |
three months | QUANTITY | 0.82+ |
single day | QUANTITY | 0.8+ |
One thing | QUANTITY | 0.79+ |
5 | QUANTITY | 0.78+ |
five | OTHER | 0.78+ |
zero Trust | QUANTITY | 0.76+ |
a few years ago | DATE | 0.74+ |
one tech | QUANTITY | 0.73+ |
double | QUANTITY | 0.71+ |
a second | QUANTITY | 0.7+ |
SMB | ORGANIZATION | 0.7+ |
GCSE | ORGANIZATION | 0.67+ |
in text | EVENT | 0.66+ |
Cube | PERSON | 0.65+ |
in tech Global Event | EVENT | 0.61+ |
Breaking Analysis: Cyber Stocks Caught in the Storm While Private Firms Keep Rising
>> From theCUBE studios in Palo Alto and Boston, bringing you data-driven insights from theCUBE and ETR. This is Breaking Analysis with Dave Vellante. >> The pandemic precipitated what is shaping up to be a permanent shift in cybersecurity spending patterns. As a direct result of hybrid work, CSOs have vested heavily in endpoint security, identity access management, cloud security, and further hardening the network beyond the headquarters. We've reported on this extensively in this Breaking Analysis series. Moreover, the need to build security into applications from the start rather than bolting protection on as an afterthought has led to vastly high heightened awareness around DevSecOps. Finally, attacking security as a data problem with automation and AI is fueling new innovations in cyber products and services and startups. Hello and welcome to this week's Wikibon CUBE Insights powered by ETR. In this Breaking Analysis, we present our quarterly findings in the security industry, and share the latest ETR survey data on the spending momentum and market movers. Let's start with the most recent news in cybersecurity. Nary a week goes by without more concerning news. The latest focus in the headlines is, of course, Russia's relentless cyber attacks on critical infrastructure in the Ukraine, including banking, government websites, weaponizing information. The hacker group, BlackByte, put a double whammy on the San Francisco 49ers, meaning they exfiltrated data and they encrypted the organization's files as part of its ransomware attack. Then there's the best Super Bowl ad last Sunday, the Coinbase floating QR code. Did you catch that? As people rushed to scan the code and participate in the Coinbase Bitcoin giveaway, it highlights yet another exposure, meaning we're always told not to click on links that we don't trust or we've never seen, but so many people activated this random QR code on their smartphones that it crashed Coinbase's website. What does that tell you? In other news, Securonix raised a billion dollars. They did this raise on top of Lacework's massive $1.3 billion raise last November. Both of these companies are attacking security with data automation and APIs that can engage machine intelligence. Securonix, specifically in the announcement, mentioned the uptake from MSSPs, managed security service providers, something we've talked about in this series. And that's a trend that we see as increasingly gaining traction as customers are just drawing in and drowning in security incidents. Peter McKay's company, Snyk, acquired Fugue, a company focused on making sure security policies are consistent throughout the software development life cycle. It's a really an example of a developer-defined security approach where policy can be checked at the dev, deployment, and production phases to ensure the same policies are in place at all stages, including monitoring at runtime. Fugue, according to Crunchbase, had raised $85 million to date. In some other company news, Cisco was rumored to be acquiring Splunk for not much more than Splunk is worth today. And the talks reportedly broke down. This would be a major move in security by Cisco and underscores the pressure to consolidate. Cisco would get an extremely strong customer base and through efficiencies could improve Splunk's profitability, but it seems like the premium Cisco was willing to pay was not enough to entice board to act. Splunk board, that is. Datadog blew away its earnings, and the stock was up 12%. It's pulled back now, thanks to Putin, but it's one of those companies that is disrupting Splunk. Datadog is less than half the size of Splunk, revenue-wise, but its valuation is more than 2 1/2 times greater. Finally, Elastic, another Splunk disruptor, settled its trademark dispute with AWS, and now AWS will now stop using the name Elasticsearch. All right, let's take a high level look at how cyber companies have performed in the stock market over time. Here's a graph of the Cyber ETF, and you can see the March 1st crosshairs of 2020 signifying the start of the lockdown. The trajectory of cybersecurity stocks is shown by the orange and blue lines, and it surely has steepened post March of 2020. And, of course, it's been down with the market lately, but the run up, as you can see, was substantial and eclipsed the trajectory of the previous cycles over the last couple of years, owing much of the momentum to the spending dynamics that we talked about at our open. Let's now drill into some of the names that we've been following over the last few years and take a look at the firm level. This chart shows some data that we've been tracking since before the pandemic. The top rows show the S&P 500 and the NASDAQ prices, and the bottom rows show specific stocks. The first column is the index price or the market cap of the company just before the pandemic, then the same data one year later. Then the next column shows the peak value during the pandemic, and then the current value. Then it shows in the next column where it is today, in percentage terms, i.e., how far has it pulled back from the peak, then the delta from pre-pandemic, in other words, how much did the issue earn or lose during the pandemic for investors? We then compare the pre-pandemic revenue multiple using a trailing 12-month revenue metric. Sorry, that's what we used. It's easy to get. (laughs) And that's the revenue multiple compared to the August in 2020, when multiples were really high, and where they are today, and then a recent quarterly growth rate guide based on the last earnings report. That's the last column. Okay, so I'm throwing a lot of data at you here, but what does it tell us? First, the S&P and the NAS are well up from pre-pandemic levels, yet they're off 9% and 15%, respectively, from their peaks today. That was earlier on Friday morning. Now let's look at the names more closely. Splunk has been struggling. It definitely had a tailwind from the pandemic as all boats seem to rise, but its execution has been lacking. It's now 30% off from its pre-pandemic levels. (groans) And it's multiple is compressing, and perhaps Cisco thought it could pick up the company for a discount. Now let's talk about Palo Alto Networks. We had reported on some of the challenges the company faced moving into a cloud-friendly model. that was before the pandemic. And we talked about the divergence between Palo Alto's stock price and the valuations relative to Fortinet, and we said at the time, we fully expected Palo Alto to rebound, and that's exactly what happened. It rode the tailwinds of the last two years. It's up over 100% from its pre-COVID levels, and its revenue multiple is expanding, owing to the nice growth rates. Now Fortinet had been doing well coming into the pandemic. In fact, we said it was executing on a cloud strategy better than Palo Alto Networks, hence that divergence in valuations at the time. So it didn't get as much of a boost from the pandemic. Didn't get that momentum at first, but the company's been executing very well. And as you can see, with 155% increase in valuation since just before the pandemic, it's going more than okay for Fortinet. Now, Okta is a name that we've really followed closely, the identity access management specialist that rocketed. But since it's Auth0 acquisition, it's pulled back. Investors are concerned about its guidance and its profitability. And several analyst have downgraded their price targets on Okta. We still really like the company. The Auth0 acquisition gives Okta a developer vector, and we think the company is going hard after market presence and is willing to sacrifice short-term profitability. We actually like that posture. It's very Frank Slupin-like. This company spends a lot of money on R&D and go-to-market. The question is, does Okta have inherent profitability? The company, as they say, spends a ton in some really key areas but it looks to us like it's going to establish a footprint. It's guiding revenue CAGR in the mid-30s over the mid to long-term and near term should beat that benchmark handily. But you can see the red highlights on Okta. And even though Okta is up 59% from its pre-pandemic levels, it's far behind its peers shown in the chart, especially CrowdStrike and Zscaler, the latter being somewhat less impacted by the pullback in stocks recently, of course, due to the fears of inflation and interest rates, and, of course, Russian invasion escalation. But these high flyers, they were bound to pull back. The question is can they maintain their category leadership? And for the most part, we think they can. All right, let's get into some of the ETR data. Here's our favorite XY view with net score, or spending momentum on the Y-axis, and market share or pervasiveness in the data center on the horizontal axis. That red 40% line, that indicates a highly elevated spending level. And the chart inserts to the right, that shows how the data is plotted with net score and shared N in each of the columns by each company. Okay, so this is an eye chart, but there really are three main takeaways. One is that it's a crowded market. And this shows only the companies ETR captures in its survey. We filtered on those that had more than 50 mentions. So there's others in the ETR survey that we're not showing here, and there are many more out there which don't get reported in the spending data in the ETR survey. Secondly, there are a lot of companies above the 40% mark, and plenty with respectable net scores just below. Third, check out SentinelOne, Elastic, Tanium, Datadog, Netskope, and Darktrace. Each has under 100 N's but we're watching these companies closely. They're popping up in the survey, and they're catching our attention, especially SentinelOne, post-IPO. So we wanted to pare this back a bit and filter the data some more. So let's look at companies with more than 100 mentions in the same chart. It gets a little cleaner this picture, but it's still crowded. Auth0 leads everyone in net score. Okta is also up there, so that's very positive sign since they had just acquired Auth0. CrowdStrike SalePoint, Cyberark, CloudFlare, and Zscaler are all right up there as well. And then there's the bigger security companies. Palo Alto Network, very impressive because it's well above the 40% mark, and it has a big presence in the survey, and, of course, in the market. And Microsoft as well. They're such a big whale. They skew the data for everybody else to kind of mess up these charts. And the position of Cisco and Splunk make for an interesting combination. They get both decent net scores, not above the 40% line but they got a good presence in the survey as well. Thinking about the acquisition, Al Shugart was the CEO of of Seagate, and founder. Brilliant Silicon valley icon and engineer. Great business person. I was asking him one time, hey, you thinking about buying this company or that company? And of course, he's not going to tell me who he's thinking about buying or acquiring. He said, let me just tell you this. If you want to know what I'm thinking, ask yourself if it were free, would you take it? And he said the answer's not always obviously yes, because acquisitions can be messy and disruptive. In the case of Cisco and Splunk, I think the answer would be a definitive yes It would expand Cisco's portfolio and make it the leader in security, with an opportunity to bring greater operating leverage to Splunk. Cisco's just got to pay more if it wants that asset. It's got to pay more than the supposed $20 billion offer that it made. It's going to have to get kind of probably north of 23 billion. I pinged my ETR colleague, Erik Bradley, on this, and he generally agreed. He's very close to the security space. He said, Splunk isn't growing the customer base but the customers are sticky. I totally agree. Cisco could roll Splunk into its security suite. Splunk is the leader in that space, security information and event management, and Cisco really is missing that piece of the pie. All right, let's filter the data even more and look at some of the companies that have moved in the survey over the past year and a half. We'll go back here to July 2020. Same two-dimensional chart. And we're isolating here Auth0, Okta, SalePoint CrowdStrike, Zscaler, Cyberark, Fortinet, and Cisco. No Microsoft. That cleans up the chart. Okay, why these firms? Because they've made some major moves to the right, and some even up since last July. And that's what this next chart shows. Here's the data from the January 2022 survey. The arrow start points show the position that we just showed you earlier in July 2020, and all these players have made major moves to the right. How come? Well, it's likely a combination of strong execution, and the fact that security is on the radar of every CEO, CIO, of course, CSOs, business heads, boards of directors. Everyone is thinking about security. The market momentum is there, especially for the leaders. And it's quite tremendous. All right, let's now look at what's become a bit of a tradition with Breaking Analysis, and look at the firms that have earned four stars. Four-star firms are leaders in the ETR survey that demonstrate both a large presence, that's that X-axis that we showed you, and elevated spending momentum. Now in this chart, we filter the N's. Has to be greater than 100. And we isolate on those companies. So more than 100 responses in the survey. On the left-hand side of the chart, we sort by net score or spending velocity. On the right-hand side, we sort by shared N's or presence in the dataset. We show the top 20 for each of the categories. And the red line shows the top 10 cutoffs. Companies that show up in the top 10 for both spending momentum and presence in the data set earn four stars. If they show up in one, and make the top 10 in one, and make the top 20 in the other, they get two stars. And we've added a one-star category as honorable mention for those companies that make the top 20 in both categories. Microsoft, Palo Alto Networks, CrowdStrike, and Okta make the four-star grade. Okta makes it even without Auth0, which has the number one net score in this data set with 115 shared N to boot. So you can add that to Okta. The weighted average would pull Okta's net score to just above Cyberark's into fourth place. And its shared N would bump Okta up to third place on the right-hand side of the chart Cisco, Splunk, Proofpoint, KnowBe4, Zscaler, and Cyberark get two stars. And then you can see the honorable mentions with one star. Now thinking about a Cisco, Splunk combination. You'd get an entity with a net score in the mid-20s. Yeah, not too bad, definitely respectable. But they'd be number one on the right-hand side of this chart, with the largest market presence in the survey by far. Okay, let's wrap. The trends around hybrid work, cloud migration and the attacker escalation that continue to drive cybersecurity momentum and they're going to do so indefinitely. And we've got some bullet points here that you're seeing private companies, (laughs) they're picking up gobs of money, which really speaks to the fact that there's no silver bullet in this market. It's complex, chaotic, and cash-rich. This idea of MSSPs on the rise is going to continue, we think. About half the mid-size and large organization in the US don't have a SecOps, a security operation center, and outsourcing to one that can be tapped on a consumption basis, cloud-like, as a service just makes sense to us. We see the momentum that companies that we've highlighted over the many quarters of Breaking Analysis are forming. They're forming a strong base in the market. They're going for market share and footprint, and they're focusing on growth, at bringing in new talent. They have good balance sheets and strong management teams and we think they'll be leading companies in the future, Zscaler, CrowdStrike, Okta, SentinelOne, Cyberark, SalePoint, over time, joining the ranks of billion dollar cyber firms, when I say billion dollar, billion dollar revenue like Palo Alto Networks, Fortinet, and Splunk, if it doesn't get acquired. These independent firms that really focus on security. Which underscores the pressure and consolidation and M&A in the whole space. It's almost assured with the fragmentation of companies and so many new entrants fighting for escape velocity that this market is going to continue with robust M&A and consolidation. Okay, that's it for today. Thanks to my colleague, Stephanie Chan, who helped research this week's topics, and Alex Myerson on the production team. He also manages the Breaking Analysis podcast. Kristen Martin and Cheryl Knight, who get the word out. Thank you to all. Remember these episodes are all available as podcasts wherever you listen. All you do is search Breaking Analysis podcast. Check out ETR's website at etr.ai. We also publish a full report every week on wikibon.com and siliconangle.com. You can email me at david.vellante@siliconangle.com. @dvellante is my DM. Comment on our LinkedIn posts. This is Dave Vellante for theCUBE Insights powered by ETR. Have a great week. Be safe, be well, and we'll see you next time. (upbeat music)
SUMMARY :
in Palo Alto and Boston, and M&A in the whole space.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Erik Bradley | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Seagate | ORGANIZATION | 0.99+ |
Alex Myerson | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Kristen Martin | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
July 2020 | DATE | 0.99+ |
January 2022 | DATE | 0.99+ |
Stephanie Chan | PERSON | 0.99+ |
Cheryl Knight | PERSON | 0.99+ |
Cyberark | ORGANIZATION | 0.99+ |
12-month | QUANTITY | 0.99+ |
SentinelOne | ORGANIZATION | 0.99+ |
BlackByte | ORGANIZATION | 0.99+ |
Netskope | ORGANIZATION | 0.99+ |
March of 2020 | DATE | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
Datadog | ORGANIZATION | 0.99+ |
Putin | PERSON | 0.99+ |
30% | QUANTITY | 0.99+ |
SalePoint | ORGANIZATION | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
Securonix | ORGANIZATION | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
Zscaler | ORGANIZATION | 0.99+ |
one star | QUANTITY | 0.99+ |
Frank Slupin | PERSON | 0.99+ |
Tanium | ORGANIZATION | 0.99+ |
Elastic | ORGANIZATION | 0.99+ |
two stars | QUANTITY | 0.99+ |
Peter McKay | PERSON | 0.99+ |
Al Shugart | PERSON | 0.99+ |
$20 billion | QUANTITY | 0.99+ |
$85 million | QUANTITY | 0.99+ |
one-star | QUANTITY | 0.99+ |
Boston | LOCATION | 0.99+ |
Coinbase | ORGANIZATION | 0.99+ |
S&P | ORGANIZATION | 0.99+ |
billion dollar | QUANTITY | 0.99+ |
Four-star | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
155% | QUANTITY | 0.99+ |
Darktrace | ORGANIZATION | 0.99+ |
Auth0 | ORGANIZATION | 0.99+ |
Crunchbase | ORGANIZATION | 0.99+ |
9% | QUANTITY | 0.99+ |
david.vellante@siliconangle.com | OTHER | 0.99+ |
Eric Herzog, Infinidat InfiniGuard Cyber Resilience
(gentle music) >> High profile cyber attacks like the SolarWinds hack, the JBS meat and the Florida municipality breach, have heightened awareness of how exposed, critical infrastructure has become. Because the pandemic has shifted employees to remote modes of work, hackers now have a much easier target to fish for credentials and exploit less secure home networks. Take the recent Log4j vulnerability, that's yet another example, of how hackers can take advantage of weak links in the chain. Now data storage companies have an important role to play in fighting cyber crime. Ultimately, they provide the equivalent of a bank vault if you will, and are responsible for storing and protecting the data that cyber criminals are targeting to steal or encrypt, in an effort to hold companies hostage, in a ransomware attack. Now in an effort to help customers understand how to protect themselves from such vulnerabilities, and how one storage company is addressing these challenges, the Cube is hosting this special presentation InfiniGuard Cyber Resilience: New Cybercrime Solutions. And we're going to speak with Eric Herzog, who's the Chief Marketing Officer of Infinidat, and then we'll bring in Stan Wysocki who is the president of Mark III Systems who is either an expert in IT infrastructure and artificial intelligence. First, let me welcome Eric Herzog back to the Cube, hello, Eric. >> Great, Dave, thank you very much, always love talking to you and the Cube, about leading edge technology solutions for end users. >> Alright let's do it. So, first we want to address the transformation and big business progress of Infinidat. New CEO, he's injected new management, new head of marketing obviously, Phil Bullinger is really been focused on accelerating the company's original vision, and doing so, Eric, in the typically unconventional style of Infinidat, you just put out a press release, capping 2021, can you set the stage for us, and give us the business update? >> Sure, so of course we summarized our 2021 results. What a very, very strong year. What a very, very strong year. We increased our bookings over 40% year to year. Even in Q4, we increased our bookings over 68%. And over 25% of the fortune 50 use an Infinidat solution, either our InfiniBox, or InfiniBox SSA, all flash array, or our Infiniguard, which is the focus of the launch we're doing today, on February 9th. >> Yeah, so I always said that Infinidat is one of the best kept secrets in the storage business. So let's talk about that hard news, what you launched on February 9th, and why it's important. >> Well, what we've done is we've got a high end enterprise purpose-built backup appliance, the InfiniGuard. We made some substantial advances in that. The key is focused on cyber resilience with what we call our infinisafe technology. Infinisafe incorporates a number of subsets, of cyber resilience from immutable snapshots, to logical air gapping, to fenced isolated networks, to almost instantaneous recovery for your backup data sets. In addition, we also dramatically improved the performance of the backup and recovery, which means, for example, if a backup window was taking three hours, now the backup window on that primary backup dataset could take only an hour and a half, which of course, as we all know backup dramatically impacts the performance of your primary applications, your primary servers, and your primary storage. So we've done both the cyber resilience aspect and then, on modern data protection, making sure that the backup and recovery are faster, for a traditional backup workload. >> So tell us a little bit more about Infinisafe, and specifically, Eric I'm interested in how it's different from other solutions, don't make me a liar, I had said, you guys always kind of take nonconventional approaches so tell us, add a little color to Infinisafe and how is it really unique from competitors? >> Sure, well Infinisafe incorporates as I mentioned, several different aspects. First of all, the immutable snapshots. So immutable snapshots can not be deleted, they cannot be altered, you cannot accelerate the rate, you can set the rate of immutable stuff, do I want to do it once a day? Do I want to do it twice a day? And obviously if a hacker could get in, you could accelerate that. Our immutable snaps are physically separated from the management schema. So the inside of an Infiniguard, we have what we call a data dedupe appliance, and that data dedupe engine, it goes ahead and it applies data reduction technology, to that back up data set. But we've divorced the immutable snapshots from the management of what we now call a DDE. So the DDE has kind of access of giving you that gap, that logical gap between the management schema of a DDE, and of course the immutable snapshot. We also combine that with this air gap technology, you've got the immutability and the air gap, which is local in that instance, but we also can do it remotely. So we can replicate from one Infiniguard in data center A, to a different Infiniguard in data center B. You then can configure that backup data set with the same immutable snapshot, and the same length, one day, half a day, six hours, whatever you choose, and then of course it'll have that same capability. The third thing we've done is very unique. We have a fenced isolated network to perform forensics. So, if the Cube has a cyber or malware attack, you need to make sure that once you've cleaned it up, off the primary storage, the primary servers, that you recover, a known good data set. So we set up this isolated fence network in which to perform that forensic analysis, to give you the appropriate good recover point. However, unlike many of our competitors, we can do it with a single InfiniBox. Some of our competitors, right on their websites say, you need two of their purpose-built backup appliances, to do cyber resilience. Meaning, twice the CapEx and twice the OpEx, which we can do with a single Infiniguard solution. And then lastly is our near instantaneous recovery. As you know, we're recovering backup data sets. We can make between 15 and 30 minutes time, the backup data set fully accessible to the backup admin or the storage admin to use their Commvault, their Veeam, their Veritas, their IBM Spectrum Protect, or whatever their backup software is, to do recovery from the InfiniGuard box, back to the primary storage using of course the backup software that they created the original dataset with. That is very unique. When you look out in the industry and look at, whether it be purpose-built backup competitors, or whether you look at primary storage competitors, almost no one talks about the speed of their recovery, and the one or two that do, talk about recovering the data set. We recover the entire environment. We are ready to go, and the backup admin, if they were, for example, Commvault, Veeam or Veritas, they could immediately start the backup, as soon as we did our recovery, which again, takes between 15 and 30 minutes, independent of the data set size. That could be 50 terabytes, it could be a petabyte, it could be two petabytes. And even two petabytes of data can be available in 15 to 30 minutes. And then of course, the backup admin can restore from that backup dataset. Very powerful and very unique in those aspects. >> Whilst the reason why this is so important is like I said, it's like the bank vault, because hackers are going to go after that backup corpus that's where the gold is, that's where all the data is. So this all really sounds good. But there's more than Infinisafe in this launch. What else should we know? >> Well, the other thing we've done is dramatically improved the performance of the purpose-built backup plants at the core. So for example, the last time we publicly announced our numbers, we were at 74 terabytes an hour, now we're 180 terabytes an hour. So of course, as we all know, when you do a backup, it impacts the performance of the primary applications, the primary servers and the primary storage. So if that backup window was taking three hours, now that we've more than doubled the performance, you could be up to 50% better. So a three hour backup window, if that's what the dataset took to be backed up, now we can get that down to an hour and a half or even faster. So that of course minimizes the impact on primary storage, primary applications, and of course your primary storage, making it much, much more efficient, from a backup perspective, and of course less impact on the primary applications, the primary servers, and primary storage. >> So I've talked to a number of Infinidat customers, they're very loyal and kind of passionate. So I wonder if you could kind of put that perspective on this discussion. The impact that InfiniGuard, this announcement, that's going to have for your customers, paint a picture as to how it's going to change their business. >> Sure, so let me give you an example. One of our customers is a cloud service buyer, in North America, they focus only on healthcare. So here's a couple of key benefits that they got. First of all, they use our integration with two different backup vendors. They don't have one, they have two. So we're tightly integrated with our backup software partners. They got a 40% cost savings on CapEX, compared to the previous vendor that they had. And, they used to be able to do 30,000 backup per day, now they can do 90,000 backup a day. And by the way, that's all with the previous version of InfiniGuard, not the version we just announced on the 9th. One of our other customers, which is in AMEA and they happened to be an energy company, they were using purpose-built backup from the other vendor, and they had 14 of them, seven in data center one, and seven in data center two. With InfiniGuard, they've got one in data center one, and one in data center two. So 14 purpose-built backup appliances consolidated down into two. And on top of that, those purpose-built backup appliances from the other vendor actually had a couple recovery failures, where they were not able to recover the data. They've been installed for a year now, they've had zero recovers, zero recovery failures, whereas the previous vendor had some. And lastly, let's talk about a large global fortune financial services. So, one of the biggest in the industry, their cost savings from their previous vendor was 46%. In addition, when you look at their cyber resilience design, they were using one of those vendors that probably talks about needing two system products to do their cyber resiliency. They again were able to take those two systems out, and use one InfiniGuard solution. Again, reducing both their capital expenditure, two going to one. And then the operational expenditure, they only have to manage one InfiniGuard versus two of the other guys appliances. Those are just three examples all over the world. One in cloud service providing, one in the energy space, and one a global fortune 500 financial services company. Just some real world examples. And all those by the way, Dave, were before the enhancements of Infinisafe, and before the additional performance we've added in the launch of InfiniGuard on February 9th. >> So like I'm just kind of sketching out the business case, you know, put my CFO hat on. So you're lowering costs cause you're consolidating, so that means I need less hardware and software. But also there's probably labor costs associated with that. If I could do it faster with less resources, I got less stuff to manage. You're accelerating the backup time, so that frees up resources that I can apply elsewhere, recovery, you know, is really important. So I'm inferring faster recovery, all this lowers my risk, and then I can sort of calculate the probability of having data loss, and then what that means to my business. Am I getting that right? >> Yeah, yeah. And in fact, the other impact is on your primary service and your primary storage. If the backup window shrinks, then you're not slowing down that SAP app, that Oracle app, you know, that SQL app, whatever you're running, whether that be the financials, whether that be your logistics, whether it be your manufacturing system, every time you turn on that backup, to do that backup, that backup window slows you down. So cutting that in half has an impact on the real-world application side, which obviously most storage guys, you know, it's hard for us to quantify. But you are taking the impact of backup, and basically reducing it, if you will shrinking the backup window, so their primary applications don't get hammered as much by the backup while they're still trying to run that SAP, that Oracle or that SQL workload. >> And you're not a backup software vendor, so I have optionality there. I can pretty much choose all the popular, you know. >> Absolutely, so Veeam, Veritas, Commvault, IBM Spectrum Protect, all the majors. And in fact, one of the players I mentioned, as you were talking about the end-users, they use two different backup packages, two of 'em. So, two of the major vendors that I named, we work with them just within one account. So, we're very flexible, the user picks what they want from a backup software perspective, and we can work with anything. So, whatever they want to use, is fine with us. We integrate with all of them, we have integration, for example, also with VMware, for vVols and other aspects in container integration, so you know, whether it be our purpose-built backup appliance, InfiniGuard, or what we do with the InfiniBox, we always make sure we integrate with the surrounding environment. 'Cause storage is not an island, storage needs to exist in your data center, or your hybrid cloud data center, or what you're doing for containers. So we make sure we have integration with our InfiniBox, our InfiniBox SSA, all flash. And of course the product we're enhancing today, the InfiniGuard. >> Yeah, integration is super important in the enterprise. Enterprises want solutions, they're busy. (laughs) They don't have unlimited budget to go, you know, plugging stuff together. So, okay Eric, we got to leave it there. Thank you so much. >> Great, thank you very much Dave. Always love talking to the Cube. >> Okay, in a moment Stan Wysocki is coming in. He's the president of Mark III Systems. He's going to join us for a drill down on how InfiniGuard is impacting customers. You're watching the Cube, your global leader, in enterprise tech coverage. (gentle music)
SUMMARY :
the Cube is hosting this always love talking to you and the Cube, and doing so, Eric, in the And over 25% of the fortune 50 in the storage business. that the backup and recovery are faster, and of course the immutable snapshot. it's like the bank vault, of the primary applications, So I've talked to a number and before the additional You're accelerating the backup time, And in fact, the other impact all the popular, you know. And in fact, one of the important in the enterprise. Always love talking to the Cube. He's the president of Mark III Systems.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Phil Bullinger | PERSON | 0.99+ |
Eric Herzog | PERSON | 0.99+ |
Eric Herzog | PERSON | 0.99+ |
Stan Wysocki | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
six hours | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
February 9th | DATE | 0.99+ |
Eric | PERSON | 0.99+ |
Infinidat | ORGANIZATION | 0.99+ |
14 | QUANTITY | 0.99+ |
one day | QUANTITY | 0.99+ |
February 9th | DATE | 0.99+ |
180 terabytes | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
two systems | QUANTITY | 0.99+ |
50 terabytes | QUANTITY | 0.99+ |
74 terabytes | QUANTITY | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
15 | QUANTITY | 0.99+ |
JBS | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
46% | QUANTITY | 0.99+ |
three hours | QUANTITY | 0.99+ |
Mark III Systems | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
three hour | QUANTITY | 0.99+ |
half a day | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
an hour and a half | QUANTITY | 0.99+ |
North America | LOCATION | 0.99+ |
one account | QUANTITY | 0.99+ |
twice | QUANTITY | 0.99+ |
two petabytes | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
Veeam | ORGANIZATION | 0.99+ |
Veritas | ORGANIZATION | 0.99+ |
Florida | LOCATION | 0.99+ |
SQL | TITLE | 0.99+ |
30 minutes | QUANTITY | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
three examples | QUANTITY | 0.99+ |
InfiniGuard | ORGANIZATION | 0.99+ |
Commvault | ORGANIZATION | 0.99+ |
seven | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
once a day | QUANTITY | 0.98+ |
twice a day | QUANTITY | 0.98+ |
a year | QUANTITY | 0.97+ |
two system products | QUANTITY | 0.97+ |
SAP | TITLE | 0.97+ |
first | QUANTITY | 0.96+ |
over 68% | QUANTITY | 0.96+ |
Eric Herzog and Stan Wysocki InfiniGuard Cyber Resilience
>> (upbeat music) >> Okay, we just covered some of the critical aspects from Infinidat recent announcement and the importance of cyber resilience and fast recovery. Eric Hertzog is back and joining us is Stan Wysocki, who's president of Mark III Systems. Stan, welcome to the Cube, good to see you. >> Thank you, pleasure to be here. >> Tell us about Mark III Systems. You specialize in IT infrastructure and artificial intelligence. It says in your website. I'd love to hear more about your business. >> Yeah, yeah, definitely. You know, I think we're a little bit unique in our industry, right? There've been business partners resellers around for, we've been around for 26 years. And in 26 years, we've supported some of largest enterprise customers in the Southeast, with server storage networking virtualization. We have VCP number 94, so we've been doing that from the very beginning. But about six years ago, we realized that IT was changing, that business was changing, that the demands of the customers was changing and we needed to create the full stack message and a full-stack practice. So we hired data scientists and developers in DevOps, MLOps and gave them the environments and the tools that they could use to build experience around AI, ML deep learning. So now when we engage with our customers, not only can we handle the entire enterprise stack that they have, but we can help accelerate them on their adoption of open-source technologies, cloud native development and AI and integrating that into their business processes. >> I love it. You got to keep moving. You've been around for a long time, but you're not just sitting still. I wonder if you could comment in an Eric, I want you to comment as well. From your customer's perspective Stan, what are the big trends that you see that are impacting their business and the challenges that they're facing? >> Yeah, that's great. So kind of ties into what I just said. Today we live in a data-driven society. Everything that we do is really driven by how the customer wants to engage. And that's both an internal customer and your end user customers, on how they want to engage, how they want to consume and how they want to interact with everything out there in the world, right? So the real trends is really around engaging with the customer, but that means that you need to be data-driven, you need to adopt AI platforms, you need to adopt a more holistic view of what you're doing with your customers. That drives up the importance of the data that you have in your shop, right? So then cybersecurity becomes extremely important, not just because of the technical skills of the hacker is getting better and better, but because we're becoming more reliant on the data that we have moving forward and we're proud to partner with Infinidat in leveraging InfiniGuard and Infinni safe to really protect our customer's data. >> Great. Eric, thinking about the trends and some of the issues that Stan just mentioned, when you think about the launch and the announcement that you just made, how do you see it fitting in to Stan's business? How's how it's going to help the end customers? >> Well, I think there's one key aspect. As noted in the fortune survey of CEOs in 2021. The number one concern of CEOs of the fortune 500, was cybersecurity and they saw that as biggest threat to their business. As Stan pointed out, that becomes of the importance of the digital data, that all companies generate, of all types, financial services, healthcare, government institutions, manufacturing, you name it. So one of the key things you've got to do, is make sure that your storage estate, fits into an overall cybersecurity strategy. And with InfiniGuard, or Ifini safe technologies, we can ensure that Stan's customers and customers of our other business partners all over the world, can make sure that the data is safe, protected and can help them form a malware or ransomware attack, against that valuable data set. >> Well then you know, one of you guys could come with, I mean, we talked to CSOs and they've told us that there be could in part due to the pandemic, largely actually, their whole strategy has changed. Their spending strategies changed, no longer than just sort of putting up hardware firewalls. They're shifting their focus to two different areas, obviously endpoint, you know, cloud security is a big deal, identity access management, but ransomware, is just top of mind for everybody. And as we talked about earlier, the exposure, now the weak links, whether you're working from home, or Stan you mentioned greater sophistication of hacker. So what are you hearing from customers in this regard, Stan? >> Well, you know I think you have that, right? But then you always have, we've been doing this for 26 years. I've never heard of an IT budget that that's gone up, in any year, right? So, with the sophistication of these hackers that are coming out and the different angles that they're using to get in, it is extremely important for our customers to be very efficient and choose their security strategy and products very wisely, right? I think I read an article a year or so ago that the average enterprise had like something like 27 different security products and imagine a CSO and his team, who is struggling with their budget to manage that. So for us to be able to leverage InfiniGuard and Infini safe and to be able to provide, you know the immutable snapshots. The logical air gas, the physical air backs and offense network for recovery. That's all extremely easy to manage. I mean I talked to my customers on why they have chosen Infinidat, you know through us, right? And one of the things that they always talk about is how easy and how amazing the support is. How easy it is to install, how easy it is to manage. And normally when you have a simple product, right, you think you can sell that to an unsophisticated customers. But my most technical customers really appreciate this, because of the way Infinidat manages itself and provides the tools saying, just for example, the host tools, right? It does it in the way that they do it, so they trust it, so that they can focus on the more important tasks, rather than the tier and feeding other storage environment. >> Yeah, thank you and then when you talk to CSOs, you ask them what's the number one problem, they'll tell you lack of talent and you just nailed it. You've got on average 27 different tools, new tools coming out every day, you're getting billion dollar, VC investments and more and more companies are getting into it. It just adds to that confusion. So Stan, I wonder if you could talk about, specifically InfiniGuard, how it fits into your stack like where and how you're applying it? Maybe you could talk about some specific use cases. >> Oh yeah definitely, you know we have customers in pretty much every vertical, that we're supporting their stores environments and Infinidat plays and all of those verticals with all of our customers. One in particular a healthcare account, one of our very first Infinidat customers and over the years, is become the de facto standard, stores platform that they have. And they also now have InfiniGuard as the backup target for commovault. And this is one of those examples of the very technical discerning customer, that really demands excellence, right? So they love, you know, the three controller setup versus a dual controller set up, they love the availability and the resiliency, but then when it comes to the cybersecurity, before they moved on to this platform, they did have some ransomware attacks and they did have to pay out and it was very public. And, you know, since they've gone onto this platform, they feel much more comfortable. >> Excellent. So Eric, I want to bring you in. So let's talk through some of the options that customers have. You and I were talking earlier about, you know, the local air gap, what is that? You know, the logical air gap if you will and then the physical labor, what patterns are you seeing with customers to really try to protect themselves against some of this ransomware? How are they approaching it? >> Well, first of all, obviously, we with the InfiniGuard, has a purpose built backup appliance can work with all the various backup vendors. But because backup, is one of the first things these sophisticated ransomware, or malware it entity is going to attack. right? Otherwise the CIO will just call up say, hey, do we have a good backup? Let's recover from that. So secondary storage, AK their backup estate, is exactly the first thing they're going to target. And they do it certain viciously of course. So what are the key things we do, is we allow them to take those backup datasets, commvault for example and in Stan's example, or Vain or veritas or IBM Spectrum Protector, many other packages, even directly with databases like with Oracle Armin and allow them to create a mutable snapshots. Can't delete them, can't change them, can alter them. And then we air gap them locally, from the management framework. So in an InfiniGuard, we have a technology known as our day-to-day dupe engines ODDES. Those are really the management scanner for the entire solution. So when we create an immutable snapshots, we create a logical air gap, with ODDES, cannot alter the immutability characteristics, they cannot shorten them, they can not lengthen them, in short we take that management scheme away and create this separation. But we also allow them to replicate those backup datasets to a remote InfiniGuard box. You would set up the exact same parameters, I want to make an immutable snap every day, every 12 hours, every six hours and then you've got the duplicate. Remember the average length, from breach to closure on a cyber attack is 287 days. So once the attack starts, you don't know until they ask you for the ransom, it could be going on for 50 days, a hundred days, 150 days. And it's all done, if you will on the download, hidden. So if by the way, you happen to have a data center fire, or you happen to have a tornado or an earthquake, or some other natural disaster, you still want that data replicated to a secondary site, but then you still want the capability of the cyber resilience, as Stan pointed out. So you can do that. We can create a then a isolated fence network and we can do that on one InfiniGarden. Most of our competitors require two data protection appliances and it's public it's right on their websites. So we save you on some CapEx there and then we can do this near instantaneous recovery. And that's not just of the dataset. Some of the cyber reasons, technology you'll see out there, including on primary storage, only recovers the dataset. We can recover the entire backup data set and all the surrounding environment. So to second that Vain or Veritas, IBM spectrum protect commvault, backup is available. The backup admins or the storage admins, could immediately restored, it's ready to go. And we can do that in 15 to 30 minutes. Now that is being fast to react to a problem. >> So thank you for that. So Stan, I wonder if you could talk about the best practice Eric was just sharing, the local air gap and then the secondary, is that really in the case of a disaster, or is it also to isolate the network? What are you seeing as the gold standard that customers are applying with your advice? >> Yeah, definitely the gold standard would be three sites. We do have a lot of our customers. The one healthcare customer in particular is splits it between two sides and they are actually working with us right now to architect the third site. Just for that fact, we are down in Texas, hurricanes can come in 60, 70, 80 miles on in land. And then there's, you know, hurricane Harvey, right with all the flooding and stuff like that. So they do want to set up a third side. I think that gives them the peace of mind. And you know the whole thing about it is right. You know, having an environment like this means the CSO and his team can focus on preventing attacks, while they're very confident that their infrastructure team, can handle anything that slips by them. >> Okay, great. Thank you. We're about out of time but Eric, I wonder if you could kind of bring us home, give us a summary of, how you see InfiniGuard impacting customers, you know where's that value that business case for them. I wonder if you could just tie that note for us. >> Sure. We want to make sure that we tie everything back, normally technical value, as Stan very eloquently did with several different customers, but what we can do from a business value perspective. So as an example, one of our infiniGuard customers, is a global financial services company and they were using a solution from a different purpose-built backup appliance provider. They switched to us, not only they're able to increase the number of daily backups, from 30,000 to 90,000. So they get better data protection, but on top of that, they cut 40% of their costs. So you want to make sure that while you're doing this, you're doing things like consolidation. One of our other customers, which is in EMEA, in the European area, they had 14 purpose-built backup appliances, seven in one data center and set seven and a second data center. Now they've got two, one in one data center, one of the other, they of course do the local backups right then and there. And then they replicate, from one data center to the other data center. As both data centers are both active data centers, but differ for the other data center. So from their perspective, dramatic reduction of OPEX and CapEx, 14 physical boxes down to two. And of course the associated management of both the manpower side, but why I love to call the watch slots, power and floor. All of those things that go into an OPEX budget, they were cut dramatically, 'cause there's only two systems now, to power cool, et cetera et cetera. Floor space, Rackspace from 14. So wow, did they save money. So I think, it's not only providing that data protection and cyber resilience technology, but doing it in a cost-effective way. And as Stan pointed out, in a highly automated way, that cuts back on the manpower they need to manage these systems, because they're overworked and they need to focus on as Stan pointed out, their AI infrastructure, where they're doing for AI applications, don't have time to deal with it. So the more we automate, the better it is for them and the easier it is for everyone from the end-user perspective, as well as up in through their entire IT chain of command. >> Okay, if you want more information, you can go to infinidatguard.com or it's markiisis.com and check it out, learn about their full stack solution. A little bit about AI. Gentlemen, thanks so much for the conversation today, great to have you. >> Mark and Steve: Thank you, Dave. Now in a moment, I'm going to have some closing thoughts on the market and what we heard today. Thank you for watching the cube. You're a leader in enterprise tech coverage.
SUMMARY :
and the importance of cyber I'd love to hear more about your business. that the demands of the and the challenges that they're facing? of the data that you have and the announcement that you just made, So one of the key things you've got to do, So what are you hearing from and to be able to provide, you and you just nailed it. and over the years, You know, the logical air gap if you will So if by the way, you happen is that really in the case of a disaster, And then there's, you I wonder if you could So the more we automate, for the conversation today, Thank you for watching the cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Eric | PERSON | 0.99+ |
Stan Wysocki | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Texas | LOCATION | 0.99+ |
50 days | QUANTITY | 0.99+ |
Eric Hertzog | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
287 days | QUANTITY | 0.99+ |
Infinidat | ORGANIZATION | 0.99+ |
150 days | QUANTITY | 0.99+ |
Eric Herzog | PERSON | 0.99+ |
two sides | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
Steve | PERSON | 0.99+ |
Stan | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
Mark | PERSON | 0.99+ |
Mark III Systems | ORGANIZATION | 0.99+ |
seven | QUANTITY | 0.99+ |
26 years | QUANTITY | 0.99+ |
third site | QUANTITY | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
15 | QUANTITY | 0.99+ |
60 | QUANTITY | 0.99+ |
70 | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
infinidatguard.com | OTHER | 0.99+ |
27 different tools | QUANTITY | 0.99+ |
EMEA | LOCATION | 0.99+ |
OPEX | ORGANIZATION | 0.99+ |
third side | QUANTITY | 0.99+ |
one key aspect | QUANTITY | 0.99+ |
CapEx | ORGANIZATION | 0.99+ |
30,000 | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
billion dollar | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
European | LOCATION | 0.99+ |
30 minutes | QUANTITY | 0.98+ |
infiniGuard | ORGANIZATION | 0.98+ |
two systems | QUANTITY | 0.98+ |
Infinni | ORGANIZATION | 0.98+ |
today | DATE | 0.98+ |
Southeast | LOCATION | 0.98+ |
Veritas | ORGANIZATION | 0.98+ |
three sites | QUANTITY | 0.98+ |
fortune | ORGANIZATION | 0.98+ |
three controller | QUANTITY | 0.97+ |
Vain | ORGANIZATION | 0.97+ |
one data center | QUANTITY | 0.97+ |
90,000 | QUANTITY | 0.97+ |
InfiniGuard | ORGANIZATION | 0.97+ |
about six years ago | DATE | 0.96+ |
27 different security products | QUANTITY | 0.96+ |
14 purpose-built backup appliances | QUANTITY | 0.95+ |
a hundred days | QUANTITY | 0.95+ |
every six hours | QUANTITY | 0.94+ |
first | QUANTITY | 0.94+ |
markiisis.com | OTHER | 0.93+ |
InfiniGuard Cyber Resilience New Cybercrime Solutions 2
(upbeat music) >> Okay, we just covered some of the critical aspects from Infinidat recent announcement and the importance of cyber resilience and fast recovery. Eric Hertzog is back and joining us is Stan Wysocki, who's president of Mark Three Systems. Stan, welcome to the Cube, good to see you. >> Thank you, pleasure to be here. >> Tell us about Mark Three Systems. You specialize in IT infrastructure and artificial intelligence. It says in your website. I'd love to hear more about your business. >> Yeah, yeah, definitely. You know, I think we're a little bit unique in our industry, right? There've been business partners resellers around for, we've been around for 26 years. And in 26 years, we've supported some of largest enterprise customers in the Southeast, with server storage networking virtualization. We have VCP number 94, so we've been doing that from the very beginning. But about six years ago, we realized that IT was changing, that business was changing, that the demands of the customers was changing and we needed to create the full stack message and a full-stack practice. So we hired data scientists and developers in DevOps, MLOps and gave them the environments and the tools that they could use to build experience around AI, ML deep learning. So now when we engage with our customers, not only can we handle the entire enterprise stack that they have, but we can help accelerate them on their adoption of open-source technologies, cloud native development and AI and integrating that into their business processes. >> I love it. You got to keep moving. You've been around for a long time, but you're not just sitting still. I wonder if you could comment in an Eric, I want you to comment as well. From your customer's perspective Stan, what are the big trends that you see that are impacting their business and the challenges that they're facing? >> Yeah, that's great. So kind of ties into what I just said. Today we live in a data-driven society. Everything that we do is really driven by how the customer wants to engage. And that's both an internal customer and your end user customers, on how they want to engage, how they want to consume and how they want to interact with everything out there in the world, right? So the real trends is really around engaging with the customer, but that means that you need to be data-driven, you need to adopt AI platforms, you need to adopt a more holistic view of what you're doing with your customers. That drives up the importance of the data that you have in your shop, right? So then cybersecurity becomes extremely important, not just because of the technical skills of the hacker is getting better and better, but because we're becoming more reliant on the data that we have moving forward and we're proud to partner with Infinidat in leveraging InfiniGuard and Infinni safe to really protect our customer's data. >> Great. Eric, thinking about the trends and some of the issues that Stan just mentioned, when you think about the launch and the announcement that you just made, how do you see it fitting in to Stan's business? How's how it's going to help the end customers? >> Well, I think there's one key aspect. As noted in the fortune survey of CEOs in 2021. The number one concern of CEOs of the fortune 500, was cybersecurity and they saw that as biggest threat to their business. As Stan pointed out, that becomes of the importance of the digital data, that all companies generate, of all types, financial services, healthcare, government institutions, manufacturing, you name it. So one of the key things you've got to do, is make sure that your storage estate, fits into an overall cybersecurity strategy. And with InfiniGuard, or Ifini safe technologies, we can ensure that Stan's customers and customers of our other business partners all over the world, can make sure that the data is safe, protected and can help them form a malware or ransomware attack, against that valuable data set. >> Well then you know, one of you guys could come with, I mean, we talked to CSOs and they've told us that there be could in part due to the pandemic, largely actually, their whole strategy has changed. Their spending strategies changed, no longer than just sort of putting up hardware firewalls. They're shifting their focus to two different areas, obviously endpoint, you know, cloud security is a big deal, identity access management, but ransomware, is just top of mind for everybody. And as we talked about earlier, the exposure, now the weak links, whether you're working from home, or Stan you mentioned greater sophistication of hacker. So what are you hearing from customers in this regard, Stan? >> Well, you know I think you have that, right? But then you always have, we've been doing this for 26 years. I've never heard of an IT budget that that's gone up, in any year, right? So, with the sophistication of these hackers that are coming out and the different angles that they're using to get in, it is extremely important for our customers to be very efficient and choose their security strategy and products very wisely, right? I think I read an article a year or so ago that the average enterprise had like something like 27 different security products and imagine a CSO and his team, who is struggling with their budget to manage that. So for us to be able to leverage InfiniGuard and Infini safe and to be able to provide, you know the immutable snapshots. The logical air gas, the physical air backs and offense network for recovery. That's all extremely easy to manage. I mean I talked to my customers on why they have chosen Infinidat, you know through us, right? And one of the things that they always talk about is how easy and how amazing the support is. How easy it is to install, how easy it is to manage. And normally when you have a simple product, right, you think you can sell that to an unsophisticated customers. But my most technical customers really appreciate this, because of the way Infinidat manages itself and provides the tools saying, just for example, the host tools, right? It does it in the way that they do it, so they trust it, so that they can focus on the more important tasks, rather than the tier and feeding other storage environment. >> Yeah, thank you and then when you talk to CSOs, you ask them what's the number one problem, they'll tell you lack of talent and you just nailed it. You've got on average 27 different tools, new tools coming out every day, you're getting billion dollar, VC investments and more and more companies are getting into it. It just adds to that confusion. So Stan, I wonder if you could talk about, specifically InfiniGuard, how it fits into your stack like where and how you're applying it? Maybe you could talk about some specific use cases. >> Oh yeah definitely, you know we have customers in pretty much every vertical, that we're supporting their stores environments and Infinidat plays and all of those verticals with all of our customers. One in particular a healthcare account, one of our very first Infinidat customers and over the years, is become the de facto standard, stores platform that they have. And they also now have InfiniGuard as the backup target for commovault. And this is one of those examples of the very technical discerning customer, that really demands excellence, right? So they love, you know, the three controller setup versus a dual controller set up, they love the availability and the resiliency, but then when it comes to the cybersecurity, before they moved on to this platform, they did have some ransomware attacks and they did have to pay out and it was very public. And, you know, since they've gone onto this platform, they feel much more comfortable. >> Excellent. So Eric, I want to bring you in. So let's talk through some of the options that customers have. You and I were talking earlier about, you know, the local air gap, what is that? You know, the logical air gap if you will and then the physical labor, what patterns are you seeing with customers to really try to protect themselves against some of this ransomware? How are they approaching it? >> Well, first of all, obviously, we with the InfiniGuard, has a purpose built backup appliance can work with all the various backup vendors. But because backup, is one of the first things these sophisticated ransomware, or malware it entity is going to attack. right? Otherwise the CIO will just call up say, hey, do we have a good backup? Let's recover from that. So secondary storage, AK their backup estate, is exactly the first thing they're going to target. And they do it certain viciously of course. So what are the key things we do, is we allow them to take those backup datasets, commvault for example and in Stan's example, or Vain or veritas or IBM Spectrum Protector, many other packages, even directly with databases like with Oracle Armin and allow them to create a mutable snapshots. Can't delete them, can't change them, can alter them. And then we air gap them locally, from the management framework. So in an InfiniGuard, we have a technology known as our day-to-day dupe engines ODDES. Those are really the management scanner for the entire solution. So when we create an immutable snapshots, we create a logical air gap, with ODDES, cannot alter the immutability characteristics, they cannot shorten them, they can not lengthen them, in short we take that management scheme away and create this separation. But we also allow them to replicate those backup datasets to a remote InfiniGuard box. You would set up the exact same parameters, I want to make an immutable snap every day, every 12 hours, every six hours and then you've got the duplicate. Remember the average length, from breach to closure on a cyber attack is 287 days. So once the attack starts, you don't know until they ask you for the ransom, it could be going on for 50 days, a hundred days, 150 days. And it's all done, if you will on the download, hidden. So if by the way, you happen to have a data center fire, or you happen to have a tornado or an earthquake, or some other natural disaster, you still want that data replicated to a secondary site, but then you still want the capability of the cyber resilience, as Stan pointed out. So you can do that. We can create a then a isolated fence network and we can do that on one InfiniGarden. Most of our competitors require two data protection appliances and it's public it's right on their websites. So we save you on some CapEx there and then we can do this near instantaneous recovery. And that's not just of the dataset. Some of the cyber reasons, technology you'll see out there, including on primary storage, only recovers the dataset. We can recover the entire backup data set and all the surrounding environment. So to second that Vain or Veritas, IBM spectrum protect commvault, backup is available. The backup admins or the storage admins, could immediately restored, it's ready to go. And we can do that in 15 to 30 minutes. Now that is being fast to react to a problem. >> So thank you for that. So Stan, I wonder if you could talk about the best practice Eric was just sharing, the local air gap and then the secondary, is that really in the case of a disaster, or is it also to isolate the network? What are you seeing as the gold standard that customers are applying with your advice? >> Yeah, definitely the gold standard would be three sites. We do have a lot of our customers. The one healthcare customer in particular is splits it between two sides and they are actually working with us right now to architect the third site. Just for that fact, we are down in Texas, hurricanes can come in 60, 70, 80 miles on in land. And then there's, you know, hurricane Harvey, right with all the flooding and stuff like that. So they do want to set up a third side. I think that gives them the peace of mind. And you know the whole thing about it is right. You know, having an environment like this means the CSO and his team can focus on preventing attacks, while they're very confident that their infrastructure team, can handle anything that slips by them. >> Okay, great. Thank you. We're about out of time but Eric, I wonder if you could kind of bring us home, give us a summary of, how you see InfiniGuard impacting customers, you know where's that value that business case for them. I wonder if you could just tie that note for us. >> Sure. We want to make sure that we tie everything back, normally technical value, as Stan very eloquently did with several different customers, but what we can do from a business value perspective. So as an example, one of our infiniGuard customers, is a global financial services company and they were using a solution from a different purpose-built backup appliance provider. They switched to us, not only they're able to increase the number of daily backups, from 30,000 to 90,000. So they get better data protection, but on top of that, they cut 40% of their costs. So you want to make sure that while you're doing this, you're doing things like consolidation. One of our other customers, which is in EMEA, in the European area, they had 14 purpose-built backup appliances, seven in one data center and set seven and a second data center. Now they've got two, one in one data center, one of the other, they of course do the local backups right then and there. And then they replicate, from one data center to the other data center. As both data centers are both active data centers, but differ for the other data center. So from their perspective, dramatic reduction of OPEX and CapEx, 14 physical boxes down to two. And of course the associated management of both the manpower side, but why I love to call the watch slots, power and floor. All of those things that go into an OPEX budget, they were cut dramatically, 'cause there's only two systems now, to power cool, et cetera et cetera. Floor space, Rackspace from 14. So wow, did they save money. So I think, it's not only providing that data protection and cyber resilience technology, but doing it in a cost-effective way. And as Stan pointed out, in a highly automated way, that cuts back on the manpower they need to manage these systems, because they're overworked and they need to focus on as Stan pointed out, their AI infrastructure, where they're doing for AI applications, don't have time to deal with it. So the more we automate, the better it is for them and the easier it is for everyone from the end-user perspective, as well as up in through their entire IT chain of command. >> Okay, if you want more information, you can go to infinidatguard.com or it's markiisis.com and check it out, learn about their full stack solution. A little bit about AI. Gentlemen, thanks so much for the conversation today, great to have you. >> Thank you, Dave. Now in a moment, I'm going to have some closing thoughts on the market and what we heard today. Thank you for watching the cube. You're a leader in enterprise tech coverage.
SUMMARY :
and the importance of cyber I'd love to hear more about your business. that the demands of the and the challenges that they're facing? of the data that you have and the announcement that you just made, So one of the key things you've got to do, So what are you hearing from and to be able to provide, you and you just nailed it. and over the years, You know, the logical air gap if you will So if by the way, you happen is that really in the case of a disaster, And then there's, you I wonder if you could So the more we automate, for the conversation today, Thank you for watching the cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Eric | PERSON | 0.99+ |
Stan Wysocki | PERSON | 0.99+ |
Eric Hertzog | PERSON | 0.99+ |
Texas | LOCATION | 0.99+ |
50 days | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
40% | QUANTITY | 0.99+ |
Infinidat | ORGANIZATION | 0.99+ |
287 days | QUANTITY | 0.99+ |
150 days | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
two sides | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
seven | QUANTITY | 0.99+ |
third site | QUANTITY | 0.99+ |
26 years | QUANTITY | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Stan | PERSON | 0.99+ |
15 | QUANTITY | 0.99+ |
Mark Three Systems | ORGANIZATION | 0.99+ |
60 | QUANTITY | 0.99+ |
70 | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
EMEA | LOCATION | 0.99+ |
27 different tools | QUANTITY | 0.99+ |
infinidatguard.com | OTHER | 0.99+ |
billion dollar | QUANTITY | 0.99+ |
third side | QUANTITY | 0.99+ |
one key aspect | QUANTITY | 0.99+ |
30,000 | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Infinni | ORGANIZATION | 0.99+ |
Today | DATE | 0.99+ |
European | LOCATION | 0.98+ |
30 minutes | QUANTITY | 0.98+ |
Southeast | LOCATION | 0.98+ |
infiniGuard | ORGANIZATION | 0.98+ |
OPEX | ORGANIZATION | 0.98+ |
Veritas | ORGANIZATION | 0.98+ |
three sites | QUANTITY | 0.98+ |
Vain | ORGANIZATION | 0.97+ |
InfiniGuard | ORGANIZATION | 0.97+ |
one data center | QUANTITY | 0.97+ |
90,000 | QUANTITY | 0.97+ |
two systems | QUANTITY | 0.97+ |
fortune | ORGANIZATION | 0.97+ |
CapEx | ORGANIZATION | 0.97+ |
markiisis.com | OTHER | 0.96+ |
about six years ago | DATE | 0.96+ |
27 different security products | QUANTITY | 0.96+ |
three controller | QUANTITY | 0.96+ |
14 physical boxes | QUANTITY | 0.96+ |
14 purpose-built backup appliances | QUANTITY | 0.95+ |
a hundred days | QUANTITY | 0.95+ |
every six hours | QUANTITY | 0.94+ |
Infini | ORGANIZATION | 0.93+ |
first | QUANTITY | 0.92+ |
InfiniGuard Cyber Resilience New Cybercrime Solutions 1
(gentle music) >> High profile cyber attacks like the SolarWinds hack, the JBS meat and the Florida municipality breach, have heightened awareness of how exposed, critical infrastructure has become. Because the pandemic has shifted employees to remote modes of work, hackers now have a much easier target to fish for credentials and exploit less secure home networks. Take the recent Log4j vulnerability, that's yet another example, of how hackers can take advantage of weak links in the chain. Now data storage companies have an important role to play in fighting cyber crime. Ultimately, they provide the equivalent of a bank vault if you will, and are responsible for storing and protecting the data that cyber criminals are targeting to steal or encrypt, in an effort to hold companies hostage, in a ransomware attack. Now in an effort to help customers understand how to protect themselves from such vulnerabilities, and how one storage company is addressing these challenges, the Cube is hosting this special presentation InfiniGuard Cyber Resilience: New Cybercrime Solutions. And we're going to speak with Eric Herzog, who's the Chief Marketing Officer of Infinidat, and then we'll bring in Stan Wysocki who is the president of Mark III Systems who is either an expert in IT infrastructure and artificial intelligence. First, let me welcome Eric Herzog back to the Cube, hello, Eric. >> Great, Dave, thank you very much, always love talking to you and the Cube, about leading edge technology solutions for end users. >> Alright let's do it. So, first we want to address the transformation and big business progress of Infinidat. New CEO, he's injected new management, new head of marketing obviously, Phil Bullinger is really been focused on accelerating the company's original vision, and doing so, Eric, in the typically unconventional style of Infinidat, you just put out a press release, capping 2021, can you set the stage for us, and give us the business update? >> Sure, so of course we summarized our 2021 results. What a very, very strong year. What a very, very strong year. We increased our bookings over 40% year to year. Even in Q4, we increased our bookings over 68%. And over 25% of the fortune 50 use an Infinidat solution, either our InfiniBox, or InfiniBox SSA, all flash array, or our Infiniguard, which is the focus of the launch we're doing today, on February 9th. >> Yeah, so I always said that Infinidat is one of the best kept secrets in the storage business. So let's talk about that hard news, what you launched on February 9th, and why it's important. >> Well, what we've done is we've got a high end enterprise purpose-built backup appliance, the InfiniGuard. We made some substantial advances in that. The key is focused on cyber resilience with what we call our infinisafe technology. Infinisafe incorporates a number of subsets, of cyber resilience from immutable snapshots, to logical air gapping, to fenced isolated networks, to almost instantaneous recovery for your backup data sets. In addition, we also dramatically improved the performance of the backup and recovery, which means, for example, if a backup window was taking three hours, now the backup window on that primary backup dataset could take only an hour and a half, which of course, as we all know backup dramatically impacts the performance of your primary applications, your primary servers, and your primary storage. So we've done both the cyber resilience aspect and then, on modern data protection, making sure that the backup and recovery are faster, for a traditional backup workload. >> So tell us a little bit more about Infinisafe, and specifically, Eric I'm interested in how it's different from other solutions, don't make me a liar, I had said, you guys always kind of take nonconventional approaches so tell us, add a little color to Infinisafe and how is it really unique from competitors? >> Sure, well Infinisafe incorporates as I mentioned, several different aspects. First of all, the immutable snapshots. So immutable snapshots can not be deleted, they cannot be altered, you cannot accelerate the rate, you can set the rate of immutable stuff, do I want to do it once a day? Do I want to do it twice a day? And obviously if a hacker could get in, you could accelerate that. Our immutable snaps are physically separated from the management schema. So the inside of an Infiniguard, we have what we call a data dedupe appliance, and that data dedupe engine, it goes ahead and it applies data reduction technology, to that back up data set. But we've divorced the immutable snapshots from the management of what we now call a DDE. So the DDE has kind of access of giving you that gap, that logical gap between the management schema of a DDE, and of course the immutable snapshot. We also combine that with this air gap technology, you've got the immutability and the air gap, which is local in that instance, but we also can do it remotely. So we can replicate from one Infiniguard in data center A, to a different Infiniguard in data center B. You then can configure that backup data set with the same immutable snapshot, and the same length, one day, half a day, six hours, whatever you choose, and then of course it'll have that same capability. The third thing we've done is very unique. We have a fenced isolated network to perform forensics. So, if the Cube has a cyber or malware attack, you need to make sure that once you've cleaned it up, off the primary storage, the primary servers, that you recover, a known good data set. So we set up this isolated fence network in which to perform that forensic analysis, to give you the appropriate good recover point. However, unlike many of our competitors, we can do it with a single InfiniBox. Some of our competitors, right on their websites say, you need two of their purpose-built backup appliances, to do cyber resilience. Meaning, twice the CapEx and twice the OpEx, which we can do with a single Infiniguard solution. And then lastly is our near instantaneous recovery. As you know, we're recovering backup data sets. We can make between 15 and 30 minutes time, the backup data set fully accessible to the backup admin or the storage admin to use their Commvault, their Veeam, their Veritas, their IBM Spectrum Protect, or whatever their backup software is, to do recovery from the InfiniGuard box, back to the primary storage using of course the backup software that they created the original dataset with. That is very unique. When you look out in the industry and look at, whether it be purpose-built backup competitors, or whether you look at primary storage competitors, almost no one talks about the speed of their recovery, and the one or two that do, talk about recovering the data set. We recover the entire environment. We are ready to go, and the backup admin, if they were, for example, Commvault, Veeam or Veritas, they could immediately start the backup, as soon as we did our recovery, which again, takes between 15 and 30 minutes, independent of the data set size. That could be 50 terabytes, it could be a petabyte, it could be two petabytes. And even two petabytes of data can be available in 15 to 30 minutes. And then of course, the backup admin can restore from that backup dataset. Very powerful and very unique in those aspects. >> Whilst the reason why this is so important is like I said, it's like the bank vault, because hackers are going to go after that backup corpus that's where the gold is, that's where all the data is. So this all really sounds good. But there's more than Infinisafe in this launch. What else should we know? >> Well, the other thing we've done is dramatically improved the performance of the purpose-built backup plants at the core. So for example, the last time we publicly announced our numbers, we were at 74 terabytes an hour, now we're 180 terabytes an hour. So of course, as we all know, when you do a backup, it impacts the performance of the primary applications, the primary servers and the primary storage. So if that backup window was taking three hours, now that we've more than doubled the performance, you could be up to 50% better. So a three hour backup window, if that's what the dataset took to be backed up, now we can get that down to an hour and a half or even faster. So that of course minimizes the impact on primary storage, primary applications, and of course your primary storage, making it much, much more efficient, from a backup perspective, and of course less impact on the primary applications, the primary servers, and primary storage. >> So I've talked to a number of Infinidat customers, they're very loyal and kind of passionate. So I wonder if you could kind of put that perspective on this discussion. The impact that InfiniGuard, this announcement, that's going to have for your customers, paint a picture as to how it's going to change their business. >> Sure, so let me give you an example. One of our customers is a cloud service buyer, in North America, they focus only on healthcare. So here's a couple of key benefits that they got. First of all, they use our integration with two different backup vendors. They don't have one, they have two. So we're tightly integrated with our backup software partners. They got a 40% cost savings on CapEX, compared to the previous vendor that they had. And, they used to be able to do 30,000 backup per day, now they can do 90,000 backup a day. And by the way, that's all with the previous version of InfiniGuard, not the version we just announced on the 9th. One of our other customers, which is in AMEA and they happened to be an energy company, they were using purpose-built backup from the other vendor, and they had 14 of them, seven in data center one, and seven in data center two. With InfiniGuard, they've got one in data center one, and one in data center two. So 14 purpose-built backup appliances consolidated down into two. And on top of that, those purpose-built backup appliances from the other vendor actually had a couple recovery failures, where they were not able to recover the data. They've been installed for a year now, they've had zero recovers, zero recovery failures, whereas the previous vendor had some. And lastly, let's talk about a large global fortune financial services. So, one of the biggest in the industry, their cost savings from their previous vendor was 46%. In addition, when you look at their cyber resilience design, they were using one of those vendors that probably talks about needing two system products to do their cyber resiliency. They again were able to take those two systems out, and use one InfiniGuard solution. Again, reducing both their capital expenditure, two going to one. And then the operational expenditure, they only have to manage one InfiniGuard versus two of the other guys appliances. Those are just three examples all over the world. One in cloud service providing, one in the energy space, and one a global fortune 500 financial services company. Just some real world examples. And all those by the way, Dave, were before the enhancements of Infinisafe, and before the additional performance we've added in the launch of InfiniGuard on February 9th. >> So like I'm just kind of sketching out the business case, you know, put my CFO hat on. So you're lowering costs cause you're consolidating, so that means I need less hardware and software. But also there's probably labor costs associated with that. If I could do it faster with less resources, I got less stuff to manage. You're accelerating the backup time, so that frees up resources that I can apply elsewhere, recovery, you know, is really important. So I'm inferring faster recovery, all this lowers my risk, and then I can sort of calculate the probability of having data loss, and then what that means to my business. Am I getting that right? >> Yeah, yeah. And in fact, the other impact is on your primary service and your primary storage. If the backup window shrinks, then you're not slowing down that SAP app, that Oracle app, you know, that SQL app, whatever you're running, whether that be the financials, whether that be your logistics, whether it be your manufacturing system, every time you turn on that backup, to do that backup, that backup window slows you down. So cutting that in half has an impact on the real-world application side, which obviously most storage guys, you know, it's hard for us to quantify. But you are taking the impact of backup, and basically reducing it, if you will shrinking the backup window, so their primary applications don't get hammered as much by the backup while they're still trying to run that SAP, that Oracle or that SQL workload. >> And you're not a backup software vendor, so I have optionality there. I can pretty much choose all the popular, you know. >> Absolutely, so Veeam, Veritas, Commvault, IBM Spectrum Protect, all the majors. And in fact, one of the players I mentioned, as you were talking about the end-users, they use two different backup packages, two of 'em. So, two of the major vendors that I named, we work with them just within one account. So, we're very flexible, the user picks what they want from a backup software perspective, and we can work with anything. So, whatever they want to use, is fine with us. We integrate with all of them, we have integration, for example, also with VMware, for vVols and other aspects in container integration, so you know, whether it be our purpose-built backup appliance, InfiniGuard, or what we do with the InfiniBox, we always make sure we integrate with the surrounding environment. 'Cause storage is not an island, storage needs to exist in your data center, or your hybrid cloud data center, or what you're doing for containers. So we make sure we have integration with our InfiniBox, our InfiniBox SSA, all flash. And of course the product we're enhancing today, the InfiniGuard. >> Yeah, integration is super important in the enterprise. Enterprises want solutions, they're busy. (laughs) They don't have unlimited budget to go, you know, plugging stuff together. So, okay Eric, we got to leave it there. Thank you so much. >> Great, thank you very much Dave. Always love talking to the Cube. >> Okay, in a moment Stan Wysocki is coming in. He's the president of Mark III Systems. He's going to join us for a drill down on how InfiniGuard is impacting customers. You're watching the Cube, your global leader, in enterprise tech coverage. (gentle music)
SUMMARY :
the Cube is hosting this always love talking to you and the Cube, and doing so, Eric, in the And over 25% of the fortune 50 in the storage business. that the backup and recovery are faster, and of course the immutable snapshot. it's like the bank vault, of the primary applications, So I've talked to a number and before the additional You're accelerating the backup time, And in fact, the other impact all the popular, you know. And in fact, one of the important in the enterprise. Always love talking to the Cube. He's the president of Mark III Systems.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Phil Bullinger | PERSON | 0.99+ |
Eric Herzog | PERSON | 0.99+ |
Eric Herzog | PERSON | 0.99+ |
Stan Wysocki | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
six hours | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
February 9th | DATE | 0.99+ |
Eric | PERSON | 0.99+ |
Infinidat | ORGANIZATION | 0.99+ |
14 | QUANTITY | 0.99+ |
one day | QUANTITY | 0.99+ |
February 9th | DATE | 0.99+ |
180 terabytes | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
two systems | QUANTITY | 0.99+ |
50 terabytes | QUANTITY | 0.99+ |
74 terabytes | QUANTITY | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
15 | QUANTITY | 0.99+ |
JBS | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
46% | QUANTITY | 0.99+ |
three hours | QUANTITY | 0.99+ |
Mark III Systems | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
three hour | QUANTITY | 0.99+ |
half a day | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
an hour and a half | QUANTITY | 0.99+ |
North America | LOCATION | 0.99+ |
one account | QUANTITY | 0.99+ |
twice | QUANTITY | 0.99+ |
two petabytes | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
Veeam | ORGANIZATION | 0.99+ |
Veritas | ORGANIZATION | 0.99+ |
Florida | LOCATION | 0.99+ |
SQL | TITLE | 0.99+ |
30 minutes | QUANTITY | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
three examples | QUANTITY | 0.99+ |
Commvault | ORGANIZATION | 0.99+ |
InfiniGuard | ORGANIZATION | 0.98+ |
seven | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
once a day | QUANTITY | 0.98+ |
twice a day | QUANTITY | 0.98+ |
a year | QUANTITY | 0.97+ |
two system products | QUANTITY | 0.97+ |
SAP | TITLE | 0.97+ |
first | QUANTITY | 0.96+ |
over 68% | QUANTITY | 0.96+ |
third thing | QUANTITY | 0.96+ |
90,000 backup a day | QUANTITY | 0.96+ |
Breaking Analysis: Cyber, Blockchain & NFTs Meet the Metaverse
>> From theCUBE Studios in Palo Alto in Boston, bringing you data-driven insights from theCUBE and ETR. This is "Breaking Analysis" with Dave Vellante. >> When Facebook changed its name to Meta last fall, it catalyzed a chain reaction throughout the tech industry. Software firms, gaming companies, chip makers, device manufacturers, and others have joined in hype machine. Now, it's easy to dismiss the metaverse as futuristic hyperbole, but do we really believe that tapping on a smartphone, or staring at a screen, or two-dimensional Zoom meetings are the future of how we work, play, and communicate? As the internet itself proved to be larger than we ever imagined, it's very possible, and even quite likely that the combination of massive processing power, cheap storage, AI, blockchains, crypto, sensors, AR, VR, brain interfaces, and other emerging technologies will combine to create new and unimaginable consumer experiences, and massive wealth for creators of the metaverse. Hello, and welcome to this week's Wiki Bond Cube Insights, powered by ETR. In this "Breaking Analysis" we welcome in cyber expert, hacker gamer, NFT expert, and founder of ORE System, Nick Donarski. Nick, welcome, thanks so much for coming on theCUBE. >> Thank you, sir, glad to be here. >> Yeah, okay, so today we're going to traverse two parallel paths, one that took Nick from security expert and PenTester to NFTs, tokens, and the metaverse. And we'll simultaneously explore the complicated world of cybersecurity in the enterprise, and how the blockchain, crypto, and NFTs will provide key underpinnings for digital ownership in the metaverse. We're going to talk a little bit about blockchain, and crypto, and get things started there, and some of the realities and misconceptions, and how innovations in those worlds have led to the NFT craze. We'll look at what's really going on in NFTs and why they're important as both a technology and societal trend. Then, we're going to dig into the tech and try to explain why and how blockchain and NFTs are going to lay the foundation for the metaverse. And, finally, who's going to build the metaverse. And how long is it going to take? All right, Nick, let's start with you. Tell us a little bit about your background, your career. You started as a hacker at a really, really young age, and then got deep into cyber as a PenTester. You did some pretty crazy stuff. You have some great stories about sneaking into buildings. You weren't just doing it all remote. Tell us about yourself. >> Yeah, so I mean, really, I started a long time ago. My dad was really the foray into technology. I wrote my first program on an Apple IIe in BASIC in 1989. So, I like to say I was born on the internet, if you will. But, yeah, in high school at 16, I incorporated my first company, did just tech support for parents and teachers. And then in 2000 I transitioned really into security and focused there ever since. I joined Rapid7 and after they picked up Medis boy, I joined HP. I was one of their founding members of Shadowlabs and really have been part of the information security and the cyber community all throughout, whether it's training at various different conferences or talking. My biggest thing and my most awesome moments as various things of being broken into, is really when I get to actually work with somebody that's coming up in the industry and who's new and actually has that light bulb moment of really kind of understanding of technology, understanding an idea, or getting it when it comes to that kind of stuff. >> Yeah, and when you think about what's going on in crypto and NFTs and okay, now the metaverse it's you get to see some of the most innovative people. Now I want to first share a little bit of data on enterprise security and maybe Nick get you to comment. We've reported over the past several years on the complexity in the security business and the numerous vendor choices that SecOps Pros face. And this chart really tells that story in the cybersecurity space. It's an X,Y graph. We've shown it many times from the ETR surveys where the vertical axis, it's a measure of spending momentum called net score. And the horizontal axis is market share, which represents each company's presence in the data set, and a couple of points stand out. First, it's really crowded. In that red dotted line that you see there, that's 40%, above that line on the net score axis, marks highly elevated spending momentum. Now, let's just zoom in a bit and I've cut the data by those companies that have more than a hundred responses in the survey. And you can see here on this next chart, it's still very crowded, but a few call-outs are noteworthy. First companies like SentinelOne, Elastic, Tanium, Datadog, Netskope and Darktrace. They were all above that 40% line in the previous chart, but they've fallen off. They still have actually a decent presence in the survey over 60 responses, but under that hundred. And you can see Auth0 now Okta, big $7 billion acquisition. They got the highest net score CrowdStrike's up there, Okta classic they're kind of enterprise business, and Zscaler and others above that line. You see Palo Alto Networks and Microsoft very impressive because they're both big and they're above that elevated spending velocity. So Nick, kind of a long-winded intro, but it was a little bit off topic, but I wanted to start here because this is the life of a SecOps pro. They lack the talent in a capacity to keep bad guys fully at bay. And so they have to keep throwing tooling at the problem, which adds to the complexity and as a PenTester and hacker, this chaos and complexity means cash for the bad guys. Doesn't it? >> Absolutely. You know, the more systems that these organizations find to integrate into the systems, means that there's more components, more dollars and cents as far as the amount of time and the engineers that need to actually be responsible for these tools. There's a lot of reasons that, the more, I guess, hands in the cookie jar, if you will, when it comes to the security architecture, the more links that are, or avenues for attack built into the system. And really one of the biggest things that organizations face is being able to have engineers that are qualified and technical enough to be able to support that architecture as well, 'cause buying it from a vendor and deploying it, putting it onto a shelf is good, but if it's not tuned properly, or if it's not connected properly, that security tool can just hold up more avenues of attack for you. >> Right, okay, thank you. Now, let's get into the meat of the discussion for today and talk a little bit about blockchain and crypto for a bit. I saw sub stack post the other day, and it was ripping Matt Damon for pedaling crypto on TV ads and how crypto is just this big pyramid scheme. And it's all about allowing criminals to be anonymous and it's ransomware and drug trafficking. And yes, there are definitely scams and you got to be careful and lots of dangers out there, but these are common criticisms in the mainstream press, that overlooked the fact by the way that IPO's and specs are just as much of a pyramid scheme. Now, I'm not saying there shouldn't be more regulation, there should, but Bitcoin was born out of the 2008 financial crisis, cryptocurrency, and you think about, it's really the confluence of software engineering, cryptography and game theory. And there's some really powerful innovation being created by the blockchain community. Crypto and blockchain are really at the heart of a new decentralized platform being built out. And where today, you got a few, large internet companies. They control the protocols and the platform. Now the aspiration of people like yourself, is to create new value opportunities. And there are many more chances for the little guys and girls to get in on the ground floor and blockchain technology underpins all this. So Nick, what's your take, what are some of the biggest misconceptions around blockchain and crypto? And do you even pair those two in the same context? What are your thoughts? >> So, I mean, really, we like to separate ourselves and say that we are a blockchain company, as opposed to necessarily saying(indistinct) anything like that. We leverage those tools. We leverage cryptocurrencies, we leverage NFTs and those types of things within there, but blockchain is a technology, which is the underlying piece, is something that can be used and utilized in a very large number of different organizations out there. So, cryptocurrency and a lot of that negative context comes with a fear of something new, without having that regulation in place, without having the rules in place. And we were a big proponent of, we want the regulation, right? We want to do right. We want to do it by the rules. We want to do it under the context of, this is what should be done. And we also want to help write those rules as well, because a lot of the lawmakers, a lot of the lobbyists and things, they have a certain aspect or a certain goal of when they're trying to get these things. Our goal is simplicity. We want the ability for the normal average person to be able to interact with crypto, interact with NFTs, interact with the blockchain. And basically by saying, blockchain in quotes, it's very ambiguous 'cause there's many different things that blockchain can be, the easiest way, right? The easiest way to understand blockchain is simply a distributed database. That's really the core of what blockchain is. It's a record keeping mechanism that allows you to reference that. And the beauty of it, is that it's quote unquote immutable. You can't edit that data. So, especially when we're talking about blockchain, being underlying for technologies in the future, things like security, where you have logging, you have keeping, whether you're talking about sales, where you may have to have multiple different locations (indistinct) users from different locations around the globe. It creates a central repository that provides distribution and security in the way that you're ensuring your data, ensuring the validation of where that data exists when it was created. Those types of things that blockchain really is. If you go to the historical, right, the very early on Bitcoin absolutely was made to have a way of not having to deal with the fed. That was the core functionality of the initial crypto. And then you had a lot of the illicit trades, those black markets that jumped onto it because of what it could do. The maturity of the technology though, of where we are now versus say back in 97 is a much different world of blockchain, and there's a much different world of cryptocurrency. You still have to be careful because with any fed, you're still going to have that FUD that goes out there and sells that fear, uncertainty and doubt, which spurs a lot of those types of scams, and a lot of those things that target end users that we face as security professionals today. You still get mailers that go out, looking for people to give their social security number over during tax time. Snail mail is considered a very ancient technology, but it still works. You still get a portion of the population that falls for those tricks, fishing, whatever it might be. It's all about trying to make sure that you have fear about what is that change. And I think that as we move forward, and move into the future, the simpler and the more comfortable these types of technologies become, the easier it is to utilize and indoctrinate normal users, to be able to use these things. >> You know, I want to ask you about that, Nick, because you mentioned immutability, there's a lot of misconceptions about that. I had somebody tell me one time, "Blockchain's Bs," and they say, "Well, oh, hold on a second. They say, oh, they say it's a mutable, but you can hack Coinbase, whatever it is." So I guess a couple of things, one is that the killer app for blockchain became money. And so we learned a lot through that. And you had Bitcoin and it really wasn't programmable through its interface. And then Ethereum comes out. I know, you know a lot about Ether and you have solidity, which is a lot simpler, but it ain't JavaScript, which is ubiquitous. And so now you have a lot of potential for the initial ICO's and probably still the ones today, the white papers, a lot of security flaws in there. I'm sure you can talk to that, but maybe you can help square that circle about immutability and security. I've mentioned game theory before, it's harder to hack Bitcoin and the Bitcoin blockchain than it is to mine. So that's why people mine, but maybe you could add some context to that. >> Yeah, you know it goes to just about any technology out there. Now, when you're talking about blockchain specifically, the majority of the attacks happen with the applications and the smart contracts that are actually running on the blockchain, as opposed to necessarily the blockchain itself. And like you said, the impact for whether that's loss of revenue or loss of tokens or whatever it is, in most cases that results from something that was a phishing attack, you gave up your credentials, somebody said, paste your private key in here, and you win a cookie or whatever it might be, but those are still the fundamental pieces. When you're talking about various different networks out there, depending on the blockchain, depends on how much the overall security really is. The more distributed it is, and the more stable it is as the network goes, the better or the more stable any of the code is going to be. The underlying architecture of any system is the key to success when it comes to the overall security. So the blockchain itself is immutable, in the case that the owner are ones have to be trusted. If you look at distributed networks, something like Ethereum or Bitcoin, where you have those proof of work systems, that disperses that information at a much more remote location, So the more disperse that information is, the less likely it is to be able to be impacted by one small instance. If you look at like the DAO Hack, or if you look at a lot of the other vulnerabilities that exist on the blockchain, it's more about the code. And like you said, solidity being as new as it is, it's not JavaScript. The industry is very early and very infantile, as far as the developers that are skilled in doing this. And with that just comes the inexperience and the lack of information that you don't learn until JavaScript is 10 or 12 years old. >> And the last thing I'll say about this topic, and we'll move on to NFTs, but NFTs relate is that, again, I said earlier that the big internet giants have pretty much co-opted the platform. You know, if you wanted to invest in Linux in the early days, there was no way to do that. You maybe have to wait until red hat came up with its IPO and there's your pyramid scheme folks. But with crypto it, which is again, as Nick was explaining underpinning is the blockchain, you can actually participate in early projects. Now you got to be careful 'cause there are a lot of scams and many of them are going to blow out if not most of them, but there are some, gems out there, because as Nick was describing, you've got this decentralized platform that causes scaling issues or performance issues, and people are solving those problems, essentially building out a new internet. But I want to get into NFTs, because it's sort of the next big thing here before we get into the metaverse, what Nick, why should people pay attention to NFTs? Why do they matter? Are they really an important trend? And what are the societal and technological impacts that you see in this space? >> Yeah, I mean, NFTs are a very new technology and ultimately it's just another entry on the blockchain. It's just another piece of data in the database. But how it's leveraged in the grand scheme of how we, as users see it, it can be the classic idea of an NFT is just the art, or as good as the poster on your wall. But in the case of some of the new applications, is where are you actually get that utility function. Now, in the case of say video games, video games and gamers in general, already utilize digital items. They already utilize digital points. As in the case of like Call of Duty points, those are just different versions of digital currencies. You know, World of Warcraft Gold, I like to affectionately say, was the very first cryptocurrency. There was a Harvard course taught on the economy of WOW, there was a black market where you could trade your end game gold for Fiat currencies. And there's even places around the world that you can purchase real world items and stay at hotels for World of Warcraft Gold. So the adoption of blockchain just simply gives a more stable and a more diverse technology for those same types of systems. You're going to see that carry over into shipping and logistics, where you need to have data that is single repository for being able to have multiple locations, multiple shippers from multiple global efforts out there that need to have access to that data. But in the current context, it's either sitting on a shipping log, it's sitting on somebody's desk. All of those types of paper transactions can be leveraged as NFTs on the blockchain. It's just simply that representation. And once you break the idea of this is just a piece of art, or this is a cryptocurrency, you get into a world where you can apply that NFT technology to a lot more things than I think most people think of today. >> Yeah, and of course you mentioned art a couple of times when people sold as digital art for whatever, it was 60, 65 million, 69 million, that caught a lot of people's attention, but you're seeing, I mean, there's virtually infinite number of applications for this. One of the Washington wizards, tokenized portions of his contract, maybe he was creating a new bond, that's really interesting use cases and opportunities, and that kind of segues into the latest, hot topic, which is the metaverse. And you've said yourself that blockchain and NFTs are the foundation of the metaverse, they're foundational elements. So first, what is the metaverse to you and where do blockchain and NFTs, fit in? >> Sure, so, I mean, I affectionately refer to the metaverse just a VR and essentially, we've been playing virtual reality games and all the rest for a long time. And VR has really kind of been out there for a long time. So most people's interpretation or idea of what the metaverse is, is a virtual reality version of yourself and this right, that idea of once it becomes yourself, is where things like NFT items, where blockchain and digital currencies are going to come in, because if you have a manufacturer, so you take on an organization like Nike, and they want to put their shoes into the metaverse because we, as humans, want to individualize ourselves. We go out and we want to have that one of one shoe or that, t-shirt or whatever it is, we're going to want to represent that same type of individuality in our virtual self. So NFTs, crypto and all of those digital currencies, like I was saying that we've known as gamers are going to play that very similar role inside of the metaverse. >> Yeah. Okay. So basically you're going to take your physical world into the metaverse. You're going to be able to, as you just mentioned, acquire things- I loved your WOW example. And so let's stay on this for a bit, if we may, of course, Facebook spawned a lot of speculation and discussion about the concept of the metaverse and really, as you pointed out, it's not new. You talked about why second life, really started in 2003, and it's still around today. It's small, I read recently, it's creators coming back into the company and books were written in the early 90s that used the term metaverse. But Nick, talk about how you see this evolving, what role you hope to play with your company and your community in the future, and who builds the metaverse, when is it going to be here? >> Yeah, so, I mean, right now, and we actually just got back from CES last week. And the Metaverse is a very big buzzword. You're going to see a lot of integration of what people are calling, quote unquote, the metaverse. And there was organizations that were showing virtual office space, virtual malls, virtual concerts, and those types of experiences. And the one thing right now that I don't think that a lot of organizations have grasp is how to make one metaverse. There's no real player one, if you will always this yet, There's a lot of organizations that are creating their version of the metaverse, which then again, just like every other software and game vendor out there has their version of cryptocurrency and their version of NFTs. You're going to see it start to pop up, especially as Oculus is going to come down in price, especially as you get new technologies, like some of the VR glasses that look more augmented reality and look more like regular glasses that you're wearing, things like that, the easier that those technologies become as in adopting into our normal lifestyle, as far as like looks and feels, the faster that stuff's going to actually come out to the world. But when it comes to like, what we're doing is we believe that the metaverse should actually span multiple different blockchains, multiple different segments, if you will. So what ORE system is doing, is we're actually building the underlying architecture and technologies for developers to bring their metaverse too. You can leverage the ORE Systems NFTs, where we like to call our utility NFTs as an in-game item in one game, or you can take it over and it could be a t-shirt in another game. The ability for having that cross support within the ecosystem is what really no one has grasp on yet. Most of the organizations out there are using a very classic business model. Get the user in the game, make them spend their money in the game, make all their game stuff as only good in their game. And that's where the developer has you, they have you in their bubble. Our goal, and what we like to affectionately say is, we want to bring white collar tools and technology to blue collar folks, We want to make it simple. We want to make it off the shelf, and we want to make it a less cost prohibitive, faster, and cheaper to actually get out to all the users. We do it by supporting the technology. That's our angle. If you support the technology and you support the platform, you can build a community that will build all of the metaverse around them. >> Well, and so this is interesting because, if you think about some of the big names, we've Microsoft is talking about it, obviously we mentioned Facebook. They have essentially walled gardens. Now, yeah, okay, I could take Tik Tok and pump it into Instagram is fine, but they're really siloed off. And what you're saying is in the metaverse, you should be able to buy a pair of sneakers in one location and then bring it to another one. >> Absolutely, that's exactly it. >> And so my original kind of investment in attractiveness, if you will, to crypto, was that, the little guy can get an early, but I worry that some of these walled gardens, these big internet giants are going to try to co-op this. So I think what you're doing is right on, and I think it's aligned with the objectives of consumers and the users who don't want to be forced in to a pen. They want to be able to live freely. And that's really what you're trying to do. >> That's exactly it. You know, when you buy an item, say a Skin in Fortnite or Skin in Call of Duty, it's only good in that game. And not even in the franchise, it's only good in that version of the game. In the case of what we want to do is, you can not only have that carry over and your character. So say you buy a really cool shirt, and you've got that in your Call of Duty or in our case, we're really Osiris Protocol, which is our proof of concept video game to show that this all thing actually works, but you can actually go in and you can get a gun in Osiris Protocol. And if we release, Osiris Protocol two, you'll be able to take that to Osiris Protocol two. Now the benefit of that is, is you're going to be the only one in the next version with that item, if you haven't sold it or traded it or whatever else. So we don't lock you into a game. We don't lock you into a specific application. You own that, you can trade that freely with other users. You can sell that on the open market. We're embracing what used to be considered the black market. I don't understand why a lot of video games, we're always against the skins and mods and all the rest. For me as a gamer and coming up, through the many, many years of various different Call of Duties and everything in my time, I wish I could still have some this year. I still have a World of Warcraft account. I wasn't on, Vanilla, Burning Crusade was my foray, but I still have a character. If you look at it that way, if I had that wild character and that gear was NFTs, in theory, I could actually pass that onto my kid who could carry on that character. And it would actually increase in value because they're NFT back then. And then if needed, you could trade those on the open market and all the rest. It just makes gaming a much different thing. >> I love it. All right, Nick, hey, we're out of time, but I got to say, Nick Donarski, thanks so much for coming on the program today, sharing your insights and really good luck to you and building out your technology platform and your community. >> Thank you, sir, it's been an absolute pleasure. >> And thank you for watching. Remember, all these episodes are available as podcasts, just search "Breaking Analysis Podcast", and you'll find them. I publish pretty much every week on siliconangle.com and wikibond.com. And you can reach me @dvellante on Twitter or comment on my LinkedIn posts. You can always email me david.vellante@siliconangle.com. And don't forget, check out etr.plus for all the survey data. This is Dave Vellante for theCUBE Insights, powered by ETR, happy 2022 be well, and we'll see you next time. (upbeat music)
SUMMARY :
bringing you data-driven and even quite likely that the combination and how the blockchain, crypto, and NFTs and the cyber community all throughout, and the numerous vendor hands in the cookie jar, if you will, and the platform. and security in the way that and probably still the ones any of the code is going to be. and many of them are going to of data in the database. Yeah, and of course you and all the rest for a long time. and discussion about the believe that the metaverse is in the metaverse, and the users who don't want and mods and all the rest. really good luck to you Thank you, sir, it's all the survey data.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Nike | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Netskope | ORGANIZATION | 0.99+ |
2003 | DATE | 0.99+ |
Datadog | ORGANIZATION | 0.99+ |
Darktrace | ORGANIZATION | 0.99+ |
Nick Donarski | PERSON | 0.99+ |
SentinelOne | ORGANIZATION | 0.99+ |
Nick | PERSON | 0.99+ |
Elastic | ORGANIZATION | 0.99+ |
Tanium | ORGANIZATION | 0.99+ |
1989 | DATE | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
10 | QUANTITY | 0.99+ |
HP | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Call of Duty | TITLE | 0.99+ |
ORE System | ORGANIZATION | 0.99+ |
40% | QUANTITY | 0.99+ |
2000 | DATE | 0.99+ |
Osiris Protocol two | TITLE | 0.99+ |
Oculus | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
69 million | QUANTITY | 0.99+ |
Matt Damon | PERSON | 0.99+ |
World of Warcraft Gold | TITLE | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
World of Warcraft | TITLE | 0.99+ |
JavaScript | TITLE | 0.99+ |
Call of Duties | TITLE | 0.99+ |
first program | QUANTITY | 0.99+ |
Zscaler | ORGANIZATION | 0.99+ |
theCUBE Studios | ORGANIZATION | 0.99+ |
Burning Crusade | TITLE | 0.99+ |
Osiris Protocol | TITLE | 0.99+ |
each company | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
single repository | QUANTITY | 0.98+ |
ETR | ORGANIZATION | 0.98+ |
siliconangle.com | OTHER | 0.98+ |
david.vellante@siliconangle.com | OTHER | 0.98+ |
first company | QUANTITY | 0.98+ |
Linux | TITLE | 0.98+ |
CES | EVENT | 0.98+ |
Shadowlabs | ORGANIZATION | 0.98+ |
today | DATE | 0.98+ |
over 60 responses | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
more than a hundred responses | QUANTITY | 0.98+ |
Boston | LOCATION | 0.97+ |
two parallel paths | QUANTITY | 0.97+ |
Harvard | ORGANIZATION | 0.97+ |
Rapid7 | ORGANIZATION | 0.97+ |
this year | DATE | 0.97+ |
early 90s | DATE | 0.97+ |
16 | QUANTITY | 0.97+ |
first | QUANTITY | 0.97+ |
BASIC | TITLE | 0.97+ |
one game | QUANTITY | 0.97+ |
one location | QUANTITY | 0.97+ |
One | QUANTITY | 0.96+ |
last fall | DATE | 0.96+ |
one small instance | QUANTITY | 0.96+ |
Auth0 | ORGANIZATION | 0.96+ |
theCUBE | ORGANIZATION | 0.95+ |
2008 financial crisis | EVENT | 0.95+ |
Fortnite | TITLE | 0.95+ |
two-dimensional | QUANTITY | 0.95+ |
Breaking Analysis: Investors Cash in as Users Fight a Perpetual Cyber War
>> From theCUBE studios in Palo Alto in Boston, bringing you data-driven insights from theCUBE in ETR. This is Breaking Analysis with Dave Vellante. >> Despite the more than $100 billion spent each year fighting Cyber-crime. When we do an end-of-the year look back and ask "How did we do?" The answer is invariably the same, "Worse than last year." Pre pandemic, the picture was disheartening, but since March of 2020 the situation has only worsened as cyber-criminals have become increasingly sophisticated, better funded and more brazen. SecOps pros continue to fight, but unlike conventional wars, this one has no end. Now the flip side of course, is that markets continue to value cybersecurity firms at significant premiums. Because this huge market will continue to grow by double digits for the foreseeable future. Hello and welcome to this week's Wikibon theCUBE Insights powered by ETR. In this Breaking Analysis, we look at the state of cybersecurity in 2021 and beyond. We'll update you with the latest survey data from enterprise technology research and share the fundamentals that have investors piling into the security space like never before. Let's start with the customer view. Cybersecurity remains the number one priority for CIOs and CSOs. This latest ETR survey, once again asked IT buyers to rank their top priorities for the next 12 months. Now the last three polling period dating back to last March. Cybersecurity has outranked every top spending category, including cloud, data analytics, productivity software, networking, AI, and automation or RPA. Now this shouldn't surprise anybody, but it underscores the challenges that organizations face. Not only are they in the midst of a non-optional digital transformation, but they have to also fund a cyber war that has no ceasefires, no truces, and no exit path. Now there's much more going on in cybersecurity than ransomware, but certainly that has the attention of executives. And it's becoming more and more lucrative for attackers. Here's a snapshot of some of the more well-documented attacks this decade many which have occurred in very recent months. CNA Financial, they got hit earlier this year and paid a $40 million ransom. The Ireland Health Service also got hit this year and refused to pay the ransom, but it's estimated that the cost to recover and the damage to the organization exceeded half a billion dollars. The request was for a $20 million ransom. The JBS meat company hack, they paid $11 million. CWT travel paid $5 million. The disruption from the Colonial Pipeline company, was widely reported they paid more than $4 million, as the Brenntag, the chemical company. The NBA got hit. Computer makers, Quanta and Acer also. More than 2,000 random attacks were reported to the FBI in the first seven months of 2021. Up more than 60% from 2020. Now, as I've said many times, you don't have to be a genius to be a ransomware as today. Anyone can go on the dark web, tap into ransomware as a service. Attackers, they have insidious names like darkside, evil, the cobalt, crime gang, wizard spider, the Lazarus gang, and numerous others. Criminals they have negotiation services is most typically the attackers, they'll demand a specific amount of money but they're willing to compromise in an exchange of cryptocurrency for decryption keys. And as mentioned, it's not just ransomware supply chain attacks like the solar winds hack hit organizations within the U.S government and companies like Mimecast this year. Now, while these attacks often do end up in a ransom situation. The attackers sometimes find it more lucrative to live off the land and stealth fashion and ex filtrates sensitive data that can be sold or in the case of many financial institution attacks they'll steal information from say a chief investment officer that signals an upcoming trading strategy and then the attackers will front run that trade in the stock market. Now, of course phishing, remains one of the most prominent threats. Only escalated by the work from home trend as users bring their own devices and of course home networks are less secure. So it's bad, worse than ever before. But you know, if there's a problem, entrepreneurs and investors, they're going to be there to solve it. So here's a LinkedIn post from one of the top investors in the business, Mike Speiser. He was a founding investor in Snowflake. He helped get pure storage to escape velocity and many, many other successes. This hit my LinkedIn feed the other day, his company Sutter Hill Ventures is co-leading a 1.3 Series D on an $8.3 billion valuation. They're putting in over $200 million. Now Lacework is a threat detection software company that looks at security as a data problem and they monitor exposures across clouds. So very timely. So watch that company. They're going to soar. Now the right hand chart shows venture investments in cybersecurity over the past several years. You can see it exploded in 2019 to $7.6 billion. And people thought the market was peaking at that time, if you recall. But then investments rose a little bit to $7.8 billion in 2020 right in the middle of lockdown. And then the hybrid work, the cloud, the new normal thesis kicked in big time. It's in full gear this year. You can see nearly $12 billion invested in cybersecurity in the first half of 2021 alone. So the money keeps coming in as the problem gets worse and the market gets more crowded. Now we'd like to show this slide from Optiv, it's their security taxonomy. It'll make your eyes cross. It's so packed with companies in different sectors. We'll put a link in our posts, so you can stare at this. We've used this truck before. It's pretty good. It's comprehensive and it's worth spending some time to see what that landscape looks like. But now let's reduce this down a bit and bring in some of the ETR data. This is survey data from October that shows net score or spending momentum on the vertical axis and market share or pervasiveness in the dataset on the horizontal axis. That's a measure of mentioned share if you will. Now this is just isolated on the information security sector within the ETR taxonomies. No filters in terms of the number of responses. So it's every company that ETR picks up in cybersecurity from its buyer surveys. Now companies above that red line, we consider them to have a highly elevated spending momentum for their products and services. And you can see, there are a lot of companies that are in this map first of all, and several above that magic mark. So you can see the momentum of Microsoft and Palo Alto. That's most impressive because of their size, their pervasiveness in the study, Cisco and Splunk are also quite prominent. They don't have as much spending momentum, but they're pretty respectable. And you can see the companies that have been real movers in this market that we've been reporting on for a while. Okta, CrowdStrike, Zscaler, CyberArk, SailPoint, Authzero, all companies that we've extensively covered in previous breaking analysis episodes as the up and comers. And isn't it interesting that Datadog is now showing up in the vertical axis. You see that in the left-hand side up high, they're becoming more and more competitive to Splunk in this space as an alternative and lines are blurring between observability, log analytics, security, and as we previously reported even backup and recovery. But now let's simplify this picture a bit more and filter down a little bit further. This chart shows the same X, Y view. Same data construct and framework, but we required more than a hundred responses to hit the chart. So the companies, they have to have a notable market presence in the ETR survey. It's perhaps a bit less crowded, but still very packed. Isn't it? You can see firms that are less prominent in the space like Datadog fell off. The big companies we mentioned, obviously still prominent Microsoft, Palo Alto, Cisco and Splunk and then those with real momentum, they stand out a little bit. There's somewhat smaller, but they're gaining traction in the market. As we felt they would Okta and Auth zero, which Okta acquired as we reported on earlier this year, both showing strength as our CrowdStrike, Zscaler, CyberArk, which does identity and competition with Okta and SentinelOne, which went public mid this year. The company SentinelOne uses AI to do threat detection and has been doing quite well. SalePoint and Proofpoint are right on that red elevated line and then there's a big pack in the middle. Look, this is not an easy market to track. It's virtually every company plays in security. Look, AWS says some of the most advanced security in the business but they're not in the chart specifically, but you see Microsoft is. Because much of AWS security is built into services. Amazon customers heavily rely on the Amazon ecosystem which is in the Amazon marketplace for security products. And often they associate their security spend with those partners and not necessarily Amazon. And you'll see networking companies you see right there, like Juniper and the bottom there and in the ETR data set and the players like VMware in the middle of the pack. They've been really acquisitive for example, with carbon black. And the, of course, you've got a lot of legacy players like McAfee and RSA and IBM. Look, virtually every company has a security story and that will only become more common in the coming years. Now here's another look at the ETR data it's in the raw form, but it'll give you a sense of two things; One is how the data from the previous chart is plotted. And two, it gives you a time series of the data. So the data lists the top companies in the ETR data sets sorted by the October net score in the right most column. Again, that measures spending momentum. So to make the cut here, you had to have more than a hundred mentions which is shown on the left-hand side of the chart that shared N, IE that's shared accounts in the dataset. And you can track the data from last October, July of this year and the most recent October, 2021 survey. So we, drew that red line just about at the 40% net score market coincidentally, there are 10 companies that are over that figure over that bar. We sometimes call out the four star companies. We give four stars to those companies that both are in the top 10 and spending momentum and the top in prominence are shared N in the dataset. So some of these 10 would fit into that profile by that methodology, specifically, Microsoft, Okta, CrowdStrike, and Palo Alto networks. They would be the four star companies. Now a couple of other things to point out here, DDoS attacks, they're still relevant, and they're real threat. So a company like CloudFlare which is just above that red line they play in that space. Now we've also shaded the companies in the fat middle. A lot of these companies like Cisco and Splunk for example, they're major players in the security space with very strong offerings and customer affinity. We sometimes give them two stars. So this is what makes this market so interesting. It's not like the high end discourage market where literally every vendor in the Gartner magic quadrant is up in the right, okay. And there's only five or four or five, six vendors there. This market is diverse with many, many segments and sub segments, and it's such a vital space. And there's so many holes to fill with an ever changing threat landscape as we've seen in the last two years. So this is in part which makes it such a good market for investors. There's a lot of room for growth and not just from stealing market share. That's certainly an opportunity there, but things like cloud, multi-cloud, shifting end points, the edge ,and so forth make this space really ripe for investments. And to underscore this, we put together this little chart of some of the pure play security firms to see how their stock performance has done recently. So you can see that here, you know, it's a little hard to read, but it's not hard to see that Okta, CrowdStrike, Zscaler on the left have been big movers. These charts where possible all show a cross here, starting at the lockdown last year. The only exception is SentinelOne which IPO mid this year. So that's the point March, 2020 when the whole world changed and security priorities really started to shift to accommodate the work from home. But it's quite obvious that since the pandemic, these six companies have been on a tear for the fundamental reason that hybrid work has created a shift in spending priorities for CSOs. No longer are organizations just spending on hardening a perimeter, that perimeter has been blown away. The network is flattening. Work is what you do, it's no longer a place. As such threats are on the rise and cloud, endpoint security, identity access tools there become increasingly vital and the vendors who provide them are on the rise. So it's no surprise that the players that we've listed here which play quite prominently in those markets are all on fire. So now in summary, I want to stress that while the picture is sometimes discouraging. The entire world is becoming more and more tuned in to the cyber threat. And that's a good thing. Money is pouring in. Look, technology got us into this problem and technology is a defensive weapon that will help us continue this fight. But it's going to take more than technology. And I want to share something. We get dozens and dozens of in bounds this time of the year because we do an annual predictions posts. So folks and they want to help us out. So now most of the in bounds and the predictions that we get, they're just kind of observations or frankly, non predictions that can't really be measured as like where you right, or where you're wrong. So for the most part I like predictions that are binary. For example, last December we predicted their IT spending in 2021 would rebound and grow at 4% relative to 2020. Well, it did rebound but that prediction really wasn't as accurate as I'd like. It was frankly wrong. We think it's actually the market's going to actually grow. Spending's going to grow more like 7% this year. Not to worry plenty of our predictions came true, but we'll leave that for another day. Anyway, I got an email from Dean Fisk of Fisk partners. It's a PR firm representing an individual named Lyndon Brown chief of strategy officer of Pondurance. Pondurance is a security consultancy. And the email had the standard, Hey, in case you're working on a predictions post this year end, blah, blah, blah. But instead of sharing with me, a bunch of non predictions, the notes said here's some trends in cybersecurity that might be worth thinking about. And there were a few predictions sprinkled in there, but I wanted to call it a couple of the comments from Linden Brown, whom I don't know, I never met the guy, but I really thought his trends were spot on. The first was a stat I'll share that the United Nations report cyber crime is up 600% due to the pandemic. If as if I couldn't feel worse already. His first point though was that the hybrid workplace will be the new frontier for cyber. Yes, we totally agree. There are permanent shifts taking place. And we actually predicted that last year, but he further cited that many companies went from zero to full digital transformation overnight and many are still on that journey. And his point is that hybrid work is going to require a complete overhaul of how we think about security. We think this is very true. Now the other point that stood out is that governments are going to crack down on this behavior. And we've seen this where criminals have had their critical infrastructure dismantled by governments. No doubt the U.S government has the capabilities to do so. And it is very much focused on this issue. But it's tricky as Robert Gates, who was the former defense secretary, told me a few years back in theCUBE. He said, well, we have the best offense. We also have the most to lose. So we have to be very careful, but Linden's key point was you are going to see a much more forward and aggressive public policy and new laws that give crime fighters more latitude . Again, it's tricky kind of like the Patriot act was tricky but it's coming. Now, another call-out from Linden shares his assertion that natural disasters will bring increased cyber risk. And I thought this was a really astute point because natural disasters they're on the rise. And when there's chaos, there's cash opportunities for criminals. And I'll add to this that the supply chain risk is far from over. This is going to be continuing theme this coming year and beyond. And one of the things that Linden Brown said in his note to me is essentially you can't take humans out of the equation. Automation alone can't solve the problem, but some companies operate as though they can. Just as bad human behavior, can tramp good security, Good human education and behavior is going to be a key weapon in this endless war. Now the last point is we're going to see continued escalation government crackdowns are going to bring retaliation and to Gates' point. The U.S has a lot at stake. So expect insurance premiums are going to go through the roof. That's assuming you can even get cyber insurance. And so we got to hope for the best, but for sure, we have to plan for the worst because it's coming. Deploy technology aggressively but people in process will ultimately be the other ingredients that allow us to live to battle for another day. Okay. That's a wrap for today. Remember these episodes they're all available as podcasts, wherever you listen just search "breaking analysis" podcast. Check out ETR his website at ETR.plus. We also publish a full report every week on Wikibond.com and siliconangle.com. You can get in touch. Email me @david.volante@tsiliconangle.com or you can DM me @dvellante. Comment on our LinkedIn posts. This is Dave Vellante for theCUBE insights powered by ETR. Have a great week. everybody stay safe, be well. And we'll see you next time. (techno music)
SUMMARY :
in Palo Alto in Boston, and the damage to the organization
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Cisco | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Lyndon Brown | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Quanta | ORGANIZATION | 0.99+ |
Mike Speiser | PERSON | 0.99+ |
Gates' | PERSON | 0.99+ |
October | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
2019 | DATE | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
$8.3 billion | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Acer | ORGANIZATION | 0.99+ |
JBS | ORGANIZATION | 0.99+ |
four | QUANTITY | 0.99+ |
Ireland Health Service | ORGANIZATION | 0.99+ |
Pondurance | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Mimecast | ORGANIZATION | 0.99+ |
Palo Alto | ORGANIZATION | 0.99+ |
March, 2020 | DATE | 0.99+ |
Robert Gates | PERSON | 0.99+ |
$7.6 billion | QUANTITY | 0.99+ |
Linden | PERSON | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
CNA Financial | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
Brenntag | ORGANIZATION | 0.99+ |
10 companies | QUANTITY | 0.99+ |
Zscaler | ORGANIZATION | 0.99+ |
$7.8 billion | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
McAfee | ORGANIZATION | 0.99+ |
March of 2020 | DATE | 0.99+ |
2021 | DATE | 0.99+ |
Dean Fisk | PERSON | 0.99+ |
two stars | QUANTITY | 0.99+ |
$20 million | QUANTITY | 0.99+ |
Sutter Hill Ventures | ORGANIZATION | 0.99+ |
4% | QUANTITY | 0.99+ |
RSA | ORGANIZATION | 0.99+ |
more than $4 million | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
$11 million | QUANTITY | 0.99+ |
$5 million | QUANTITY | 0.99+ |
United Nations | ORGANIZATION | 0.99+ |
more than $100 billion | QUANTITY | 0.99+ |
last March | DATE | 0.99+ |
$40 million | QUANTITY | 0.99+ |
six companies | QUANTITY | 0.99+ |
Lacework | ORGANIZATION | 0.99+ |
Linden Brown | PERSON | 0.99+ |
Patriot act | TITLE | 0.99+ |
last December | DATE | 0.99+ |
10 | QUANTITY | 0.99+ |
over $200 million | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
Authzero | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
Juniper | ORGANIZATION | 0.99+ |
Fisk | ORGANIZATION | 0.99+ |
More than 2,000 random attacks | QUANTITY | 0.99+ |
Datadog | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
SentinelOne | ORGANIZATION | 0.99+ |
7% | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
mid this year | DATE | 0.99+ |
each year | QUANTITY | 0.99+ |
half a billion dollars | QUANTITY | 0.99+ |
CyberArk | ORGANIZATION | 0.99+ |
six vendors | QUANTITY | 0.99+ |
Breaking Analysis: Cyber, Cloud, Hybrid Work & Data Drive 8% IT Spending Growth in 2021
>> From theCUBE studios in Palo Alto and Boston, bringing you data-driven insights from theCUBE in ETR. This is Breaking Analysis with Dave Vellante. >> Every CEO is figuring out the right balance for new hybrid business models. Now, regardless of the chosen approach, which is going to vary, technology executives, they understand they have to accelerate their digital and build resilience as well as optionality into their platforms. Now, this is driving a dramatic shift in IT investments. And at the macro level, we expect total spending to increase at as much as 8% or even more in 2021, compared to last year's contraction. Investments in cybersecurity, cloud collaboration that are enabling hybrid work as well as data, including analytics, AI, and automation are at the top of the spending priorities for CXOs. Hello everyone. And welcome to this week's Wiki Bond Cube insights, powered by ETR. In this Breaking Analysis, we're pleased to welcome back Erik Bradley, who is the chief engagement strategist at our partner, ETR. Now in this segment, we're going to share some of the latest findings from ETR's surveys and provide our commentary on what it means for the markets, for sellers, and for buyers. Erik, great to see you, my friend. Welcome back to Breaking Analysis. >> Thank you for having me, always enjoy it. We've got some fresh data to talk about on this beautiful summer Friday, so I'm ready to go. >> All right. I'm excited too. Okay, last year we saw a contraction in IT spending by at least 5%. And now we're seeing a snapback to, as I said, at least 8% growth relative to last year. You got to go back to 2007 just before the financial crisis to see this type of top line growth. The shift to hybrid work, it's exposed us to new insidious security threats. And we're going to discuss that in a lot more detail. Cloud migration of course picked up dramatically last year, and based on the recent earnings results of the big cloud players, for now we got two quarters of data, that trend continues as organizations are accelerating their digital platform build-outs, and this is bringing a lot of complexity and a greater need for so-called observability solutions, which Erik is going to talk about extensively later on in this segment. Data, we think is entering a new era of de-centralization. We see organizations not only focused on analytics and insights, but actually creating data products. Leading technology organizations like JP Morgan, they're heavily leaning into this trend toward packaging and monetizing data products. And finally, as part of the digital transformation trend, we see no slow down in spending momentum for AI and automation, generally in RPA specifically. Erik, anything you want to add to that top level narrative? >> Yeah, there's a lot to take on the macro takeaways. The first thing I want to state is that that 8, 8.5% number that started off at just 3 to 4% beginning of the year. So as the year has continued, we are just seeing this trend in budgets continue to accelerate, and we don't have any reason to believe that's going to stop. So I think we're going to just keep moving on heading into 2021. And we're going to see a banner year of spend this year and probably next as well. >> All right, now we're going to bring up a chart that shows kind of that progression here of spending momentum. So Erik, I'm going to let you comment on this chart that tracks those projections over time. >> Erik: Yeah. Great. So thank you very much for pulling this up. As you can see in the beginning part of the year, when we asked people, "What do you plan to spend throughout 2021?" They were saying it would be about a 4% increase. Which we were happy with because as you said last year, it was all negative. That continues to accelerate and is only hyper accelerating now as we head into the back half of the year. In addition, after we do this data, I always host a panel of IT end users to kind of get their feedback on what we collected, to a man, every one of them expects continued increase throughout next year. There are some concerns and uncertainty about what we're seeing right now with COVID, but even with that, they're planning their budgets now for 2022 and they're planning for even further increases going forward. >> Dave: Great, thank you. So we circled that 8%. That's really kind of where we thought it was going to land. And so we're happy with that number, but let's take a look at where the action is by technology sector. This chart that we're showing you here, it tracks spending priorities back to last September. When I believe that was the point, Erik, that cyber became the top priority in the survey, ahead of cloud collaboration, analytics, and data, and the other sectors that you see there. Now, Erik, we should explain. These areas, they're the top seven, and they outrank all the other sectors. ETR tracks many, many other sectors, but please weigh in here and share your thoughts on this data. >> Erik: Yeah. Security, security, security. It hasn't changed. It had really hasn't. The hybrid work. The fact that you're behind the firewall one day and then you're outside working from home the next, switching in and out of networks. This is just a field day for bad actors. And we have no choice right now, but to continue to spend, because as you're going to talk about in a minute, hybrid's here to stay. So we have to figure out a way to secure behind the firewall on-prem. We also have to secure our employees and our assets that are not in the office. So it is a main priority. One of the things that point out on this chart, I had a couple of ITN users talk to me about customer experience and automation really need to move from the right part of that chart to the left. So they're seeing more in what you were talking about in RPA and automation, starting to creep up heading into next year. As cloud migration matures, as you know, cybersecurity spending has been ramping up. People are going to see a little bit more on the analytics and a little bit more on the automation side going forward. >> Dave: Great. Now, this next data view- well, first of all, one of the great things about the ETR dataset is that you can ask key questions and get a time series. And I will tell you again, I go back to last March, ETR hit it. They were the first on the work from home trend. And so if you were on that trend, you were able to anticipate it. And a lot of investors I think took advantage of that. Now, but we've shown this before, but there's new data points that we want to introduce. So the data tracks how CIOs and IT buyers have responded to the pandemic since last March. Still 70% of the organizations have employees working remotely, but 39% now have employees fully returning to the office and Erik, the rest of the metrics all point toward positives for IT spending, although accelerating IT deployments there at the right peaked last year, as people realized they had to invest in the future. Your thoughts? >> Erik: Yeah, this is the slide for optimism, without a doubt. Of the entire macro survey we did, this is the most optimistic slide. It's great for overall business. It's great for business travel. This is well beyond just IT. Hiring is up. I've had some people tell me that they possibly can't hire enough people right now. They had to furlough employees, they had to stop projects, and they want to re accelerate those now. But talent is very hard to find. Another point to you about your automation and RPA, another underlying trend for there. The one thing I did want to talk about here is the hybrid workplace, but I believe there's another slide on it. So just to recap on this extremely optimistic, we're seeing a lot of hiring. We're seeing increased spending, and I do believe that that's going to continue. >> Yeah I'm glad you brought that up because a session that you and I did a while ago, we pointed out, it was earlier this year, that the skill shortage is one potential risk to our positive scenario. We'll keep an eye on that, but so I want to show another set of data that we've showed previously, but ETR again, has added some new questions in here. So note here that 60% of employees still work remotely with 33% in a hybrid model currently, and the CIO's expect that to land on about 42% hybrid workforce with around 30% working remotely, which is around, it's been consistent by the way on your surveys, but that's about double the historic norm, Eric. >> Erik: Yeah, and even further to your point Dave, recently I did a panel asking people to give me some feedback on this. And three of those four experts basically said to me, if we had greed run this survey right now, that even more people would be saying remote. That they believe that that number, that's saying they're expecting that number of people to be back in office, is actually too optimistic. They're actually saying that maybe if we had- cause as a survey launched about six, seven weeks ago before this little blip on the radar, before the little COVID hiccup we're seeing now, and they're telling me that they believe if we reran this now that it would be even more remote work, even more hybrid and less returned to the office. So that's just an update I wanted to offer on this slide. >> Dave: Yeah. Thank you for that. I mean, we're still in this kind of day to day, week to week, month to month mode, but I want to do a little double click on this. We're not going to share this data, but there was so much ETR data. We got to be selective. But if you double click on the hybrid models, you'll see that 50% of organizations plan to have time roughly equally split between onsite and remote with again around 30 or 31% mostly remote, with onsite space available if they need it. And Erik, very few don't plan to have some type of hybrid model, at least. >> Yeah, I think it was less than 10% that said it was going to be exclusively onsite. And again, that was a more optimistic scenario six, seven weeks ago than we're seeing right now throughout the country. So I agree with you, hybrid is here to stay. There really is no doubt about it. from everyone I speak to when, you know, I basically make a living talking to IT end users. Hybrid is here to stay. They're planning for it. And that's really the drive behind the spending because you have to support both. You have to give people the option. You have to, from an IT perspective, you also have to support both, right? So if somebody is in office, I need the support staff to be in office. Plus I need them to be able to remote in and fix something from home. So they're spending on both fronts right now. >> Okay. Let's get into some of the vendor performance data. And I want to start with the cloud hyperscalers. It's something that we followed pretty closely. I got some Wiki bond data, that we just had earnings released. So here's data that shows the Q2 revenue shares on the left-hand side in the pie and the growth rates for the big four cloud players on the right hand side. It goes back to Q1 2019. Now the first thing I want to say is these players generated just under $39 billion in the quarter with AWS capturing 50% of that number. I said 39, it was 29 billion, sorry, with AWS capturing 50% of that in the quarter. As you're still tracking around a third in Alibaba and GCP in the, you know, eight or 9% range. But what's most interesting to me, Erik, is that AWS, which generated almost 15 billion in the quarter, was the only player to grow its revenue, both sequentially and year over year. And Erik, I think the street is missing the real story here on Amazon. Amazon announced earnings on Thursday night. The company had a 2% miss on the top line revenues and a meaningful 22% beat on earnings per share. So the retail side of the business missed its revenue targets, so that's why everybody's freaked out. But AWS, the cloud side, saw a 4% revenue beat. So the stock was off more than 70% after hours and into Friday. Now to me, a mix shift toward AWS, that's great news for investors. Now, tepid guidance is a negative, but the shift to a more profitable cloud business is a huge positive. >> Yeah, there's a lot that goes into stock price, right? I remember I was a director of research back in the day. One of my analysts said to me, "Am I crazy for putting a $1,000 target on Amazon?" And I laughed and I said, "No, you're crazy if you don't make it $2,000." (both chuckling) So, you know, at that time it was basically the mix shift towards AWS. You're a thousand percent right. I think the tough year over year comps had something to do with that reaction. That, you know, it's just getting really hard. What's that? The law of large numbers, right? It's really hard to grow at that percentage rate when you're getting this big. But from our data perspective, we're seeing no slowdown in AWS, in cloud, none whatsoever. The only slowdown we're seeing in cloud is GCP. But to, you know, to focus on AWS, extremely strong across the board and not only just in cloud, but in all their data products as well, data and analytics. >> Yeah and I think that the AWS, don't forget folks, that funds Amazon's TAM expansion into so many different places. Okay. As we said at the top, the world of digital and hybrid work, and multi-cloud, it's more complicated than it used to be. And that means if you need to resolve issues, which everybody does, like poor application performance, et cetera, what's happening at the user level, you have to have a better way to sort of see what's going on. And that's what the emergence of the observability space is all about. So Erik, let me set this up and you have a lot of comments here because you've recently had some, and you always have had a lot of round table discussions with CXOs on this topic. So this chart plots net score or spending momentum on the vertical axis, and market share or pervasiveness in the dataset on the horizontal axis. And we inserted a table that shows the data points in detail. Now that red dotted line is just sort of Dave Vellante's subjective mark in the sand for elevated spending levels. And there are three other points here. One is Splunk as well off is two-year peak, as highlighted in the red, but Signal FX, which Splunk acquired, has made a big move northward this last quarter. As has Datadog. So Erik, what can you share with us on this hot, but increasingly crowded space? >> Yeah. I could talk about the space for a long time. As you know, I've gotten some flack over the last year and a half about, you know, kind of pointing out this trend, this negative trend in Splunk. So I do want to be the first one to say that this data set is rebounding. Splunk has been horrific in our data for going back almost two years now, straight downward trend. This is the first time we're seeing any increase, any positivity there. So I do want to be fair and state that because I've been accused of being a little too negative on Splunk in the past. But I would basically say for observability right now, it's a rising tide lifts all boats, if I can use a New England phrase. The data across the board in analytics for these observability players is up, is accelerating. None more so than Datadog. And it's exactly your point, David. The complexity, the increased cloud migration is a perfect setup for Datadog, which is a cloud native. It focuses on microservices. It focuses on cloud observability. Old Splunk was just application monitoring. Don't get me wrong, they're changing, but they were on-prem application monitoring, first and foremost. Datadog came out as cloud native. They, you know, do microservices. This is just a perfect setup for them. And not only is Datadog leading the observability, it's leading the entire analytics sector, all of it. Not just the observability niche. So without a doubt, that is the strongest that we're seeing. It's leading Dynatrace new Relic. The only one that really isn't rebounding is Cisco App Dynamics. That's getting the dreaded legacy word really attached to it. But this space is really on fire, elastic as well, really doing well in this space. New Relic has shown a little bit of improvement as well. And what I heard when I asked my panelists about this, is that because of the maturity of cloud migration, that this observability has to grow. Spending on this has to happen. So they all say the chart looks right. And it's really just about the digital transformation maturity. So that's largely what they think is happening here. And they don't really see it getting, you know, changing anytime soon. >> Yeah, and I would add, and you see that it's getting crowded. You saw a service now acquired LightStep, and they want to get into the game. You mentioned, you know, last deck of the elk stack is, you know, the open source alternative, but then we see a company who's raised a fair amount of money, startup, chaos search, coming in, going after kind of the complexity of the elk stack. You've got honeycomb, which has got a really innovative approach, Jeremy Burton's company observes. So you have venture capital coming in. So we'll see if those guys could be disruptive enough or are they, you know, candidates to get acquired? We'll see how that all- you know that well. The M and A space. You think this space is ripe for M and A? >> I think it's ripe for consolidation, M and A. Something has to shake out. There's no doubt. I do believe that all of these can be standalone. So we shall see what's happened to, you mentioned the Splunk acquisition of Signal FX, just a house cleaning point. That was really nice acceleration by Signal FX, but it was only 20 citations. We'd looked into this a little bit deeper. Our data scientists did. It appears as if the majority of people are just signaling spunk and not FX separately. So moving forward for our data set, we're going to combine those two, so we don't have those anomalies going forward. But that type of acquisition does show what we should expect to see more of in this group going forward. >> Well that's I want to mention. That's one of the challenges that any data company has, and you guys do a great job of it. You're constantly having to reevaluate. There's so much M and A going on in the industry. You've got to pick the right spots in terms of when to consolidate. There's some big, you know, Dell and EMC, for example. You know, you've beautifully worked through that transition. You're seeing, you know, open shift and red hat with IBM. You just got to be flexible. And that's where it's valuable to be able to have a pipeline to guys like Erik, to sort of squint through that. So thank you for that clarification. >> Thank you too, because having a resource like you with industry knowledge really helps us navigate some of those as well for everyone out there. So that's a lot to do with you do Dave, >> Thank you. It's going to be interesting to watch Splunk. Doug Merritt's made some, you know, management changes, not the least of which is bringing in Teresa Carlson to run go to market. So if you know, I'd be interested if they are hitting, bouncing off the bottom and rising up again. They have a great customer base. Okay. Let's look at some of the same dimensions. Go ahead. You got a comment? >> A few of ETR's clients looked at our data and then put a billion dollar investment into it too. So obviously I agree. (Dave laughing) Splunk is looking like it's set for a rebound, and it's definitely something to watch, I agree. >> Not to rat hole in this, but I got to say. When I look back, cause theCUBE gives us kind of early visibility. So companies with momentum and you talk to the customers that all these shows that we go to. I will tell you that three companies stood out last decade. It was Splunk. It was Service Now and Tableau. And you could tell just from just discussions with their customers, the enthusiasm in that customer base. And so that's a real asset, and that helps them build them a moat. So we'll see. All right, let's take a look at the same dimensions now for cyber. This is cybersecurity net score in the vertical, and market share in the horizontal. And I filtered by in greater than a hundred shared in because just gets so crowded. Erik, the only things I would point out here is CrowdStrike and Zscaler continue to shine, CyberArk also showing momentum over that 40% line. Very impressively, Palo Alto networks, which has a big presence in the market. They've bounced back. We predicted that a while back. Your round table suggested people like working with Palo Alto. They're a gold standard. You know, we had reported earlier on that divergence with four to net in terms of valuation and some of the challenges they had in cloud, clearly, you know, back with the momentum. And of course, Microsoft in the upper, right. It's just, they're literally off the charts and obviously a major player here, but your thoughts on cyber? >> Erik: Yeah. Going back to the backdrop. Security, security, security. It has been the number one priority going back to last September. No one sees it changing. It has to happen. The threat vectors are actually expanding and we have no choice but to spend here. So it is not surprising to see. You did name our three favorite names. So as you know, we look at the dataset, we see which ones have the most positive inflections, and we put outlooks on those. And you did mention Zscaler, Okta and CrowdStrike, by far the three standouts that we're seeing. I just recently did a huge panel on Okta talking about their acquisition of Auth Zero. They're pushed into Sale Point space, trying to move just from single sign on and MFA to going to really privileged account management. There is some hurdles there. Really Okta's ability to do this on-prem is something that a little bit of the IT end users are concerned about. But what we're seeing right now, both Okta and Auth Zero are two of the main adopted names in security. They look incredibly well set up. Zscaler as well. With the ZTNA push more towards zero trust, Zscaler came out so hot in their IPO. And everyone was wondering if it was going to trail off just like Snowflake. It's not trailing off. This thing just keeps going up into the right, up into the right. The data supports a lot of tremendous growth for the three names that you just mentioned. >> Yeah. Yeah. I'm glad you brought up Auth Zero. We had reported on that earlier. I just feel like that was a great acquisition. You had Okta doing the belly to belly enterprise, you know, selling. And the one thing that they really lacked was that developer momentum. And that's what Auth Zero brings. Just a smart move by Todd McKinnon and company. And I mean, so this, you know, I want to, I want to pull up another chart show a quick snapshot of some of the players in the survey who show momentum and have you comment on this. We haven't mentioned Snowflake so far, but they remain again with like this gold standard of net score, they've consistently had those high marks with regard to spending velocity. But here's some other data. Erik, how should we interpret this? >> Erik: Yeah, just to harp on Snowflake for a second. Right, I mean the rich get richer. They came out- IPO was so hyped, so it was hard for us as a research company to say, "Oh, you know, well, you know, we agree." But we did. The data is incredible. You can't beat the management team. You can't beat what they're doing. They've got so much cash. I can't wait to see what they do with it. And meanwhile, you would expect something that debuted with that high of a net score, that high of spending velocity to trail off. It would be natural. It's not Dave, it's still accelerating. It's gone even higher. It's at all time highs. And we just don't see it stopping anytime soon. It's a really interesting space right now. Maybe another name to look at on here that I think is pretty interesting, kind of a play on return to business is Kupa. It's a great project expense management tool that got hit really hard. Listen, traveling stopped, business expense stopped, and I did a panel on it. And a lot of our guys basically said, "Yeah, it was the first thing I cut." But we're seeing a huge rebound in spending there in that space. So that's a name that I think might be worth being called out on a positive side. Negative, If you look down to the bottom right of that chart, unfortunately we're seeing some issues in RingCentral and Zoom. Anything that's sort of playing in this next, you know, video conferencing, IP telephony space, they seem to be having really decelerating spending. Also now with Zoom's acquisition of five nine. I'm not really sure how RingCentral's going to compete on that. But yeah, that's one where we debuted for the first time with a negative outlook on that name. And looking and asking to some of the people in our community, a lot of them say externally, you still need IP telepany, but internally you don't. Because the You Cast communication systems are getting so sophisticated, that if I have Teams, if I have Slack, I don't need phones anymore. (chuckling) That you and I can just do a Slack call. We can do a Teams call. And many of them are saying I'm truly ripping out my IP Telepany internally as soon as possible because we just don't need it. So this whole collaboration, productivity space is here to stay. And it's got wide ranging implications to some of these more legacy type of tools. >> You know, one of the other things I'd call out on this chart is Accenture. You and I had a session earlier this year, and we had predicted that that skill shortage was going to lead to an uptick in traditional services. We've certainly seen that. I mean, IBM beat its quarter on the strength of services largely. And seeing Accenture on that is I think confirmation. >> Yeah that was our New Year prediction show, right Dave? When we made top 10 predictions? >> That's right. That was part of our predictions show. Exactly, good memory. >> The data is really showing that continue. People want the projects, they need to do the projects, but hiring is very difficult. So obviously the number one beneficiary there are going to be the Accentures of the world. >> All right. So let's do a quick wrap. I'm going to make a few comments and then have you bring us home, Erik. So we laid out our scenario for the tech spending rebound. We definitely believe last year tracked downward, along with GDP contraction. It was interesting. Gardner doesn't believe, at least factions of Gardner don't believe there's a correlation between GDP and tech spending. But, you know, I personally think there generally is some kind of relatively proportional pattern there. And I think we saw contraction last year. People are concerned about inflation. Of course, that adds some uncertainty. And as well, as you mentioned around the Delta variant. But I feel as though that the boards of directors and CEOs, they've mandated that tech execs have to build out digital platforms for the future. They're data centric. They're highly automated, to your earlier points. They're intelligent with AI infused, and that's going to take investment. I feel like the tech community has said, "Look, we know what to do here. We're dealing with hybrid work. We can't just stop doing what we're doing. Let's move forward." You know, and as you say, we're flying again and so forth. You know, getting hybrid right is a major priority that directly impacts strategies. Technology strategies, particularly around security, cloud, the productivity of remote workers with collaboration. And as we've said many times, we are entering a new era of data that's going to focus on decentralized data, building data products, and Erik let's keep an eye on this observability space. Lot of interest there, and buyers have a number of choices. You know, do they go with a specialist, as we saw recently, we've seen in the past, or did they go with the generalist like Service Now with the acquisition of LightStep? You know, it's going to be interesting. A lot of people are going to get into this space, start bundling into larger platforms. And so as you said, there's probably not enough room for all the players. We're going to see some consolidation there. But anyway, let me give you the final word here. >> Yeah, no, I completely agree with all of it. And I think your earlier points are spot on, that analytics and automation are certainly going to be moving more and more to that left of that chart we had of priorities. I think as we continue that survey heading into 2022, we'll have some fresh data for you again in a few months, that's going to start looking at 2022 priorities and overall spend. And the one other area that I keep hearing about over and over and over again is customer experience. There's a transition from good old CRM to CXM. Right now, everything is digital. It is not going away. So you need an omni-channel support to not only track your customer experience, but improve it. Make sure there's a two way communication. And it's a really interesting space. Salesforce is going to migrate into it. We've got Qualtrics out there. You've got Medallia. You've got FreshWorks, you've got Sprinkler. You got some names out there. And everyone I keep talking to on the IT end user side keeps bringing up customer experience. So let's keep an eye on that as well. >> That's a great point. And again, it brings me back to Service Now. We wrote a piece last week that's sort of, Service Now and Salesforce are on a collision course. We've said that for many, many years. And you've got this platform of platforms. They're just kind of sucking in different functions saying, "Hey, we're friends with everybody." But as you know Erik, software companies, they want to own it all. (both chuckling) All right. Hey Erik, thank you so much. I want to thank you for coming back on. It's always a pleasure to have you on Breaking Analysis. Great to see you. >> Love the partnership. Love the collaboration. Let's go enjoy this summer Friday. >> All right. Let's do. Okay, remember everybody, these episodes, they're all available as podcasts, wherever you listen. All you got to do is search Breaking Analysis Podcast, click subscribe to the series. Check out ETR's website at etr.plus. They've just launched a new website. They've got a whole new pricing model. It's great to see that innovation going on. Now remember we also publish a full report every week on WikiBond.com and SiliconAngle.com. You can always email me, appreciate the back channel comments, the metadata insights. David.Vellante@SiliconAngle.com. DM me on Twitter @DVellante or comment on the LinkedIn posts. This is Dave Vellante for Erik Bradley and theCUBE insights powered by ETR. Have a great week, a good rest of summer, be well. And we'll see you next time. (inspiring music)
SUMMARY :
bringing you data-driven And at the macro level, We've got some fresh data to talk about and based on the recent earnings results So as the year has So Erik, I'm going to let back half of the year. and the other sectors that you see there. and a little bit more on the and Erik, the rest of the metrics Another point to you about and the CIO's expect that to land on returned to the office. on the hybrid models, I need the support staff to be in office. but the shift to a more One of my analysts said to me, And that means if you is that because of the last deck of the elk stack It appears as if the majority of people going on in the industry. So that's a lot to do with you do Dave, It's going to be something to watch, I agree. and some of the challenges that a little bit of the IT And I mean, so this, you know, I want to, Erik: Yeah, just to harp You know, one of the That was part of our predictions So obviously the number and that's going to take investment. And the one other area I want to thank you for coming back on. Love the partnership. It's great to see that
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Erik Bradley | PERSON | 0.99+ |
Erik | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
Teresa Carlson | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
$2,000 | QUANTITY | 0.99+ |
Jeremy Burton | PERSON | 0.99+ |
Auth Zero | ORGANIZATION | 0.99+ |
JP Morgan | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
50% | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
Signal FX | ORGANIZATION | 0.99+ |
$1,000 | QUANTITY | 0.99+ |
2022 | DATE | 0.99+ |
Zscaler | ORGANIZATION | 0.99+ |
EMC | ORGANIZATION | 0.99+ |
Thursday night | DATE | 0.99+ |
last year | DATE | 0.99+ |
Gardner | PERSON | 0.99+ |
Eric | PERSON | 0.99+ |
70% | QUANTITY | 0.99+ |
8, 8.5% | QUANTITY | 0.99+ |
39% | QUANTITY | 0.99+ |
RingCentral | ORGANIZATION | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
three names | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Boston | LOCATION | 0.99+ |
four experts | QUANTITY | 0.99+ |
29 billion | QUANTITY | 0.99+ |
Doug Merritt | PERSON | 0.99+ |
22% | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
8% | QUANTITY | 0.99+ |
33% | QUANTITY | 0.99+ |
60% | QUANTITY | 0.99+ |
last September | DATE | 0.99+ |
2% | QUANTITY | 0.99+ |
Breaking Analysis Learnings from the hottest startups in cyber & IT infrastructure
from the cube studios in palo alto in boston bringing you data-driven insights from the cube and etr this is breaking analysis with dave vellante as you well know by now the cloud is about shifting i.t labor to more strategic initiatives or as andy jassy laid out years ago removing the undifferentiated heavy lifting associated with deploying and managing i.t infrastructure cloud is also about changing the operating model and rapidly scaling a business operation or a company often overlooked with cloud however is the innovation piece of the puzzle a main source of that innovation is venture funded startup companies that have brilliant technologists who are mission driven and have a vision to solve really hard problems and enter a large market at scale to disrupt it hello everyone and welcome to this week's wikibon cube insights powered by etr in this breaking analysis we're pleased to welcome a special guest and author of the elite 80. a report that details the hottest privately held cyber security and i.t infrastructure companies in the world eric suppenger is that author and joins us today from jmp securities eric welcome to the cube thanks for being here thank you very much dave i'm uh i'm looking forward to uh to having a discussion here with you yeah me too this is going to be great so let's dive right into the elite 80. first if you could tell us about jmp securities and fill us in on the report its history your approach to picking the 80 companies out of thousands of choices sure so jmp is a middle markets investment bank we're a full full-service investment bank based in san francisco we were founded in 2000 and we focus on technology health care financial services and real estate i've been with jmp since 2011. um i've uh i've i cover uh cyber security companies public companies uh i cover uh it infrastructure companies uh more broadly and um we have having been based here in san francisco i've long kept uh a good dialogue with uh private companies uh that that compete with the public companies that i cover and so um about seven years ago i i started uh developing this uh this report which is really designed to highlight uh emerging uh private companies that uh that i think are are well positioned to be leaders in their respective markets and uh and over time we've um we've built the list up to about 80 companies and uh and we publish this report every year uh it's designed to uh to keep tabs on on the companies that are doing well and uh and we rotate about uh about 15 to 20 to 25 percent of the companies uh out of the report every year either as they get acquired or they do an ipo or um uh they uh they if we think that they are slowing and others are getting a little bit more uh more exciting and you talk directly to the companies that's part of your methodology as well you do a lot of background research digging into funding but you also talk to the executives at these companies correct yes for the most part we uh we try to talk to the ceos at least the cfos the object here is to build a a relationship with these companies so that we have some good insights into uh into how they're doing and and how the market trends are evolving as they relate to those companies in particular some of the some of the dynamics that go into us selecting companies is one we do have to talk to the management teams uh two we uh we we base our decisions on who we include on how the companies are performing on how their competitors are uh are are discussing those companies their performance uh how other industry contacts talk about those companies and then we we track their hiring and uh and and how they've uh you know other metrics that we can uh we can gauge them by got it okay so i dug into the report a little bit and tried to summarize a few key takeaways so let's take a look at those and if if you allow me just set up the points and then and ask you to add some color so the first two things that really you know jumped out i want to comment on are the perspectives of the technology companies and then of course the other side is the buyers so it seems that the pandemic really got startups to sharpen their focus i remember talking to a number of vcs early on in the shutdown and they were all over their portfolio companies to reset their icp their ideal customer profile and sharpen their uvp their unique value proposition and they wanted them to do that specifically in the context of the pandemic and the new reality and then on the buy side let's face it if you weren't a digital business you were out of business so picking up on those two thoughts eric what can you share with us in terms of the findings that you have well that's that's very uh consistent with what we had found uh basically um when the pandemic first when the lockdown came uh in march we reached out to quite a few companies and industry contacts at that time feedback was uh you know it was uh it was a period of great uncertainty and a lot of a lot of budgets were were tightened pretty quickly but it didn't take very long and a lot of these companies uh you know having been uh innovation engines and and emerging players what they found was that uh the broader market quickly adopted uh digital transformation in response to the pandemic basically that was how they they uh facilitated uh keeping their their doors open so to speak and so um the ones that were able to uh to leverage uh need for emerging technologies because of an acceleration in digital transformation uh they they really stepped up and and quite a few of these companies they kept hiring they kept uh their sales uh did very well and uh and ultimately um a lot of the vcs that had been uh putting on the brakes uh they actually stepped up and uh and and continued funding uh pretty generously yeah we've got some data on that that we wanna look into so thank you for that now let's take a look at some of the the specific date of the study just break that down the elite 80 raised more than three billion dollars last year eclipsing the previous highs in your studies of 2019 and then a big portion of that capital went to pretty small number only 10 of the 80 firms and and most of that went to cyber security plays so what do you make of these numbers especially you know given your history with with this group of elite companies and the high concentration this year this past year so one of the trends that we've seen in the public in the public market or the ipo market is um companies are are waiting until they're a little bit more mature than they used to be so what we've seen is um the the funding for companies uh the the larger rounds are far larger than they used to be these companies typically are waiting until they're of size you know maybe now they're waiting to be uh 200 million uh in annual salary in annual revenues versus a 100 million before and so they are consuming quite a bit the larger rounds are are much bigger than they used to be um in the in the most recent uh report that we published we had uh one round that was over half a billion and another one that was over 400 million and if you go back just a couple of few years ago a large round was over 100 million and you didn't get too many that were over 200 million so that's that's been a distinct change and and i think that's not necessarily just a function of the pandemic but i think the pandemic caused caused some companies to kind of step up the size of their rounds uh and so there were a handful of uh very large rounds uh certainly bigger than what we've ever seen before yeah those are great observations i mean you're right it was 100 million used to be the magic number to go public and now you get so much late money coming in locking in maybe smaller gains but giving that company you know a little more time to get their act together pre-ipo let's take a look at where the money went you know talk about follow the money and eric you and your team you segmented that three billion dollars into a number of different categories as i said most of it go into cyber security uh categories like application security is assessment and risk there's endpoint endpoint boomed during the pandemic same with identity and this chart really shows those categories that you created to better understand these dynamics and sort of figure out where the money went how did you come up with these these categories and what does this data tell you so these categories were basically uh homegrown these are how i um i think of these companies um it's a little bit of uh pulling some information out of uh the likes of gartner but uh for the most part this was how i how i conceptualize the landscape uh in my mind um the interesting thing to me is you know so a lot of that data is skewed by a few large transactions so um you know if you if you think about the the the allocation of those uh those different categories and and the uh investments in those categories it's it's skewed by large transactions and what was most interesting to me was one the application security space is a space that had quite a few additional smaller rounds and i think that's one that's pretty interesting going forward and then the one that was a surprise to me more than that was the data management um outside of cyber security uh data management's a space that's getting uh a lot more attention and uh and it's getting um uh some pretty good uh growth so that's a space that we're uh we're paying some good good attention to as well yeah that's interesting i mean of course data management means a lot of different things to a lot of different people and vc's throwing money at it maybe trying to define it and then and then the the the ai ops and and the that data management piece you know took a took a portion of it but wow the the cyber guys really are are killing it and now as we mentioned ten companies sucked up the lion's share of of the funding and this next chart shows that concentration of those 10 investments so eric some big numbers here one trust secured more than a half a billion dollars four others nabbed more than a quarter billion in funding give us your thoughts on this what do you make of that high concentration well um i i think this is a function of companies that are waiting uh longer than they used to um they're these these companies are getting to be of considerable scale i mean titanium would be a good example that's a company that could have gone public years ago and uh and i don't think they're particularly eager to get out the door uh they provide liquidity to their previous investors by raising money and uh and and buying those shares back um and so they uh they basically uh just continue to uh to grow uh without the uh the burden or or the um uh the demands that being a public company create um so there's this that's that's really a function of of companies just waiting longer before they get out the door got it now here's another view of that that data the so the left side of this chart uh that we we want to show you next um gives you a sense of the size of the companies the revenue in the elite 80 and you know most of these companies have broken through the 100 million dollar revenue mark as you say uh and they're they're still private and so you can see the breakdown and then the right-hand side of the chart shows the most active investors we just pulled out those with three or more transactions and it's it's interesting to see the players there and of course you've got some strategics you got city in there you've got cisco along with a little bit of p and e private equity action maybe your thoughts on on on this data so so to give you a little flavor around the uh the size of these companies when we first started publishing this report a little bit of the goal was to try to keep those categories relatively equal and as you can see they've skewed uh far to the left uh towards the uh to the larger revenue stream you know size so that's that just goes to the point that um uh the the companies that uh you know that are getting that a lot of these private companies uh they're they're of saw considerable size before they uh they really go out the door and and i think that's a reflection of um of the caliber of uh of or the quality of investments that uh that are out there today these are companies that have built very mature businesses and they're not going into the market until um until they can demonstrate uh high confidence and uh and consistency in their performance yeah i mean you i remember when when cloudera took that massive i think it was the 750 billion a million dollar investment from uh from intel you know way back when they that bridged them to ipo and that was sort of if i recall started that that trend and then now you get a ipo last year like snowflake which is price to perfection and you got guys that really know how to do this they've done it a number of times and so it really is somewhat changed that that dynamic uh for ipos which of course came booming back it was so quiet there for so many years but let's look into these markets a bit um i want to talk about the security space and the i.t infrastructure space and here's a chart from optiv which is one of the elite 80 ironically and we've shared this with with our audience before and the point of this is that the cyber security spaces it's highly fragmented we've reported on this a lot it's got hundreds and hundreds of companies in there it's just mosaic of solutions so very complicated and bespoke sets of tooling and combine that with a lack of skilled expertise you know csos tell us the lack of talent is their biggest challenge makes it a really dynamic market and eric this is part of the reason why vcs they want in so the takeaway i get from that chart is we have a lot of um we still have a great need for best of breed um digital transformation uh cloud mobile all these trends are creating such a disruption that there's still a great opportunity for somebody that can deliver a uh you know a real best of the best of breed uh solution uh in spite of uh all the challenges that uh id it departments are having with trying to uh to meet you know security requirements and things like that uh the the world has embraced uh you know digital delivery and uh you are your success is oftentimes dependent on your your digital differentiation and if that's the case then there's always going to be opportunity for a better technology out there so that's that in the end is uh is why uh optiv has a uh a line card that's uh as as long as you can read it i'm glad you brought the point about best of breeze it's an age-old debate in the industry it's do we go best of breed or do we go you know integrated suites you know you look at a company like microsoft obviously that that works very well for them uh companies like cisco but so this next uh set of data we're gonna bring in some etr customer spending data and see where the momentum is and i think it'll really underscore the points that you're making there in terms of best of breed this chart shares a popular view that we like to to share with our community on the vertical axis is net score or that's spending velocity and the horizontal axis shows market share or pervasiveness in the data as we've said before anything above 40 percent that red line on the vertical axis is considered elevated and you can see a lot of companies in cyber security are above that mark now a couple points i want to make here before we bring eric back in first is the market it's fragmented but it's pretty large at over 100 billion dollars depending on which research firm you look at it's growing at you know the low double digits so so nice growth is putting on 10 billion dollars a year into that number and there are some big pure plays like palo alto networks and fortinet but the market includes some other large whales like cisco uh they've built up a sizeable security business microsoft microsoft's in most markets and serves its you know software customers so but you can see how crowded this market is now we've superimposed in the red recent valuations for some of the companies and and the other point we want to make is there's some big numbers here and some divergence between us eric was saying the the best of breed and the integrated suites and the pandemic as we've talked about a lot is fueled a shift in cyber strategies toward endpoint identity and cloud and you can see that in crowdstrike's 50 billion plus valuation octa another best of breed 34 billion dollars in identity they just bought off zero and paid four and a half billion dollars for auth0 to get access to the developer community z scaler at 28 billion proof point is going private at a 12 billion dollar number so you can see why vcs are pouring money into this market some really attractive valuations eric what are your thoughts on this data so my interpretation is that's that's just further validation that uh that these security markets are uh are getting disrupted and uh and the truth of the matter is there's only one um really well positioned uh platform player in there uh uh palo alto the rest of them are are platforms within their respective uh security technology space but uh you know there's there's not very many um you know broad security solution providers today and the reason for that is because we've got such a uh transformation going on uh across uh technology that the need for best of breed is uh is is getting recognized uh day in day out yeah you're right palo alto they're they csos love to work with palo alto they're kind of the high-end gold standard but and we reported last year on the divergence in valuations between fortinet and palo alto networks fortinet was doing a better job you know pivoting to the cloud we said palo alto will get its act together it did but then you see these pure play best of breeds really you know doing well so now let's take a look at the it infrastructure space and it's it's quite different in terms of the dynamics of the market so here's that same view of the etr data and we've cut it by uh three categories we cut on networking servers and storage and this is a very large market it's it's it's over 200 billion dollars but it's much more of an oligopoly in that you've got great concentration at the top you've got some really big companies like cisco and dell which is spinning out vmware so we're going to unlock you know more value of the core dell company dell's valuation is 79 billion and that includes its 80 ownership in vmware so you do the math and figure out what core dell is worth hpe is much smaller it's notable that its valuation is comparable to netapp netapp's around you know one-fifth the size of revenue-wise uh hpe now eric arista they stand out as the lone player that's having some success clearly against cisco what are your thoughts on on the infrastructure space so so a couple things i'll take away from that now first off uh you mentioned arista arista is a bit of an anomaly um a switching company you know a networking company that is in that upper echelon like you've pointed out above 40 percent it is it is unique and and basically they kind of cracked the code they figured out how to beat cisco at cisco's core competency which is traditionally switching switching and routing and they they did that by delivering a very differentiated uh uh hardware product um that that they were able to tap into some markets that uh that even cisco hasn't been able to open up and and those would be the hyperscale uh hyperscale you know hosting vendors like uh google and facebook and microsoft but i would i would put i would put arista kind of in a in a unique situation the other thing that i'll just point out that i think is an interesting takeaway from the um from the the the slide that you showed is there are some uh infrastructure or what i would consider is bordering on data management type companies i mean you look at uh rubric you look at cohesity and nutanix veeam they're they're all kind of bubbling up there and pure storage and i think that comes back to what i was mentioning earlier where there is some pretty interesting innovation going on in data management which has traditionally not had a lot of innovation so i would bet you those names would have bubbled up just in the last uh year or two where that's been a market that hasn't had a lot of innovation and and now there's some interesting things coming down the pipe you know that's interesting comments that you make in there because if you think back to sort of last decade arista obviously broke out the only two other companies in the in the core infrastructure space and this was a hardware game historically but it's obviously becoming a software game but take a look at pure storage and nutanix you can see their valuations at five billion and seven point four billion dollars respectively uh and then to your point cohesity you got them at 3.7 billion just did a recent you know round rubric 3.3 billion that's from 2019 and so you know presumably that's a higher valuation now veeam got taken out last january at five billion by uh inside capital uh and so i think they're doing very well and they're probably uh up from that and susa is going public at uh at a reported seven billion dollar valuation so quite a bit different dynamic in the infrastructure space so eric i want to bring it back to the elite 80 in in in in startups in general my first question to you is is what do you look for from successful startups to make this elite 80 list so a few factors first off uh their performance is uh is is one of the primary uh situations if it's a company that's not growing we'll we'll probably pull it from the list um i would say it is also very much a function of my perception of the quality of management uh we we do meet with all these management teams um if we feel like uh they're they're they're putting together a uh you know a um a leadership team that's gonna be around for a long time and they've got a product position that's uh pretty attractive uh those would certainly be two key aspects of what i look for beyond that uh certainly feedback that we get from competitors uh feedback that we get from industry contacts like resellers and then then i'd also just say my enthusiasm for their respective market that they're in if it's a a market that i think is is going to be difficult or flat or not very interesting then then that would certainly be a a reason to to not include them uh conversely even if it's a small company if it's if it's a sector that i think is going to be uh around for quite a while and it's very differentiated uh then we'll include um a lot of the smaller companies too well a good example that's like a weka i mean i don't want to i don't want to go into these companies but two because we believe we 80 companies are going to leave somebody else but that that's a good example of a smaller company that looks to be disruptive um how should enterprise customers the buyers do you think evaluate and filter startups you have any sense of that well um a couple things that i struggle with that that would be uh you know something that's a lot more readily available to them is uh is just the quality of the product i mean that's obviously uh why why they're looking at it but uh if it's a uh if it's a company that's got a a unique product that uh is is built uh you know that that can that can that works that would be the starting point then then beyond that it's also is it a management team is is the behavior of the company something that uh reflects a management team that's uh that's that's you know a high quality management team if they if they you know are responsive if they're following up if they're not trying to pull in business uh quickly if they're priced appropriately uh metrics like that would certainly be um key aspects that would be readily available to uh to the you know to the the buyers of technology beyond that um you know i think the viability of that market is going to be uh a key aspect as to whether or not that company is going to be around even if it's a good company if uh if it's a highly competitive uh market that's going to have some big big players that can kind of integrate it and to make it a feature across other other product lines then that's going to make it a a tough a tough road to to go for a start-up these days you know the other thing i wanted to to talk about was the risks and the rewards of working with with startup companies and i've had i've had cios and and enterprise architects tell me that they'll when when they have to do an rfp they'll pull out the gartner magic quadrant they'll always you know pick a couple in the top right just to cover their butts but they many say you know what we also pick some of those those in the challenger space because because that are that are really interesting to us and and we run them through the paces and we manage those risks we don't we don't run the company on them but it helps us find these diamonds in the rough i mean think about you know in the in this in the second part of last decade if you picked a snowflake you might have been able to get ahead of some of your competition things like data sharing or or maybe you found that that well you know what octa is going to help me with my identity in in a new way and you're going to be better prepared to be a digital business but do you have any thoughts on how uh people should manage those risks and and how they should think about the upside i don't i don't think today um a a you know a company can work today using legacy technologies i i think the risk the greater risk is falling behind from a a digital transformation perspective this this era i think the pandemic is probably the best proof point of this um you can't you can't go with just a uh a traditional legacy architecture in a in in a key aspect of your business and so the startups um i i think you've got to take the quote-unquote risk of working with a startup that's uh you know that's got a viability concern or sustainability concern uh the risk of of having a um uh an i.t infrastructure that's inadequate is uh is a far greater risk from my perspective so i think that the startups right now are are are in a very strong position and they're well funded that's the last question i wanted to talk about is how will startups kind of penetrate the enterprise in this modern era i mean you know this is really a software world and software is this sort of capital efficient business but yet you're seeing companies raise hundreds of millions of dollars i mean that's not even absurd these days you see companies go to ipo that have raised over a billion dollars and much of that if not most of it goes to promotion and go to market uh so so how maybe you could give us your perspectives on how you see startups getting into the enterprise in these sectors so i one of the really interesting things that we've seen in the last couple years is a lot of changes to sales models and and if you look at the mid market the ability to leverage viral sales models uh has been wildly successful for some companies um it's been um you know a great strategy uh there's a public company ubiquity that did a uh has built a multi-billion dollar uh you know business on on without without a sales organization so there's some pretty interesting um directions that i think sales and go to market is going to uh incur over the over the coming years uh traditional enterprise sales i think are still uh pretty standard today but i i think that the efficiency of um of you know social networking and and uh and and what would the the delivery of uh of products on on a digital for in a digital format is going to change the way that we do sales so i think i think there's a lot of efficiencies that are going to come in uh in sales over the coming years that's interesting because then you'll you know i i think you're right and and and instead of just just pouring money at promotion maybe get more efficient there and pour money in into engineering because that really is the long-term sustainable value that these companies are going to create right yeah i i would absolutely agree with that and um again if you look at the you know if you look at the charts of the well-established players that that you had mentioned those companies are where they are that the ones at the top are where they are because of their technology i mean it's it's not because of uh their go to market it's it's it's because they have something that other people can't uh can't replicate right well eric hey it's been great having you on today thanks so much for joining us really appreciate your time well dave i greatly appreciate it uh it's been a lot of fun so uh so thank you all right hey go get the elite 80 report all you got to do is search jmp elite 80 and it'll it'll come up there's a there's a lot of data out there so it's really a worthwhile reference tool and uh so thank you everybody for watching remember these episodes are all available as podcasts wherever you listen you can check out etr's website at etr dot plus and we also publish weekly a full report on wikibon.com and siliconangle.com you can email me david.velante at siliconangle.com or dm me on twitter at divalante hit up hit our linkedin post and really appreciate those comments this is dave vellante for the cube insights powered by etr have a great week everybody stay safe and we'll see you next time you
SUMMARY :
the the companies that uh you know that
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
2000 | DATE | 0.99+ |
five billion | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
3.7 billion | QUANTITY | 0.99+ |
dell | ORGANIZATION | 0.99+ |
microsoft | ORGANIZATION | 0.99+ |
100 million | QUANTITY | 0.99+ |
cisco | ORGANIZATION | 0.99+ |
79 billion | QUANTITY | 0.99+ |
28 billion | QUANTITY | 0.99+ |
34 billion dollars | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
san francisco | LOCATION | 0.99+ |
80 companies | QUANTITY | 0.99+ |
siliconangle.com | OTHER | 0.99+ |
10 investments | QUANTITY | 0.99+ |
80 companies | QUANTITY | 0.99+ |
first question | QUANTITY | 0.99+ |
more than a quarter billion | QUANTITY | 0.99+ |
over 200 million | QUANTITY | 0.99+ |
four billion dollars | QUANTITY | 0.99+ |
over 400 million | QUANTITY | 0.99+ |
over 100 million | QUANTITY | 0.99+ |
jmp securities | ORGANIZATION | 0.99+ |
hundreds of millions of dollars | QUANTITY | 0.99+ |
more than a half a billion dollars | QUANTITY | 0.99+ |
2011 | DATE | 0.99+ |
four and a half billion dollars | QUANTITY | 0.99+ |
more than three billion dollars | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
dave vellante | PERSON | 0.99+ |
over half a billion | QUANTITY | 0.99+ |
palo alto | ORGANIZATION | 0.99+ |
pandemic | EVENT | 0.99+ |
over 200 billion dollars | QUANTITY | 0.99+ |
ten companies | QUANTITY | 0.98+ |
over a billion dollars | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
zero | QUANTITY | 0.98+ |
ORGANIZATION | 0.98+ | |
fortinet | ORGANIZATION | 0.98+ |
100 million dollar | QUANTITY | 0.98+ |
seven billion dollar | QUANTITY | 0.98+ |
boston | LOCATION | 0.98+ |
etr | ORGANIZATION | 0.97+ |
jmp | ORGANIZATION | 0.97+ |
over 100 billion dollars | QUANTITY | 0.97+ |
two key aspects | QUANTITY | 0.97+ |
ORGANIZATION | 0.97+ | |
eric arista | PERSON | 0.97+ |
multi-billion dollar | QUANTITY | 0.97+ |
second | QUANTITY | 0.96+ |
20 | QUANTITY | 0.96+ |
first | QUANTITY | 0.96+ |
eric | PERSON | 0.96+ |
80 firms | QUANTITY | 0.96+ |
two other companies | QUANTITY | 0.96+ |
10 | QUANTITY | 0.96+ |
25 percent | QUANTITY | 0.96+ |
last decade | DATE | 0.95+ |
3.3 billion | QUANTITY | 0.95+ |
750 billion a million dollar | QUANTITY | 0.95+ |
200 million | QUANTITY | 0.95+ |
one | QUANTITY | 0.95+ |
this year | DATE | 0.95+ |
10 billion dollars a year | QUANTITY | 0.95+ |
about seven years ago | DATE | 0.94+ |
last january | DATE | 0.94+ |
Breaking Analysis: Chaos Creates Cash for Criminals & Cyber Companies
from the cube studios in palo alto in boston bringing you data-driven insights from the cube and etr this is breaking analysis with dave vellante the pandemic not only accelerated the shift to digital but also highlighted a rush of cyber criminal sophistication collaboration and chaotic responses by virtually every major company in the planet the solar winds hack exposed supply chain weaknesses and so-called island hopping techniques that are exceedingly difficult to detect moreover the will and aggressiveness of well-organized cyber criminals has elevated to the point where incident responses are now met with counterattacks designed to both punish and extract money from victims via ransomware and other criminal activities the only upshot is the cyber security market remains one of the most enduring and attractive investment sectors for those that can figure out where the market is headed and which firms are best positioned to capitalize hello everyone and welcome to this week's wikibon cube insights powered by etr in this breaking analysis we'll provide our quarterly update of the security industry and share new survey data from etr and thecube community that will help you navigate through the maze of corporate cyber warfare we'll also share our thoughts on the game of 3d chest that octa ceo todd mckinnon is playing against the market now we all know this market is complicated fragmented and fast moving and this next chart says it all it's an interactive graphic from optiv a denver colorado based si that's focused on cyber security they've done some really excellent research and put together this awesome taxonomy and mapped vendor names therein and this helps users navigate the complex security landscape and there are over a dozen major sectors high-level sectors within the security taxonomy in nearly 60 sub-sectors from monitoring vulnerability assessment identity asset management firewalls automation cloud data center sim threat detection and intelligent endpoint network and so on and so on and so on but this is a terrific resource and can help you understand where players fit and help you connect the dots in the space now let's talk about what's going on in the market the dynamics in this crazy mess of a landscape are really confusing sometimes now since the beginning of cyber time we've talked about the increasing sophistication of the adversary and the back and forth escalation between good and evil and unfortunately this trend is unlikely to stop here's some data from carbon black's annual modern bank heist report this is the fourth and of course now vmware's brand highlights the carbon black study since the acquisition and it catalyzed the creation of vmware's cloud security division destructive malware attacks according to the recent study are up 118 percent from last year now one major takeaway from the report is that hackers aren't just conducting wire fraud they are 57 of the bank surveyed saw an increase in wire fraud but the cyber criminals are also targeting non-public information such as future trading strategies this allows the bad guys to front run large block trades and profit it's become very lucrative practice now the prevalence of so-called island hopping is up 38 from already elevated levels this is where a virus enters a company's supply chain via a partner and then often connects with other stealthy malware downstream these techniques are more common where the malware will actually self-form with other infected parts of the supply chain and create actions with different signatures designed to identify and exfiltrate valuable information it's a really complex problem of major concern is that 63 of banking respondents in the study reported that responses to incidents were then met with retaliation designed to intimidate or initiate ransomware attacks to extract a final pound of flesh from the victim notably the study found that 75 percent of csos reported to the cio which many feel is not the right regime the study called for a rethinking of the right cyber regime where the cso has increased responsibility in a direct reporting line to the ceo or perhaps the co with greater exposure to boards of directors so many thanks to vmware and tom kellerman specifically for sharing this information with us this past week great work by your team now some of the themes that we've been talking about for several quarters are shown in the lower half of the chart cloud of course is the big driver thanks to work from home and the pandemic to pandemic and the interesting corollary of course is we see a rapid rethinking of endpoint and identity access management and the concept of zero trust in a recent esg survey two-thirds of respondents said that their use of cloud computing necessitated a change in how they approach identity access management now as shown in the chart from optiv the market remains highly fragmented and m a is of course way up now based on our research it looks like transaction volume has increased more than 40 percent just in the last five months so let's dig into the m a the merger and acquisition trends for just a moment we took a five month snapshot and we were able to count about 80 deals that were completed in that time frame those transactions represented more than 20 billion dollars in value some of the larger ones are highlighted here the biggest of course being the toma bravo taking proof point private for a 12 plus billion dollar price tag the stock went from the low 130s and is trading in the low 170s based on 176 dollar per share offer so there's your arbitrage folks go for it perhaps the more interesting acquisition was auth 0 by octa for 6.5 billion which we're going to talk about more in a moment there's more private equity action we saw as insight bought armis and iot security play and cisco shelled out 730 million dollars for imi mobile which is more of an adjacency to cyber but it's going to go under cisco's security and applications business run by g2 patel but these are just the tip of the iceberg some of the themes that we see connecting the dots of these acquisitions are first sis like accenture atos and wipro are making moves in cyber to go local they're buying secops expertise as i say locally in places like france germany netherlands canada and australia that last mile that belly-to-belly intimate service israel israeli-based startups chalked up five acquired companies in the space over the last five months also financial services firms are getting into the act with goldman and mastercard making moves to own its own part of the stack themselves to combat things like fraud and identity theft and then finally numerous moves to expand markets octa with zero crowdstrike buying a log management company palo alto picking up devops expertise rapid seven shoring up its kubernetes chops tenable expanding beyond insights and going after identity interesting fortinet filling gaps in a multi-cloud offering sale point extending to governance risk and compliance grc zscaler picked up an israeli firm to fill gaps in access control and then vmware buying mesh 7 to secure modern app development and distribution services so tons and tons of activity here okay so let's look at some of the etr data to put the cyber market in context etr uses the concept of market share it's one of the key metrics which is a measure of pervasiveness in the data set so for each sector it calculates the number of respondents for that sector divided by the total to get a sense for how prominent the sector is within the cio and i.t buyer communities okay this chart shows the full etr sector taxonomy with security highlighted across three survey periods april last year january this year in april this year now you wouldn't expect big moves in market share over time so it's relatively stable by sector but the big takeaway comes from observing which sectors are most prominent so you see that red line that dotted line imposed at the sixty percent level you can see there are only six sectors above that line and cyber security is one of them okay so we know that security is important in a large market but this puts it in the context of the other sectors however we know from previous breaking analysis episodes that despite the importance of cyber and the urgency catalyzed by the pandemic budgets unfortunately are not unlimited and spending is bounded it's not an open checkbook for csos as shown in this chart this is a two-dimensional graphic showing market share in the horizontal axis or pervasiveness and net score in the vertical axis net score is etr's measurement of spending velocity and we've superimposed a red line at 40 percent because anything over 40 percent we consider extremely elevated we've filtered and limited the number of sectors to simplify the graphic and you can see in the sectors that we've highlighted only the big four four are above that forty percent line ai containers rpa and cloud they exceed that sort of forty percent magic water line information security you can see that is highlighted and it's respectable but it competes for budget with other important sectors so this of course creates challenges for organization because not only are they strapped for talent as we've reported they like everyone else in it face ongoing budget pressures research firm cybersecurity ventures estimates that in 2021 6 trillion dollars worldwide will be lost on cyber crime conversely research firm canalis pegs security spending somewhere around 60 billion dollars annually idc has it higher around 100 billion so either way we're talking about spending between one to one point six percent annually of how much the bad guys are taking out that's peanuts really when you consider the consequences so let's double click into the cyber landscape a bit and further look at some of the companies here's that same x y graphic with the company's etr captures from respondents in the cyber security sector that's what's shown on the chart here now the usefulness of the red lines is 20 percent on the horizontal indicates the largest presence in the survey and the magic 40 percent line that we talked about earlier shows those firms with the most elevated momentum only microsoft and palo alto exceed both high water marks of course splunk and cisco are prominent horizontally and there are numerous companies to the left of the 20 percent line and many above that 40 percent high water mark on the vertical axis now in the bottom left quadrant that includes many of the legacy names that have been around for a long time and there are dozens of companies that show spending momentum on their platforms i.e above single digits so that picture is like the first one we showed you very very crowded space but so let's filter it a bit and only include companies in the etr survey that had at least a hundred responses so an n of a hundred or greater so it's a little easy to read but still it's kind of crowded when you think about it okay so same graphic and we've superimposed the data that determined the plot position over in the bottom right there so it's net score and shared n including only companies with more than 100 n so what does this data tell us about the market well microsoft is dominant as always it seems in all dimensions but let's focus on that red line for a moment some of the names that we've highlighted over the past two years show very well here first i want to talk about palo alto networks pre-covet as you might recall we highlighted the valuation divergence between palo alto and fortinet and we said fortinet was executing better on its cloud strategy and palo alto was at the time struggling with the transition especially with its go to market and its sales force compensation and really refreshing its portfolio but we told you that we were bullish on palo alto networks at the time because of its track record and the fact that cios consistently told us that they saw palo alto as a thought leader in the space that they wanted to work with they said that palo alto was the gold standard the best especially larger company cisos so that gave us confidence that palo alto a very well-run company was going to get its act together and perform better and palo alto has just done just that as we expected they've done very well and they've been rapidly moving customers to the next generation of platforms and we're very impressed by the company's execution and the stock has generally reflected that now some other names that hit our radar and the etr data a couple of years ago continue to perform well crowdstrike z-scaler sales sail point and cloudflare a cloudflare just reported and beat earnings but was off the stock fell on headwinds for tech overall the big rotation but the company is doing very well and they're growing rapidly and they have momentum as you can see from the etr data and we put that double star around proof point to highlight that it was worthy of fetching 12 and a half billion dollars from private equity firm so nice exit there supporting the continued control consolidation trend that we've predicted in cyber security now let's turn our attention to octa and auth zero this is where it gets interesting and is a clever play for octa we think and we want to drill into it a bit octa is acquiring auth zero for big money why well we think todd mckinnon octa ceo wants to run the table on identity and then continue to expand his tam he has to do that to justify his lofty valuation so octa's ascendancy around identity and single sign sign-on is notable the fragmented pictures that we've shown you they scream out for simplification and trust and that's what octa brings but it competes with some major players most notably microsoft with active directory so look of course microsoft is going to dominate in its massive customer base but the rest of the market that's like jump ball it's wide open and we think mckinnon saw the opportunity to go dominate that sector now octa comes at this from an enterprise perspective bringing top-down trust to the equation and throwing a big blanket over all the discrete sas platforms and unifying employee access octa's timing was perfect it was founded in 2009 just as the massive sasification trend was happening around crm and hr and service management and cloud etc but the one thing that octa didn't have that auth 0 does is serious developer chops while octa was crushing it with its enterprise sales strategy auth 0 was laser focused on developers and building a bottoms up approach to identity by acquiring auth0 octa can dominate both sides of the barbell and then capture the fat middle so yes it's a pricey acquisition but in our view it's a great move by mckinnon now i don't know mckinnon personally but last week i spoke to arun shrestha who's the ceo of security specialist beyond id they're a platinum services partner of octa and there a zero trust expert he worked for octa for a number of years and shared with me a bit about mckinnon's style and think big approach arun said something that caught my attention he said firewalls used to be the perimeter now people are and while that's self-serving to octa and probably beyond id it's true people apps and data are the new perimeter and they're not in one location and that's the point now unfortunately i had lined up an interview with dia jolly who was the chief product officer at octa in a cube alum for this past week knowing that we were running this segment in this episode but she unfortunately fell ill the day of our interview and had to cancel but i want to follow up with her and understand how she's thinking about connecting the dots with auth 0 with devs and enterprises and really test our thesis there this is a really interesting chess match that's going on let's look a little deeper into that identity space this chart here shows some of the major identity players it has some of the leaders in the identity market and there's a breakdown of etr's net score now net score comprises five elements the lime green is we're adding the platform new the forest green is we're spending six percent or more relative to last year the gray is flat send plus or minus flat spend plus or minus five percent the pinkish is spending less and the bright red is where exiting the platform retiring now you subtract the red from the green and that gets you the result for net score which you can see superimposed on the right hand chart at the bottom that first column there the far column is shared in which informs and indicates the number of responses and is a proxy for presence in the market oh look at the top two players in terms of spending momentum now sales sale point is right there but auth 0 combined with octa's distribution channel will extend octa's lead significantly in our view and then there's microsoft now just a caveat this includes all of microsoft's security offerings not just identity but it's there for context and cyber arc as well includes its acquisition of adaptive but also other parts of cyberarks portfolio so you can see some of the other names that are there many of which you'll find in the gartner magic quadrant for identity and as we said we really like this move by octa it combines positive market forces with lead offerings from very well-run companies that have winning dna and passionate people now to further emphasize emphasize what what's happening here take a look at this this chart shows etr data for octa within sale point and cyber arc accounts out of the 230 cyber and sale point customers in the data set there are 81 octa accounts that's a 35 overlap and the good news for octa is that within that base of sale point in cyber arc accounts octa is shown by the net score line that green line has a very elevated spending and momentum and the kicker is if you read the fine print in the right hand column etr correctly points out that while sailpoint and cyberarc have long been partners with octa at the recent octane 21 event octa's big customer event the company announced that it was expanding into privileged access management pam and identity governance hello and welcome to coopetition in the 2020s now our current thinking is that this bodes very well for octa and cyberark and sailpoint well they're going to have to make some counter moves to fend off the onslaught that is coming now let's wrap up with what has become a tradition in our quarterly security updates looking at those two dimensions of net score and market share we're going to see which companies crack the top 10 for both measures within the etr data set we do this every quarter so here on the left we have the top 20 sorted by net score or spending momentum and on the right we sort by shared n so again top 20 which informs shared end and forms the market share metric or presence in the data set that red horizontal lines those two lines on each separate the top 10 from the remaining 10 within those top 20. in our method what we do is we assign four stars to those companies that crack the top ten for both metrics so again you see microsoft palo alto networks octa crowdstrike and fortinet fortinet by the way didn't make it last quarter they've kind of been in and out and on the bubble but you know this company is very strong and doing quite well only the other four did last quarter there was same four last quarter and we give two stars to those companies that make it in both categories within the top 20 but didn't make the top 10. so cisco splunk which has been steadily decelerating from a spending momentum standpoint and z-scaler which is just on the cusp you know we really like z-scaler and the company has great momentum but that's the methodology it is what it is now you can see we kept carbon black on the rightmost chart it's like kind of cut off it's number 21 only because they're just outside looking in on netscore you see them there they're just below on on netscore number 11. and vmware's presence in the market we think that carbon black is really worth paying attention to okay so we're going to close with some summary and final thoughts last quarter we did a deeper dive on the solar winds hack and we think the ramifications are significant it has set the stage for a new era of escalation and adversary sophistication now major change we see is a heightened awareness that when you find intruders you'd better think very carefully about your next moves when someone breaks into your house if the dog barks or if you come down with a baseball bat or other weapon you might think the intruder is going to flee but if the criminal badly wants what you have in your house and it's valuable enough you might find yourself in a bloody knife fight or worse what's happening is intruders come to your company via island hopping or inside or subterfuge or whatever method and they'll live off the land stealthily using your own tools against you so they can you can't find them so easily so instead of injecting new tools in that send off an alert they just use what you already have there that's what's called living off the land they'll steal sensitive data for example positive covid test results when that was really really sensitive obviously still is or other medical data and when you retaliate they will double extort you they'll encrypt your data and hold it for ransom and at the same time threaten to release the sensitive information to crushing your brand in the process so your response must be as stealthy as their intrusion as you marshal your resources and devise an attack plan you face serious headwinds not only is this a complicated situation there's your ongoing and acute talent shortage that you tell us about all the time many companies are mired in technical debt that's an additional challenge and then you've got to balance the running of the business while actually affecting a digital transformation that's very very difficult and it's risky because the more digital you become the more exposed you are so this idea of zero trust people used to call it a buzzword it's now a mandate along with automation because you just can't throw labor at the problem this is all good news for investors as cyber remains a market that's ripe for valuation increases and m a activity especially if you know where to look hopefully we've helped you squint through the maze a little bit okay that's it for now thanks to the community for your comments and insights remember i publish each week on wikibon.com and siliconangle.com these episodes they're all available as podcasts all you do is search breaking analysis podcast put in the headphones listen when you're in your car out for your walk or run and you can always connect on twitter at divalante or email me at david.valante at siliconangle.com i appreciate the comments on linkedin and in clubhouse please follow me so you're notified when we start a room and riff on these topics and others and don't forget to check out etr.plus for all the survey data this is dave vellante for the cube insights powered by etr be well and we'll see you next time [Music] you
SUMMARY :
and on the bubble but you know this
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
2009 | DATE | 0.99+ |
20 percent | QUANTITY | 0.99+ |
six percent | QUANTITY | 0.99+ |
microsoft | ORGANIZATION | 0.99+ |
57 | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
40 percent | QUANTITY | 0.99+ |
palo alto | ORGANIZATION | 0.99+ |
five elements | QUANTITY | 0.99+ |
81 | QUANTITY | 0.99+ |
fortinet | ORGANIZATION | 0.99+ |
tom kellerman | PERSON | 0.99+ |
palo alto | ORGANIZATION | 0.99+ |
75 percent | QUANTITY | 0.99+ |
6.5 billion | QUANTITY | 0.99+ |
australia | LOCATION | 0.99+ |
cisco | ORGANIZATION | 0.99+ |
730 million dollars | QUANTITY | 0.99+ |
sixty percent | QUANTITY | 0.99+ |
dia jolly | PERSON | 0.99+ |
france | LOCATION | 0.99+ |
more than 20 billion dollars | QUANTITY | 0.99+ |
12 and a half billion dollars | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
april last year | DATE | 0.99+ |
april this year | DATE | 0.99+ |
6 trillion dollars | QUANTITY | 0.99+ |
octa | ORGANIZATION | 0.99+ |
two stars | QUANTITY | 0.99+ |
boston | LOCATION | 0.99+ |
g2 patel | ORGANIZATION | 0.99+ |
2020s | DATE | 0.99+ |
siliconangle.com | OTHER | 0.99+ |
forty percent | QUANTITY | 0.99+ |
more than 40 percent | QUANTITY | 0.99+ |
five month | QUANTITY | 0.99+ |
vmware | ORGANIZATION | 0.99+ |
first column | QUANTITY | 0.99+ |
arun shrestha | PERSON | 0.99+ |
last week | DATE | 0.99+ |
dozens of companies | QUANTITY | 0.98+ |
both categories | QUANTITY | 0.98+ |
both measures | QUANTITY | 0.98+ |
both metrics | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
pandemic | EVENT | 0.98+ |
each week | QUANTITY | 0.98+ |
two dimensions | QUANTITY | 0.98+ |
last quarter | DATE | 0.98+ |
five acquired companies | QUANTITY | 0.98+ |
12 plus billion dollar | QUANTITY | 0.98+ |
six sectors | QUANTITY | 0.98+ |
canada | LOCATION | 0.98+ |
wipro | ORGANIZATION | 0.97+ |
january this year | DATE | 0.97+ |
last quarter | DATE | 0.97+ |
10 | QUANTITY | 0.97+ |
first one | QUANTITY | 0.97+ |
netherlands | LOCATION | 0.96+ |
accenture atos | ORGANIZATION | 0.96+ |
more than 100 n | QUANTITY | 0.96+ |
dave vellante | PERSON | 0.96+ |
each sector | QUANTITY | 0.96+ |
arun | PERSON | 0.96+ |
two lines | QUANTITY | 0.96+ |
fourth | QUANTITY | 0.96+ |
imi mobile | ORGANIZATION | 0.95+ |
Breaking Analysis: Chaos Creates Cash for Criminals & Cyber Companies
>> From The Cube Studios in Palo Alto in Boston, bringing you data-driven insights from The Cube in ETR. This is "Breaking Analysis" with Dave Vellante >> The pandemic not only accelerated the shift to digital but it also highlighted a rush of cyber criminal sophistication, collaboration, and chaotic responses by virtually every major company in the planet. The SolarWinds hack exposed supply chain weaknesses and so-called island hopping techniques that are exceedingly difficult to detect. Moreover, the will and aggressiveness of well-organized cybercriminals has elevated to the point where incident responses are now met with counter attacks, designed to both punish and extract money from victims via ransomware and other criminal activities. The only upshot is the cybersecurity market remains one of the most enduring and attractive investment sectors for those that can figure out where the market is headed and which firms are best positioned to capitalize. Hello, everyone. And welcome to this week's Wikibon Cube Insights powered by ETR. In this "Breaking Analysis" we'll provide our quarterly update of the security industry, and share new survey data from ETR and the Cube community that will help you navigate through the maze of corporate cyber warfare. We'll also share our thoughts on the game of 3D chess that Okta CEO, Todd McKinnon, is playing against the market. Now, we all know this market is complicated, fragmented and fast moving. And this next chart says it all. It's an interactive graphic from Optiv, a Denver, Colorado-based SI that's focused on cybersecurity. They've done some really excellent research and put together this awesome taxonomy, and it mapped vendor names therein. And this helps users navigate the complex security landscape. And there are over a dozen major sectors, high-level sectors within the security taxonomy and nearly 60 subsectors. From monitoring, vulnerability assessment, identity, asset management, firewalls, automation, cloud, data center, sim, threat detection and intelligent endpoint network, and so on and so on and so on. But this is a terrific resource, and going to help you understand where players fit and help you connect the dots in the space. Now let's talk about what's going on in the market. The dynamics in this crazy mess of a landscape are really confusing sometimes. Now, since the beginning of cyber time, we've talked about the increasing sophistication of the adversary, and the back and forth escalation between good and evil. And unfortunately, this trend is unlikely to stop. Here's some data from Carbon Black's annual modern bank heist report. This is the fourth, and of course now, VMware's brand, highlights the Carbon Black study since the acquisition, and to catalyze the creation of VMware's cloud security division. Destructive malware attacks, according to the recent study are up 118% from last year. Now, one major takeaway from the report is that hackers aren't just conducting wire fraud, they are. 57% of the banks surveyed, saw an increase in wire fraud, but the cybercriminals are also targeting non-public information such as future trading strategies. This allows the bad guys to front-run large block trades and profit. It's become a very lucrative practice. Now the prevalence of so-called island hopping is up 38% from already elevated levels. This is where a virus enters a company supply chain via a partner, and then often connects with other stealthy malware downstream. These techniques are more common where the malware will actually self-form with other infected parts of the supply chain and create actions with different signatures, designed to identify and exfiltrate valuable information. It's a really complex problem. Of major concern is that 63% of banking respondents in the study reported that responses to incidents were then met with retaliation designed to intimidate, or initiate ransomware tax to extract a final pound of flesh from the victim. Notably, the study found that 75% of CISOs reported to the CIO, which many feel is not the right regime. The study called for a rethinking of the right cyber regime where the CISO has increased responsibility and a direct reporting line to the CEO, or perhaps the COO, with greater exposure to boards of directors. So, many thanks to VMware and Tom Kellerman specifically for sharing this information with us this past week. Great work by your team. Now, some of the themes that we've been talking about for several quarters are shown in the lower half of the chart. Cloud, of course is the big driver thanks to work-from-home and to the pandemic. And the interesting corollary of course, is we see a rapid rethinking of end point and identity access management, and the concept of zero trust. In a recent ESG survey, two thirds of respondents said that their use of cloud computing necessitated a change in how they approach identity access management. Now, as shown in the chart from Optiv, the market remains highly fragmented, and M&A is of course, way up. Now, based on our research, it looks like transaction volume has increased more than 40% just in the last five months. So let's dig into the M&A, the merger and acquisition trends for just a moment. We took a five-month snapshot and we were able to count about 80 deals that were completed in that timeframe. Those transactions represented more than $20 billion in value. Some of the larger ones are highlighted here. The biggest of course, being the Thoma Bravo, taking Proofpoint private for a $12 plus billion price tag. The stock went from the low 130s and is trading in the low 170s based on the $176 per share offer. So there's your arbitrage, folks. Go for it. Perhaps the more interesting acquisition was Auth0 by Optiv for 6.5 billion, which we're going to talk about more in a moment. There was more private equity action we saw as Insight bought Armis, an IOT security play, and Cisco shelled out $730 million for IMImobile, which is more of an adjacency to cyber, but it's going to go under Cisco security and applications business run by Jeetu Patel. But these are just the tip of the iceberg. Some of the themes that we see connecting the dots of these acquisitions are first, SIs like Accenture, Atos and Wipro are making moves in cyber to go local. They're buying SecOps expertise, as I say, locally in places like France, Germany, Netherlands, Canada, and Australia, that last mile, that belly to belly intimate service. Israeli-based startups chocked up five acquired companies in the space over the last five months. Also financial services firms are getting into the act with Goldman and MasterCard making moves to own its own part of the stack themselves to combat things like fraud and identity theft. And then finally, numerous moves to expand markets. Okta with Auth0, CrowdStrike buying a log management company, Palo Alto, picking up dev ops expertise, Rapid7 shoring up it's Coobernetti's chops, Tenable expanding beyond Insights and going after identity, interesting. Fortinet filling gaps in a multi-cloud offering. SailPoint extending to governance risk and compliance, GRC. Zscaler picked up an Israeli firm to fill gaps in access control. And then VMware buying Mesh7 to secure modern app development and distribution service. So tons and tons of activity here. Okay, so let's look at some of the ETR data to put the cyber market in context. ETR uses the concept of market share, it's one of the key metrics which is a measure of pervasiveness in the dataset. So for each sector, it calculates the number of respondents for that sector divided by the total to get a sense for how prominent the sector is within the CIO and IT buyer communities. Okay, this chart shows the full ETR sector taxonomy with security highlighted across three survey periods; April last year, January this year, and April this year. Now you wouldn't expect big moves in market share over time. So it's relatively stable by sector, but the big takeaway comes from observing which sectors are most prominent. So you see that red line, that dotted line imposed at the 60% level? You can see there are only six sectors above that line and cyber security is one of them. Okay, so we know that security is important in a large market. But this puts it in the context of the other sectors. However, we know from previous breaking analysis episodes that despite the importance of cyber, and the urgency catalyzed by the pandemic, budgets unfortunately are not unlimited, and spending is bounded. It's not an open checkbook for CSOs as shown in this chart. This is a two-dimensional graphic showing market share in the horizontal axis, or pervasiveness in net score in the vertical axis. Net score is ETR's measurement of spending velocity. And we've superimposed a red line at 40% because anything over 40%, we consider extremely elevated. We've filtered and limited the number of sectors to simplify the graphic. And you can see, in the sectors that we've highlighted, only the big four are above that 40% line; AI, containers, RPA, and cloud. They exceed that sort of 40% magic waterline. Information security, you can see that as highlighted and it's respectable, but it competes for budget with other important sectors. So this is of course creates challenges for organization, because not only are they strapped for talent as we've reported, they like everyone else in IT face ongoing budget pressures. Research firm, Cybersecurity Ventures estimates that in 2021, $6 trillion worldwide will be lost on cyber crime. Conversely, research firm, Cannolis peg security spending somewhere around $60 billion annually. IDC has at higher, around $100 billion. So either way, we're talking about spending between 1 to 1.6% annually of how much the bad guys are taking out. That's peanuts really when you consider the consequences. So let's double-click into the cyber landscape a bit and further look at some of the companies. Here's that same X/Y graphic with the companies ETR captures from respondents in the cybersecurity sector. That's what's shown on the chart here. Now, the usefulness of the red lines is 20% on the horizontal indicates the largest presence in the survey, and the magic 40% line that we talked about earlier shows those firms with the most elevated momentum. Only Microsoft and Palo Alto exceed both high watermarks. Of course, Splunk and Cisco are prominent horizontally. And there are numerous companies to the left of the 20% line and many above that 40% high watermark on the vertical axis. Now in the bottom left quadrant, that includes many of the legacy names that have been around for a long time. And there are dozens of companies that show spending momentum on their platforms, i.e above single digits. So that picture is like the first one we showed you, very, very crowded space. But so let's filter it a bit and only include companies in the ETR survey that had at least 100 responses. So an N of 100 or greater. So it was a little easier to read but still it's kind of crowded when you think about it. Okay, so same graphic, and we've superimposed the data that determined the plot position over in the bottom right there. So there's net score and shared in, including only companies with more than 100 N. So what does this data tell us about the market? Well, Microsoft is dominant as always, it seems in all dimensions but let's focus on that red line for a moment. Some of the names that we've highlighted over the past two years show very well here. First, I want to talk about Palo Alto Networks. Pre-COVID as you might recall, we highlighted the valuation divergence between Palo Alto and Fortinet. And we said Fortinet was executing better on its cloud strategy, and Palo Alto was at the time struggling with the transition especially with its go-to-market and its Salesforce compensation, and really refreshing its portfolio. But we told you that we were bullish on Palo Alto Networks at the time because of its track record, and the fact that CIOs consistently told us that they saw Palo Alto as a thought leader in the space that they wanted to work with. They said that Palo Alto was the gold standard, the best, especially larger company CISOs. So that gave us confidence that Palo Alto, a very well-run company was going to get its act together and perform better. And Palo Alto has just done just that. As we expected, they've done very well and rapidly moving customers to the next generation of platforms. And we're very impressed by the company's execution. And the stock has generally reflected that. Now, some other names that hit our radar in the ETR data a couple of years ago, continue to perform well. CrowdStrike, Zscaler, SailPoint, and CloudFlare. Now, CloudFlare just reported and beat earnings but was off, the stock fell on headwinds for tech overall, the big rotation. But the company is doing very well and they're growing rapidly and they have momentum as you can see from the ETR data. Now, we put that double star around Proofpoint to highlight that it was worthy of fetching $12.5 billion from private equity firm. So nice exit there, supporting the continued consolidation trend that we've predicted in cybersecurity. Now let's turn our attention to Okta and Auth0. This is where it gets interesting, and is a clever play for Okta we think, and we want to drill into it a bit. Okta is acquiring Auth0 for big money. Why? Well, we think Todd McKinnon, Okta CEO, wants to run the table on identity and then continue to expand as TAM has to do that, to justify his lofty valuation. So Okta's ascendancy around identity and single sign-on is notable. The fragmented pictures that we've shown you, they scream out for simplification and trust, and that's what Okta brings. But it competes with some major players, most notably Microsoft with active directory. So look, of course, Microsoft is going to dominate in its massive customer base, but the rest of the market, that's like (indistinct) wide open. And we think McKinnon saw the opportunity to go dominate that sector. Now Okta comes at this from an enterprise perspective bringing top-down trust to the equation, and throwing a big blanket over all the discreet SaaS platforms and unifying employee access. Okta's timing was perfect. It was founded in 2009, just as the massive SaaSifiation trend was happening around CRM and HR, and service management and cloud, et cetera. But the one thing that Okta didn't have that Auth0 does is serious developer chops. While Okta was crushing it with its enterprise sales strategy, Auth0 was laser-focused on developers and building a bottoms up approach to identity. By acquiring Auth0, Okta can dominate both sides of the barbell and then capture the fat middle. So yes, it's a pricey acquisition, but in our view, it's a great move by McKinnon. Now, I don't know McKinnon personally, but last week I spoke to Arun Shrestha, who's the CEO of security specialist, BeyondID, they're a platinum services partner of Okta. And they're a zero trust expert. He worked for Okta for a number of years and shared with me a bit about McKinnon's style, and think big approach. Arun said something that caught my attention. He said, firewalls used to be the perimeter, now people are. And while that's self-serving to Okta and probably BeyondID, it's true. People, apps and data are the new perimeter, and they're not in one location. And that's the point. Now, unfortunately, I had lined up an interview with Diya Jolly, who was the chief product officer at Okta and a Cube alum for this past week, knowing that we were running this segment in this episode but she unfortunately fell ill the day of our interview and had to cancel. But I want to follow up with her, and understand how she's thinking about connecting the dots with Auth0 with devs and enterprises and really test our thesis there. This is a really interesting chess match that's going on. Let's look a little deeper into that identity space. This chart here shows some of the major identity players. It has some of the leaders in the identity market, and is a breakdown at ETR's net score. Now net score comprises five elements. The lime green is, we're adding the platform new. The forest green is we're spending 6% or more relative to last year. The gray is flat send plus or minus flat spend, plus or minus 5%. The pinkish is spending less. And the bright red is we're exiting the platform, retiring. Now you subtract the red from the green, and that gets you the result for net score which you can see super-imposed on the right hand chart at the bottom, that first column there. The far column is shared in which informs and indicates the number of responses and is a proxy for presence in the market. Oh, look at the top two players in terms of spending momentum. Now SailPoint is right there, but Auth0 combined with Okta's distribution channel will extend Okta's lead significantly in our view. And then there's Microsoft. Now just a caveat, this includes all of Microsoft's security offerings, not just identity, but it's there for context. And CyberArk as well includes this acquisition of adaptive, but also other parts of CyberArk's portfolio. So you can see some of the other names that are there, many of which you'll find in the Gartner magic quadrant for identity. And as we said, we really like this move by Okta. It combines positive market forces with lead offerings from very well-run companies that have winning DNA and passionate people. Now, to further emphasize what's happening here, take a look at this. This chart shows ETR data for Okta within SailPoint and CyberArk accounts. Out of the 230 CyberArk and SailPoint customers in the dataset, there are 81 Okta accounts. That's a 35% overlap. And the good news for Okta is that within that base of SailPoint and CyberArk accounts, Okta is shown by the net score line, that green line has a very elevated spending in momentum. And the kicker is, if you read the fine print in the right hand column, ETR correctly points out that while SailPoint and CyberArk have long been partners with Okta, at the recent Octane21 event, Okta's big customer event, The company announced that it was expanding into privileged access management, PAM, and identity governance. Hello, and welcome to co-opetition in the 2020s. Now, our current thinking is that this bodes very well for Okta and CyberArk and SailPoint. Well, they're going to have to make some counter moves to fend off the onslaught that is coming. Now, let's wrap up with what has become a tradition in our quarterly security updates. Looking at those two dimensions of net score and market share, we're going to see which companies crack the top 10 for both measures within the ETR dataset. We do this every quarter. So here in the left, we have the top 20, sorted by net score spending momentum and on the right, we sort by shared N. So it's again, top 20, which informs, shared N informs the market share metric or presence in the dataset. That red horizontal lines, those two lines on each separate the top 10 from the remaining 10 within those top 20. And our method, what we do is we assign four stars to those companies that crack the top 10 for both metrics. So again, you see Microsoft, Palo Alto Networks, Okta, CrowdStrike, and Fortinet. Fortinet by the way, didn't make it last quarter. They've kind of been in and out and on the bubble, but company is very strong, and doing quite well. Only the other four did last quarter. They were the same for last quarter. And we give two stars to those companies that make it in both categories within the top 20 but didn't make the top 10. So Cisco, Splunk, which has been steadily decelerating from a spending momentum standpoint, and Zscaler, which is just on the cusp. We really like Zscaler and the company has great momentum, but that's the methodology. That is what it is. Now you can see, we kept Carbon Black on the right most chart, it's like kind of cut off, it's number 21. Only because they're just outside looking in on net score. You see them there, they're just below on net score, number 11. And VMware's presence in the market we think, that Carbon Black is right really worth paying attention to. Okay, so we're going to close with some summary and final thoughts. Last quarter, we did a deeper dive on the SolarWinds hack, and we think the ramifications are significant. It has set the stage for a new era of escalation and adversary sophistication. Now, major change we see is a heightened awareness that when you find intruders, you'd better think very carefully about your next moves. When someone breaks into your house, if the dog barks, or if you come down with a baseball bat or other weapon, you might think the intruder is going to flee. But if the criminal badly wants what you have in your house and it's valuable enough, you might find yourself in a bloody knife fight or worse. Well, what's happening is intruders come to your company via island hopping or insider subterfuge or whatever method. And they'll live off the land stealthily using your own tools against you so that you can't find them so easily. So instead of injecting new tools in that send off an alert, they just use what you already have there. That's what's called living off the land. They'll steal sensitive data, for example, positive COVID test results when that was really, really sensitive, obviously still is, or other medical data. And when you retaliate, they will double-extort you. They'll encrypt your data and hold it for ransom, and at the same time threaten to release the sensitive information, crushing your brand in the process. So your response must be as stealthy as their intrusion, as you marshal your resources and devise an attack plan. And you face serious headwinds. Not only is this a complicated situation, there's your ongoing and acute talent shortage that you tell us about all the time. Many companies are mired in technical debt, that's an additional challenge. And then you've got to balance the running of the business while actually effecting a digital transformation. That's very, very difficult, and it's risky because the more digital you become, the more exposed you are. So this idea of zero trust, people used to call it a buzzword, it's now a mandate along with automation. Because you just can't throw labor at the problem. This is all good news for investors as cyber remains a market that's ripe for valuation increases and M&A activity, especially if you know where to look. Hopefully we've helped you squint through the maze a little bit. Okay, that's it for now. Thanks to the community for your comments and insights. Remember I publish each week on wikibon.com and siliconangle.com. These episodes, they're all available as podcasts. All you got to do is search breaking analysis podcasts, put in the headphones, listen when you're in your car, or out for your walk or run, and you can always connect on Twitter @DVellante, or email me at david.vellante@siliconangle.com. I appreciate the comments on LinkedIn and in Clubhouse, please follow me, so you're notified when we start a room and riff on these topics and others. And don't forget to check out etr.plus for all the survey data. This is Dave Vellante for The Cube Insights powered by ETR. Be well, and we'll see you next time. (light instrumental music)
SUMMARY :
This is "Breaking Analysis" and at the same time threaten to release
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Microsoft | ORGANIZATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Todd McKinnon | PERSON | 0.99+ |
2009 | DATE | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
April | DATE | 0.99+ |
Goldman | ORGANIZATION | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
Arun Shrestha | PERSON | 0.99+ |
IMImobile | ORGANIZATION | 0.99+ |
$12 | QUANTITY | 0.99+ |
Netherlands | LOCATION | 0.99+ |
Canada | LOCATION | 0.99+ |
6% | QUANTITY | 0.99+ |
SailPoint | ORGANIZATION | 0.99+ |
France | LOCATION | 0.99+ |
$730 million | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
Accenture | ORGANIZATION | 0.99+ |
$12.5 billion | QUANTITY | 0.99+ |
Atos | ORGANIZATION | 0.99+ |
Auth0 | ORGANIZATION | 0.99+ |
Palo Alto | ORGANIZATION | 0.99+ |
Carbon Black | ORGANIZATION | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
20% | QUANTITY | 0.99+ |
Germany | LOCATION | 0.99+ |
billion | QUANTITY | 0.99+ |
Diya Jolly | PERSON | 0.99+ |
60% | QUANTITY | 0.99+ |
Australia | LOCATION | 0.99+ |
63% | QUANTITY | 0.99+ |
35% | QUANTITY | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
more than $20 billion | QUANTITY | 0.99+ |
five-month | QUANTITY | 0.99+ |
five elements | QUANTITY | 0.99+ |
Tom Kellerman | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
40% | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
Jeetu Patel | PERSON | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
75% | QUANTITY | 0.99+ |
6.5 billion | QUANTITY | 0.99+ |
CyberArk | ORGANIZATION | 0.99+ |
$6 trillion | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
MasterCard | ORGANIZATION | 0.99+ |
Wipro | ORGANIZATION | 0.99+ |
two stars | QUANTITY | 0.99+ |
Last quarter | DATE | 0.99+ |
81 | QUANTITY | 0.99+ |
Cannolis | ORGANIZATION | 0.99+ |
Breaking Analysis: Spending Shifts in Cyber Security Predicted to be Permanent
>> From theCUBE studios in Palo Alto in Boston, bringing you data-driven insights from theCUBE at ETR. This is Breaking Analysis with Dave Vellante >> As we've reported extensively, the pandemic has affected cybersecurity markets perhaps more than any other. Remote work has caused CISOs, chief information security officers to shift spending priorities toward identity access management endpoint and cloud security. COVID has been a benefactor for next gen security companies that participate in these sectors. Notably, we believe tactical responses to the coronavirus have resulted in productivity improvements that will create permanent change in the way organizations defend themselves against cyber threats. Hello everyone and welcome to this week's Wikibon CUBE Insights powered by ETR. In this Breaking Analysis, we'll provide you with our quarterly update of the cybersecurity space and share fresh ETR data on the market. We also have some results from Eric Bradley's most recent Venn round table conducted with three senior chief information security officers. Let's start by looking at this notion of a single pane of glass. Now, despite the aspiration, there is no silver bullet to protect organizations from cyber attacks. The complexities of security, they're enormous and they require a layered defense approach. They range from securing internal networks to end points, to DMZ subnets, external traffic security, data in motion, data at rest, protecting from ransomware, dealing with web traffic, emails, phishing, not to mention threats from internal employees and contractors. As we mentioned at the open, there are three areas in particular that have seen significantly elevated spending momentum that is translated into the valuation increases for several companies, including CrowdStrike, Okta, Zscaler and several others. Zero trust security has gone from buzzword to reality. And spending shifts to these technologies have siphoned off demand from traditional hardware based firewalls. Although CISOs seem to be hedging their bets, at some point, they realized that people are actually going to come back to the office, so they have to remain agile. Lack of talent. Well, that remains one of the CISOs biggest challenges to securing applications and data. And automation while sometimes viewed as risky, is becoming increasingly important. Several companies have hit our radar this quarter and were highlighted in the CISO Panel, including Elastic which has seen momentum as an open source alternative to Splunk and notably multiple CIOs in the panel, they cited concerns related to Splunk's pricing and their sales tactics. They actually compared those of Splunk to those of EMC in the past, if anybody remembers how aggressive EMC salespeople could be. CloudFlare also broke into the top 10 in the ETR survey based on net score which is a measure of spending momentum. And that was for those companies with more than 50 mentions in the survey. CloudFlare is a CDN and provides security for websites. Also Netskope, a cloud security specialist cracked the top 10 in terms of net score and received high marks from the CISO panel, particularly with respect to it's vision and roadmap. Microsoft, Palo Alto Networks, Okta, CrowdStrike Cisco, CyberArk, SailPoint, Zscaler and Proofpoint remain focus vendors for us in the ETR survey as measured by spending momentum and their presence in the data set, what we call market share. And we'll talk more about those companies in a moment. Now finally, even CISOs that were skeptical about the permanence of the effects of COVID, they're seeing business benefits that suggest many of these shifts are circular, and not cyclical. Indeed, prior to the pandemic, ETR survey data showed that about 16% of organizations workers were primarily remote. CIOs expect that number to more than double post pandemic to 34%. Let's say you look at some of the cybersecurity vendors. We'll plot some, we don't have enough room to plot all of them, there are so many. But this chart shows one of our favorite XY views. On the Y axis, we measure net score. And that measures against spending velocity by looking at the net percentage of customers that are spending more versus those that are spending less within the ETR survey. The X axis measures market share or pervasiveness in the survey. Now we've included a select list of companies for this view and only include those with more than 50 responses, or 50 Ns, shared Ns, if you will, in the data set. In the upper right, you can see a table that shows the data sorted by both net score and shared Ns for each vendor. Now, as we indicated, Elastic has taken the top spot, just barely edging out Okta who took over from CrowdStrike in the last survey. And you can see the significant market presence of Palo Alto and Splunk and the most pervasive vendor here is Cisco. Note that Cisco also owns Umbrella and Duo which both have meaningful Ns in the survey. Now, if we were to combine these into one view, a single view of Cisco, all three of those, it would pull the company even further up into the right. Security is one of the bright spots in Cisco's portfolio and shows consistent year-on-year growth each quarter. Now having said that, some CISOs complained that Cisco's propensity to rely on acquisitions to fill gaps has caused them integration challenges in the past. Let's go back to Palo Alto for a moment. We'll make some comments later regarding their position relative to Fortinet, but we wanted to call them out here. Look, CISOs, they really liked Palo Alto. They trust the Palo Alto Networks. They consider Palo Alto as a trusted leader with a very strong portfolio and vision. Now let's turn our attention to the pack here, as we mentioned, Okta's momentum is notably elevated and it's meaningfully higher than the others. Its presence continues to increase up to the right, as does CrowdStrike's, or to the right, not necessarily up to the right, but to the right. But CrowdStrike has come off its net score high, so it's coming down actually in the vertical axis. And we're not super concerned about that because they're dramatically increasing their presence on the X axis each survey. But so is Okta, so that's something to watch. In other words, CrowdStrike's coming down in net score while it's increasing its presence, Okta is holding its net score while at the same time increasing its presence, which is really a strong sign. Now that they compete, they don't compete against each other directly, but it's they're still in the same sector. We've also included Carbon Black here because because of their VMware acquisition and VMware CEO, Pat Gelsinger, he's on a mission to fix security and the company has made a number of moves in cyber. VMware has a really good track record could of execution and while fixing Curity is highly aspirational. With its install base and history of success, we wanted to include them here because they're getting more attention of the CISOs in the ETR panel. So we're keeping an eye on VMware and Carbon Black. It's going to take some time, but we'll keep watching them. Now let's take a look at how the players have moved this year over the quarters. We're going to show you four tables here and we're going to compare the net scores and market share of the cyber companies for January, April, July, and October surveys. So pre-COVID and throughout the year. So let's look first at the pre-COVID positions. The left most chart is sorted by net score or spending momentum and the right most chart is the shared Ns, which is the number of mentions in the survey, which is what drives the horizontal axis that I showed you earlier. Now, when you go back to the January survey, you see CrowdStrike was already doing very well with an elevated net score of 68.3% and 123 mentions. By the way, please ignore those companies with less than 50 Ns, I didn't filter the data back then. I was kind of still learning how to use the ETR software platform. Okta was also elevated and you can see the others there as well. Now, last year, we came up with a method to assign stars to those companies that had both top net scores and large shared Ns in the survey. So spending momentum and strong market share. And you can see Microsoft, Splunk, Palo Alto Networks, Proofpoint, CrowdStrike, Zscaler and CyberArk made the cut and all received four stars. And we gave two stars to Cisco and Fortinet because they had strong net scores and very high presence in the survey. Now let's go forward and look at April when the lockdown was in full swing. Okay, so we tightened things up in April and on the presentation of the survey did and only included those companies with more than 50N. And we cut the top 10, that's the red line and we put in their Dell EMC which is RSA and IBM for context. And you can see CrowdStrike, they shot to the top with a 68% net score and increased it's shared N, and you can see the stars right. Now, let's just jump ahead to the July survey. So now we're well into the pandemic. Maybe things are calming down a little bit in the summer. People feeling a little bit more freedom, maybe not as concerned about the work-from-home peace, that's sort of settling in, and CISOs, they had a little time to respond here and that's kind of the picture in the summer. Okta jumped way up on the left, you see in spending momentum and CrowdStrike, they moderated a bit, although they remained elevated. And again, they're not direct competitors, but it's instructive to compare these two firms, 'cause they're both hot and growing. And you see the green lines, they show the direction of the momentum of the net score. CrowdStrike was a bit of a concern because its net score dropped and its presence in the dataset kind of moderated. But the company continued to report strong revenue during its earnings calls and the stock remain a darling. So some mixed signals in the data, one quarter doesn't necessarily make a trend. But Okta, Microsoft, Cisco, Palo Alto, Splunk and several others, they remained very, very strong. Now let's go into the most recent October survey. So again, we continue to fine tune our presentation analysis here. And you can see there are two red lines. The top one is the top 10 cutoff. And the second line is the top 20. As we said, Elastic hit the radar for net score but still not pervasive enough in the dataset on the right to earn some stars with the shared Ns. So Okta in our view continues to hold that top spot for momentum and made the top 10 cut for shared N, two very positive signs. It's shared N, for example, jumped from 139 to 185. So more and more mentions, people are increasingly relying on Okta for identity access management. Now for the green arrows here, the momentum lines, we've tried to take into consideration the shared N. So even though, for example CrowdStrike's net score dropped from 50 down to 43%, it's shared N, or again, the number of mentions, it jumped from 119 to 162. So that's a 36% increase and you might be thinking, well, why is that significant? Well, CIOs and IT buyers in the ETR survey, they're asked to choose the areas with which they are most familiar and then they answer questions on which vendors they use. So the fact that companies like Okta and Palo Alto and CrowdStrike and several others that we've highlighted are increasing their presence in the data set and still maintaining a very strong net score is a really good signal in our view. That's why, for example, take Zscaler, we still give them two stars, even though on a relative basis, it didn't make the top 10 cut. It's net score held relatively firm and it's shared N jumped by 39%. So we continue to like names like Zscaler, Okta, CrowdStrike, CyberArk, Proofpoint Fortinet and of course Microsoft, which consistently shines brightly. Let's look at a comment that underscores the CISOs sentiment and I think the market overall. Here's a comment from a CISO of a global travel and hospitality company. It's a name you would recognize and obviously this individual's business was hit hard by the pandemic. So there's an inherent bias toward hope anyway, toward a return to the normal. But look at the comment, I'll read it. "I was a skeptic on the permanence of the changes due to COVID, but I've seen firsthand, there are legitimate structural changes that are taking place, and that's going to fundamentally shift where companies are investing in cyber. Building leases are expiring, people, they're productive working from home. Products that enable work from home and that are cloud first, that trend will continue and be permanent." And you know what? We agree. Okay, here's a chart that we've been updating since right before the pandemic and it compares the performance of the S & P 500 and Nasdaq with specific security companies that are public. And we've been tracking the revenue multiples on a trailing 12 month revenue basis over time to get a sense of how these companies compare. And we prefer to use forward looking revenue, but find TTM to be more consistent and frankly easier to access quickly. So that's what we're using. Now note that Splunk, Octa, CrowdStrike and Zscaler, those are the guys I've highlighted in red, they have yet to report as of this publication. A couple of points here are worth noting. First, we've been talking a lot about the divergence in valuation between Palo Alto and Fortinet and we'll show some more data on that in a moment but we want to share some CISO comments about Fortinet. People sometimes refer to Fortinet as Forti knife, as in Swiss army knife. They're a Swiss army knife of cyber, Forti everything is what one CISO called it. Fortinet is more price attractive, especially for mid-sized companies who don't have the resources of larger firms that might gravitate toward Palo Alto Networks. And the companies around for awhile and has earned the trust of CISOs because of their portfolio and their track record. Now, the other notable item in this data is the rise in value for Okta, CrowdStrike and Zscaler which have seen values increase 78%, 128%, 124% respectively in the time period we show here. You can see the very highly elevated revenue multiples compared to some of the more mature companies. Splunk, they're a bit of an outlier here 'cause we're showing negative growth in that right-hand column. And that's because of its transition toward a subscription model. That really messes up the income statement. And we just wanted to cite that. Splunk's been doing a good job communicating to the street. There are some concerns in the ETR dataset, which we've talked about. They've sort of moderated lately. There's also concerns about pricing that CISOs have mentioned, but generally there's a real bifurcation in the market in terms of valuations. And we think that while there's a lot of discussion about the so-called stay-at-home stocks and a shift back away from those when the pandemic subsides, we believe that the productivity benefits of remote work are becoming more clear and these next gen security companies are going to continue to thrive. Now let's take a moment to look at the relative performance of Palo Alto and Fortinet. Back in February of this year, we noted that there was a valuation divergence occurring between these two companies. And we cited three factors at the time for this gap. First, we said the Palo Alto was trying to cloud proof its business, and as such, it was in transition. And second, it had some challenges with regard to the pace of that transition, including sales incentives, actually that's part of the first point. That was kind of one A. Secondly, we said that the shift away from appliance-based firewalls was accelerating and that was pressuring Palo Alto's valuation. They were kind of underperforming in that segment. And finally we said the Palo Alto was facing some very tough compares in 2019 relative to 2018. And that was causing investors to pause as Palo Alto began shifting to an annual recurring revenue model. Now we said at the time that CISOs really, they really liked Palo Alto and we felt it would... the company would deal with these issues in 2020. And this chart really shows that and they've begun to reverse this trend. The yellow line is Fortinet. The blue line is Palo Alto and it's showing this sort of relative performance here. And you can see that gap coming into 2020 which extended into the meat of 2020. But now it's starting to compress, thanks to a nice earnings report that beat EPS on revenue this month, as we're talking about Palo Alto. So we continue to believe that Fortinet has done a good job and a better job of moving to the cloud model. And Palo Alto has largely relied on acquisitions to accelerate this trend. And we'll see if they can continue to thrive during this transition to cloud. But there's little doubt that CISOs want to work with Palo Alto networks and they remain committed to having a strategic relationship with the company. Alright, let's wrap. The shift to the subscription model is well underway in the cybersecurity space and it's buoyed by cloud and next generation SAS-based security players. Splunk is in transition. Cisco and Palo Alto emphasize the importance of this trend and virtually all historically on-prem players are being forced to respond. Survey data and anecdotal information from theCUBE community supports what the ETR Venn CISOs are saying, that the internet is becoming the new private network and these trends toward cloud-based and remote worker support are delivering benefits that CEOs and CFOs are going to continue to push to operationalize. CISOs, they got to continue to take a multi-layered approach to defending their data, their applications and their users. And it's such a fragmented market with specialists is going to continue for quite some time. Now, despite these clear trends, CISOs face a real challenge, the timing of the return to semi normal, it's really uncertain. And we still don't have a clear picture of what that future will look like. As such incumbent firms with hardened networks, they're going to have to remain in a hybrid holding pattern to accommodate whatever happens. Why is that important? Well, this means that budgets are going to be stretched. Look, while security remains a top priority, you can't expect an open checkbook going to SecOps team. Throwing money at the problem wouldn't really solve it anyway. Rather CISOs have to take a balanced portfolio of investments, continuing with automation and data analytics and of course, good security practice practices. That's going to be the pattern. Alright, well, thanks everyone for watching this episode of theCUBE insights powered by ETR. There are many ways to get in touch. @dvellante on Twitter, david.vellante@siliconangle.com. You can comment on my LinkedIn posts. I publish weekly on wikibon.com and siliconangle.com and always appreciate the feedback from our community. These episodes, by the way, are all available as podcasts. So you can listen while you multitask and don't forget to check out etr.plus for all the survey action. This is Dave Vellante. Have a great Thanksgiving, be smart, stay safe and we'll see you next time. (light melodic music)
SUMMARY :
in Palo Alto in Boston, of the changes due to COVID,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Microsoft | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
April | DATE | 0.99+ |
Palo Alto | ORGANIZATION | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
12 month | QUANTITY | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
SailPoint | ORGANIZATION | 0.99+ |
2019 | DATE | 0.99+ |
2018 | DATE | 0.99+ |
Eric Bradley | PERSON | 0.99+ |
68.3% | QUANTITY | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
CyberArk | ORGANIZATION | 0.99+ |
Zscaler | ORGANIZATION | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
January | DATE | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Proofpoint | ORGANIZATION | 0.99+ |
October | DATE | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
two stars | QUANTITY | 0.99+ |
second line | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
two companies | QUANTITY | 0.99+ |
68% | QUANTITY | 0.99+ |
ETR | ORGANIZATION | 0.99+ |
36% | QUANTITY | 0.99+ |
123 mentions | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
50 | QUANTITY | 0.99+ |
39% | QUANTITY | 0.99+ |
July | DATE | 0.99+ |
one view | QUANTITY | 0.99+ |
124% | QUANTITY | 0.99+ |
first point | QUANTITY | 0.99+ |
two firms | QUANTITY | 0.99+ |
43% | QUANTITY | 0.99+ |
78% | QUANTITY | 0.99+ |
Netskope | ORGANIZATION | 0.99+ |
three factors | QUANTITY | 0.99+ |
Carbon Black | ORGANIZATION | 0.99+ |
128% | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
34% | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
more than 50 responses | QUANTITY | 0.99+ |
Breaking Analysis: Cyber Security Tailwinds in the Post Isolation Economy
>> From The Cube studios in Palo Alto in Boston, connecting with thought leaders all around the world, this is a Cube Conversation. >> The isolation economy has created substantial momentum for certain cybersecurity companies, notably, as of the big stock market sell off on June 11th, relative to our last cyber report, which we did in February, the S and P 500, and the NASDAQ are off 11% and 3% respectively. But the valuations of three companies that we cited as four-star firms in our February cyber report are up significantly. In particular, Okta's valuation is up 34% since our last look in February. CrowdStrike, almost 50%, and Zscaler over 60%. Yet several other companies that were named as four-star players have really either tracked the S and P or even performed more poorly, despite still showing decent strength and spending momentum based on survey data from ETR. Welcome, everybody, to this week's Wickibon Cube Insights powered by ETR. My name is Dave Vellante and in this breaking analysis, we want to update you on our cybersecurity outlook and try to answer several questions, such as what has changed in the cybersecurity landscape. since our last report. Much has, as you know, Has the isolation economy created a permanent shift in security spend, or are these upticks just anomalies? What can we learn from the ETR spending data, and is the divergence and valuations amongst security leaders justified? Let's start by taking a look at what has changed since our last cyber report. Now, we produce this just ahead of the RSA conference in February, and one of the last physical conferences. So there's some big changes going on in the market. We really want to understand, are they systematic? In other words, are there fundamental changes to the system and its underlying principles, and by many accounts, the answer appears to be yes. Recently I listened in to a number of CSOs. of it was a call with ETR's Eric Bradley. And we heard the executives echo some of the themes that we've been discussing previously. It was notion of the work-from-home pivot, creating a focus on things like zero trust networks, changes in identity and access management, and way more focus on cloud, and of course, as a service, really reducing reliance on traditional firewalls and appliances that would reside in organizations' data centers. You know, we've gone from a world where digital transformation was an important strategic initiative to one where if you weren't digital, you largely couldn't transact business. Now, people are, the question they have is that is the longterm viability of VPNs makes sense? And even things like SD-WAN are being called into question, as corporate offices are empty and the internet is becoming the new private network. Now, one thing that hasn't changed is there are still a lot of technologies in this space. And that seems to be continuing as buyers need solutions to problems quickly to plug holes, and on balance IT budgets, they are contracting, so most companies still have to justify security spending based on the amount of risk reduction versus the cost. Of course, it's easier to justify for securing remote workers. So what I want to do now is take a pause and let's look back at some of the ETR data that we shared back in February. Now remember, this data is from the January ETR survey, ETR surveys organizations once every quarter. And if you recall, we keyed on two key metrics, some of our favorite metrics. Net Score, which is a measure of spending momentum, and Market Share, which measures pervasive per, sorry, pervasiveness in the dataset. Now, as you might recall, the left most chart here shows the cyber players and we sorted them by Net Score. The right hand side, that sorts those companies on Shared N, which measures the number of mentions of that company within the cybersecurity sector. Now, at the time, we named several four-star companies, actually we started this last year when we initiated coverage in the security space. These four-star security firms, really based on their rankings within both of those metrics, Net Score and Shared N. So you could see the four stars, Microsoft, Splunk, Palo Alto Networks, Proofpoint, Okta, CrowdStrike, and we added Zscaler as new, and then CyberArk. And we gave Cisco and Fortinet two stars, as they were kind of on the cusp. Now let's look at some of these companies from the April survey that ETR did. So this chart shows a subset of the vendors that we showed before. Now remember, this survey was taken at the height of the lockdown, from kind of early part of March to the early part of April. Budgets were under immense pressure. Nonetheless, look at Microsoft, Cisco, Palo Alto, Fortinet, and Zscaler all held up pretty evenly. CrowdStrike also held steadily and maintain a very high level. Okta dipped somewhat, but from a pretty high level as well. Only Proofpoint is one of the ones that showed decline notably from 48% to a 40% Net Score relative to the chart I showed earlier. Now, SailPoint didn't make the four-star cut because it doesn't have the presence in the dataset, but it's Net Score is solid, and the Shared N jumped from 66 last survey to 88 in the latest checkpoint. So this identity and access management player, it seems to be one to watch. We'll come back to that in future episodes. Now let's plot some of these players in context, you know, using this two-dimensional axis that we often show. This chart shows that that view that we like to share. It plots Net Score, or spending velocity, on the Y axis, and then market share on the X axis. Remember, our market share is calculated by dividing the number of mentions for a company by the total number of mentions within that sector. So it's not like true IDC market share, it's market share within the survey. So you can see here a continued theme of Microsoft momentum, very high Net Score, or high Net Score and big presence. We plotted IBM and Dell EMC, which is really the legacy RSA business, just for context. And these are two companies with strong security brands, but as you can see, they're really not the giants that they used to be in cybersecurity software. So a couple of points on this graphic. CrowdStrike really jumps out as the momentum play on this chart. And that's really no surprise given its focus on endpoint security and the pivot to work-from-home. Okta has a focus on cloud-based identity management and they continue to show very strong. And CyberArk, with a focus on privileged access is also very important in this remote worker environment. We'll talk about that some more later. And you can see Zscaler, quite strong and steady from the last survey, but that company saw some of the biggest action in the stock market, which we're going to try to explain in a moment. Proofpoint, we talked about a deceleration in Net Score, but they're right in the mix as is Fortinet. Now finally, Palo Alto, you know, they remain strong. And Cisco, like many of its businesses, very credible with a Net Score that's decent and a large market presence as always. Now, as we've reported, security is one of the brightest spots in that Cisco portfolio. So the big takeaway from the ETR data is that despite the pandemic, cybersecurity software has held up very well from a spending standpoint. But now let's look a little bit deeper into what's happening in the stock market with these firms. And first as we know, there's a clear disconnect between what's happening in financial markets and the fundamentals of the economy. You know, Wall Street versus Main Street is kind of that narrative. And within the security sector, there's also a dissonance between companies, and we want to discuss that next. Here's an updated chart that we showed in February from our last cybersecurity episode. It compares the performance of the S and P 500 and the NASDAQ as of February 19th, with the performance of four-star cyber players from that date to Thursday, June 11th, the day that saw an 1800 point drop in the Dow. So some of the steam has been let out of the market, but the story really isn't going to change that much. First, the S and P is off 11% since that time, but the NAS is only off of 3%, tech heavy. But look at the deltas of our four-star companies. Let me start with Splunk. I didn't show Splunk earlier on the charts, but the value metrics of Splunk, they really haven't moved much since our February report. Splunk's Net Score was down somewhat in the sector, but remember, Splunk does more than just security. It's really becoming a critical big data player in analytics. I think people maybe don't like the tepid 2% revenue growth that Splunk showed, but remember Splunk is transitioning to an ARR model, an annual recurring revenue model, and that's going to take some time. It acquired SignalFx late last year to give it a stronger SaaS play in monitoring, and of course the analytics. I like Splunk, just like Adobe and Tableau had to make a similar transition, and ultimately they powered through it because they're great companies with really loyal customers, and I think that really does apply to Splunk. Let's take a look now at Palo Alto Networks and Fortinet. Now, you might remember in our last security update, we spent a fair amount of time explaining the valuation divergence between Palo Alto and Fortinet due to some of the cloud challenges that Palo Alto was facing, even some of the sales motions. So we said Fortinet at the time had done a better job transitioning to a cloud, but Palo Alto really had a good quarter. It beat earnings revenue, and it gave guidance, and the stock moved up very nicely. But then it ran into resistance, and you can see it's a tracking about what the S and P 500 over this period of time. And you can see the revenue multiples show the valuations divergence between those two companies. It's even more stark. So you've got Fortinet's kind of holding firm, and Palo Alto, dipping a little bit. Now, let me make some comments here. I mean, I like Palo Alto Networks. Not only are they solid in the ETR dataset, despite the COVID pandemic, but anecdotal evidence in discussions with IT leaders suggests that organizations want to do business with Palo Alto. They're really considered a thought leader in the space. And I personally, I think they're going to do very well this decade. So now maybe there's some technical aspects going on with the stock. I'm not really qualified to address that. But they clearly saw some resistance despite bouncing on the strong quarter. Just couldn't hold. Now, let me skip over the green box, and I want to quickly comment on the last two here. I'm going to start with CyberArk. They are underperforming, this group, even though you would think with the focus on privileged access security, they'd do well in this environment. And they beat last quarter, but they suspended guidance, and they cited exposure to some hard hit industries on their earnings call. And as well, it just is interesting, the company is aggressively hiring. And so that increased op ex substantially. The thing in management is confidence, you know, what do they know that the street doesn't know? And they're just being cautious, you know, but they are taking a valuation hit as a result. We'll see how that plays out. Now, Proofpoint has also taken a valuation hit in our period of analysis back from February to now, despite beating estimates last quarter. You know, maybe not as strong as a work-from-home play, but again, a beat in this environment is definitely a positive. Now I want to come back to the three key companies highlighted in the green, Okta, CrowdStrike and Zscaler. Zscaler, remember, we added new in February to our four-star list, which we initiated last year. The valuation of these three companies has soared since the pandemic, and they've reported tailwinds as a result of the new reality. Okta with its identity management focus, CrowdStrike with endpoint, and Zscaler with its security cloud, are all seeing momentum. And it makes sense that these three are very focused and they're aligned with our remote worker economy, and of course, a shift to the cloud. As well, they all beat earnings and management had a pretty sanguine outlook going forward. But I want to call your attention to the revenue multiples of these three companies and take a look and compare them to their peers. You know, are these justified? Well, as I said before, there's really a difference between the stock market and what's happening in the real world today. So I would say, you know, I want to see these companies continue to outperform their estimates, and their strong guidance. And frankly, at these revenue multiples, I'd expect, you know, even higher growth rates of, especially from Okta and Zscaler. So we'll see. The point is, the market's exuberance, it's really based on future expectations. And I do think there was a bit of, you know, FOMO, fear of missing out, at play here with investors hopping on the bandwagon. Remember, look, the data from ETR shows that these companies are pretty strong, and of course, much of the stock action is based on performance relative to earnings estimates. So we'll see if this can continue. I mean, to me, it does feel a little frothy even after that recent sell off. All right, let's wrap up. So the disconnect between financial markets and the real world economy, it creates uncertainty in the market. So you got to be cautious, really, if, especially if you're chasing momentum. I just want to say, I know a lot of young investors who reach out to me and they comment to me in these segments. And look, I'm not qualified to tell you where to invest. I just report on the fundamentals and I try to tie in financial trends, and market trends, of course, But you got to do your own research, you know, be patient, do your dollar cost averaging thing. You got a long life to live. Now, the after COVID AC economy and the remote work-from-home momentum will not be a rising tide that's going to lift all ships in this segment. But there's no doubt that CSOs are rethinking cyber. We've said for years that protecting the perimeter was going to change as the main focus. And it has to a degree. But I'll tell ya, I think the mindset has changed more in the last 90 days than in the previous three years. The scourge of VPNs, and even the efficacy of SD-WAN are being called into question as security technologies that exploit the internet and cloud appear to be very sensible to CSOs and have momentum. You know, we're also seeing more collaboration between organizational boundaries, and even many CIOs are becoming much more involved in security as their line of business tends. And even some CSOs reporting it to CIO's. As we've said many times, cyber has become and will continue to be a board level agenda item and topic. On near term, we really don't see the fragmentation of the products that we've talked about for years changing. If anything, the shiny new security tools, you know, might even increase granularity in the marketplaces organizations, they can't just unplug their legacy infrastructure as much as they they'd like to. But longer term, there will be more consolidation in this market, as the whales are going to buy companies to fill holes in their lines. I mean, look at VMware, there's a good example of a company we really haven't talked about trying to elbow its way into the security space. And the cloud, as well, was going to attack some of the problems of complexity, which in part stems from too many tools, and that will foster some of this collaboration expectation. Okay, well, that's it for this week. Remember, these episodes are all available as podcasts. So please subscribe. I publish weekly on wikibon.com and siliconangle.com. So check that out and please do comment on my LinkedIn posts. You can email me as well, at david.vellante@siliconangle.com. This is Dave Vellante for The Cube Insights powered by ETR. Thanks for watching, everyone. We'll see you next time. (mellow digital music)
SUMMARY :
leaders all around the world, and the pivot to work-from-home.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IBM | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Eric Bradley | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
February | DATE | 0.99+ |
June 11th | DATE | 0.99+ |
February 19th | DATE | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
Proofpoint | ORGANIZATION | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
Zscaler | ORGANIZATION | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
April | DATE | 0.99+ |
Palo Alto | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
two companies | QUANTITY | 0.99+ |
January | DATE | 0.99+ |
48% | QUANTITY | 0.99+ |
four-star | QUANTITY | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
1800 point | QUANTITY | 0.99+ |
11% | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
last quarter | DATE | 0.99+ |
ETR | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
david.vellante@siliconangle.com | OTHER | 0.99+ |
3% | QUANTITY | 0.99+ |
88 | QUANTITY | 0.99+ |
CyberArk | ORGANIZATION | 0.99+ |
NASDAQ | ORGANIZATION | 0.99+ |
two stars | QUANTITY | 0.99+ |
Adobe | ORGANIZATION | 0.99+ |
Thursday, June 11th | DATE | 0.99+ |
three companies | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Breaking Analysis: Cyber Security Update: What to Expect at RSA 2020
>> From the SiliconANGLE Media office in Boston, Massachusetts, it's the cube. Now, here's your host, Dave Vellante. >> Hello everyone and welcome to this week's Wikibon cube insights powered by ETR. In this breaking analysis ahead of the RSA conference, we want to update you on the cyber security sector. This year's event is underlined by coronavirus fears, IBM has pulled out of the event and cited the epidemic as the reason and it's also brings to the front the sale of RSA by Dell to STG partners and private equity firm. Now in our last security drill down, we cited several mega trends in the security sector. These included the ever escalating sophistication of the attacker, the increased risk from the data economy, the expanded attack surface with the huge number of IP addresses that are that are exploding out there, and the lack of skills and the number of cyber tools that are coming to the market. Now, as you know, in these segments, we'd like to share insights from the cube. And I want you to listen to two American statesman and what they said, on The Cube. Here's general Keith Alexander, who's the former director of the NSA, along with Dr. Robert Gates, who's the former director of the CIA and former Secretary of Defense, play the clip. >> When you think about threats, you think about nation states, so you can go to Iran, Russia, China, North Korea, and then you think about criminal threats, and all the things like ransomware. Some of the nation state actors are also criminals at night, so they can use nation state tools and my concern about all the evolution of cyber threats is that the attacks are getting more destructive. >> I think cyber and the risks associated with cyber, and IT need to be a regular part of every board's agenda. >> So you hear General Alexander really underscore the danger, as well, Dr. Gates is articulating what we've said many times on the cube that cyber security is a board level agenda item. Now, the comments from both of these individuals represent what I would consider tailwinds for cyber technology companies. Now we're going to drill into some of those today. But it's not all frictionless. There are headwinds to in this market space, cloud migration, the shift from north south south to East West network traffic, its pressure traditional appliance based perimeter security solutions, increase complexity and lack of skills and other macro factors, including questions on ROI. CFO saying, hey, we spend all this cash, why aren't we more secure? Now, I want you to hear from two chief information security officers officers on both the challenges that they face and how they're dealing with them. Roll the clip. >> Lack of talent, I mean, we're starving for talent. Cybersecurity is the only field in the world with negative unemployment. We just don't have the actual bodies to actually fill the gaps that we have and in that lack of talent Cecil's are starving. >> I think that the public cloud offers us a really interesting opportunity to reinvent security right. So if you think about all of the technologies and processes and many of which are manual over the years, I think we have an opportunity to leverage automation to make our work easier in some ways. >> Now I featured Brian Lozada and Katie Jenkins before and breaking analysis segments, and you can hear it from the cyber leaders, we lack the talent, and cloud computing and automation are areas we're pursuing. So this challenges security companies to respond. But at the end of the day, companies have no no choice. In other words, organizations buying security solutions, the sophistication of the attacker is very high and the answer to my CFO and ROI is fear based. If you don't do this, you might lose billions in market cap. Now, I want you to take a listen to these cubilam talking about the attacker of sophistication and the importance of communication skills in order to fund cyber initiatives, really to keep up with the bad guys, please play the clip. >> The adversary is talented and they're patient, they're well funded okay, that's that's where it starts. And so, you know why why bring an interpreter to a host when there's already one there right? Why write all this complicated software distribution when I can just use yours. And so that's that's where the play the game starts. And and the most advanced threats aren't leaving footprints because the footprints already there, you know, they'll get on a machine and behaviorally they'll check the cash to see what's hot. And what's hot in the cash means that behaviorally, it's a fast they can go they're not cutting a new trail most of the time, right? So living off the land is not only the tools that they're using the automation, your automation they're using against you, but it's also behavioral. >> That's why the most the most important talent or skill that a security professional needs is communication skills. If you can't articulate technical risk into a business risk to fund your program, it's, you know, it's very hard for you to actually be successful in security. >> Now, the really insidious thing about what TK Keanini just said is the attackers are living off the land, meaning they're using your tools and your behaviors to sneak around your data unnoticed. And so as Brian Lozada said, as a security Pro, you need to be a great communicator in order to get the funding that you need to compete with the bad guys. Which brings me to the RSA conference. This is why you as a security practitioner attend, you want to learn more, you want to obtain new skills, you want to bring back ideas to the organization. Now one of the things I did to prepare for this segment is to read the RSA conference content agenda, which was co authored by Britta Glade and I read numerous blogs and articles about what to expect at the event and from all that I put together this word cloud, which conveys some of the key themes that I would expect you're going to hear at the shows. Look at skills jump right out, just like Brian was saying, the human element is going to be a big deal this year. IoT and the IT OT schism, everyone's talking about the Olympics, and seeing that as a watershed event for cyber, how to apply machine learning and AI is a big theme, as is cloud with containers and server less. phishing, zero trust and frameworks, framework for privacy, frameworks for governance and compliance, the 2020 election and weaponizing social media with deep fakes, and expect to hear a lot about the challenges of securing 5G networks, open source risks, supply chain risks, and of course, the need for automation. And it's no surprise there's going to be a lot of talk about cyber technology, the products and of course, the companies that sell them. So let's get into the market and unpack some of the ETR spending data and drill into some of these companies. The first chart I want to show you is spending on cyber relative to other initiatives. What this chart shows is the spending on cyber security highlighted in the green in relation to other sectors in the ETR taxonomy. Notice the blue dot. It shows the change in spending expected in 2020 versus 2019. Now, two points here. First, is that despite the top of my narrative that we always hear, the reality is that other initiatives compete for budget and you just can't keep throwing cash at the security problem. As I've said before, we spend like .014% percent of our global GDP on cyber, so we barely scratched the surface. The second point is there's there's there's a solid year on year growth quite high at 12% for a sector that's estimated at 100 to 150 billion dollars worldwide, according to many sources. Now let's take a look at some of the players in this space, who are going to be presenting at the RSA conference. You might remember to my 2020 predictions in that breaking analysis I focused on two ETR metrics, Net Score, which is a measure of spending velocity and Market Share, which measures pervasiveness in the data set. And I anointed nine security players as four star players. These were Microsoft, Cisco, Palo Alto Networks, Splunk, Proofpoint, Fortinet, Oka, Cyber Ark and CrowdStrike. What we're showing here is an update of that data with the January survey data. My four star companies were defined as those in the cyber security sector that demonstrate in both net scores or spending momentum, that's the left hand chart and market share or pervasiveness on the right hand chart. Within the top 22 companies, why did I pick 22? Well, seemed like a solid number and it fit nicely in the screen and allowed more folks. So a few takeaways here. One is that there are a lot of cyber security companies in the green from the standpoint of net score. Number two is that Fortinet and Cisco fell off the four star list because of their net scores. While still holding reasonably well, they dropped somewhat. Also, some other companies like Verona's and Vera code and Carbon Black jumped up on the net score rankings, but Cisco and Fortinet are still showing some strength in the market overall, I'ma talk about that. Cisco security businesses up 9% in the quarter, and Fortinet is breaking away from Palo Alto Networks from a valuation perspective, which I'm going to drill into a bit. So we're going to give Cisco and Fortinet two stars this survey period. But look at Zscaler. They made the cut this time their net score or spending momentum jumped from 38% last quarter to nearly 45% in the January survey, with a sizable shared in at 123. So we've added Zscaler to the four star list, they have momentum, and we're going to continue to watch that quarterly horse race. Now, I'd be remiss if I didn't point out that Microsoft continues to get stronger and stronger in many sectors including cyber. So that's something to really pay attention to. Okay, I want to talk about the valuations a bit. Valuations of cyber security space are really interesting and for reasons we've discussed before the market's hot right now, some people think it's overvalued, but I think the space is going to continue to perform quite well, relative to other areas and tech. Why do I say that? Because cyber continues to be a big priority for organizations, the software and annual recurring revenue contribution ARR continues to grow, M&A is going to continue to be robust in my view, which is going to fuel valuations. So Let's look at some of the public companies within cyber. What I've compiled in this chart is eight public companies that were cited as four star or two star firms, as I defined earlier, now ranked this by market value. In the columns, we show the market cap and trailing 12 month revenue in billions, the revenue multiple and the annual revenue growth. And I've highlighted Palo Alto Networks and Fortinet because I want to drill into those two firms, as there's a valuation divergence going on between those two names, and I'll come back to that in just a minute. But first, I want to make a few points about this data. Number one is there's definitely a proportional relationship between the growth rate and the revenue multiple or premium being paid for these companies. Generally growth ranges between one and a half to three times the revenue multiple being paid. CrowdStrike for example has a 39 x revenue multiple and is growing at 110%, so they're at the high end of that range with a growth at 2.8 times their revenue multiple today. Second, and related, as you can see a wide range of revenue multiples based on these growth rates with CrowdStrike, Okta and now Zscaler as the standouts in this regard. And I have to call at Splunk as well. They're both large, and they have high growth, although they are moving beyond, you know, security, they're going into adjacencies and big data analytics, but you you have to love the performance of Splunk. The third point is this is a lucrative market. You have several companies with valuations in the double digit billions, and many with multi billion dollar market values. Cyber chaos means cash for many of these companies, and, of course for their investors. Now, Palo Alto throw some of these ratios out of whack, ie, why the lower revenue multiple with that type of growth, and it's because they've had some execution issues lately. And this annual growth rate is really not the best reflection of the stock price today. That's really being driven by quarterly growth rates and less robust management guidance. So why don't we look into that a bit. What this chart shows is the one year relative stock prices of Palo Alto Networks in the blue and compared to Fortinet in the red. Look at the divergence in the two stocks, look at they traded in a range and then you saw the split when Palo Alto missed its quarter last year. So let me share what I think is happening. First, Palo Alto has been a very solid performance since an IPO in 2012. It's delivered more than four Rex returns to shareholders over that period. Now, what they're trying to do is cloud proof their business. They're trying to transition more to an AR model, and rely less on appliance centric firewalls, and firewalls are core part of the business and that has underperformed expectations lately. And you just take Legacy Tech and Cloud Wash and Cloud native competitors like Zscaler are taking advantage of this and setting the narrative there. Now Palo Alto Network has also had some very tough compares in 2019 relative to 2018, that should somewhat abate this year. Also, Palo Alto has said some execution issues during this transition, especially related to sales and sales incentives and aligning that with this new world of cloud. And finally, Palo Alto was in the process of digesting some acquisitions like Twistlock, PureSec and some others over the past year, and that could be a distraction. Fortinet on the other hand, is benefiting from a large portfolio refresh is capitalizing on the momentum that that's bringing, in fact, all the companies I listed you know, they may be undervalued despite, of all the company sorry that I listed Fortinet may be undervalued despite the drop off from the four star list that I mentioned earlier. Fortinet is one of those companies with a large solution set that can cover a lot of market space. And where Fortinet faces similar headwinds as Palo Alto, it seems to be executing better on the cloud transition. Now the last thing I want to share on this topic is some data from the ETR regression testing. What ETR does is their data scientists run regression models and fit a linear equation to determine whether Wall Street earnings consensus estimates are consistent with the ETR spending data, they started trying to line those up and see what the divergence is. What this chart shows is the results of that regression analysis for both Fortinet and Palo Alto. And you can see the ETR spending data suggests that both companies could outperform somewhat expectations. Now, I wouldn't run and buy the stock based on this data as there's a lot more to the story, but let's watch the earnings and see how this plays out. All right, I want to make a few comments about the sale of the RSA asset. EMC bought RSA for around the same number, roughly $2 billion that SDG is paying Dell. So I'm obviously not impressed with the return that RSA has delivered since 2006. The interesting takeaway is that Dell is choosing liquidity over the RSA cyber security asset. So it says to me that their ability to pay down debt is much more important to Dell and their go forward plan. Remember, for every $5 billion that Dell pays down in gross debt, it dropped 25 cents to EPS. This is important for Dell to get back to investment grade debt, which will further lower its cost. It's a lever that Dell can turn. Now and also in thinking about this, it's interesting that VMware, which the member is acquiring security assets like crazy and most recently purchased carbon black, and they're building out a Security Division, they obviously didn't paw on the table fighting to roll RSA into that division. You know maybe they did in the financial value of the cash to Dell was greater than the value of the RSA customers, the RSA product portfolio and of course, the RSA conference. But my guess is Gelsinger and VMware didn't want the legacy tech. Gelsinger said many times that security is broken, it's his mission to fix it or die trying. So I would bet that he and VMware didn't see RSA as a path to fixing security, it's more likely that they saw it as a non strategic shrinking asset that they didn't want any part of. Now for the record, and I'm even won't bother showing you the the data but RSA and the ETR data set is an unimpressive player in cyber security, their market share or pervasiveness is middle of the pack, so it's okay but their net score spending velocities in the red, and it's in the bottom 20th percentile of the data set. But it is a known brand, certainly within cyber. It's got a great conference and it's been it's probably better that a PE company owns them than being a misfit toy inside of Dell. All right, it's time to summarize, as we've been stressing in our breaking analysis segments and on the cube, the adversaries are very capable. And we should expect continued escalation. Venture capital is going to keep pouring into startups and that's going to lead to more fragmentation. But the market is going to remain right for M&A With valuations on the rise. The battle continues for best of breed tools from upstarts like CrowdStrike and Okta and Zscaler versus sweets from big players like Cisco, Palo Alto Networks and Fortinet. Growth is going to continue to drive valuations. And so let's keep our eyes on the cloud, remains disruptive and for some provides momentum for others provides friction. Security practitioners will continue to be well paid because there's a skill shortage and that's not going away despite the push toward automation. Got in talk about machine intelligence but AI and ML those tools, there are two edged sword as bad actors are leveraging installed infrastructure, both tools and behaviors to so called live off the land, upping the stakes in the arms race. Okay, this is Dave Vellante for Wikibon's CUBE Insights powered by ETR. Thanks for watching this breaking analysis. Remember, these episodes are all available as podcasted Spotfire or wherever you listen. Connect with me at david.vellante at siliconangle.com, or comment on my LinkedIn. I'm @dvellante on Twitter. Thanks for watching everybody. We'll see you next time. (upbeat music).
SUMMARY :
Massachusetts, it's the cube. and the lack of skills and the number of cyber tools and all the things like ransomware. and IT need to be a regular part Now, the comments from both of these individuals represent We just don't have the actual bodies to actually fill and many of which are manual over the years, and the answer to my CFO and ROI is fear based. And and the most advanced threats to actually be successful in security. highlighted in the green in relation to other sectors
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Cisco | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Keith Alexander | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Brian Lozada | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
EMC | ORGANIZATION | 0.99+ |
Legacy Tech | ORGANIZATION | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
Oka | ORGANIZATION | 0.99+ |
NSA | ORGANIZATION | 0.99+ |
Brian | PERSON | 0.99+ |
2012 | DATE | 0.99+ |
2019 | DATE | 0.99+ |
Palo Alto | ORGANIZATION | 0.99+ |
January | DATE | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
12 month | QUANTITY | 0.99+ |
Gelsinger | PERSON | 0.99+ |
Katie Jenkins | PERSON | 0.99+ |
Proofpoint | ORGANIZATION | 0.99+ |
Gates | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
two firms | QUANTITY | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
25 cents | QUANTITY | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
Olympics | EVENT | 0.99+ |
Britta Glade | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
2.8 times | QUANTITY | 0.99+ |
two stocks | QUANTITY | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
Cyber Ark | ORGANIZATION | 0.99+ |
38% | QUANTITY | 0.99+ |
12% | QUANTITY | 0.99+ |
SDG | ORGANIZATION | 0.99+ |
two names | QUANTITY | 0.99+ |
Second | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Robert Gates | PERSON | 0.99+ |
two star | QUANTITY | 0.99+ |
second point | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
M&A | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
110% | QUANTITY | 0.99+ |
siliconangle.com | OTHER | 0.99+ |
three times | QUANTITY | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
2006 | DATE | 0.99+ |
One | QUANTITY | 0.99+ |
two points | QUANTITY | 0.99+ |
Zscaler | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
Cloud Wash | ORGANIZATION | 0.99+ |
Data Protection 2020 Cloud, VMware and Cyber | | CUBE Conversation, February 2020
>> From the SiliconANGLE Media office in Boston, Massachusetts. It's theCUBE. (upbeat music) Now, here's your host Dave Vellante. >> Hi everybody, welcome to this Cube Conversation on data protection. You know, I've been reporting for the last several months that spending on storage is reverting back to pre-2018 levels, but at the same time, it's not falling off a cliff. Now, one area of storage that is still very, very strong is the data protection segment. In the past 18 months, we've seen about a half a billion dollars in venture funding come into the market. We've just seen a big multi-billion dollar exit. And backup specifically in data protection, data management generally is where all the action is right now. And one of the leaders in data protection is Dell EMC. The company has the largest share of the market and the new entrants, believe me, want a piece of their pie. But anyone who follows this company knows that the firm is not likely to give up it's turf very easily. So much is changing in the market today. And I want to understand how Dell EMC's data protection division is responding to both the competitive threats and the changing market dynamics. With me are two experts from Dell EMC to address these issues. Nelson Hsu is Director of Solutions, Product Marketing for the data protection division at Dell EMC, and Colm Keegan is Senior Consultant, Product Marketing at Dell EMC. Gents, welcome to theCUBE. Great to see you again. >> Thank you for having us. >> Thanks, Dave. >> So you heard my intro. You guys are the leader. You got the biggest market share. You got all the upstarts coming at ya. What's your response? >> Want me to take that? >> Sure. >> Yeah. It's interesting, so we were talking about this before we came on set, you know and often times they want to poke holes at us 'cause you know we're perceived as being the old timers, or the stodgy ones of the group out there. And play a little jiu jitsu, you move in say you know well time in market counts for something. You know we've been solving data protection challenges for customers for literally decades now. You know and so, water under the boat and knowing the experience that we've derived from that allows us to bring solutions that are mature, that are proven. What we're doing is we're taking those proven solutions and pairing them with modern capabilities. So that, you know we look at it and say, hey, look, Mr. Customer. You have significant data protection challenges today because, as you said, the world's changing. It's changing rapidly. We can help you address those while also sowing the seeds for the foundation for the future. So we think that's a compelling message and we think that while some of our competitors, in particular the upstarts, have had some interesting things to say, big picture-wise, they don't know what they don't know. 'Cause they just don't have the time in the market. Their solutions are also largely absent upmarket, you know, when you look at the enterprise. So we're comfortable. We think we're in a very good spot right now. >> So cloud obviously was the huge mega trend of the past decade. You guys said from the beginning, it's going to be a hybrid world. Some of that was we hope it's going to be a hybrid world. Well you were right, it's a hybrid world. So how is cloud, hybrid cloud affecting your customer decisions around data protection, and how are you responding? >> Well, you know, there's no doubt that the growth in cloud and the growth in hybrid cloud is real. And it's there today. As we look, and as Colm mentioned, we've been protecting data across the enterprise, across the edge and in the cloud, and that growth continues. So today, we have over 1,000 customers that we're protecting their data in the cloud. To the tone of over 2.7 exabytes of data protected in the cloud by Dell EMC data protection. So there is absolutely no doubt that that growth is there. We have a lot of innovation that we're driving on, both in various ares of cloud native, cyber security and deep integration. >> Okay, so that's good, 1,000 customers. That's a pretty good observation space. But when you think about hybrid, what I think when I talk to customers is they want that same exact cloud experience. They don't want to have to context switch. They don't want to have to buy different platforms. So how are you specifically addressing that customer requirement? >> So there's a couple ways we look at that, right? For our customers, simplicity is very key in ease of use. So that's one of our core tenants as we go across both the edge, the core and the cloud. And the other aspect of that is consistency. So giving them and allowing them to use the tools that they know today to be able to protect their data, wherever that data resides. So with the cloud, with cloud native, your data becomes very, very distributed. And you have to be able to see all that data, and control and manage that data. So the whole aspect around cloud data management has now risen to the top as a major concern. We do that in a great way in a sense that we both have a hybrid strategy and a lot of that is working with Dell Technologies cloud. And it's based upon VMware. And so we have a very good deep relationship with VMware to utilize their tools that our customers use today. Whether it be vSphere or vcontrol that they can manage their data protection from one console, from one environment itself. >> Yeah, Dave, I think when you look at the split today, the latest cut of research is that roughly 52% of VM's are in the cloud, and 48 percent are on-prems so it's already hybrid, and as Nelson said, it's largely predicated on VMware. So as organizations start consuming cloud they're going to go with the platform that they've been operating under for years now. So it'll be VMware. We've always had very tight integration with VMware. We have a very strong partnership with them. And that's both on the existing portfolio as well as the agile portfolio that we're building out today under PowerProtect. So as that hybrid world evolves for the customers obviously we want to make sure they're protected from a virtual machine standpoint. And make that, as Nelson said, very simple for them because the last thing customers need is complexity particularly as their environments are becoming inherently more complex. Because now you look at most enterprises today, they're going to have a mix of workloads. It's physical, it's virtual, containers are unaccounted for. It's cloud native apps, it's SaaS. You know we were talking earlier about multi-clouds. Oftentimes it just kind of came up organically and now you've got this huge distribution of workloads and oftentimes, customers have been just sort of reactive to that. In other words, let me find a way to protect that and I'll worry about the details later. We're looking at that and saying, we have the portfolio to help you protect all your workloads, and as importantly, we'll help consolidate the management in that environment. It's going to start with VMware, but then longer term we're planning for things like a SaaS control plane so that we can give you a complete view of that environment and allow you to assign the policies you need in terms of SLA's, in terms of compliance. You're basically hitting all the security, hitting all the key things that you need and so directionally we think starting with VMware and building from there is probably the most realistic way we can get customers protected from a hyper cloud. >> So the vision is a single point of control that is SaaS based that lives in the cloud or lives wherever you want it to live? >> Right, it can be either. >> So one of our core tendencies here, right, is that we want and deliver the ability to protect our customer's data wherever it resides. Whether it's edge, core or cloud. >> So sticking on cloud for a second, and then sort of segue into the VMware conversation that I want to have is VMware is the sort of linchpin of your multi-cloud strategy. That makes a lot of sense. VMware is going to be a leader, if not the leader in multi-cloud. We'll see how that all shakes out. It's kind of jump ball right now but VMware is in pretty good position with 500,000 customers. But your perspective on cloud is different than say, take an AWS cloud provider, it's a place. Put your data in my cloud. You guys are talking about the experience. And that's really what you're trying to drive with VMware, whether is Ron-prem, whether it's in Google, Azure, AWS, wherever. The cloud, you name it. Is that the right way to think about your strategy? Specifically as it relates to multi-cloud. >> Yeah, so I think on the area of multi-cloud, it is a multi-cloud world. Years ago I was in a SaaS startup and we had customers that were looking to deploy to the cloud. And then that was the question. Okay, do we hedge on multi-cloud or not? As a SaaS provider, we actually implemented on both AWS and Azure at the time. Which became relevant, because now our customers are asking us, yes, my primary is with this particular hyper scaler. But do you also support this second hyper scaler? So the reality started to evolve. And so for us, yes, VMware is a very strategic aspect and partner with us, especially with Dell Technologies cloud. But we also have a multi-cloud relationship with AWS, with Azure and with Google. >> Yes, so the compatibility matrix, if you will, applies now to the cloud. >> Absolutely, absolutely. So now it's having that feature and functionality across multiple clouds. >> One of the things we obviously paid attention to is Project Tanzu with inside of VMware. All around bringing kind of Kubernetes and VMware together. How does that affect data protection? >> Well, I think it affects data protection in the sense that addressing the entire aspect of still your data is distributed now. And it's going to grow that way. I think that we've seen numbers upwards of 70% of applications will be container based. Some of that will be going forward to 2022 where there'll be multiple production applications that will be container based. I think what Tanzu will bring to the table is a cohesive way to manage and control that environment itself. >> Okay, and so maybe we could sort of drill into that a little bit. Containers, it's becoming more obvious that people want to persist some of that data. It's largely stateless, but you've got to figure out how to recover. So do you have solutions in that space, is that sort of more road mapping? You can talk about that a little bit. >> No, absolutely. So definitely we have concrete solutions with our Dell EMC PowerProtect data manager for Kubernetes. It's actually one of the first that was in the market to support cloud native environments. >> It is the first. >> Yeah, the first offering out there to support Kubernetes. And so the aspect there is that as cloud native has moved from DevOps, and now into production in the mission critical applications, now becomes the aspect of originally the DNA of DevOps was my data doesn't have to be persistent. Now when you move into a mission critical environment, you're entire environment needs to be protected. And to be able to bring those workloads back up should anything happen and to be able to protect that data that is critical to those workloads. >> Okay, and so you're saying you're first, and you see this as a differentiator in the marketplace, or is everybody going to have this, or it's one of these confusing ice cream cone of solutions. So why you guys? What's your big differentiation? Let's stick to containers. I have the same questions sort of overall come back to that. >> So great question, and the matter of fact is that with our experience across the edge, core and cloud, Kubernetes and containers will be prevalent throughout. And it'll be the way that applications will be developed. It's meeting the demands of the business and being agile. And I think that with our ability internally that would move to that agile emotion. We have that ability to address the customer's needs especially in the cloud native Kubernetes space. >> I think going back to what you said too about VMware, certainly our partnership there is differentiated. We even heard some echos of that during Vmworld. Pat Gelsinger usually doesn't give call outs on the main stage very frequently. And he said that they were working with us as a best-in-class partner for data protection with Tanzu. And so there is a very tight partnership there, so if I'm a customer and I'm looking at containers, I'm probably going to want to do it within the framework of VMware to start with. But it's important to point out that we're also not dependent on VMware. So we can still deliver protection for Kubernetes containers outside of say the VMware management domain. But I would say from a differentiation standpoint there are some real tight partnering going on to make these capabilities mature. >> Well it helps that your CEO owns 80% of the company. (laughing) But it's an interesting point you're making because again, dial back 10 years ago, VMware had much more of a Switzerland strategy under Maritz, almost to, at the time, EMC's detriment. I think Michael Dell is very clearly, as is Jeff Clarke, said look, we're going to do more integration. And Pat Gelsinger has been, look, I love all my partners. It's true but we're entering sort of a new era. And that integration is key, you know, again, because of the ownership structure, and your long history there. It's got to confer some advantages in the marketplace. >> Yeah, and he's also got to remove some of the headwinds to adoption of VMware cloud. And data protection, as we discussed often times can be a headwind if customers are concerned that they're not going to be able to protect their data, chances are they're going to stand pat for a while. So I mean you need to find ways to take some of those objections off the table. >> Yeah, and not to take anything away from your competitors. Look, it's an open API world, and again, people are going to compete. But at the end of the day this stuff is still really complex and if you can do some core engineering together it's definitely an advantage. Let's talk a little bit about cyber. I often say it's become a board level topic. It's not a matter of if, it's a matter of when. SecOps teams are overtaxed. I think I put out a stat lately, I got it from Robert Herjavec actually. He said think about this. The worldwide economy is 86 trillion and we spend .014% on cyber, that's it. We're barely scratching the surface. And that's part of the problem. Okay, but with that limited resource we have to be as smart as possible. You've got this ransomware coming in. So what are your customers asking you for and how are you responding? >> So it's interesting, right, because it is top of mind, cyber and cyber attacks, and it takes many forms. The attacks can be malware, they could be encryption, they could be deletion. Which is ultimately the worst case scenario. And I think as you go forward and you look at it cyber is the number one concern for any CIO, CISO or anyone that's worried about their security infrastructure. >> Which is everybody >> Which is everybody, right, exactly. I think that we have delivered for the cloud data protection area a first and best offering with an air gap data protection solution. So inherently, we can insulate and protect our customer's data from cyber threats. So when a ransom event occurs you can recover your data without having to pay that ransom. Or not be concerned that in most severe cases your data gets deleted. I think most recently there was a healthcare provider who was threatened about their data being deleted. And that was the worst case. We were able to protect their data in the sense that with our cyber recovery offering they protected their data in an air gap vaulted solution. And they didn't have to pay for that ransom. >> So what I'm hearing from you guys is okay, cloud, very important. Hybrid cloud, multi-cloud, fundamental to our strategy. VMware, they say bet on sure things. VMware is pretty much a sure thing. Large customer base, leader in the space. And then cyber as a key concern of customers, you want to expand the notion of backup and data protection to really point it at cyber as well. >> Absolutely, in fact with this recent research, it's called the Global Data Protection Index Survey and we just refreshed it. And what customers identified as the most compelling reasons to adopt cloud is for better performance, better data protection, and better security. Not necessarily in that order but those were the top three. So we look at that and say, you know we've got plays there. Certainly we have capabilities protecting workloads in the cloud whether they be virtual machines, cloud native, containers. But the security aspect of it is huge. Because oftentimes customers, and Dave, you and I were talking about this, they make some broader assumptions about once data is in the clouds they can kind of wash their hands and walk away. Not so fast, because certainly there is a shared responsibility model that extends not only to data protection, but also to security. Look, don't get me wrong, the cloud service providers have fantastic security capabilities, have a great perimeter. But as you said, it's not a question of if, it's a question of when. And when something happens, are you ready for it? So these solutions extend not only to on-prem but into the cloud. So it's that ability wherever the workload lives that you can get the right protection and what we're really now referring to as safeguarding data. Because it's a combination of data protection and security that's embedded and doing it wherever the workload resides. >> I'm glad you brought that up Colm. I have a follow up on that, but Nelson, did you want to add something? >> Well, I just want to mention that one of the biggest concerns is making sure that that data you vaulted is actually clean and safe. So we have a cyber sense capability within our cyber recovery product, that when you vault that data it does about 100 analytics on that data to make sure that there's no malware. That it's not infected. And it does it automatically and even on incremental using machine learning. >> That's really important because mistakes happen really fast. (laughing) So if you're vaulting corrupted data, >> What do you do? >> Oops. >> Yeah, exactly. >> I want to come back, I think the shared responsibility model is not well understand and there's a lot of confusion in the industry. At a conference this year, AWS' CISO Stephen Schmidt was saying, look all this talk about security is broken it's not really productive. The state of security in the cloud is actually really good and to your point Colm, yeah, he's right about that. Then you hear Pat Gelsinger saying, he's told me many times in theCUBE security is a do-over. To my point, you know the 86 trillion. And so I kind of lean, when I talk to IT people what Pat is saying. So you say okay, where is the dissidence there? Well, the reality is is the cloud service providers and the shared security model, they'll secure the physical infrastructure. But it's up to the customer to be responsible for everything else. You know, the edicts of the organization are applied. We were talking to the CISO of a large insurance company and she said to us, oh no, shared responsibility means it's our responsibility. So you're not going to go after the cloud service provider, you're going to go after the insurance company, or the financial service institution. Their brand is the one that's going to get hurt. So that's misunderstood. My question, very long winded rant, but what role do you guys play in that shared responsibility model? >> Well, ultimately it comes down to the customer. And the shared responsibility model really is admissible, as you mentioned, right? And so at the end of the day, you as the customer own and are responsible to protect that data. So your data protection strategy, your cyber resilience strategy has to be sound. And it has to be secured by those that can actually do it across multiple distribution models and platforms, whether it's edge, core or cloud. Whether it's VM's, containers. It doesn't change. You're still ultimately responsible for it. >> I think maybe what you might be driving at the question, Dave, is empowering the customers to maintain control of their data. And having the tools in place so that they feel comfortable. And part of it too is moving more towards automation. Because as their applications grow, and as Nelson said, become more distributed, as the data grows exponentially, this just fundamentally isn't a task that humans can manage very much longer. >> I'm glad you brought that up, because you ask a CISO, what's your number one problem? And he or she will tell you the skill sets to keep up with all this complexity. And that's where automation comes in. >> Correct, it does. So that's where we're taking it. Is trying to make things more automated and take tasks away from humans that they just can't keep up with. >> All right guys, I'll give you the last word. We go back a decade or so ago and backup was a whole different situation. And we saw the rise of virtualization and now cloud and all these other things that we have been talking about. Edge, the cyber threats, et cetera. So bring us home, where do you see the future and how does Dell EMC data protection fit in? >> It's an exciting time, it really is. It's kind of like the coming of that second storm as you mentioned. Businesses have that demand of needing more services to load more quickly in an agile fashion. And as they pair that with the growth of their data which is distributed, they really have that challenge overall of how do I manage this environment? So you have to have the observability to understand where your data is and to be able to monitor it. You have to be able to orchestrate your workloads so that they're automated, and the data protection of those workloads are automated as well. And so the imperative that aspects like Tanzu are addressing with cloud native, that Kubernetes brings to the table to deliver containerized applications. That's really quite honestly is the biggest evolution I've seen in my last 20 to 30 years. This is definitely a different paradigm shift. >> Yeah, you know, six months ago I was with a competitor and was taking a look at EMC, sorry, I should say Dell EMC, and I was wondering, should I make a move over here? And really what convinced me was the fact that the company was willing to basically solve internally the innovator's dilemma. You're making so much money on your existing portfolio, now you're going to start investing in what appears to be almost internal competition to your portfolio. It's not, it's complimentary. So that's what drove the decision for me to come here, but I will also say it's great to be a part of an organization that has a long-term vision. You remember, I think the phrase that was being used, being held captive to the 90-day shot clock. You know, the earnings reports and stuff. And that drives behavior. Well, if your organization is looking at decade-long goals, that means that you can actually plan to do things that over time are going to actually bring real value to customers. So I think we're doing the right things. We're obviously innovating, we're on this agile software development cadence gives us the ability to solve the problems incrementally over time so customers can see that value instead of waiting for large batch releases. But is also gives us the ability to say, hey, when we've made mistakes or when we hadn't seen certain things come around the corner, we're agile enough to change with that. So I think the combination of having that vision and putting in the investments, and we've kind of likened ourselves to the biggest startup in the industry with the backing of a Fortune 50. And so from a customer standpoint you got to look at that and think, you know, that's interesting, because I need to solve my current problems today. I need to have a path forward for the future. And who am I betting on to deliver that? And the other thing I'll leave on is customers are trying to work with fewer suppliers, not more suppliers. Because they want to reduce the complexity. Well who has the ability to not only bring data protection to bear, but a whole portfolio of technology is really end to end. That can snap into those environments to again reduce complexity and drive more business value. >> That's a really interesting point you make about consolidations. Ever since I've been in this industry people want to deal with less suppliers and reduce the complexity. But you still see startups and VC's funding things. And what's happened is this consolidation, the big guys, you guys are the biggest consolidator. And I always say the rich get richer. There's always this tension between sort of, do I go out and buy the spoke, best of breed tools, or do I get them from somebody who can help me across the portfolio? That's really where your strength is. Guys, thank you so much. This is really a very important topic. Data protection is one of the most important areas that we've been covering. I've been reporting on it a lot. As I said, a lot of venture money has been flowing in. So I really appreciate you guys coming in, sharing your perspectives. And best of luck in the marketplace. >> Appreciate it, Dave. >> Thanks, this was great. >> You're welcome. All right, and thank you for watching, everybody. This is Dave Vellante for theCUBE. We'll see you next time. (upbeat music)
SUMMARY :
From the SiliconANGLE Media office that the firm is not likely You got the biggest market share. and knowing the experience Some of that was we hope that the growth in cloud So how are you specifically addressing And the other aspect of that is consistency. so that we can give you is that we want and deliver the ability Is that the right way So the reality started to evolve. Yes, so the compatibility matrix, So now it's having that feature and functionality One of the things we obviously paid attention to And it's going to grow that way. So do you have solutions in that space, It's actually one of the first that was in the market And so the aspect there is that in the marketplace, or is everybody going to have this, and the matter of fact is that I think going back to what you said too And that integration is key, you know, again, some of the headwinds to adoption of VMware cloud. And that's part of the problem. And I think as you go forward and you look at it And they didn't have to pay for that ransom. So what I'm hearing from you guys as the most compelling reasons to adopt cloud I'm glad you brought that up Colm. is making sure that that data you vaulted So if you're vaulting corrupted data, Their brand is the one that's going to get hurt. And so at the end of the day, And having the tools in place And he or she will tell you the skill sets that they just can't keep up with. So bring us home, where do you see the future the coming of that second storm as you mentioned. the ability to say, hey, when we've made mistakes And best of luck in the marketplace. All right, and thank you for watching, everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Jeff Clarke | PERSON | 0.99+ |
Pat | PERSON | 0.99+ |
EMC | ORGANIZATION | 0.99+ |
AWS' | ORGANIZATION | 0.99+ |
80% | QUANTITY | 0.99+ |
.014% | QUANTITY | 0.99+ |
Dell EMC | ORGANIZATION | 0.99+ |
February 2020 | DATE | 0.99+ |
Colm | PERSON | 0.99+ |
Nelson | PERSON | 0.99+ |
90-day | QUANTITY | 0.99+ |
86 trillion | QUANTITY | 0.99+ |
Colm Keegan | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
48 percent | QUANTITY | 0.99+ |
70% | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
2022 | DATE | 0.99+ |
Michael Dell | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
1,000 customers | QUANTITY | 0.99+ |
Nelson Hsu | PERSON | 0.99+ |
Stephen Schmidt | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
two experts | QUANTITY | 0.99+ |
one console | QUANTITY | 0.99+ |
Robert Herjavec | PERSON | 0.99+ |
500,000 customers | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
Tanzu | ORGANIZATION | 0.99+ |
Boston, Massachusetts | LOCATION | 0.99+ |
both | QUANTITY | 0.99+ |
over 1,000 customers | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
six months ago | DATE | 0.98+ |
DevOps | TITLE | 0.98+ |
One | QUANTITY | 0.98+ |
one environment | QUANTITY | 0.98+ |
Dell Technologies | ORGANIZATION | 0.98+ |
over 2.7 exabytes | QUANTITY | 0.98+ |
about a half a billion dollars | QUANTITY | 0.97+ |
vSphere | TITLE | 0.97+ |
this year | DATE | 0.97+ |
PowerProtect | TITLE | 0.96+ |
about 100 analytics | QUANTITY | 0.96+ |
Switzerland | LOCATION | 0.96+ |
Vmworld | ORGANIZATION | 0.95+ |
Breaking Anaylsis: Predictions 2020: Cloud, Kubernetes & Cyber Continue to Power the Tech Economy
>> From the SiliconANGLE Media Office in Boston, Massachusetts, it's theCUBE. Now, here's your host, Dave Vellante. >> Hello everyone and welcome to this week's episode of theCUBE Insights, powered by ETR. In this Breaking Analysis I want to lay out my 2020 predictions using insights gleaned from theCUBE blended with ETR spending data. You know, 2019 marked our 10th year of doing theCUBE. Over that time we've had the pleasure of covering nearly 1000 events and milestones, including the exit from the great softness of 2008 and 2009. You know theCUBE has extensively tracked a 10 year bull market. We've covered the era of data. We saw the rise and profitless prosperity of the big data and opensource Hadoop movement, where we predicted the practitioners, not vendors, would benefit the most from big data. We've covered many dozens of acquisitions including the 60 billion dollar chess move made by Michael Dell acquiring EMC, and a launch of hundreds of startups in flash, hyper-converged, big data, AI, blockchain, crypto, security and SaaS. There'll be other days to talk about theCUBE and review that, today's all about predicting the future, using spending data and insights from the thousands of interviews we've done on theCUBE. So let's get right into the ETR data and start with the high-level spending. Remember in October, ETR released its survey results and stated that we're coming out of a multiyear investment cycle in digital transformation. Enterprise IT buyers have learned what works, and on which technologies they're going to double down. They're now narrowing their investments on emerging technologies, picking those winners for the next gen tech, and at the same time, they're cutting redundancies from legacy players that they were keeping on as a hedge. Buyers are picking bundled suites from a handful of mega vendors, and solidifying their investments. We're seeing a multi-generational dynamic repeat itself, where buyers are creating a balance between the convenience of packaged offerings, i.e. bundles, and leveraging best of breed technologies to drive innovation. So on balance, the ETR data shows that a contraction in spending and tepid CIO sentiment is impacting both emerging vendors as well as traditional players, and these trends are most pronounced in the very largest organizations, which have always been the best bellwether in ETR's data sets. Let me share with you what one IT executive said recently that I think really sums up the situation quite well. He said, "ETR's findings mirror what we're doing today, "in that we spend most of 2018 bringing in "a lot of the new, core technology. "I believe what you're seeing now is not a lull in spend, "but an operationalization of what we've already purchased. "We're not spending on what's next yet, "because we're still rolling out what we just bought." This is from a VP of global IT at a large public manufacturing company, I said he, it could be a she as well. I think that she's summing it up correctly, and it reflects many of what customers on theCUBE tell us. Now, let's take a look at the macroeconomy. GDP growth is going to come in at about 2.3% this year, give or take. It's not going to hit the Trump administration's goal of 3% plus, but consumers are clearly powering steady growth. At least for now. IT spending should grow at about a point or two above GDP, so let's put that at, say, 4%. We're right in the middle of a Santa Claus rally, and the S&P is above 3200 today. Tech has been a powerful tailwind for stocks, and I think stocks, tech stock's going to take a breath in early 2020, but I expect continued strong growth in the economy and tech spending after a Q1 pause. I could see the S&P flirting with 3700 or even higher in 2020, and I think the tech sector will be a benefactor of that momentum, providing an impetus for continued growth. Here's my thinking on that. So much of 2020 is going to be about the election, and to me the election is going to be really about the economy. And I predict the economy is going to remain steady. And as the IT leader I quoted earlier said, customers will be operationalizing what's been previously purchased. Here's what's different in 2020. Tech projects have historically been very risky investments, and have required higher internal rates of return, IRRs, to get approved by CFOs. But the cloud has altered two factors. One, is that it's allowed more experimentation for way less money. The second is cloud, by shifting CAPEX to OPEX, allows for much more incremental, lower risk investments. So I think you'll see continued steady growth, powered by the cloud, which allows experimentation, and importantly higher hit rates of success. These successful projects will throw off cash for companies, and CFOs are getting on board because they realize it's driving innovation. They also realize that IT does matter, maybe not in the form that Nick Carr envisioned, but a new generation of IT that creates competitive advantage. This brings me to my first main prediction, which is the growth of cloud computing is going to moderate, but the cloud will continue to steal significant share from on-prem spending. Now the narrative that the pendulum is swinging back in my view, is a false narrative. Rather, the pendulum has swung, and the cloud is the underpinning of innovation. Now having said that, I do think we're seeing a bit of an equilibrium in spending, where buyers have identified those workloads that are going to remain on-prem, which is why you see, for example, AWS, Azure, and Google making moves in hybrid. Hybrid slash on-prem offerings. What this chart here shows from ETR, so from 2010 through October '19 survey on cloud spending, I had to block out the 2020 survey as it's currently in the field, I'm not allowed to show that data. The yellow line is market share, which in ETR parlance, as you remember, is pervasiveness, or mentions in their survey. The blue line is spending momentum, measured as net score, which essentially subtracts the percent of customers spending less from those spending more. The long, steady march of cloud, as you can see, continues, and there's no indication that it's going to abate. That said, the penetration of cloud has become much more meaningful, so share gains will be more hard-fought for the cloud guys. Now, you may see this as a non-prediction, or a hedge. It's not, let me be clear. Cloud will continue to steal share from on-prem, but share gains for the cloud vendors will be more difficult. Which brings me to part B of this prediction. What I'm showing in this chart is market share from ETR's January 2016 survey through October '19. And I'm showing spending for three on-prem vendors within AWS, Azure, and Google Cloud accounts. And I'm picking on Oracle, IBM, and Dell EMC as three prominent on-prem proxies, and you can see the steady decline in market share for these companies. And even though there's a bit of an uptick in October, I don't see this as a reversal. What's going to happen is that traditional on-prem vendors are going to step up their cloud strategies. Specifically with multicloud management. This is going to be the case with Dell, who's going to leverage VMware, and in the case of IBM, they'll try to take advantage of Red Hat in that multicloud game. Now both IBM and Oracle, who each have public clouds are going to dig their heels in, they're going to get customers in a headlock, and provide big financial incentives for them to use their captive clouds. All right, so with the high-level spending comments that I made earlier, and that cloud discussion that we just had as a backdrop, the question is, which companies will do well in the coming year? I'm going to call out five companies, that I want to highlight where the ETR data intersects what we're seeing on theCUBE. The prediction is these five players will do well in 2020, they're going to power through any downturn in spending, and they're going to thrive in the face of the cloud share shift. So the chart here shows data from the ETR October 2019 survey, and it lays out net score or spending momentum for these companies, that I am predicting will be winners in 2020 and beyond. And the five companies are UIPath, Snowflake, Databricks, HashiCorp, and Rubrik. Let me start with UIPath. They are the leader in robotic process automation. I think RPA is going to do well even in a downturn, because more companies will be looking to automate and save money, even in a softer climate. Automation Anywhere is another player in this space, they're doing pretty well, and I predict that UIPath will come out on top of this space, but both UIPath and Automation Anywhere can thrive. Next company is Snowflake, they are changing the analytic database market, and I've covered them before in previous Breaking Analysis segments. They are going to continue to grow nicely in my view. They are 100% cloud-based, and they participate in all popular cloud platforms. Now ironically, they compete with AWS RedShift, who continues to copy some of the innovations that Snowflake has popularized. But AWS and Snowflake are strong partners, so there's room for both companies to thrive. Snowflake especially, as they play in clouds other than just AWS. Which brings me to Databricks. We're seeing a new type of workload emerge in the cloud for modern analytic databases, where organizations are taking all this data that they have, lots of it in the cloud, and they're structuring it within a Snowflake database, or RedShift, and they're bringing Databricks tooling to the equation to be able to query and visualize the data in near real time. Now of course, as I say, AWS plays here with RedShift, and they're selling a lot of EC2, so they love Snowflake. All major cloud players are seeing this type of workload enter the mix, and it's going to be a strong area of growth in 2020 and beyond. Next thing I want to talk about is HashiCorp. HashiCorp is capitalizing on this trend toward cloud-native computing. The company provides opensource tooling for developers, and is all about simplifying application deployment independent of the underlying platform, whether it's virtual, container, or cloud. Five years ago, the players in the space that got all the attention on theCUBE were Chef, Puppet, Ansible and Salt, and today, especially again on theCUBE, you hear the most about Hashi and Ansible, and in fact we were at AnsibleFest with theCUBE, and we heard lots about HashiCorp, so they both complement and compete with the older players. To me, this reminds me of Spark within the Hadoop ecosystem. Hashi has raised about 174 million in VC, and as you can see they have very strong spending momentum in the ETR dataset, with a net score, as shown, of 63%. Now finally, I want to talk about Rubrik, which has been a consistent performer in the ETR dataset. They're trying to transform backup into data management as a discipline. They compete with established players in the data protection space, guys like Veritas, Dell EMC, IBM and CommVault. Now Rubrik is not the only new or newish player here, that's doing very well, Cohesity, who's relatively new, Veeam, which has been around for a decade, both doing very well and showing up strong in ETR surveys, especially Veeam, but Rubrik has been a consistently strong performer and has been outpacing the others, so I want to call them out. Look for these five to do very well in 2020, and into the next decade. So that brings me to my next prediction, I want to talk about Kubernetes. This prediction is twofold. Kubernetes is going to continue its strong showing as this data from ETR shows. This is Kubernetes' market share in the October 2019 survey, so Kubernetes spend had a 76% net score. So very very strong. But the other part of the prediction is that Kubernetes will become embedded into virtually every platform, and people will stop thinking about it as a separate market. Already today, there's little discussion of the idea of a Kubernetes distro, I mean Anthos is an example of a Kubernetes stack, but it can be run in the cloud, it can be run on-prem, anywhere. VMware Tanzu, Microsoft Azure Arc are other examples, they're really not stacks, but they're management platforms that can manage anyone's Kubernetes instances. I like to think of this as kind of like flash. You remember when everyone looked at flash storage as a separate market, well today it's just embedded everywhere. And that's kind of what's happening with Kubernetes. So spending momentum is going to continue to be strong, but by 2023, Kubernetes will be ubiquitous, and not really thought of as a separate entity. All right, for my next prediction, I want to talk about cybersecurity. I did a Breaking Analysis earlier this year on security, and I showed this slide. And as you can see, I've added a little something in the red stars for my prediction. So what this chart shows is two views of net score, the left-hand side shows the ranking by net score, and you can see CrowdStrike, Okta, Shape Security, which was just, by the way, bought by F5, that was an announcement. Twistlock, which is now Palo Alto Networks, and you can see the others down that list. On the right-hand side is net score, but it's ranked by shared N, which is a measure of pervasiveness in the ETR dataset. What I've added is the four star companies, that is those companies that have both spending momentum and are pervasive in the ETR survey. So the prediction is 2020 we'll see the four star companies maintain their position and gain strength in 2020. These include established players with portfolios where they can bundle like Microsoft, Cisco, Palo Alto Networks, Splunk, Proofpoint, Fortinet, and CyberArk Software. And then the newer companies like Okta and CrowdStrike are going to continue to gain share faster than the larger players. Now you also may see companies like SailPoint, Illumio, and SentinelOne emerge as four star companies over the next 24 months. Now the one company that's not on this list that is a major player in security is AWS. AWS is the cloud security leader, and is in a category all by itself in many ways. As I said in my security segment earlier this year, the market is incredibly fragmented, and it's going to stay that way. Each year we look back and say "Did we spend more on security?" and "Are we more safe?" And every year the answer is yes, and no. And 2020 will be no different. Now if you look at the various data sources, we spend approximately 120 billion dollars annually on cybersecurity. The worldwide economy is about 85 trillion in dollar terms, so on balance, we spend about .14% on securing our economy, so we're barely scratching the surface. The market is going to remain highly fragmented, the rich will get richer if they have four stars, new players will continue to enter the space, and M&A will continue to be robust. Now if you exclude my long shot that the S&P will break through 3700 next year, that makes nine predictions. For my 10th and final prediction, I don't have hard data from ETR, but I have a strong opinion on this, and that is that the edge will be won by developers, you've heard me talk about this before. Specifically, platforms like Outposts, which are essentially programmable infrastructure which bring a cloud development platform to the edge, is how that space will evolve. It won't be won by shoving traditional servers and storage boxes out to the edge. Rather, it will grow by coders being able to build new applications and workloads on top of infrastructure as code. Okay, that wraps up my 2020 predictions. I'd very much like to hear your opinion, so you can leave your thoughts or your own predictions in the comments sections of this video, or go to my LinkedIn posts. You can reach me @DVellante on Twitter, love to hear your thoughts. And don't forget, this series is available on iTunes, Spotify, and other podcast platforms for your listening pleasure. I'd like to wish everyone a safe and restful holiday season and a prosperous, healthy 2020. Enjoy your families, enjoy this time, this is Dave Vellante, signing out from the latest episode of theCUBE Insights powered by ETR, thanks for watching, everybody. We'll see you next time. (techno music)
SUMMARY :
From the SiliconANGLE Media Office and that is that the edge will be won by developers,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IBM | ORGANIZATION | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
January 2016 | DATE | 0.99+ |
October | DATE | 0.99+ |
CommVault | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
Michael Dell | PERSON | 0.99+ |
October 2019 | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Veritas | ORGANIZATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
2008 | DATE | 0.99+ |
76% | QUANTITY | 0.99+ |
2009 | DATE | 0.99+ |
10th | QUANTITY | 0.99+ |
Snowflake | ORGANIZATION | 0.99+ |
63% | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
100% | QUANTITY | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
10 year | QUANTITY | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
Nick Carr | PERSON | 0.99+ |
October '19 | DATE | 0.99+ |
Rubrik | ORGANIZATION | 0.99+ |
4% | QUANTITY | 0.99+ |
2010 | DATE | 0.99+ |
Illumio | ORGANIZATION | 0.99+ |
two factors | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
2018 | DATE | 0.99+ |
five companies | QUANTITY | 0.99+ |
3% | QUANTITY | 0.99+ |
Proofpoint | ORGANIZATION | 0.99+ |
EMC | ORGANIZATION | 0.99+ |
UIPath | ORGANIZATION | 0.99+ |
10th year | QUANTITY | 0.99+ |
two views | QUANTITY | 0.99+ |
@DVellante | PERSON | 0.99+ |
HashiCorp | ORGANIZATION | 0.99+ |
F5 | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
Databricks | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
about .14% | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
five players | QUANTITY | 0.99+ |
ETR | ORGANIZATION | 0.99+ |
SailPoint | ORGANIZATION | 0.99+ |
next decade | DATE | 0.99+ |
SentinelOne | ORGANIZATION | 0.99+ |
both companies | QUANTITY | 0.99+ |
Boston, Massachusetts | LOCATION | 0.99+ |
approximately 120 billion dollars | QUANTITY | 0.99+ |
Okta | ORGANIZATION | 0.98+ |
second | QUANTITY | 0.98+ |
Five years ago | DATE | 0.98+ |
60 billion dollar | QUANTITY | 0.98+ |
Richard A. Clarke, National Security & Cyber Risk Expert | Qualys Security Conference 2019
>> Announcer: From Las Vegas, it's theCUBE. Covering Qualys Security Conference 2019, brought to you by Qualys. >> Hey welcome back everybody, Jeff Frick here with theCUBE, we're in Las Vegas at the Bellagio, at the Qualys Security Conference, pretty amazing, it's been going on for 19 years, we heard in the keynote. It's our first time here, and we're excited to have our first guest, he was a keynote earlier this morning, the author of nine books, Richard Clarke, National Security and Cyber Risk expert, and author most recently of "The Fifth Domain." Dick, great to see you. >> Great to be with you. >> Absolutely. So you've been in this space for a very long time. >> I started doing cybersecurity in about 1996 or 1997. >> So early days. And preparing for this, I've watched some of your other stuff, and one of the things you said early on was before there was really nothing to buy. How ironic to think about that, that first there was a firewall, and basic kind of threat protection. Compare and contrast that to walking into RSA, which will be in a couple of months in Moscone, 50,000 people, more vendors than I can count on one hand, now there's too much stuff to buy. Do you look at this evolution? What's your take? And from a perspective of the CIO and the people responsible for protecting us, how should they work through this morass? >> Well, the CIO and the CFO, got used to thinking cyber security costs a little bit, 'cause you can only buy, this is 1997, you can only buy antivirus, firewall, and maybe, in 1997, you could buy an intrusion detection system. Didn't do anything, it just went "beep," but you could buy that too. So you had three things in 1997. And so that resulted in the IT budget having to take a tiny little bit of it, and put it aside for security, maybe 2%, 3% of the budget. Well, now, if you're only spending 2 or 3% of your IT budget on security, somebody owns your company, and it's not you (laughs). >> And that's 2 or 3% of the IT budget, that's not the whole budget. >> No, that's the IT budget. What we found in researching the book, is that secure companies, and there are some, there's companies that don't get hacked, or they get hacked, but the hack gets in, immediately contained, identified, quarantined. The damage is done, but it's easily repaired. Companies that are like that, the resilient companies, are spending 8%, 10%, we found companies at 12 and 17%, of their IT budget on security, and to your point, how many devices do you have to buy? You look at the floor at any of these RSA Conventions, Black Hat, or something, now there are 2000 companies at RSA, and they're all selling something, but their marketing message is all the same. So pity the poor CSO as she goes around trying to figure out, "Well, do I want to talk to that company? "What does it do?" We found that the big banks, and the big corporations, that are secure, have not three, anymore, but 75, 80, different, discreet cybersecurity products on their network, most of it software, some of it hardware. But if you've got 80 products, that's probably 60 vendors, and so you got to, for yourself, there's the big challenge, for a CSO, she's got to figure out, "What are the best products? "How do they integrate? "What are my priorities?" And, that's a tough task, I understand why a lot of the people want to outsource it, because it's daunting, especially for the small and medium-size business, you got to outsource it. >> Right, right. So the good news is, there's a silver lining. So traditionally, and you've talked about this, we talk about it all the time too, there's people that have been hacked and know it, and people that have been hacked and just don't know it yet, and the statistics are all over the map, anywhere you grab it, it used to be hundreds of days before intrusions were detected. Kind of the silver lining in your message is, with proper investments, with proper diligence and governance, you can be in that group, some they're trying to get in all the time, but you can actually stop it, you can actually contain it, you can actually minimize the damage. >> What we're saying is, used to be two kinds of companies, those that are hacked and knew it, and those that are hacked that don't, that didn't know it. Now there's a third kind of company. The company that's stopping the hack successfully, and the average, I think, is a 175 days to figure it out, now it's 175 minutes, or less. The attack gets in, there's all the five or six stages, of what's called "the attack killchain," and gets out very, very quickly. Human beings watching glass, looking at alerts, are not going to detect that and respond in time, it's got to be automated. Everybody says they got AI, but some people really do (laughs), and machine learning is absolutely necessary, to detect things out of the sea of data, 75 different kinds of devices giving you data, all of them alarming, and trying to figure out what's going on, and figure out in time, to stop that attack, quarantine it, you got to move very, very quickly, so you've got to trust machine learning and AI, you got to let them do some of the work. >> It's so funny 'cause people still are peeved when they get a false positive from their credit card company, and it's like (laughs), do you realize how many of those things are going through the system before one elevates to the level that you are actually getting an alert? >> So the problem has always been reducing the number of false positives, and identifying which are the real risks, and prioritizing, and humans can't do that anymore. >> Right, right, there's just too much data. So let's shift gears a little bit about in terms of how this has changed, and again, we hear about it over and over, right, the hacker used to be some malicious kid living in his mom's basement, being mischievous, maybe, actually doing some damage, or stealing a little money. Now it's government-funded, it's state attacks, for much more significant threats, and much more significant opportunities, targets of opportunity. You've made some interesting comments in some of your prior stuff, what's the role of the government? What's the role of the government helping businesses? What's the role of business? And then it also begs the question, all these multinational business, they don't even necessarily just exist in one place, but now, I've got to defend myself against a nation state, with, arguably, unlimited resources, that they can assign to this task. How should corporate CIOs be thinking about that, and what is the role, do you think, of the government? >> Let's say you're right. 20 years ago we actually used to see the number of cyber attacks go up on a Friday night and a Saturday night, because it was boys in their mother's basement who couldn't get a date, you know, and they were down there having fun with the computer. Now, it's not individuals who are doing the attacks. It is, as you say, nation states. It's the Russian Army, Russian Intelligence, Russian Military Intelligence, the GRU. The North Korean Army is funding its development of nuclear weapons by hacking companies and stealing money, all over the world, including central banks, in some cases. So, yeah, the threat has changed, and obviously, a nation state is going to be far more capable of attacking, military is going to be far more capable of attacking, so, CISOs say to me, "I'm being attacked by a foreign military, "isn't that the role of the Pentagon "to defend Americans, American companies?" And General Keith Alexander, who used to run Cyber Command, talks about, if a Russian bomber goes overhead, and drops a bomb on your plant, you expect the United States Air Force to intercept that Russian bomber, that's why you pay your taxes, assuming you pay taxes. What's the difference? General Alexander says, whether that's a Russian bomber attacking your plant, or a Russian cyber attack, attacking your plant, and he says, therefore, people should assume the Pentagon will protect them from foreign militaries. That sounds nice. There's a real ring of truth to that, right? But it doesn't work. I mean, how could the Pentagon defend your regional bank? How could the Pentagon defend the telephone company, or a retail store? It can't. It can barely defend itself, and they're not doing a great job of that either, defending the federal government. So, do you really want the Pentagon putting sensors on your network? Looking at your data? No, you don't. Moreover, they can't. They don't have enough people, they don't have enough skills. At the end of the day, whatever the analogy is about how the Defense Department should defend us from foreign military attack, they can't. And they shouldn't, by the way, in my view. The conclusion that that gets you to, is you got to defend yourself, and you can, right now, if you use the technology that exists. The government has a role, sure. It can provide you warnings, it can provide the community with intelligence, it can fund development and stuff, can train people, but it cannot defend your network, you have to defend your network. >> And you have municipalities, I think it's Atlanta, is the one that keeps getting hit, there's-- >> Well Louisiana, just the other night, the whole state of Louisiana government unplugged from the internet, because it was being hit by a ransomware attack. The whole city of Baltimore's been down, the whole city of Atlanta, as you said. There's a real problem here, because people, many of them are paying the ransom, and they pay the ransom, and they get their network back right away. People ask me, "Can I trust these criminals?" Well you can trust them to give you your network back, because they have a reputation to maintain. Think about that. This whole thing about ransomware depends on their reputation, the bad guys' reputation. If they get a reputation for not giving you your network back when you pay, no one's ever going to pay, so they do give it back, and sometimes that's a lot quicker, and a lot cheaper, than saying no and rebuilding your network. But if we give them the money, what are they doing with it? Yeah, they're buying Ferraris to drive round the streets of Moscow, but some of that money is going back into R&D, so they can develop more effective attacks. >> So it's an interesting take, right, so most people, I think, would say that the cybersecurity war is completely always going to be kind of cat and mouse, whack-a-mole, that the bad guys are always a little step ahead, and you're always trying to catch up, just the way the innovation cycle works. You specifically say no, that's not necessarily always true, that there are specific things you can do to, not necessarily have an impenetrable wall, but to really minimize the impact and neutralize these threats, like a super white blood cell, if you will. So what are those things that companies should be doing, to better increase their probability, their chance, of, I don't know, blocking-- >> Depends on the size of the company. >> Absorbing. >> Depends on the size of the company. But I think whether you're a small-to-medium business, or you're an enterprise, you begin in the same place. And I do this with all of my consulting contracts, I sit down with the leadership of the company individually, and I ask every one of them, "What are you worried about? "What could happen? "What could a bad guy do to you "that matters to your company?" 'Cause what matters to one company may not matter to another company. And you can't spend your entire budget defending the network, so let's figure out exactly what risk we're worried about, and what risk we're just kind of willing to tolerate. And then, we can design security around that, and sometimes that security will be outsourced, to a managed security provider. A lot of it means getting into the cloud, because if you're in Amazon or Microsoft's cloud, you've got some security automatically built in, they've got thousands of people doing the security of the cloud, and if your server's in your basement, good luck. (laughs) >> So, as you look forward, now you said you finished the book earlier in the year, it gets published, and it's out, and that's great, but as you said, it's a fast-moving train, and the spaces develops. 10 years from now, we don't want to look at 10 years from now, it's way too long. But as you look forward the next couple, two, three years, what are you keeping an eye on, that's going to be, again, another sea change of both challenge and opportunity in this space? >> The three technologies we talk about in the book, for the three-year time horizon, 'cause I can't get beyond three years, more machine learning on the defense, but also more machine learning on the offense, and where does that balance work out? To whose advantage? Secondly, quantum computing, which, we don't know how rapidly quantum computing will come onto the market, but we do know it's a risk for some people, in that it might break encryption, if the bad guys get their hands on the quantum computer, so that's a worry. But one I think most immediately, is 5G. What 5G allows people to do, is connect millions of things, at high speed, to the internet. And a lot of those things that will be connected are not defended right now, and are outside firewalls, and don't have end-point protection, and aren't really built into networks on a secure network. So I worry about 5G empowering the Internet of Things, and doing what we call expanding the attack surface, I worry about that. >> Right, Richard, well thank you for taking a few minutes, and congrats on the book, and I'm sure within a couple of years the gears will start turning and you'll put pen to paper and kick another one out for us. >> Number 10. >> All right. He's Richard, I'm Jeff, you're watching theCUBE, we're at the Qualys Security Conference at the Bellagio in Las Vegas, thanks for watching, we'll see you next time. (upbeat music)
SUMMARY :
brought to you by Qualys. at the Qualys Security Conference, So you've been in this space for a very long time. and one of the things you said early on And so that resulted in the IT budget having to take And that's 2 or 3% of the IT budget, and so you got to, for yourself, and the statistics are all over the map, and the average, I think, is a 175 days to figure it out, So the problem has always been reducing the number and what is the role, do you think, of the government? and you can, right now, the whole city of Atlanta, as you said. that the bad guys are always a little step ahead, of the company. "What could a bad guy do to you and the spaces develops. but also more machine learning on the offense, and congrats on the book, at the Bellagio in Las Vegas,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Microsoft | ORGANIZATION | 0.99+ |
2 | QUANTITY | 0.99+ |
United States Air Force | ORGANIZATION | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Richard | PERSON | 0.99+ |
1997 | DATE | 0.99+ |
Jeff | PERSON | 0.99+ |
Richard Clarke | PERSON | 0.99+ |
10% | QUANTITY | 0.99+ |
12 | QUANTITY | 0.99+ |
8% | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Richard A. Clarke | PERSON | 0.99+ |
Pentagon | ORGANIZATION | 0.99+ |
175 days | QUANTITY | 0.99+ |
175 minutes | QUANTITY | 0.99+ |
60 vendors | QUANTITY | 0.99+ |
Moscow | LOCATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Qualys | ORGANIZATION | 0.99+ |
2% | QUANTITY | 0.99+ |
Atlanta | LOCATION | 0.99+ |
five | QUANTITY | 0.99+ |
North Korean Army | ORGANIZATION | 0.99+ |
19 years | QUANTITY | 0.99+ |
Moscone | LOCATION | 0.99+ |
80 products | QUANTITY | 0.99+ |
three years | QUANTITY | 0.99+ |
two kinds | QUANTITY | 0.99+ |
17% | QUANTITY | 0.99+ |
Baltimore | LOCATION | 0.99+ |
first time | QUANTITY | 0.99+ |
Friday night | DATE | 0.99+ |
3% | QUANTITY | 0.99+ |
three technologies | QUANTITY | 0.99+ |
three-year | QUANTITY | 0.99+ |
50,000 people | QUANTITY | 0.99+ |
Defense Department | ORGANIZATION | 0.99+ |
Saturday night | DATE | 0.99+ |
75 | QUANTITY | 0.99+ |
The Fifth Domain | TITLE | 0.99+ |
Alexander | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
2000 companies | QUANTITY | 0.99+ |
GRU | ORGANIZATION | 0.99+ |
Russian Army | ORGANIZATION | 0.99+ |
Keith Alexander | PERSON | 0.99+ |
80 | QUANTITY | 0.99+ |
millions | QUANTITY | 0.99+ |
first guest | QUANTITY | 0.99+ |
nine books | QUANTITY | 0.99+ |
RSA | ORGANIZATION | 0.98+ |
third kind | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
Russian Intelligence | ORGANIZATION | 0.98+ |
Russian Military Intelligence | ORGANIZATION | 0.98+ |
Russian | OTHER | 0.98+ |
six st | QUANTITY | 0.98+ |
three | QUANTITY | 0.98+ |
Ferraris | ORGANIZATION | 0.98+ |
Qualys Security Conference | EVENT | 0.97+ |
10 years | QUANTITY | 0.97+ |
20 years ago | DATE | 0.97+ |
hundreds of days | QUANTITY | 0.97+ |
General | PERSON | 0.97+ |
one | QUANTITY | 0.96+ |
1996 | DATE | 0.96+ |
three things | QUANTITY | 0.96+ |
American | OTHER | 0.96+ |
Louisiana | LOCATION | 0.96+ |
one place | QUANTITY | 0.95+ |
first | QUANTITY | 0.95+ |
Qualys Security Conference 2019 | EVENT | 0.95+ |
75 different kinds of devices | QUANTITY | 0.95+ |
theCUBE | ORGANIZATION | 0.94+ |
Dick | PERSON | 0.93+ |
thousands of people | QUANTITY | 0.93+ |
Bellagio | LOCATION | 0.93+ |
one company | QUANTITY | 0.92+ |
Breaking Analysis: The State of Cyber Security Q4 2019
>> From the SiliconANGLE Media office in Boston, Massachusetts, it's theCUBE. Now, here's your host, Dave Vellante. >> Hello, everyone, and welcome to this week's Cube Insights, powered by ETR. Today is November 8, 2019 and I'd like to address one of the most important topics in the minds of a lot of executives. I'm talking about CEOs, CIOs, Chief Information Security Officers, Boards of Directors, governments and virtually every business around the world. And that's the topic of cyber security. The state of cyber security has changed really dramatically over the last 10 years. I mean, as a cyber security observer I've always been obsessed with Stuxnet, which the broader community discovered the same year that theCUBE started in 2010. It was that milestone that opened my eyes. Think about this. It's estimated that Stuxnet cost a million dollars to create. That's it. Compare that to an F-35 fighter jet. It costs about $85-$100 million to build one. And that's on top of many billions of dollars in R&D. So Stuxnet, I mean, it hit me like a ton of bricks. That the future of war was all about cyber, not about tanks. And the barriers to entry were very, very low. Here's my point. We've gone from an era where thwarting hacktivists was our biggest cyber challenge to one where we're now fighting nation states and highly skilled organized criminals. And of course, cyber crime and monetary theft is the number one objective behind most of these security breaches that we see in the press everyday. It's estimated that by 2021 cyber crime is going to cost society $6 trillion in theft, lost productivity, recovery costs. I mean, that's just a staggeringly large number. It's even hard to fathom. Now, the other C-change is how organizations have had to respond to the bad guys. It used to be pretty simple. I got a castle and the queen is inside. We need to protect her, so what do we do? We built a mote, put it around the perimeter. Now, think of the queen as data. Well, what's happened? The queen has cloned herself a zillion times. She's left the castle. She's gone up to the sky with the clouds. She's gone to the edge of the kingdom and beyond. She's also making visits to machines and the factories and hanging out with the commoners. She's totally exposed. Listen, by 2020, there's going to be hundreds of billions of IP addresses. These are going to be endpoints and phones, TVs, cameras, tablets, automobiles, factory machines, and all these represent opportunities for the bad guys to infiltrate. This explosion of endpoints that I'm talking about is created massive exposures, and we're seeing it manifest itself in the form of phishing, malware, and of course the weaponization of social media. You know, if you think that 2016 was nuts, wait 'til you see how the 2020 presidential election plays out. And of course, there's always the threat of ransomware. It's on everybody's minds these days. So I want to try to put some of this in context and share with you some insights that we've learned from the experts on theCUBE. And then let's drill into some of the ETR data and assess the state of security, the spending patterns. We're going to try to identify some of those companies with momentum and maybe some of those that are a little bit exposed. Let me start with the macro and the challenged faced by organization and that's complexity. Here's Robert Herjavec on theCUBE. Now, you know him from the Shark Tank, but he's also a security industry executive. Herjavec told me in 2017 at the Splunk.com Conference that he thought the industry was overly complex. Let's take a look and listen. >> I think that the industry continues to be extremely complicated. There's a lot of vendors. There's a lot of products. The average Fortune 500 company has 72 security products. There's a stat that RSA this year, that there's 1500 new security start-ups every year. Every single year. How are they going to survive? And which ones do you have to buy because they're critical and provide valuable insights? And which ones are going to be around for a year or two and you're never going to hear about again? So it's a extremely challenging complex environment. >> So it's that complexity that had led people like Pat Gelsinger to say security is a do-over, and that cyber security is broken. He told me this years ago on theCUBE. And this past VM World we talked to Pat Gelsinger and remember, VMware bought Carbon Black, which is an endpoint security specialist, for $2.1 billion. And he said that he's basically creating a cloud security division to be run by Patrick Morley, who is the Carbon Black CEO. Now, many have sort of questioned and been skeptical about VMware's entrance into the space. But here's a clip that Pat Gelsinger shared with us on theCUBE this past VM World. Let's listen and we'll come back and talk about it. >> And this move in security, I am just passionate about this, and as I've said to my team, if this is the last I do in my career is I want to change security. We just not are satisfying our customers. They shouldn't put more stuff on our platforms. >> National defense issues, huge problems. >> It's just terrible. And I said, if it kills me, right, I'm going to get this done. And they says, "It might kill you, Pat." >> So this brings forth an interesting dynamic in the industry today. Specifically, Steven Smith, the CISO of AWS, at this year's Reinforce, which is their security conference, Amazon's big cloud security conference, said that this narrative that security is broken, it's just not true, he said. It's destructive and it's counterproductive. His and AWS's perspective is that the state of cloud security is actually strong. Kind of reminded me of a heavily messaged State of the Union address by the President of the United States. At the same time, in many ways, AWS is doing security over. It's coming at it from the standpoint of a clean slate called cloud and infrastructure as a surface. Here's my take. The state of security in this union is not good. Every year we spend more, we lose more, and we feel less safe. So why does AWS, the security czar, see if differently? Well, Amazon uses this notion of a shared responsibility security model. In other words, they secure the S3 buckets, maybe the EC2 infrastructure, not maybe, the EC2 infrastructure. But it's up to the customer to make sure that she is enforcing the policies and configuring systems that adhere to the EDIX of the corporation. So I think the shared security model is a bit misunderstood by a lot of people. What do I mean by that? I think sometimes people feel like well, my data's in the cloud, and AWS has better security than I do. Here I go, I'm good. Well, AWS probably does have better security than you do. Here's the problem with that. You still have all these endpoints and databases and file servers that you're managing, and that you have to make sure comply with your security policies. Even if you're all on the cloud, ultimately, you are responsible for securing your data. Let's take a listen to Katie Jenkins, the CISO of Liberty Mutual, on this topic and we'll come back. >> Yeah, so the shared responsibility model is, I think that's an important speaking point to this whole ecosystem. At the end of the day, Liberty Mutual, our duty is to protect policyholder data. It doesn't matter if it's in the cloud, if it's in our data centers, we have that duty to protect. >> It's on you. >> All right, so there you have it from a leading security practitioner. The cloud is not a silver bullet. Bad user behavior is going to trump good security every time. So unfortunately the battle goes on. And here's where it gets tricky. Security practitioners are drowning in a sea of incidents. They have to prioritize and respond to, and as you heard Robert Herjavec say, the average large company has 75 security products installed. Now, we recently talked to another CISO, Brian Lozada, and asked him what's the number one challenge for security pros. Here's what he said. >> Lack of talent. I mean, we're starving for talent. Cyber security's the only field in the world with negative unemployment. We just don't have the actual bodies to actually fill the gaps that we have. And in that lack of talent CISOs are starving. We're looking for the right things or tools to actually patch these holes and we just don't have it. Again, we have to force the industry to patch all of those resource gaps with innovation and automation. I think CISOs really need to start asking for more automation and innovation within their programs. >> So bottom line is we can't keep throwing humans at the problem. Can't keep throwing tools at the problem. Automation is the only way in which we're going to be able to keep up. All right, so let's pivot and dig in to some of the ETR data. First, I want to share with you what ETR is saying overall, what their narrative looks like around spending. So in the overall security space, it's pretty interesting what ETR says, and it dovetails into some of the macro trends that I've just shared with you. Let's talk about CIOs and CISOs. ETR is right on when they tell me that these executives no longer have a blank check to spend on security. They realize they can't keep throwing tools and people at the problem. They don't have the bodies, and as we heard from Brian Lozada. And so what you're seeing is a slowdown in the growth, somewhat of a slowdown, in security spending. It's still a priority. But there's less redundancy. In other words, less experimentation with new vendors and less running systems in parallel with legacy products. So there's a slowdown adoption of new tools and more replacement of legacy stuff is what we're seeing. As a result, ETR has identified this bifurcation between those vendors that are very well positioned and those that are losing wallet share. Let me just mention a few that have the momentum, and we're going to dig into this data in more detail. Palo Alto Networks, CrowdStrike, Okta, which does identity management, Cisco, who's coming at the problem from its networking strength. Microsoft, which recently announced Sentinel for Azure. These are the players, and some of them that are best positioned, I'll mention some others, from the standpoint spending momentum in the ETR dataset. Now, here's a few of those that are losing momentum. Checkpoint, SonicWall, ArcSight, Dell EMC, which is RSA, is kind of mixed. We'll talk about that a little bit. IBM, Symantec, even FireEye is seeing somewhat higher citations of decreased spending in the ETR surveys and dataset. So there's a little bit of a cause for concern. Now, let's remember the methodology here. Every quarter ETR asks are you green, meaning adopting this vendor as new or spending more? Are you neutral, which is gray, are you spending the same? Or are you red, meaning that you're spending less or retiring? You subtract the red from the green and you get what's called a net score. The higher the net score, the better. So here's a chart that shows a ranking of security players and their net scores. The bars show survey data from October '18, July '19, and October '19. In here, you see strength from CrowdStrike, Okta, Twistlock, which was acquired by Palo Alto Networks. You see Elastic, Microsoft, Illumio, the core, Palo Alto Classic, Splunk looking strong, Cisco, Fortinet, Zscaler is starting to show somewhat slowing net score momentum. Look at Carbon Black. Carbon Black is showing a meaningful drop in net score. So VMware has some work to do. But generally, the companies to the left are showing spending momentum in the ETR dataset. And I'll show another view on net score in a moment. But I want to show a chart here that shows replacement spending and decreased spending citations. Notice the yellow. That's the ETR October '19 survey of spending intentions. And the bigger the yellow bar, the more negative. So Sagar, the director of research at ETR, pointed this out to me, that, look at this. There are about a dozen companies where 20%, a fifth of the customer base is decreasing spend or ripping them out heading into the year end. So you can see SonicWall, CA, ArcSight, Symantec, Carbon Black, again, a big negative jump. IBM, same thing. Dell EMC, which is RSA, slight uptick. That's a bit of a concern. So you can see this bifurcation that ETR has been talking about for awhile. Now, here's a really interesting kind of net score. What I'm showing here is the ETR data sorted by net score, again, higher is better, and shared N, which is the number of shared accounts in the survey, essentially the number of mentions in that October survey with 1,336 IT buyers responded. So how many of that 1,300 identified these companies? So essentially it's a proxy for the size of the install base. So showing up on both charts is really good. So look, CrowdStrike has a 62% net score with a 133 shared account. So a fairly sizable install base and a very high net score. Okta, similar. Palo Alto Networks and Splunk, both large, continue to show strength. They got net scores of 44% and 313 shared N. Fortinet shows up in both. Proofpoint. Look at Microsoft and Cisco. With 521 and 385 respectively on the right hand side. So big install bases with very solid net scores. Now look at the flip side. Go down to the bottom right to IBM. 132 shared accounts with a 14.4% net score. That's very low. Check Point similarly. Same with Symantec. Again, bifurcation that ETR has been citing. Really stark in this chart. All right, so I want to wrap. In some respects from a practitioner perspective, the sky erectus is falling. You got increased attack surface. You've got exploding number of IP addresses. You got data distributed all over the place, tool creep. You got sloppy user behavior, overwork security op staff, and a scarcity of skills. And oh, by the way, we're all turning into a digital business, which is all about data. So it's a very, very dangerous time for companies. And it's somewhat chaotic. Now, chaos, of course, can mean cash for cyber security companies and investors. This is still a very vibrant space. So just by the way of comparison and looking at some of the ETR data, check this out. What I'm showing is companies in two sectors, security and storage, which I've said in previous episodes of breaking analysis, storage, and especially traditional storage disk arrays are on the back burner spending wise for many, many shops. This chart shows the number of companies in the ETR dataset with a net score greater than a specific target. So look, security has seven companies with a 49% net score or higher. Storage has one. Security has 18 above 39%. Storage has five. Security has 31 companies in the ETR dataset with a net score higher than 30%. Storage only has nine. And I like to think of 30% as kind of that the point at which you want to be above that 30%. So as you can see, relatively speaking, security is an extremely vibrant space. But in many ways it is broken. Pat Gelsinger called it a do-over and is affecting a strategy to fix it. Personally, I don't think one company can solve this problem. Certainly not VMware, or even AWS, or even Microsoft. It's too complicated, it's moving too fast. It's so lucrative for the bad guys with very low barriers to entry, as I mentioned, and as the saying goes, the good guys have to win every single day. The bad guys, they only have to win once. And those are just impossible odds. So in my view, Brian Lozada, the CISO that we interviewed, nailed it. The focus really has to be on automation. You know, we can't just keep using brute force and throwing tools at the problem. Machine intelligence and analytics are definitely going to be part of the answer. But the reality is AI is still really complicated too. How do you operationalize AI? Talk to companies trying to do that. It's very, very tricky. Talk about lack of skills, that's one area that is a real challenge. So I predict the more things change the more you're going to see this industry remain a game of perpetual whack a mole. There's certainly going to be continued consolidation, and unquestionably M&A is going to be robust in this space. So I would expect to see continued storage in the trade press of breaches. And you're going to hear scare tactics by the vendor community that want to take advantage of the train wrecks. Now, I wish I had better news for practitioners. But frankly, this is great news for investors if they can follow the trends and find the right opportunities. This is Dave Vellante for Cube Insights powered by ETR. Connect with me at David.Vellante@siliconangle.com, or @dvellante on Twitter, or please comment on what you're seeing in the marketplace in my LinkedIn post. Thanks for watching. Thank you for watching this breaking analysis. We'll see you next time. (energetic music)
SUMMARY :
From the SiliconANGLE Media office And the barriers to entry were very, very low. I think that the industry continues to be about VMware's entrance into the space. and as I've said to my team, I'm going to get this done. His and AWS's perspective is that the state At the end of the day, Liberty Mutual, the average large company We're looking for the right things or tools and looking at some of the ETR data, check this out.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Brian Lozada | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Katie Jenkins | PERSON | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
Symantec | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Patrick Morley | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Liberty Mutual | ORGANIZATION | 0.99+ |
Steven Smith | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Herjavec | PERSON | 0.99+ |
October '18 | DATE | 0.99+ |
$2.1 | QUANTITY | 0.99+ |
July '19 | DATE | 0.99+ |
2010 | DATE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
October '19 | DATE | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
nine | QUANTITY | 0.99+ |
14.4% | QUANTITY | 0.99+ |
62% | QUANTITY | 0.99+ |
ArcSight | ORGANIZATION | 0.99+ |
Robert Herjavec | PERSON | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
Carbon Black | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
Sagar | PERSON | 0.99+ |
seven companies | QUANTITY | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
31 companies | QUANTITY | 0.99+ |
18 | QUANTITY | 0.99+ |
20% | QUANTITY | 0.99+ |
44% | QUANTITY | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
$6 trillion | QUANTITY | 0.99+ |
F-35 | COMMERCIAL_ITEM | 0.99+ |
First | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
SonicWall | ORGANIZATION | 0.99+ |
October | DATE | 0.99+ |
Zscaler | ORGANIZATION | 0.99+ |
2021 | DATE | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
72 security products | QUANTITY | 0.99+ |
75 security products | QUANTITY | 0.99+ |
1,300 | QUANTITY | 0.99+ |
49% | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
David.Vellante@siliconangle.com | OTHER | 0.99+ |
30% | QUANTITY | 0.99+ |
2017 | DATE | 0.99+ |
Today | DATE | 0.99+ |
Checkpoint | ORGANIZATION | 0.99+ |
Illumio | ORGANIZATION | 0.99+ |
Twistlock | ORGANIZATION | 0.99+ |
132 shared accounts | QUANTITY | 0.99+ |
November 8, 2019 | DATE | 0.99+ |
Elastic | ORGANIZATION | 0.99+ |
FireEye | ORGANIZATION | 0.99+ |
M&A | ORGANIZATION | 0.99+ |
a year | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Cube Insights | ORGANIZATION | 0.99+ |
Pat | PERSON | 0.99+ |
2016 | DATE | 0.99+ |
Alex Miroshnichenko, Acronis | Acronis Global Cyber Summit 2019
>> Narrator: From Miami Beach, Florida, it's theCUBE. Covering Acronis Global Cyber Summit 2019. Brought to you by Acronis. >> Everyone welcome back to theCUBE coverage here in Miami Beach at the Fontainebleau Hotel, for Acronis' Global Cyber Summit 2019. I'm John Furrier. Two days of coverage, we're on day two, learning a lot about the global security, cyber security, and protection. Market place and Solutions. Our next guest is Alex Miroshnichenko. Also know as Alex Miro. Great to have you on. And great chatting with you prior to coming on camera. Thanks for coming on. >> My pleasure, thank you. >> So Vice President of Cyber Infrastructure for Acronis, essentially looking at your platform. That's essentially the hyperconverged stack underneath the platform software you're enabling, kind of the critical infrastructure for-- >> That's, yeah that's one-- >> the platform. >> one way to describe it. It is infrastructure we provide the complete stack. All the way whatever you're ran on top of. The standard comminuting hardware, including the virtualization layer. Capability to run the still standard container workloads. And essentially optimized for whole cyber platform. It's good enough. >> You know you're interesting background. We were talking before we came on camera about your background. Certainly you've seen waves of innovation, you've been a high performance, storage enterprise, infrastructure, engineer and developer, and executive. A lot has change in past couple of years, and certainly the past decade. You're on the vSAN wave, you saw that storage wave, and now we're in a cloud wave. Now we're on premise with hybrid. >> All right. >> So hybrid, certainly now a big part of the operating model. >> Correct. >> So the operating system is not just storage anymore, it's a system view. What's your personal opinion on where storage is now? I've heard software defined data center from VMware for years. We've even joked about software defined storage, software defined compute. >> Everything. >> I mean everything software defined, but software is the game. Scale's a game, high performance is a requirement. What's changed in storage right now? >> Well in everything and in nothing at the same time. As I said, like, remember going back to thirty years ago. It's like, "Oh gosh, the storage is exploding!" You know, soon we're going to have like two gigabytes. (laughter) You know a company server, my God! And, or, where's it going to be coming from. Like imagining when people started recording music, like they seeing this MP3 things is coming up so. >> Yeah. It's the same game, different year. More game, more storage. >> It's just like, It's this exponential curve. It's like the shape of the curve stays the same. And to be honest, I, part of me never believes that. Like come on, how much bigger can it get, and now everybody's like we get IUT line, we got like those cameras. Streaming things 24/7 and every possible thing you can think of. And of course we're going to store everything, but we obviously don't know what to do with it, but. So from that point of view, the demand keeps growing and you need, you have technologies to handle that appropriately. >> Yeah. >> And again, it's just not a matter of kind of throwing the bits somewhere and forgetting about them. It's just keeping them in the predefined order, and actually being able to process them. And Acronis in the business of a cyber protection. Some people say: "Oh you guys are just "like a back up company." I mean yeah, that's the fundamental part of that, but as you pointed in our pregame chat, as you call it. (laughter) Is, the traditional data protection guys, be that backup, you know you can think about as the various, like a raid as a way to protect your data. They are all about defending against like physical disruption as you call it, right. My disk died, my data center died. You know, my power went out. >> Yeah >> So what do I do? I was the data. But it does not protect you, what I call a logical destruction. I mean back in the classical. >> Logical disruption, what does, >> Disruption >> Okay yeah logical disruption >> Did I say this destruction?. Okay. >> Disruption. It's almost the same thing. >> Right >> I mean, ransomware is pretty much destructive. I mean it's hostage at that point. Logical meaning nonphysical, not like an event like a hurricane or outage or something like that. >> I mean you remove the wrong file, the right file and you didn't notice that. And then you went through several back up cycles and then you realize, " Oh, I want my files back" but then you, the back up that had that file is gone. I mean what are you going to do right? Nothing got disrupted, destructed or destroyed. (laughter) But your files gone. >> So logical disruptions or destructions that's happening, certainly your security points that out. >> But the security is the big thing. That's what the people didn't think about it back, definitely not like me, back twenty years ago. It's like, they. So what happens if you see some got hacked or like people, like a ransomware, right. It's specifically the product designed to muck with your storage. Encrypted, deleted, whatever they want to do there. And again, next thing you know, you're backing up junk that will keep a virus somewhere. And then you go to your back ups and then it's like oh my God, where's everything? Because it's all dead. >> So you're saying people have really strong back up and recovery, but they're recovering malware that they stored. >> Exactly. >> Yeah. >> It's like. (laughter) >> So that seem like an obvious problem, but nobody but Acronis as actually provides an integrated solution to deal with that. I mean there are different, I mean people know what the problem is and there companies out there, like we'll scan your backup archives, and will find malware backup. Fine, great. But then anybody could try to really deal with their restore, in a critical situation, knows that even without the malware concerns, it's stressful shall we say. >> Yeah and it's not always predictable. And it's post haste too. After the fact. >> Right. But if the malware is involved that's, you know, it becomes and extremely expensive and sometimes impossible operation. Acronis takes care of that. Because you know we can actually monitor your back ups. We can find out where was the last time you were clean. It's a post-hoc. We're purposely practical sort through, kind of real time scanning for viruses. So it's a multilevel cyber protection. Which is fairly, I think, >> New >> I think it's unique in the industry. >> Well I think it's interesting how you guys have brought data protection concepts and paradigm, and practice by the way into cyber with much more holistic view. >> Right. >> And I think that's like an operating system kind of thinking. And thinking holistically is about systems. And systems has consequences. If something goes wrong over here it's affecting it, all over the place. >> Right. You've got to the right software for that. >> And I have a very strong system background or DNA as they sometimes like to say that. And in fact the first virtualization solution and containers for that matter, were built by the Acronis engineering team. More than fifteen years ago, way before anybody in the Linux world new how to spell container or what they mean. So our storage layer, software defined storage, >> Yeah. it's fully blown HCI product. Complete around, understand who built that. That gives us a unique advantage among the security companies. >> You know I got to ask you a question. I'm fascinated, I'm a student of history and also of competitive advantage when it comes to technology platforms, and the one thing I always say and see is entrepreneurs whether they're young or old, is that there's two types of entrepreneurs: there's a systems thinker and a coder, right. And I think with platforms you can't short cut a platform because there's trajectory benefits, economies of scale for putting the work in. You can't just put a platform out there over night. You got to have a, you got to build it and it takes time. So there's some people trying to exhilarate platforms. Some have done the work, you guys have done it for a long time. What's your view on that whole: "Well I'm going to throw a whole platform out there." What are some of the things that get exposed when I try to push a platform too fast? >> Well, the platform presumes that you have an ecosystem, people actually using it and building stuff on top of that. Like every, you talked about the coders, every programmers, software developer, or most of them at least. They dream of two things: To write and create a new programming language. Finally the one. >> Yeah, yeah. (laughter) Or the other kind of guy is like, I'm going to write a new operating system. I went through that phase mostly an operating system. Log time ago. And it's a process. I mean whatever you build has to actually serve the purpose. >> Yup. >> There are a lots of platforms in all areas of technology that people's like: "Oh, we're going to create a set of API's "and anybody can plug into us." It's like unless you solved the real problem and really simplify life for people, they're not going to do that. They're not going to do, use a platform for the sake of using the platform. Our cyber platform is different because we're essentially exposed our API's to our technology that's out there and people has been using. I mean, I don't know you saw the keynote yesterday, there was a demo the way how to write, let's go to plug in for the sake of better term. For the person who's interviewed. When people can add their own policies to cyber protect workflow. Which could be specific to what they're doing. You know they notarize things like that. That plan the platform makes sense because it's already out there and it responds to customer demands. We love what you guys do but we have this special, a specific set of requirements. If it's general enough, incorporate it into the product but there's also a lot of things which could be specific to a vertical or even to a specific company. >> Yeah. >> We just want to enable them to do stuff. >> Well that's what platforms are they're enabling >> Right. >> They have to enable some capabilities that provides value to >> Right. >> that use case. And that can be custom or domain specific. >> I'm sorry what? >> That could be domain specific. >> Yes, I'm sorry. >> A platform enables capabilities for someone to do something. (mumbles) >> Yes, but again the key point to the platform is, it has to kind of solve a real problem, not be there for the sake of elegance, or solution, or API's or thing of that nature. >> Final question for you Alex. I'm a CIO or CSO or I'm there decision making, man you know what, I got to rethink my enterprise architecture, I got to think about, I got IoT coming, I got industrial IoT and just regular IoT, I want to have a comprehensive platform. Why Acronis, what's the pitch? And what's different than the traditional SAN's and storage and other solutions out there? What's that pitch to that enterprise decision maker about Acronis? >> Well. You kind of, like you said, you have a tremendous growth in your data flows, the number of data sources are exploding. That's actually going back to your previous question. I think that's what one of the difference is. That it's not just the volume of data, it's the breadth of the data sources you're getting that. So you kind of have to manage that cat zoo some how or it's not even a cat, I don't know. I don't know what the right world analogy for that. So how you guys going to manage that if you have to protect it? At least you have to know what your exposure is, and what the things there. And just throwing out a bunch of you know, like standard cyber, >> Point products. >> technology point products is not going to solve it. I mean yes you can hire lots of people, you can build your own thing, you would be effectively reinventing lot of wheels in the process while we already have that solution for you. >> I like the platform idea because it makes data more addressable horizontally scalable. It's not a side load. >> Right. >> (mumbles) product that you can actually work and enable the data. Data's moving around and you got to be acting on. >> Yes. >> You need software to do that. >> Yes, exactly. So that's another thing. It's not, it's like a structure data, resting on structured data. There's discussions been going on for many years. You know the reality is you will always have both types and you always have the need to process them in both ways. And that's the flexibility. >> I have one more question final question since I just popped in my head. So final, final question. What's in the infrastructure platform that you're involved in that people should know about, that they might not know about that's important to investigate? Is there a killer feature, is there a killer thing in there that is notable that they should know about? What's under the hood on the infrastructures side for Acronis? >> Well lots of things. >> What's your favorite features? >> What are you talking about? >> What's your favorite feature? What's the one thing? >> Gosh you know it's like I have lot of data and I love them all. It's kind of hard >> Yeah you can't take sides. >> It's not sides. Let's say I've been writing storage most of my career. So I like storage. But that doesn't mean it's more important or less important than other things. >> Yeah. >> Unless you have a comprehensive compute layer on top of that. The storage is just, then it becomes a storage vendor, niche vendor, so that's not who we are. I'm really fascinated by actually the integration with the like cyber feature in the security because that's on one hand it's not something that I've been doing in my previous career for most of the time, but I do have a lot of kind of understanding of the workflow issues and integration points. >> Yeah. >> And that excites me. That's one the reasons. >> Yeah. Integrated platform is one the key things. Thanks for coming on Alex. Thanks for sharing your insight. Appreciate it, first in the morning here, and well afternoon now. Thanks for coming on. >> You never know, it's like everybody is so busy. >> The Acronis inaugural Global Cyber Summit 2019. About cyber protection, not data protection. Cyber protection, they both work hand and hand. >> Right. >> This is theCUBE Coverage here in Miami Beach, I'm John Furrier, we'll be back with more after this short break (upbeat music)
SUMMARY :
Brought to you by Acronis. And great chatting with you prior to coming on camera. kind of the critical infrastructure for-- All the way whatever you're ran on top of. and certainly the past decade. certainly now a big part of the operating model. So the operating system but software is the game. It's like, "Oh gosh, the storage is exploding!" It's the same game, different year. and every possible thing you can think of. And Acronis in the business of a cyber protection. I mean back in the classical. Did I say this destruction?. It's almost the same thing. I mean it's hostage at that point. the right file and you didn't notice that. So logical disruptions or destructions It's specifically the product designed to So you're saying people have really strong It's like. an integrated solution to deal with that. After the fact. But if the malware is involved that's, you know, and paradigm, and practice by the way all over the place. You've got to the right software for that. And in fact the first virtualization solution among the security companies. And I think with platforms you can't short cut a platform Well, the platform presumes that you have an ecosystem, I mean whatever you build has to actually serve the purpose. I mean, I don't know you saw the keynote yesterday, enable them to do stuff. And that can be custom or domain specific. capabilities for someone to do something. Yes, but again the key point to the platform is, What's that pitch to That it's not just the volume of data, I mean yes you can hire lots of people, I like the platform idea because it makes data and enable the data. to do that. You know the reality is you will always have What's in the infrastructure platform Gosh you know it's like I have lot of data But that doesn't mean it's more important for most of the time, That's one the reasons. Integrated platform is one the key things. it's like everybody is so busy. Cyber protection, they both work hand and hand.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Alex Miroshnichenko | PERSON | 0.99+ |
Alex Miro | PERSON | 0.99+ |
Miami Beach | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Acronis | ORGANIZATION | 0.99+ |
Two days | QUANTITY | 0.99+ |
Miami Beach, Florida | LOCATION | 0.99+ |
two types | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
two things | QUANTITY | 0.99+ |
both types | QUANTITY | 0.99+ |
two gigabytes | QUANTITY | 0.99+ |
Alex | PERSON | 0.99+ |
both ways | QUANTITY | 0.99+ |
thirty years ago | DATE | 0.99+ |
Linux | TITLE | 0.98+ |
twenty years ago | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
one | QUANTITY | 0.97+ |
day two | QUANTITY | 0.97+ |
Global Cyber Summit 2019 | EVENT | 0.97+ |
one more question | QUANTITY | 0.96+ |
Acronis Global Cyber Summit 2019 | EVENT | 0.95+ |
Acronis' Global Cyber Summit 2019 | EVENT | 0.95+ |
first | QUANTITY | 0.92+ |
vSAN wave | EVENT | 0.92+ |
More than fifteen years ago | DATE | 0.91+ |
past decade | DATE | 0.9+ |
Fontainebleau Hotel | LOCATION | 0.89+ |
past couple of years | DATE | 0.82+ |
first virtualization | QUANTITY | 0.82+ |
one thing | QUANTITY | 0.72+ |
IUT | ORGANIZATION | 0.69+ |
Vice President | PERSON | 0.64+ |
years | QUANTITY | 0.54+ |
of | EVENT | 0.54+ |
HCI | ORGANIZATION | 0.52+ |
storage | EVENT | 0.5+ |
VMware | ORGANIZATION | 0.47+ |
Cyber | ORGANIZATION | 0.46+ |
theCUBE | ORGANIZATION | 0.35+ |
Ryan Walsh, Pax8 | Acronis Global Cyber Summit 2019
>> Announcer: From Miami Beach, Florida, it's theCUBE. Covering Acronis Global Cyber Summit 2019. Brought to you by Acronis. >> Welcome back to theCUBE's coverage. Two days here in Miami Beach at the Fontainebleau Hotel for Acronis' Global Cyber Summit 2019. I'm John Furrier, host of theCUBE. We are breaking it all down, our next guest, Ryan Walsh, co-founder and chief channel officer at Pax8. Just talking, riffing about the change in the channels. Welcome to theCUBE. >> Thank you so much, John, happy to be here. >> Thanks for coming on. >> Yeah, that's great. >> We have multiple ways of innovation now more than ever. Cloud computing, and digital products. The game is still the same but the equation changes. I've got to get a product in the hands of the customer through a channel of distribution, aka system intergraters, ISVs, VABS, VARS, resellers. Whatever the hell the word is, it's a channel. >> Ryan: That's right. >> And they want to have their customers pay them for services and have turnkey products. Okay, that old world has shifted, so now software. >> Ryan: That's right. >> You got hardware that you could buy from Acronis and others. Edge devices that can be deployed, managed over the cloud. So the cloud has kind of changed the game. >> Yes. >> You guys that started a company that's essentially born in the cloud distributor, which is interesting. So I want you to take a minute to explain Pax8, born in the cloud distributor, what does it mean? How did you get there? >> Yeah, why do we do it? >> What's the story? >> Yeah, that makes sense, the traditional distribution game was on-premise technology. Hardware, printers, software to install, ship it, right? Pick, pack, and ship. Now fast forward to a cloud game, and you'd say, well, do you need distribution? There was a thought at a time that said, well, the channel's going to get disintermediated 'cause all we're going to do is we're just going to go online and we're just going to download it. Customer's going to buy it. I don't need a channel, I don't a distributor. I'm just going to go get what I need. What we learned is that's not the case, because there are some products that you can certainly go and download an app on your phone and know how to do that. But when you're talking about small and medium-sized businesses that might not have in-house IT, it's not so easy as downloading a product. And this was a problem that we wanted to solve as Pax8. Reason we got in the game we actually, many of us came from a born-in-the-cloud software company. And we learned how powerful the channel was. In fact, we started selling direct and realized we just can't scale fast enough, so we committed to the channel. Once we did, we started selling to those partners and you might have thought, yeah, we didn't need distribution. Some of our partners said, yeah, go onto the traditional distributors line card. And when we did that we said, well, they're great at pick, pack, and ship, but as it pertains to a cloud world, it's broken. And so after we sold that company, the CEO of our company, John Street, and another co-founder, we said, well, hey let's go fix a problem, what's out there? And we said, well, distribution is broken for the cloud and that's how Pax8 came to be. >> It's interesting as a student of competitive strategy business, being an entrepreneur myself and having some experience in the channel like you guys have. It's interesting that the same mean comes around the trope, or whatever you want to call it is, oh, the middleman are going to be desegregated and it's direct-to-consumer. Now, I would argue that's true in a lot of cases, it's a bit more efficient to go direct to the consumer. Technology enables that, so downloading basic apps, media's now going direct. Yeah, middleman gets cut out, but that's undifferentiated value. And I think when you look at middlemen, people get confused between a middleman role and a supply chain. So I think what you guys are doing is cracking the code on this value and the supply chain of distribution of software to an edge or channel partner that has a relationship with customers. They don't just change over night. >> This is why we actually, I've been in meetings where we had a born-in-the cloud SaaS company show up at a channel event and at this particular event, we thought this guy was going to come in here and say, "Tell me about how great you are and why I need you." He sat in the chair and said, "Why do I need you?" I wasn't even thinking about this, right, as a channel. A year later he came back and he says, "I understand why I need you. "One, I need partners to help deliver that last mile," because the trust was already there. But more importantly, customers want solutions. And now with, you see what's happening with cloud products, Acronis being one of them, they can pull together multiple things to create a solution. And you really need to have somebody guide that tool. It is not as simple as just downloading an app and making sure that it all work for a business. It just isn't. >> High volume, low margin businesses tend to get disintermediated quickly. >> Right. >> But when there's value creation, you talk about relationship to customers, great channel players have that. And they have costs around servicing that customer. The challenge is when the cost becomes so high (laughs) to provision and serve the customer, gross margin gets hit. >> Ryan: Well this is where-- >> And if so they can eliminate that risk, why wouldn't I look at new supply chain partner or a new partner? >> This is where Pax8 comes into play, which is most partners don't have the in-house technology to build a platform, to shift if they didn't support a recurring subscription revenue model. That's not easy, because when you've shipped a box, you created a bill at that time, but now if you're selling cloud products, you've got to turn it on quickly, you've got to allow somebody to order one, two, three more seats, or gigabytes of something and you've got to make sure that the bill is accurate. That becomes very complex. Just to know what to price things at. >> We've been doing a lot of coverage and reporting on modernization of the Enterprise, cloud computing, of course, Cloud 1.0, Amazon model, Cloud 2.0 is Enterprise, and these nuances that are operationally challenging. But for CureMint, whether it's government, public sector, man, it's 1994! For CureMint, there's no modernization, you're kind of teasing out what I think is like a really big wave coming, which is the modernization of products, marketplaces, and delivery value. >> Yeah, you're right. >> Do you see it the same way? >> 100%. And what's interesting about what you're talking about, even when we started and what we're doing right now, the nuance around what you're saying has, we built things in our platform that we didn't envision in the beginning because the market said this is a problem and we need to fix this. How do you make it easy? And one example of that is, whether you're an Enterprise customer, or you're a partner, a man and service provider, providing multiple cloud solutions to a customer. What they want is, pull it all together, turn it on quickly, and make sure that I can support this technology stack. Look at what Acronis is doing, they've put together data protection and security. This is a very unique combination. Well, a lot of these customers are not just buying that, they are also buying Microsoft products. And so as they grow their stack of technology, they still want to get it as fast as they can, they don't want to pay for things that they don't use. This is the new nuance that we had to solve for this problem with our marketplace is, nobody wants inventory in a virtual world. Pay for what you use, nothing more, nothing less. And you really needed advance automation and integration to make that happen, and that's where Pax8 came in. >> Well, I think that Pax8, Acronis story is interesting because if you think about the demands of the dealer, owner, manager, or the guy who's an entrepreneur or owner of the channel or whatever that partner it is, they have to hire people. The a human resource side of the equation is super efficient, but it's also a razor edge too, right? You overdrive on human labor that has to be a trained out security, right? Why not bring in Acronis in there and Pax8, and I'm up and running with a full-blown security suite cyber protection, new category, I can bring that to market through my channel. >> That's right. >> Trust relationship is there, everything's kind of end-to-end. >> Well, what you think about, what you're saying, it's a part of our model, which is what's sexy that you talk about at first is you've got a cloud marketplace, our partners can use this thing to order multiple cloud products. That's pretty cool because they typically, they wouldn't have the capability to do that themselves. But a part of our model is Pax8 provides Tier 1 support to these partners. To your point, you have to bring on a technician, you may not know whether you're going to sell something new right in the beginning, so the fact that Pax8 can provide sales support and Tier 1 support on that product, allows a partner to figure out whether they're going to sell it, how they're going to sell it, without incurring that cost, because you have a partner like us. >> So what's your positioning relative to the competition? What do you guys offer that's different? How are you guys positioned to the channel versus some other big player? >> What we talk about, and a lot of people say, well, why would you come into this game when you have such big names, big brand recognition? They've got more money, they've got more engineers, they have some tech. But what they didn't have was cloud in your DNA. That's what we represented, so we were untethered by legacy processes, we didn't go through a pick, pack, and ship world. We were built from the ground up to be in the cloud. >> John: DevOps. >> Yeah, DevOps and high automation, this blend. The message we've taken to the street and our focus is, we're blowing up traditional distribution because you needed to think and operate differently to take advantage of the cloud. And so this is our message, our differentiation is solely around this focus on enabling a partner. And if you look at what we are, we're very selective on the cloud products, we a have cloud marketplace, but a lot of people do. The big difference is really we create a partner experience, where we're there by their side. We're not telling them what to do, we're there to make sure that they can grow their cloud footprint. >> You act as fulfillment. >> That's right, we are not-- >> John: You're a full service. >> Yeah, and there's a big difference between saying, I know you want this, can I, I'm going to place the order to, how do you introduce a new technology like Acronis to a partner who's never heard of it? They typically aren't coming in saying, well, I want Acronis and I want to buy it. It's how do you teach them? How do you show they how it works and then how do you support it? >> Channels are very efficient, as well. If you're good, you're gone, you're golden. You'll double down on it. If you suck, you're out, right? They don't tolerate dogma, so I've got to ask you, when you go into the channel, one of the things that they have, and just my observation is, they have a bar about value creation. They want partners that are going to create value. >> Ryan: That's right. >> What's your pitch to them when you're saying, what value do I bring for you, channel partner? >> So is this to Pax8? To the channel partner? >> Pax8 to the channel partner, what value are you bringing? Value creation, bring me value, I'm buying all day long. >> Yeah, Pax8 value, it's two-fold. What we're trying to do is, there's a revenue side of that value and there's a cost-efficiency side to that value. I'll start with the cost efficiency. Partners don't embrace cloud because there's friction in the cloud-buying process. It's difficult to get. The bills are difficult to consolidate, it's difficult to aggregate all of that in one place, and then ultimately make sure that that flows through their business systems. So, the value that Pax8's creating on the simplification of buying cloud, we have a technology that allows them to quickly provision, aggregate the bill, but we don't stop there. Marketplaces that stop there aren't doing enough because we hear about the buyer's journey with customers, and this is where that journey for a partner doesn't start and stop with our marketplace, they actually have tools, like professional service automation tools, where they want what we do with our marketplace to integrate into those tools. So we simplify that whole buying process. That's one huge value add that we have. On the revenue side, most of the partners that we deal with don't have time to go check out cloud products. We do all that vetting and then half our company is sales. So our internal reps help our partners get introduced, and sell-- >> You're driving revenue. >> Yeah, we're driving revenue. I'll give you an example of this value add. It's not a matter of saying, and this is what a lot of marketplaces do, they put up a bunch of tiles and say, well, go pick what you want. You're still faced with the same challenge, well, I don't know about that, I don't recognize the Acronis logo, or maybe I do but I don't know what's in that product." It's really about sales enabling, how do you do that? Well, the one way that we do this is, we go talk to partners about how to grow a cloud practice. We actually go into the field and introduce these cloud products and have partners talk to other partners about how they grew their stack of technology. And then again, we'll demonstrate it, we'll show them, we'll run through the whole thing to sell on their behalf. This is what we find is value add, so a partner doesn't have to do that. It can build a cloud practice, and they can do cost effectively. >> As a disrupter coming into the marketplace, with the cloud mindset, DevOps, you've got a lot of advantages, you can automate, you're driving revenue. Come on, it's a winning formula, you pulled that off, you're going to do well. So I wanted to get your perspective. Looking at this industry, what's the modern channel look like? I've heard all the, oh, the channel's dead, it's changing. Certainly changing. What's the new picture of the channel in your mind? >> Oh, man, I tell you, this is a great question. And one that I'm really excited about because we deal with a lot of partners that had an on-prem practice, where they would drive out and service an account. The new definition of the channel now is one that's untethered by a GEO, because they're taking advantage of cloud services and can get turned on anywhere, and can get supported anywhere. So what we're saying is, man and service providers that are showing up, and they're acting as an outsourced IT and a virtual CIO to a small business. Now to do that, what they're doing is, they're building a stack of technology, saying, when you sign with me, this is how I interact with you, I have a stack of technologies, I'll deliver it, configure it, I'll answer questions for you. And they're going even further then that. These guys are also partnering with other partners who have specialty, because what they realize is, to be a generalist it's hard to win. Now you got to be niche razor focused, because what we see is customers are now educating themselves before they call a partner, right? 70% of the research is done before they even call, so you'd better know what you're doing. And so what we're seeing is that the channel of the future is one that's focused on their specialty, they're not afraid to partner with other partners who have a specialty that their customers may want. And everyone is dealing with automation and integration. So it has to happen at the speed of light. >> John: Time to value. >> Time to value, speed to market. This is a progressive partner today, and they're growing. They're growing rapidly and they're buying each other. There's a huge M and A activity now because they recognize there's a fragmented market. So if you're really good at your focus, you really can take advantage of that. >> So speed, agility, profitability, customer satisfaction? >> Core drivers, core drivers. But then, what you need though is, there's no reason to go it alone. This is where at Pax8 you would say, well, okay, that's value for the service provider, why do you need Tier II? Well, you need to aggregate these solutions and bring it into one place for that partner. You need somebody to help them out to be by their side. This is something that we're finding, this is a part of the value chain. >> Well, I think, you know certainly directive consumer is happening, but there's still value creation opportunities out there in the new shift. Acronis is doing a good job with you guys, you think? Acronis good for you guys? >> I tell you what, Acronis is blowing up with us. We were just talking to Serguei about this, like why, why is this happening? Well, one of the things that they've done, that's really adapting to what the market wants is one, they put multiple solutions together in a single place and made that easy. Two, they made an upgrade to their user interface, so it's really easy to interact with. And so you can have a great technology, but if it's not easy to work with, customers are moving on, that's the state of reality today in the market. They put those things together at a great price, and they're maniacal about support, and so they're built to make sure that partners and their customers sort of get up and running with their product quickly. And add to that, then we've got integration with that platform and ours, now it's like it's a perfect opportunity, because now we can all move quickly, automated. This is why it's a great union. >> Ryan, thanks for coming on and sharing your insight. Take a minute to give a quick plug for Pax8. What are you guys working on? What are you guys looking to do, hire, take new territory? What's the plug? >> Pax8 is blowing up distribution and we're growing rapidly. One of the things we're focused on right now is that with the focus on the customer experience, and digitizing operations, what we're focused on now is thinking differently about how you target your customers and what they need. If you take a page of the Amazon marketplace playbook, and I'm talking about consumer products, they're really taking advantage of understanding the characteristics of each buyer. This is what Pax8's focused on for the future, so that you can really have a more targeted conversation, and focus and marketing campaign with your customers. And we're going to deliver that with our platform. >> And being cloud guys, I'm sure data's a big part of it? >> Data's a big, this is the future. We're hiring data scientists to really be prescriptive about how to target and what comes next. >> Ryan, thank you so much for sharing that insight. Good stuff, congratulations. Looking forward to tracking your progress in the industry. Thanks for coming on. >> Thank you so much, John, I appreciate it and, yeah, I look forward to talking to you in the future. >> Okay, it's theCUBE coverage from Miami Beach for Acronis' Global Cyber Summit 2019, I'm John Furrier, thanks for watching. (upbeat music)
SUMMARY :
Brought to you by Acronis. Welcome back to theCUBE's coverage. The game is still the same but the equation changes. And they want to have their customers pay them You got hardware that you could buy So I want you to take a minute to explain Pax8, the channel's going to get disintermediated in the channel like you guys have. And you really need to have somebody guide that tool. tend to get disintermediated quickly. you talk about relationship to customers, Just to know what to price things at. on modernization of the Enterprise, cloud computing, This is the new nuance that we had to solve for this problem I can bring that to market through my channel. everything's kind of end-to-end. Well, what you think about, what you're saying, well, why would you come into this game And if you look at what we are, and then how do you support it? If you suck, you're out, right? Pax8 to the channel partner, what value are you bringing? and there's a cost-efficiency side to that value. well, go pick what you want. Come on, it's a winning formula, you pulled that off, they're not afraid to partner with other partners you really can take advantage of that. This is where at Pax8 you would say, Acronis is doing a good job with you guys, you think? and so they're built to make sure that partners What are you guys looking to do, hire, take new territory? so that you can really have a more targeted conversation, about how to target and what comes next. Looking forward to tracking your progress in the industry. I look forward to talking to you in the future. for Acronis' Global Cyber Summit 2019,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Ryan | PERSON | 0.99+ |
Ryan Walsh | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Acronis | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Miami Beach | LOCATION | 0.99+ |
70% | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Two days | QUANTITY | 0.99+ |
Miami Beach, Florida | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
A year later | DATE | 0.99+ |
theCUBE | ORGANIZATION | 0.99+ |
1994 | DATE | 0.99+ |
Two | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
CureMint | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
Pax8 | ORGANIZATION | 0.97+ |
John Street | PERSON | 0.96+ |
Serguei | PERSON | 0.96+ |
Tier II | OTHER | 0.96+ |
half | QUANTITY | 0.95+ |
Pax8 | COMMERCIAL_ITEM | 0.95+ |
Acronis Global Cyber Summit 2019 | EVENT | 0.95+ |
Pax8 | PERSON | 0.94+ |
100% | QUANTITY | 0.94+ |
one example | QUANTITY | 0.93+ |
one place | QUANTITY | 0.92+ |
Acronis' Global Cyber Summit 2019 | EVENT | 0.91+ |
Cloud 2.0 | TITLE | 0.9+ |
three more seats | QUANTITY | 0.89+ |
Cloud 1.0 | TITLE | 0.88+ |
each buyer | QUANTITY | 0.88+ |
single place | QUANTITY | 0.87+ |
one way | QUANTITY | 0.79+ |
Tier 1 | OTHER | 0.78+ |
Fontainebleau Hotel | LOCATION | 0.75+ |
two-fold | QUANTITY | 0.73+ |
first | QUANTITY | 0.72+ |
playbook | COMMERCIAL_ITEM | 0.56+ |
them | QUANTITY | 0.56+ |
Philbert Shih, Structure Research | Arconis Global Cyber Summit 2019
>>From Miami beach, Florida. It's the queue covering a Chronis global cyber summit 2019 brought to you by Acronis. >>Okay. Welcome back to the cubes coverage. Everyone two days here in Miami beach at the fountain blue hotel for kronas cyber global cyber summit 2019. I'm John furrier, our next guest, Phil, she founder of structured research, do an industry analyst firm doing analysis of what's going on here. And the big story is cyber protect as a category emerging from data protection, but a lot of infrastructure going on under the knee. Phil, thanks for coming on. Appreciate it. Thanks for having me. So they got this platform, but underneath the platform they got a hyper converged stack. A lot of stories, lot of networking involved, abstraction layer, platform layer to enable Cisco services. ISV is whatnot. Um, pretty compelling. And you're seeing with cloud computing, cloud 2.0 modernization. These kind of white spaces can become categories. So I kinda like the cyber protection angle. We'll see how it's kind of developed, but you got to make it work under the hood. >>What's your take of their infrastructure, the platform, what's underneath? What's, what's going on there in your opinion? >> Yeah, I mean, I look at the world from the angle of service providers or infrastructure service providers. They come in all shapes and sizes. Uh, typically the crowd here is probably what most would classify as small to mid size. And those kinds of organizations are typically challenged when it comes to resources you have, they have, uh, you know, smaller staffs, you know, less resources to acquire development talent. And so when it comes to approaching, you know, innovative products and services to drive their business, you know, they often have to look to a third party like Acronis, >> they'll talk about them. The evolution of service providers, the deputies has changed over the decades, right? I mean, Cisco Sarvis targeted service providers, what does that means and tell goats what's a, you know, MSP, managed service providers. >>So the word service providers kind of evolving as these platforms start to become more relevant. How do you, how do you, how do you shape the market? How would you talk about the evolution of what a service provider is? >> Yeah, I mean I like to think of it as infrastructure providers, infrastructure service providers. So those that are managing third party infrastructure that lives, uh, typically in some kind of off premise, not on premise environment. Uh, that's certainly a big chunk of the audience here. Uh, those people will run data centers or they'll run multiple data centers. They might run some of their own data sets and they might run some stuff on the public cloud. Uh, and then they manage that for an end user, which could be a small business, mid size enterprise or large enterprise. >> What are the top stories in that market dynamic that you're seeing involved? >>Is it IOT? Is it the SLA, is the required for latency? What are some of the dynamics going on and then that serves provided market? I mean, I think the big thing today is a boil it all down is the impact of hyperscale and what that does to market that these service providers playing. So you have hyperscale just grabbing huge chunks of the infrastructure and it real estate out there. And how that affects MSPs or service providers is that Hey, there's probably a little less market than you would have, like pre hyperscale. And so what that forces them to do is to do two things, I think, uh, which is a specialized focus, uh, and try to drive value from the infrastructure you do get to host or manage or run on, on the public cloud. So that brings the punchline here to be, you know, it's all about value add. >>What is the value add? Well, you know, this is how kind of a kronas came there. They understood that, you know, organizations that are a little more specialized like to work with service providers, they need to backup up infrastructure. They have security requirements, they have compliance requirements, and then, uh, they have to deliver that to the customer. Uh, and being able to do all that is sometimes can be difficult. But if you work with a third party like, what they've done is, you know, package that for you, hence the cyber platform so that people can basically, you know, turn the key and be able to deliver those kinds of services. And get back to focusing on what they're good at, managing customers and dealing with them. What's been the reaction, your opinion on what's happening with the crunch value proposition? Because again, like you said, these they want to differentiate ed services to around it seems like a good opportunity. >>Is it resonating well with um, infrastructure service providers? No, no, I think so because of where, as I mentioned where we are in the marketplace, you know, hyper scale is maybe 10, the public cloud, maybe 10, 12 years old. Uh, and you know, it took some time for, you know, to MSP server the feel it, uh, and now they're reacting, right? The market is changing, customer requirements, becoming more sophisticated and they're saying, Hey, listen, we've got to get out there and do something. So absolutely anything that drives value add on top of, let's call it commodity. Come on. I don't want to use that word. Plain vanilla infrastructure infrastructure. Uh, yeah, anything above value add. I mean, we saw the global service providers like Assensure and these guys doing the same thing because their days were numbered on the consultant and they're building their own sets of services. >>Why wouldn't they? I mean, it's a whole nother cloud expansion opportunity for people with expertise. Why wouldn't they want to increase their gross profits would deliver services on top of something like this. So, so I've got to ask you, um, on the, on the research section, how big is the Tam and you're in this market that, that's in there? I mean, what's it, what's a size? Is it changing? Is it shifting or is it more than saying no, it's definitely, I like to think of, you know, the world, like there's many ways to look at it. Uh, you know, some people throw around the word, sorry, the number $1 trillion a night to spending. Um, but what I like to do is look at, at least for a lot of the guys here, what they're doing is they're managing infrastructure or hosting infrastructure on a third party basis. >>And that means the customer, the end user letting go, not running it themselves in house, in server closets and their own it, their own data centers. Yeah. Uh, and in terms of going from that model, which is a traditional model to outsource infrastructure and all its flavors, you know, we're still not, you know, we use the baseball analogy. Uh, you know, we're not, we used to say that we're in the first or second any further along now, but we definitely haven't hit the seventh inning stretch. So we're middle innings, we're like middle innings of this game. I would argue maybe only the third or fourth. Anyway. Yeah. Um, and not only that, if you think so you can think of that as, Hey, if you put a number on the total value and we're only 30% of the way there, there's still all that addressable market left. >>But you also have to think about all the new workloads, content applications that are being built and created. They are invariably moving to either the public cloud or something that an MSP or a third party or third party provider would touch. So it's a big one. Yeah, it's a big market and the, and, and this channel businesses are very efficient. I was talking earlier with, with the sales guys here who runs growth, it's like they don't mess around. Like they're pretty efficient and if it works they can take it and they run with it doesn't as feedback comes back pretty quick. Yeah. So I can see MSPs liking this kind of approach. The question that I have is that, you know, the adding tier at this show, one of the top stories is they're opening up API APIs. They are doing some developer reaction questions. >>Does that develop our action translate down into like say storage and these other areas? What's your take on the ecosystem and developers specifically opportunity cause ecosystems. The nice to Acronis they have some success there. Now they have a developer piece to it. What's your assessment of that developer angle? No, absolutely. It's important, uh, because they need everybody to get together. They need the ecosystem come together to try to innovate. Uh, if you're looking at, if you're managing infrastructure, you're competing against some pretty innovative platforms. And, and we know the names of those, uh, and the resources they can put at, they can throw it that are just, they're, they're unbelievable. So smaller providers have to team up, they have to work together, they have to work in an ecosystem, you have to encourage each other. And what Kronos I think is doing a great job of is creating a venue and a platform for them to say, Hey you guys, you can be part of this channel. >>You can also work. We're going to open up our platform so that you can innovate and build cool tools that we haven't thought of of building that are specific maybe to your use case and maybe another provider can use them as well. Platforms are hard to figure out and hard to, easy to say, hard to do. But I think one of the validations that I always look for for platforms is, is there an enabling technology angle? Is there a disruptive enable that's gonna create some enablement and then true, what's the valuation value validation from an ecosystem. So I can talk platform, it's like a dance floor. How many people are on the dance floor, you know, if the music is good here, the platform's good, the ecosystem rises up and you can see it. Absolutely. That's a key thing. Feel. Take a minute to talk about the structure research. >>Okay. What do you guys do and what's your, what's your focus, um, how long you've been doing it and what do you see evolve and give a quick plug for what you're working on. Yeah, we're a eight year old firm. We were founded in 2012. Uh, we're based in Toronto. Uh, we yourself as a smaller focused, uh, boutique research firm. Uh, so we cover, uh, we don't cover multiple sectors. We covered infrastructure services, what some people call internet infrastructure, uh, but we live and breathe on a daily basis. The life of the service provider and that service provider could be one, you know, a 10 man shop that's walking around here. There are many of those all the way up to, to a Rackspace, uh, to, uh, the hyperscale clouds as well as the underlying data center infrastructure, uh, encompassing real estate facilities. You guys are laser focused absolutely. >>Service rider is what we all the vote. You know, we have six man analyst team. So yeah we only have time to focus on this. I mean, yeah, what we do is what we've taken with it is try to take a, a global approach to, so we're, we're based in North America. Uh, but we uh, we, we do a lot of research and food just feels to me, I mean I'm not in the, in the weeds of details that you guys are, cause you're laser focused on that. But Dave a lot and I always talk on the Q about how the rich are getting richer, the bigger getting bigger and it's really been sucking in the like that title waves of the beach wave from South and there's a tsunami of, of the hyperscalers dominating. But it's interesting that with the IOT opportunity you start to see him with machine learning and AI kind of really out front you seeing a Renaissance of what I call domain specific apps and services. >>And we think that this is going to create a massive innovation around what I call tier one be or two clouds. Why not build on Google, Amazon or Azure and create a unique service provider model for something that's very domain specific. I mean, that's seems like a great business opportunity. Why? I mean, it's a been a part of the space and I think more so we're headed there faster. And, and you know, to your earlier question, you know, where the impact of hyperscale cloud, how it's taken out certain parts of the more commodity parts of the business and then it's driven service riders who go to pockets of value. You know, we did a panel earlier on, you know, that featured for service providers that had decided to take a vertically focused strategy. So get into areas where their specific expertise with certain platforms or certain software packages, uh, you know, targeted that. >>And then the kind of customers they use, those have specific security and compliance requirements, certain backup NDR requirements that obviously Acronis is more than happy to enable and then these service miters deliver that. So yeah, you absolutely could see, you know, people popping up. Yeah. Doing kind of have an entire business focused on just serving the specific requirements on financial services, uh, for even the dental sector. Uh, and yeah, and they can run on, on private infrastructure, but they also can run on the public cloud. There's a lot of marketplaces popping up too. I had the Ingram micro on Amazon's got a market Wade's, Google's gonna have one. They ever going to have these marketplaces for their clouds. How does multi-cloud fit into your world? First of all, I think multicloud is just BS. Me personally, but I think everyone has multiple cloud providers. If you've upgraded with office three 65 you technically have Azure. >>It doesn't mean that you're using Azure. That's like you might have an Amazon and Google, but know people might have multiple clouds, but hybrid seems to be the operating model. How does hybrid and this hype around multi-cloud impact your research area in any way or? Yeah, absolutely. I mean, you know, we care about how people deploy their infrastructure and we closely track how, you know, the way they do it and how those patterns change. You know, I would say I would slightly disagree. I think multicloud they starting, I would probably agree that it's not very pervasive. Yeah, it's not, it's not very pervasive, but it is a model we've tracked, uh, and sorry and uses. We've seen, uh, I have definitely, you know, taken a liking to that or at least are putting that on the roadmap and saying, Hey, listen, you know, if we're going to build, you know, most of the architectures that are being built are hybrid. >>Uh, but how w I think the question is in what way? Or how are they hybrid? Does that mean I'm running exclusively on the public cloud and running on AWS and Google for other stuff? Am I running private infrastructure on premise? And then in a private cloud and on backing that up to say the public cloud, there's so many different ways to do it. So, you know, it's interesting. Fill your brain. First of all. I agree. Well, we could debate, I love to have debates, but to me, I think you're right. I look at multicloud in terms of the hype. Hype is good, but you've always gotta be careful of it. Not over, you know, overplay their card on that. But yeah, I would see that multi-cloud basically to me is multi-vendor. I've got I got it. So as that shakes out, that's going to be an operational dynamic. >>And I think that's going to be interesting to see how a company will operationalize their tech stacks to deal with the multi-vendor or multi-cloud case because the workload shouldn't care. Ideally, if it's true multi-cloud, none of my workload, I mean she should run right. And so I haven't seen a lot of that across multiple clouds and some peoples have use case analytics. I get that. But like running a workload on any cloud, probably not there yet. Not there yet. All right. What's the coolest, coolest thing that you're covering right now that you think is important for folks to know that in your space, what's the top burning issues of your sector? Yeah, I mean, I would say that, you know, just the global build out of the cloud, the hyperscale clouds, you know, that short list of very big platforms. He's going, you know, global at a rapid speed. >>Uh, and also just the pace at which they are expanding is just incredible. And that's not just the infrastructure but also just the product and service development. Just the tool sets have gone from dozens to hundreds to probably thousands. You know, as we're speaking right now, just the pace at which this is growing is just, you know, pretty tough to comprehend and it's tough to comprehend because not that long ago we were debating, you know, what is the cloud? Or yeah, running, I as, yeah, I'm running a few things on the cloud, but now people are making much bigger bets. There are businesses now out there that you use on your phone that are run completely on the cloud. I mean, that's, that's big. And I mean, just go back with the, has been around for 10 years riding this wave and covering it. Remember OpenStack? Yeah, of course. >>Hold up a second. Just a hyperscaler just blew that away, just, and then found his place. No, that's just crazy. Great time. Yeah. And I think it's, it's, it's the, you're right, the, the pace at which things are changing is incredible. And we're, the other thing, you know, to answer my second part to the question was not only going to, we're following the global buildup, but at the same time almost kind of paradoxically, like we're talking now and I think it's a really exciting part of RV searches. He's the edge. So the decentralization, you know, everything is building out really rapidly into the, you know, compute as an it infrastructure is consolidate around centralized locations, you know, but now how do we hit mobile eyeballs are eyeballs in kind of more distant locations. And so yeah, edge infrastructure or the decentralization, uh, is we're really excited about, I think edge is beautiful thing. >>It's gonna open up. And by the way, we were talking last night, bunch of the sales guys here, I always like to debate them. Their edge is a box, but there's the deeper edge. There's also deep edge or outer edge, right? This human's right. So there's edge edge, so it's just so many surface points now. It's just manageable challenge. Yeah, there's edge on a kind of like on a geographic basis and then there's edge, you know, how close to the user's device can you get. And that device may not be static. Right. They'll be moving around. So yeah. Well, Phil, thanks for the great insight of structured research. Is there a URL for your site? Yes. Structure research.net structured research.net check it out. Hyper focused on service providers and infrastructure. Super important area as the clouds continue to grow as hybrid multicloud. Certainly IOT is going industrial IOT from national security and physical security to digital security. All big a part of it. Data as the pay is going to be there. Storage and compute. Phil, thanks for coming. I appreciate it. Thanks for having coverage here. Miami beach. I'm John furrier back with more coverage after this short break.
SUMMARY :
global cyber summit 2019 brought to you by Acronis. but you got to make it work under the hood. you know, innovative products and services to drive their business, you know, they often have to look to a third party like you know, MSP, managed service providers. How would you talk about the evolution that's certainly a big chunk of the audience here. So that brings the punchline here to be, you know, hence the cyber platform so that people can basically, you know, Uh, and you know, it took some time for, you know, Uh, you know, some people throw around the word, you know, we're still not, you know, we use the baseball analogy. you know, the adding tier at this show, one of the top stories is they're opening up API APIs. they have to work together, they have to work in an ecosystem, you have to encourage each other. How many people are on the dance floor, you know, if the music is good here, the platform's good, could be one, you know, a 10 man shop that's walking around here. and food just feels to me, I mean I'm not in the, in the weeds of details that you guys are, cause you're laser focused on that. And, and you know, to your earlier question, you know, where the impact of hyperscale So yeah, you absolutely could see, you know, people popping up. are putting that on the roadmap and saying, Hey, listen, you know, if we're going to build, you know, most of the architectures that are being So, you know, it's interesting. the hyperscale clouds, you know, that short list of very big platforms. were debating, you know, what is the cloud? you know, everything is building out really rapidly into the, you know, compute as an it infrastructure you know, how close to the user's device can you get.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Phil | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
2012 | DATE | 0.99+ |
Toronto | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Dave | PERSON | 0.99+ |
10 | QUANTITY | 0.99+ |
Acronis | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
third | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
North America | LOCATION | 0.99+ |
fourth | QUANTITY | 0.99+ |
John furrier | PERSON | 0.99+ |
Philbert Shih | PERSON | 0.99+ |
two days | QUANTITY | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
second | QUANTITY | 0.99+ |
dozens | QUANTITY | 0.99+ |
Miami beach | LOCATION | 0.99+ |
Assensure | ORGANIZATION | 0.99+ |
seventh inning | QUANTITY | 0.99+ |
12 years | QUANTITY | 0.99+ |
10 man | QUANTITY | 0.99+ |
30% | QUANTITY | 0.98+ |
second part | QUANTITY | 0.98+ |
hundreds | QUANTITY | 0.98+ |
six man | QUANTITY | 0.98+ |
two things | QUANTITY | 0.98+ |
thousands | QUANTITY | 0.98+ |
Chronis global cyber summit 2019 | EVENT | 0.97+ |
Azure | TITLE | 0.97+ |
last night | DATE | 0.96+ |
today | DATE | 0.96+ |
Miami beach, Florida | LOCATION | 0.96+ |
10 years | QUANTITY | 0.94+ |
one | QUANTITY | 0.94+ |
Ingram | ORGANIZATION | 0.94+ |
First | QUANTITY | 0.94+ |
two clouds | QUANTITY | 0.93+ |
Cisco Sarvis | ORGANIZATION | 0.92+ |
Kronos | ORGANIZATION | 0.92+ |
kronas | EVENT | 0.92+ |
Azure | ORGANIZATION | 0.9+ |
tier one | QUANTITY | 0.89+ |
Arconis Global Cyber Summit 2019 | EVENT | 0.89+ |
$1 trillion a night | QUANTITY | 0.86+ |
Wade | PERSON | 0.84+ |
cyber global cyber summit 2019 | EVENT | 0.83+ |
eight year old | QUANTITY | 0.83+ |
research.net | OTHER | 0.77+ |
multicloud | ORGANIZATION | 0.69+ |
waves of the beach wave | EVENT | 0.68+ |
Structure | ORGANIZATION | 0.56+ |
OpenStack | TITLE | 0.52+ |
65 | QUANTITY | 0.24+ |