Image Title

Search Results for Cybersecurity Summit:

Rupesh Chokshi, AT&T Cybersecurity | Fortinet Security Summit 2021


 

>>From around the globe. It's the cube covering Fortinet security summit brought to you by Fortinet. >>Welcome back to the cube. Lisa Martin here at the Fordham het championship security summit. Napa valley has been beautiful and gracious to us all day. We're very pleased to be here. I'm very pleased to welcome a first-timer to the cube. Rupesh Chuck Chuck Xi, VP a T and T cybersecurity and edge solutions at, at and T cybersecurity. Refresh. Welcome. >>Thank you. Thank you so much for having me, Lisa, I'm looking forward to our conversation today. >>Me too. First of all, it's we're in Napa we're outdoors. It's beautiful venue, no complaints, right? We're at a golf PGA tournament. Very exciting. Talk to me about the at and T Fordanet relationship. Give me, give me an, a good insight into the partnership. >>Sure, sure. So, as you said, you know, beautiful weather in California, Napa it's my first time. Uh, so it's kind of a new experience for me going back to your question in terms of the relationship between eight P and T and Ford in that, uh, a long lasting, you know, 10 plus years, you know, hand in hand in terms of the product, the technology, the capabilities that we are brought together in the security space for our customers. So a strategic relationship, and I'm so thrilled to be here today as a, Fordanet invited us to be part of the championship. Tommy, >>Talk to me. So your role VP of, and T cybersecurity and edge solutions, give me an, a deep dive into what's in your purview. >>Sure, sure. So I, uh, sort of, you know, run the PNL or the profit and loss center for product management for all of at and T cybersecurity and ed solutions and the whole concept behind putting the teams together is the convergence in networking and security. Um, so, you know, we are supporting the entire customer continuum, whether it's a fortune 50, the fortune 1000 to mid-market customers, to small businesses, to, you know, government agencies, you know, whether it's a local government agency or a school district or a federal agency, et cetera. And my team and I focus on bringing new product and capabilities to the marketplace, you know, working with our sales team from an enablement perspective, go to market strategy. Um, and the whole idea is about, uh, you know, winning in the marketplace, right? So delivering growth and revenue to the business, >>Competitive differentiation. So we've seen so much change in the last year and a half. I know that's an epic understatement, but we've also seen the proliferation at the edge. What are some of the challenges that you're seeing and hearing from customers where that's concerned >>As you stated, right. There's a lot happening in the edge. And sometimes the definition for edge varies when you talk with different people, uh, the way we look at it is, you know, definitely focused on the customer edge, right? So if you think about many businesses, whether I am a, a quick serve restaurant or I'm a banking Institute or a financial services or an insurance agency, or I'm a retail at et cetera, you know, lots of different branches, lots of different transformation taking place. So one way of approaching it is that when you think about the customer edge, you see a lot of virtualization, software driven, a lot of IOT endpoints, et cetera, taking place. So the cyber landscape becomes more important. Now you're connecting users, devices, capabilities, your point of sale system to a multi-cloud environment, and that, you know, encryption of that data, the speed at which it needs to happen, all of that is very important. And as we think ahead with 5g and edge compute and what that evolution revolution is going to bring, it's going to get even more excited because to me, those are kind of like in a playgrounds of innovation, but we want to do it right and keep sort of, you know, cyber and security at the core of it. So we can innovate and keep the businesses safe. >>How do you help customers to kind of navigate edge cybersecurity challenges and them not being synonymous? >>That's a great, great question. You know, every day I see, you know, different teams, different agendas, different kinds of ways of approaching things. And what I tell customers and even my own teams is that, look, we have to have a, a blueprint and architecture, a vision, you know, what are the business outcomes that we want to achieve? What the customer wants to achieve. And then start to look at that kind of technology kind of convergence that is taking place, and especially in the security and the networking space, significant momentum on the convergence and utilize that convergence to create kind of full value stack solutions that can be scaled, can be delivered. So you are not just one and done, but it's a continuous innovation and improvement. And in the security space, you need that, right. It's never going to be one and done. No >>We've seen so much change in the last year. We've seen obviously this rapid pivot to work from home that was overnight for millions and millions of people. We're still in that too. A fair amount. There's a good amount of people that are still remote, and that probably will be permanently there's. Those that are going to be hybrid threat landscape bloated. I was looking at and talking with, um, 40 guard labs and the, the nearly 11 X increase in the last 12 months in ransomware is insane. And the ransomware as a business has exploded. So security is a board level conversation for businesses I assume in any. >>Absolutely. Absolutely. I agree with you, it's a board level conversation. Security is not acknowledged the problem about picking a tool it's about, you know, the business risk and what do we need to do? Uh, you mentioned a couple of interesting stats, right? So we've seen, uh, you know, two things I'll share. One is we've seen, you know, 440 petabytes of data on the at and T network in one average business day. So 440 petabytes of data. Most people don't know what it is. So you can imagine the amount of information. So you can imagine the amount of security apparatus that you need, uh, to Tofino, protect, and defend and provide the right kind of insights. And then the other thing that VOC and along the same lines of what you were mentioning is significant, you know, ransomware, but also significant DDoSs attacks, right? So almost like, you know, we would say around 300% plus said, DDoSs mitigations that we did from last year, you know, year over year. >>So a lot of focus on texting the customer, securing the end points, the applications, the data, the network, the devices, et cetera. Uh, the other two points that I want to mention in this space, you know, again, going back to all of this is happening, right? So you have to focus on this innovation at the, at the speed of light. So, you know, artificial intelligence, machine learning, the software capabilities that are more, forward-looking have to be applied in the security space ever more than ever before, right. Needs these do, we're seeing alliances, right? We're seeing this sort of, you know, crowdsourcing going on of action on the good guys side, right? You see the national security agencies kind of leaning in saying, Hey, let's together, build this concept of a D because we're all going to be doing business. Whether it's a public to public public, to private, private, to private, all of those different entities have to work together. So having security, being a digital trust, >>Do you think that the Biden administrations fairly recent executive order catalyst of that? >>I give it, you know, the president and the, the administration, a lot of, you know, kudos for kind of, and then taking it head on and saying, look, we need to take care of this. And I think the other acknowledgement that it is not just hunting or one company or one agency, right? It's the whole ecosystem that has to come together, not just national at the global level, because we live in a hyper connected world. Right. And one of the things that you mentioned was like this hybrid work, and I was joking with somebody the other day that, and really the word is location, location, location, thinking, network security, and networking. The word is hybrid hybrid hybrid because you got a hybrid workforce, the hybrid cloud, you have a hybrid, you have a hyper-connected enterprise. So we're going to be in this sort of, you know, hybrid for quite some time are, and it has to >>Be secure and an org. And it's, you know, all the disruption of folks going to remote work and trying to get connected. One beyond video conference saying, kids are in school, spouse working, maybe kids are gaming. That's been, the conductivity alone has been a huge challenge. And Affordanet zooming a lot there with links to us, especially to help that remote environment, because we know a lot of it's going to remain, but in the spirit of transformation, you had a session today here at the security summit, talked about transformation, formation plan. We talk about that word at every event, digital transformation, right? Infrastructure transformation, it security. What context, where you talking about transformation in it today? What does it transformation plan mean for your customers? >>That's a great question because I sometimes feel, you know, overused term, right? Then you just take something and add it. It's it? Transformation, network, transformation, digital transformation. Um, but what we were talking today in, in, in the morning was more around and sort of, you know, again, going back to the network security and the transformation that the customers have to do, we hear a lot about sassy and the convergence we are seeing, you know, SD van takeoff significantly from an adoption perspective application, aware to experiences, et cetera, customers are looking at doing things like internet offload and having connectivity back into the SAS applications. Again, secure connectivity back into the SAS applications, which directly ties to their outcomes. Um, so the, the three tenants of my conversation today was, Hey, make sure you have a clear view on the business outcomes that you want to accomplish. Now, the second was work with a trusted advisor and at and T and in many cases is providing that from a trusted advisor perspective. And third, is that going back to the one and done it is not a one and done, right? This is a, is a continuous process. So sometimes we have to be thinking about, are we doing it in a way that we will always be future ready, will be always be able to deal with the security threats that we don't even know about today. So yeah, >>You bring up the term future ready. And I hear that all the time. When you think of man, we really weren't future ready. When the pandemic struck, there was so much that wasn't there. And when I was talking with 49 earlier, I said, you know, how much, uh, has the pandemic been a, uh, a catalyst for so much innovation? I imagine it has been the same thing that >>Absolutely. And, you know, I remember, you know, early days, February, March, where we're all just trying to better understand, right? What is it going to be? And the first thing was, Hey, we're all going to work remote, is it a one week? Is it a two week thing? Right? And then if you're like the CIO or the CSO or other folks who are worried about how am I going to give the productivity tools, right. Businesses in a one customer we work with, again, tobacco innovation was said, Hey, I have 20,000 call center agents that I need to take remote. How do you deliver connectivity and security? Because that call center agent is the bloodline for that business interacting with their end customers. So I think, you know, it is accelerated what would happen over 10 years and 18 months, and it's still unknown, right? So we're still discovering the future. >>There's a, there will be more silver linings to come. I think we'll learn to pick your brain on, on sassy adoption trends. One of the things I noticed in your abstract of your session here was that according to Gardner, the convergence of networking and security into the sassy framework is the most vigorous technology trend. And coming out of 2020, seeing that that's a big description, most vigorous, >>It's a big, big description, a big statement. And, uh, we are definitely seeing it. You know, we saw some of that, uh, in the second half of last year, as the organizations were getting more organized to deal with, uh, the pandemic and the change then coming into this year, it's even more accelerated. And what I mean by that is that, you know, I look at sort of, you know, three things, right? So one is going back to the hybrid work, remote work, work from anywhere, right. So how do you continue to deliver a differentiated experience, highly secure to that workforce? Because productivity, human capital very important, right? The second is that there's a back and forth on the branch transformation. So yes, you know, restaurants are opening back up. Retailers are opening back up. So businesses are thinking about how do I do that branch transformation? And then the third is explosive business IOT. So the IOT end points, do you put into manufacturing, into airports in many industries, we continue to see that. So when you think about sassy and the framework, it's about delivering a, a framework that allows you to protect and secure all of those endpoints at scale. And I think that trend is real. I've seen customer demand, we've signed a number of deals. We're implementing them as we speak across all verticals, healthcare, retail, finance, manufacturing, transportation, government agencies, small businesses, mid-sized businesses. >>Nope, Nope. Not at all. Talk to me about, I'm curious, you've been at, at and T a long time. You've seen a lot of innovation. Talk, talk to me about your perspectives on seeing that, and then what to you think as a silver lining that has come out of the, the acceleration of the last 18 months. >>She and I, I get the question, you know, I've been with at and T long time. Right. And I still remember the day I joined at T and T labs. So it was one of my kind of dream coming out of engineering school. Every engineer wants to go work for a brand that is recognized, right. And I, I drove from Clemson, South Carolina to New Jersey Homedale and, uh, I'm still, you know, you can see I'm still having the smile on my face. So I've, you know, think innovation is key. And that's what we do at, at and T I think the ability to, um, kind of move fast, you know, I think what the pandemic has taught us is the speed, right? The speed at which we have to move the speed at which we have to collaborate the speed at which we have to deliver, uh, to agility has become, you know, the differentiator for all of us. >>And we're focusing on that. I also feel that, uh, you know, there have been times where, you know, product organizations, technology organizations, you know, we struggle with jumping this sort of S-curve right, which is, Hey, I'm holding onto something. Do I let go or not? Let go. And I think the pandemic has taught us that you have to jump the S-curve, you have to accelerate because that is where you need to be in, in a way, going back to the sassy trend, right. It is something that is real, and it's going to be there for the next three to five years. So let's get ready. >>I call that getting comfortably uncomfortable, no businesses safe if they rest on their laurels these days. I think we've learned that, speaking of speed, I wanna, I wanna get kind of your perspective on 5g, where you guys are at, and when do you think it's going to be really impactful to, you know, businesses, consumers, first responders, >>The 5g investments are happening and they will continue to happen. And if you look at what's happened with the network, what at and T has announced, you know, we've gotten a lot of kudos for whatever 5g network for our mobile network, for our wireless network. And we are starting to see that, that innovation and that innovation as we anticipated is happening for the enterprise customers first, right? So there's a lot of, you know, robotics or warehouse or equipment that needs to sort of, you know, connect at a low latency, high speed, highly secure sort of, you know, data movements, compute edge that sits next to the, to the campus, you know, delivering a very different application experience. So we're seeing that, you know, momentum, uh, I think on the consumer side, it is starting to come in and it's going to take a little bit more time as the devices and the applications catch up to what we are doing in the network. And if you think about, you know, the, the value creation that has happened on, on the mobile networks is like, if you think about companies like Uber or left, right, did not exist. And, uh, many businesses, you know, are dependent on that network. And I think, uh, it will carry on. And I think in the next year or two, we'll see firsthand the outcomes and the value that it is delivering you go to a stadium at and T stadium in Dallas, you know, 5g enabled, you know, that the experience is very different. >>I can't wait to go to a stadium again and see it came or live music. Oh, that sounds great. Rubbish. Thank you so much for joining me today, talking about what a T and T is doing with 49, the challenges that you're helping your customers combat at the edge and the importance of really being future. Ready? >>Yes. Thank you. Thank you so much. Really appreciate you having me. Thanks for 49 to invite us to be at this event. Yes. >>Thank you for refresh talk. She I'm Lisa Martin. You're watching the cube at the 40 net championship security summits.

Published Date : Sep 14 2021

SUMMARY :

security summit brought to you by Fortinet. a first-timer to the cube. Thank you so much for having me, Lisa, I'm looking forward to our conversation today. Talk to me about the at and T Fordanet uh, a long lasting, you know, 10 plus years, you know, hand in hand So your role VP of, and T cybersecurity and edge solutions, give me an, Um, and the whole idea is about, uh, you know, What are some of the challenges that you're but we want to do it right and keep sort of, you know, cyber and security at the core of a vision, you know, what are the business outcomes that we want to achieve? And the ransomware as a business acknowledged the problem about picking a tool it's about, you know, the business risk and what do mention in this space, you know, again, going back to all of this is happening, So we're going to be in this sort of, you know, hybrid for quite some time are, And it's, you know, all the disruption of folks going to remote in, in the morning was more around and sort of, you know, again, going back to the network security And when I was talking with 49 earlier, I said, you know, how much, uh, has the pandemic been you know, it is accelerated what would happen over 10 years and 18 months, and it's One of the things I noticed in your abstract of your session here was that according to Gardner, So the IOT end points, do you put into manufacturing, seeing that, and then what to you think as a silver lining that has come out of the, She and I, I get the question, you know, I've been with at and T long time. I also feel that, uh, you know, there have been times where you guys are at, and when do you think it's going to be really impactful to, you know, that needs to sort of, you know, connect at a low latency, high speed, Thank you so much for joining me today, talking about what a T and T is doing with Thank you so much. Thank you for refresh talk.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Rupesh ChokshiPERSON

0.99+

Lisa MartinPERSON

0.99+

UberORGANIZATION

0.99+

LisaPERSON

0.99+

440 petabytesQUANTITY

0.99+

NapaLOCATION

0.99+

TommyPERSON

0.99+

2020DATE

0.99+

millionsQUANTITY

0.99+

one weekQUANTITY

0.99+

440 petabytesQUANTITY

0.99+

last yearDATE

0.99+

thirdQUANTITY

0.99+

Rupesh Chuck Chuck XiPERSON

0.99+

Napa valleyLOCATION

0.99+

two weekQUANTITY

0.99+

10 plus yearsQUANTITY

0.99+

TofinoORGANIZATION

0.99+

todayDATE

0.99+

secondQUANTITY

0.99+

New Jersey HomedaleLOCATION

0.99+

FortinetORGANIZATION

0.99+

one companyQUANTITY

0.99+

FebruaryDATE

0.98+

DallasLOCATION

0.98+

one agencyQUANTITY

0.98+

two pointsQUANTITY

0.98+

next yearDATE

0.98+

first timeQUANTITY

0.98+

GardnerPERSON

0.98+

OneQUANTITY

0.98+

over 10 yearsQUANTITY

0.98+

three tenantsQUANTITY

0.98+

one customerQUANTITY

0.98+

two thingsQUANTITY

0.98+

20,000 call center agentsQUANTITY

0.98+

around 300%QUANTITY

0.97+

pandemicEVENT

0.97+

three thingsQUANTITY

0.97+

FordORGANIZATION

0.97+

MarchDATE

0.96+

oneQUANTITY

0.96+

Fortinet Security Summit 2021EVENT

0.95+

FordanetORGANIZATION

0.95+

Clemson, South CarolinaLOCATION

0.94+

last year and a halfDATE

0.93+

FirstQUANTITY

0.91+

first thingQUANTITY

0.91+

18 monthsQUANTITY

0.9+

eightQUANTITY

0.9+

40 guard labsQUANTITY

0.89+

Fordham het championship security summitEVENT

0.89+

TPERSON

0.88+

millions of peopleQUANTITY

0.88+

AT&T CybersecurityORGANIZATION

0.88+

this yearDATE

0.88+

T and TORGANIZATION

0.87+

firstQUANTITY

0.87+

five yearsQUANTITY

0.86+

one wayQUANTITY

0.83+

California, NapaLOCATION

0.83+

twoDATE

0.83+

T FordanetORGANIZATION

0.83+

Fortinet security summitEVENT

0.82+

second half of last yearDATE

0.78+

49DATE

0.74+

one average businessQUANTITY

0.74+

last 18 monthsDATE

0.74+

last 12 monthsDATE

0.72+

threeQUANTITY

0.7+

40 net championship security summitsEVENT

0.7+

nearly 11 XQUANTITY

0.7+

BidenORGANIZATION

0.66+

VOCORGANIZATION

0.65+

TORGANIZATION

0.64+

Matt Olsen, IronNet Cybersecurity | AWS Public Sector Summit 2018


 

>> Live from Washington DC, it's theCUBE covering AWS Public Sector Summit 2018. Brought to you by Amazon Web Services and its ecosystem partners. >> Welcome back to our nation's capital. You're watching theCUBE, the worldwide leader in live tech coverage. I'm Stu Miniman, joined by my co-host Dave Vallante. Happy to welcome to the program Matt Olsen, who is the co-founder, president, and chief revenue officer of IronNet cybersecurity, thanks so much for joining us. >> Yeah, great to be here, Stu. Thanks. >> So, obviously, public sector, we've been talking a lot about the cyber, as it were. As a co-founder, always one of the first, give us the why of the company. Why was it founded and a little bit of background. >> Sure, you know, we were founded, I guess out of some frustration. A number of us, including our CEO, Keith Alexander, who was formerly the director of NSA, we came out of the government. And the frustration was, that what we saw happening to companies, big companies, small companies, and the government was getting hit with cyber attacks, you know, consistently and increasingly sophisticated and disruptive, even destructive cyber attacks. So we left the government around the same time, a number of us, and we decided, can we start a company to really take on these threats? What can we do to develop a technology based on the threat landscape that really takes cyber security to the next level? So our mission has always been to protect companies and governments from these types of attacks that are hitting us all the time. >> Yeah, so there's no shortage of security experts inside the government, especially NSA. Actually, I remember Dave and I had talked to, there was a little company called Squirrel that came out of the NSA a little bit later. Oh, what do you know? AWS acquired them last year. So bring us insight a little bit, you know, what's the offering that IronNet has? How do you differentiate yourself in the marketplace? >> Sure, and you're absolutely right. There is a lot of expertise in places like NSA, where I formally worked and a bunch of us formally worked. The offering basically is, network traffic analytics. So we look at the network traffic inside large companies and, right down to the PCAP, so we're looking at the actual network traffic and running analytics. And what that means is not signature-based, but behavioral analytics. Looking for those indicators of malicious activity that we then can alert the SOC operators in these companies that this is something they need to pay attention to right away. Of course the problem always with this area is false positives. You know, how do you make sure that the alerts you're giving to these operators really mean something? So we've done a lot of work to draw down those false positives so that we're giving them alerts that are actionable and meaningful in the context of, you know, a very difficult threat landscape. So that's the basic offering. >> So what's underneath the covers? I mean, what's the secret sauce? Are you using machine intelligence? Share with us. >> Yeah, sure, I think the secret sauce is really a combination of two things. It's analytics algorithms that our data scientists develop. We've got some world-class folks that came out of places like the Defense Research Agency and universities that develop the analytics, the algorithms, but we combine those, that math with real life operators, people who themselves were on the offense at one point, right? They were working to, you know, break into other networks. They were the hackers who understand how the adversary operates like nobody else does. Combining the mathematics, the analytics with real life operators, that I'd say, you know, Dave, is the secret sauce because those are how we develop the analytics and the expert system to produce the alerts and draw down those false positives. >> Yeah, it was interesting. Last week, we were at Cisco Live, talking a lot about networking, and one of the biggest things for networking people is a lot of the network that they own, they don't actually own it anymore. It's in Amazon, it's in, you know, I've got my SAF stuff, public clouds, all that I'm dealing with. So, you know, where do you sit, are you mostly focused on public clouds like AWS or, you know, where in the network? >> So its a great question because there's clearly a movement, right, from on PRAM solutions to cloud solutions. AWS is part of that. So we're partners with AWS. So we've developed our analytics to run in AWS as one of our key cloud providers. So, we, with some of our customers, we're all on PRAM, we're in their data center. These are companies that want us there inside their perimeter, right? But then, with others, we have the ability to have sensors in their network but then do all the analytics, all the backend work in AWS, in the cloud environment. And that makes a lot of sense for many companies, especially when you talk about companies that are a little smaller maybe or, you know, we're not talking about the biggest companies. So they do, a lot of their applications are running in the cloud, so that's been a key transition for us as we've developed our product. >> Matt, what would you say are the biggest threats to organizations that they should be aware of? >> Yeah, you know, the biggest threats are the obvious ones in some ways, but there's no doubt that the nation-states that are carrying out attacks, whether we're talking about China or Iran or North Korea or Russia, are increasingly active and are especially dangerous in a volatile geopolitical landscape like we face today. So we're concerned in working with our customers to make sure that we're taking on the level of threat that we see from nation-states. And that's something, I think, at IronNet we understand particularly well, given that we were operating at that nation-state level when we were all in government. Of course, the most pervasive problem is the criminals. And you see that in all manner of hacks in cyber attacks, that the most common type of attack, including ransomware are occurring at the hands of criminals. >> So rewarding. But, your behavioral analytics can help with that problem. What about, like, the weaponization of social media? I mean, what do you make of that? And, I don't know, is there an answer to that that you can help with? >> You know, the way that social media has been used, you know, for example in the election in 2016, it's obviously a problem that we all are concerned about as citizens. And part of that is, I think there's a combination of the government working together with the private sector, in particular, the social media companies, to come up with better ways to take on that problem to make sure that people who are using those platforms are actually people, and not bots, not Russian trolls. We need to do an education campaign for American citizens, who are coming into this election cycle that were, you know, better prepared for what we saw happen in 2016. I mean, it's a big effort and, you know, I'm not sure, to be honest, that as a country we've totally come to grips with the nature of that problem. >> Yeah, I think you're right. We're just trying to get our heads around it. I interviewed Robert Gates one time and I asked him this question, and I've asked other security practitioners, and I get all kinds of different responses. He said, I want to tell you what he said and then maybe you can respond. I'm paraphrasing, of course, for Dr. Gates. He said we have to be really careful. I was asking him offense or defense, you know. Should we, we probably have some of the best security people in the world, we could go on offense, is that the future of warfare? He said we have to be really careful because we have a lot to lose as well in critical infrastructure. Others have said, no, we should go on the offense to flex our muscles. What do you think the right posture is there? >> You know, I think that's a great point, Dave. There clearly is a balance. I mean, it begins with defense, right. It begins with hardening our defenses, having the right people with the right experience and the right expertise in place to protect our networks because, you know, the best offense really is a good defense and protecting our networks. But we do need to have the capability, and we do have the capability to take offensive action when warranted. One of the challenges, I think, in this space is that we haven't necessarily developed the rules of engagement. You know, under what circumstances should the United States government take action on offense in cyber? You know, we saw this in going after ISIS. You know, going after some of their capability as a terrorist group, targeting people in the United States and taking out some of that capability. That's one way I think that we've clearly done the right thing in going on the offense. Harder to say when you have some of the cyber attacks going after a critical infrastructure. What's the right role for the government in going on the offense? I think, again, the first step is a good defense. And one element of a good defense is working better together. Companies working together, as well as companies working in close coordination and cooperation with the government. >> So it's not so much the technology. Obviously the technology is there, but it's the process around that, the collaboration with, whether it's within agencies or organizations. >> I think that's right. I think there's a lot of good technology. We're, our company, we provide a common defense platform for companies to work together. That's what we do at IronNet. And we're doing that with a number of energy companies right now. But the, I think it's getting that policy in place so that companies understand the technology exists to be faster and better working together. How can we then break down whatever barriers there are to sharing information and having that sort of collaborative approach? And we see that happening more and more across the critical infrastructure, whether we're talking finance or healthcare or energy. >> Matt, what's IronNet's relationship with Amazon? Are you part of the market place? How do you go to market together? >> Yeah, we're a registered partner with Amazon. Amazon is our, one of our cloud providers for our, as I mentioned, for where we run our analytics. I also mentioned this common defense platform. We run the correlations that we do for companies working together. That's all done in AWS, in the cloud. We've found Amazon to be a, really an extraordinary partner as an industry leader and a cloud provider. And so we're very close to, and with Amazon, in both going to market but also in developing our product, so it's been a great partnership for us. >> What do you think of the show? I mean, it's insane, isn't it? >> Yeah, it's amazing, right? Just the parking, finding a parking space was incredible. But once I got in. >> We didn't have to park. >> Yeah, once I got in, it's a fantastic show. >> We did have to register. (laughter) >> Likewise. No, congratulations, it's a great show and Amazon has been terrific for us at IronNet. >> Well, we're glad to cover it and we appreciate you joining us, Matt, for this segment. Be back with more coverage here from the AWS Public Sector show. For Dave Vallante, I'm Stu Miniman and thanks again for watching theCUBE.

Published Date : Jun 20 2018

SUMMARY :

Brought to you by Amazon Web Services the worldwide leader Yeah, great to be here, Stu. As a co-founder, always one of the first, And the frustration was, that came out of the make sure that the alerts Are you using machine intelligence? and the expert system and one of the biggest in the cloud environment. that the most common type of that you can help with? of the government working that the future of warfare? and the right expertise in So it's not so much the technology. the technology exists We run the correlations that we do Just the parking, finding a Yeah, once I got in, We did have to register. and Amazon has been and we appreciate you joining

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VallantePERSON

0.99+

AmazonORGANIZATION

0.99+

Keith AlexanderPERSON

0.99+

Matt OlsenPERSON

0.99+

AWSORGANIZATION

0.99+

DavePERSON

0.99+

Amazon Web ServicesORGANIZATION

0.99+

Stu MinimanPERSON

0.99+

GatesPERSON

0.99+

Defense Research AgencyORGANIZATION

0.99+

MattPERSON

0.99+

IronNetORGANIZATION

0.99+

2016DATE

0.99+

Last weekDATE

0.99+

NSAORGANIZATION

0.99+

Washington DCLOCATION

0.99+

StuPERSON

0.99+

United StatesLOCATION

0.99+

last yearDATE

0.99+

Robert GatesPERSON

0.99+

ISISORGANIZATION

0.99+

two thingsQUANTITY

0.99+

first stepQUANTITY

0.99+

bothQUANTITY

0.99+

oneQUANTITY

0.98+

AWSEVENT

0.98+

firstQUANTITY

0.98+

OneQUANTITY

0.98+

todayDATE

0.97+

one elementQUANTITY

0.97+

one pointQUANTITY

0.96+

United States governmentORGANIZATION

0.96+

SquirrelORGANIZATION

0.95+

one timeQUANTITY

0.93+

AWS Public Sector Summit 2018EVENT

0.93+

RussianOTHER

0.85+

one wayQUANTITY

0.85+

CiscoORGANIZATION

0.81+

Public Sector Summit 2018EVENT

0.8+

North KoreaLOCATION

0.74+

RussiaLOCATION

0.73+

theCUBEORGANIZATION

0.7+

ChinaORGANIZATION

0.69+

NSALOCATION

0.64+

AmericanOTHER

0.64+

Public SectorTITLE

0.6+

IranORGANIZATION

0.52+

LiveEVENT

0.5+

Merritt Baer, AWS | Fortinet Security Summit 2021


 

>> Narrator: From around the globe, It's theCUBE! Covering Fortinet Security Summit, brought to you by Fortinet. >> And welcome to the cube coverage here at the PGA champion-- Fortinet championship, where we're going to be here for Napa valley coverage of Fortinet's, the championships security summit, going on Fortinet, sponsoring the PGA, but a great guest Merritt Baer, who's the principal in the office of the CISO at Amazon web services. Great to see you. Thanks for coming on. >> Merritt: Thank you for having me. It's good to be here. >> So Fortinet, uh, big brand now, sponsoring the PGA. Pretty impressive that they're getting out there with the golf. It's very enterprise focused, a lot of action. A lot of customers here. >> Merritt: It seems like it, for sure. >> Bold move. Amazon, Amazon web services has become the gold standard in terms of cloud computing, seeing DevOps people refactoring. You've seen the rise of companies like Snowflake building on Amazon. People are moving not only to the cloud, but they're refactoring their business and security is top of mind for everyone. And obviously cybersecurity threats that Fortinet helps cover, you guys are partnering with them, is huge. What is your state of the union for cyber? What's the current situation with the threat landscape? Obviously there's no perimeter in the cloud. More end points are coming on board. The Edge is here. 5G, wavelength with outpost, a lot happening. >> That was a long question, but I'll, I'll try. So I think, you know, as always business in innovation is the driver. And security needs to be woven into that. And so I think increasingly we're seeing security not be a no shop, but be an enabler. And especially in cloud, when we're talking about the way that you do DevOps with security, I know folks don't like the term DevSecOps, but you know, to be able to do agile methodology and be able to do the short sprints that are really agile and, and innovative where you can-- So instead of nine months or whatever, nine week timelines, we're talking about short sprints that allow you to elastically scale up and down and be able to innovate really creatively. And to do that, you need to weave in your security because there's no like, okay, you pass go, you collect $200. Security is not an after the fact. So I think as part of that, of course the perimeter is dead, long live the perimeter, right? It does matter. And we can talk about that a little bit. You know, the term zero trust is really hot right now. We can dig into that if that's of interest. But I think part of this is just the business is kind of growing up. And as you alluded to we're at the start of what I think is an S curve that is just at the beginning. >> You know, I was really looking forward to Reinforced this year. It was got canceled last year, but the first inaugural event was in Boston. I remember covering that. This year it was virtual, but the keynote Steven gave was interesting, security hubs at the center of it. And I want to ask you, because I need you to share your view on how security's changed with the cloud, because there's now new things that are there to take advantage of if you're a business or an enterprise, yeah on premises, there's a standard operating procedure. You have the perimeter, et cetera. That's not there anymore, but with the cloud, there's a new, there's new ways to protect and security hub is one. What are some of the new things that cloud enables for security? >> Well, so just to clarify, like perimeters exist logically just like they do physically. So, you know, a VPC for example, would be a logical perimeter and that is very relevant, or a VPN. Now we're talking about a lot of remote work during COVID, for example. But one of the things that I think folks are really interested with Security Hub is just having that broad visibility and one of the beauties of cloud is that, you get this tactile sense of your estate and you can reason about it. So for example, when you're looking at identity and access management, you can look at something like access analyzer that will under the hood be running on a tool that our, our group came up with that is like reasoning about the permissions, because you're talking about software layers, you're talking about computer layer reasoning about security. And so another example is in inspector. We have a tool that will tell you without sending a single packet over the network, what your network reach ability is. There's just like this ability to do infrastructure as code that then allows you to do security as code. And then that allows for ephemeral and immutable infrastructures so that you could, for example, get back to a known good state. That being said, you know, you kill a, your web server gets popped and you kill it and you spin up a new one. You haven't solved your problem, right? You need to have some kind of awareness of networking and how principals work. But at the same time, there's a lot of beauties about cloud that you inherit from a security perspective to be able to work in those top layers. And that's of course the premise of cloud. >> Yeah, infrastructure as code, you mentioned that, it's awesome. And the program ability of it with, with server-less functions, you're starting to see new ways now to spin up resources. How is that changing the paradigm and creating opportunities for better security? Is it, is it more microservices? Is it, is, are there new things that people can do differently now that they didn't have a year ago or two years ago? Because you're starting to see things like server-less functions are very popular. >> So yes, and yes, I think that it is augmenting the way that we're doing business, but it's especially augmenting the way we do security in terms of automation. So server-less, under the hood, whether it's CloudWatch events or config rules, they are all a Lambda function. So that's the same thing that powers your Alexa at home. These are server-less functions and they're really simple. You can program them, you can find them on GitHub, but they are-- one way to really scale your enterprise is to have a lot of automation in place so that you put those decisions in ahead of time. So your gray area of human decision making is scaled down. So you've got, you know, what you know to be allowable, what you know to be not allowable. And then you increasingly kind of whittled down that center into things that really are novel, truly novel or high stakes or both. But the focus on automation is a little bit of a trope for us. We at Amazon like to talk about mechanisms, good intentions are not enough. If it's not someone's job, it's a hope and hope is not a plan, you know, but creating the actual, you know, computerized version of making it be done iteratively. And I think that is the key to scaling a security chain because as we all know, things can't be manual for long, or you won't be able to grow. >> I love the AWS reference. Mechanisms, one way doors, raising the bar. These are all kind of internal Amazon, but I got to ask you about the Edge. Okay. There's a lot of action going on with 5G and wavelength. Okay, and what's interesting is if the Edge becomes so much more robust, how do you guys see that security from a security posture standpoint? What should people be thinking about? Because certainly it's just a distributed Edge point. What's the security posture, How should we be thinking about Edge? >> You know, Edge is a kind of catch all, right, we're talking about Internet of Things. We're talking about points of contact. And a lot of times I think we focus so much on the confidentiality and integrity, but the availability is hugely important when we're talking about security. So one of the things that excites me is that we have so many points of contact and so many availability points at the Edge that actually, so for example, in DynamoDB, the more times you put a call on it, the more available it is because it's fresher, you've already been refreshing it, there are so many elements of this, and our core compute platform, EC2, all runs on Nitro, which is our, our custom hardware. And it's really fascinating, the availability benefits there. Like the best patching is a patching you don't have to do. And there are so many elements that are just so core to that Greengrass, you know, which is running on FreeRTOS, which has an open source software, for example, is, you know, one element of zero trust in play. And there are so many ways that we can talk about this in different incarnations. And of course that speaks to like the breadth and depth of the industries that use cloud. We're talking about automotive, we're talking about manufacturing and agriculture, and there are so many interesting use cases for the ways that we will use IOT. >> Yeah. It's interesting, you mentioned Nitro. we also got Annapurna acquisition years ago. You got latency at the Edge. You can handle low latency, high volume compute with the data. That's pretty powerful. It's a paradigm shift. That's a new dynamic. It's pretty compelling, these new architectures, most people are scratching their heads going, "okay, how do I do this, like what do I do?" >> No, you're right. So it is a security inheritance that we are extremely calculated about our hardware supply chain. And we build our own custom hardware. We build our own custom Silicon. Like, this is not a question. And you're right in that one of the things, one of the north stars that we have is that the security properties of our engineering infrastructure are built in. So there just is no button for it to be insecure. You know, like that is deliberate. And there are elements of the ways that nature works from it running, you know, with zero downtime, being able to be patched running. There are so many elements of it that are inherently security benefits that folks inherit as a product. >> Right. Well, we're here at the security summit. What are you excited for today? What's the conversations you're having here at the Fortinet security summit. >> Well, it's awesome to just meet folks and connect outside. It's beautiful outside today. I'm going to be giving a talk on securing the cloud journey and kind of that growth and moving to infrastructure as code and security as code. I'm excited about the opportunity to learn a little bit more about how folks are managing their hybrid environments, because of course, you know, I think sometimes folks perceive AWS as being like this city on a hill where we get it all right. We struggle with the same things. We empathize with the same security work. And we work on that, you know, as a principal in the office of the CISO, I spend a lot of my time on how we do security and then a lot of my time talking to customers and that empathy back and forth is really crucial. >> Yeah. And you've got to be on the bleeding edge and have the empathy. I can't help but notice your AWS crypto shirt. Tell me about the crypto, what's going on there. NFT's coming out, is there a S3 bucket at NFT now, I mean. (both laughing) >> Cryptography never goes out of style. >> I know, I'm just, I couldn't help-- We'll go back to the pyramids on that one. Yeah, no, this is not a, an advertisement for cryptocurrency. It is, I'm a fangirl of the AWS crypto team. And as a result of wearing their shirts, occasionally they send me more shirts. And I can't argue with that. >> Well, love, love, love the crypto. I'm big fan of crypto, I think crypto is awesome. Defi is amazing. New applications are going to come out. We think it's going to be pretty compelling, again, let's get today right. (laughing) >> Well, I don't think it's about like, so cryptocurrency is just like one small iteration of what we're really talking about, which is the idea that math resolves, and the idea that you can have value in your resolution that the math should resolve. And I think that is a fundamental principle and end-to-end encryption, I believe is a universal human right. >> Merritt, thank you for coming on the cube. Great, great to have you on. Thanks for sharing that awesome insight. Thanks for coming on. >> Merritt: Thank you. >> Appreciate it. Okay. CUBE coverage here in Napa valley, our remote set for Fortinet's security cybersecurity summit here as part of their PGA golf Pro-Am tournament happening here in Napa valley. I'm John Furrier. Thanks for watching.

Published Date : Sep 15 2021

SUMMARY :

brought to you by Fortinet. of Fortinet's, the It's good to be here. now, sponsoring the PGA. What's the current situation the way that you do DevOps You have the perimeter, et cetera. But one of the things that I think How is that changing the paradigm but creating the actual, you know, but I got to ask you about the Edge. And of course that speaks to You got latency at the Edge. is that the security properties What's the conversations you're having And we work on that, you know, and have the empathy. of the AWS crypto team. Well, love, love, love the crypto. and the idea that you can for coming on the cube. Thanks for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AmazonORGANIZATION

0.99+

John FurrierPERSON

0.99+

MerrittPERSON

0.99+

AWSORGANIZATION

0.99+

BostonLOCATION

0.99+

$200QUANTITY

0.99+

FortinetORGANIZATION

0.99+

Merritt BaerPERSON

0.99+

last yearDATE

0.99+

Napa valleyLOCATION

0.99+

Napa valleyLOCATION

0.99+

StevenPERSON

0.99+

nine monthsQUANTITY

0.99+

nine weekQUANTITY

0.99+

AnnapurnaORGANIZATION

0.99+

This yearDATE

0.99+

two years agoDATE

0.99+

todayDATE

0.98+

this yearDATE

0.98+

bothQUANTITY

0.98+

PGA golf Pro-AmEVENT

0.98+

NFTORGANIZATION

0.98+

oneQUANTITY

0.98+

one elementQUANTITY

0.97+

NitroORGANIZATION

0.97+

a year agoDATE

0.97+

Fortinet championshipEVENT

0.96+

Fortinet Security SummitEVENT

0.95+

Fortinet Security Summit 2021EVENT

0.95+

CloudWatchTITLE

0.95+

EC2TITLE

0.95+

DevSecOpsTITLE

0.94+

AlexaTITLE

0.94+

GreengrassORGANIZATION

0.94+

PGAEVENT

0.9+

single packetQUANTITY

0.89+

GitHubORGANIZATION

0.89+

DynamoDBTITLE

0.87+

FortinetEVENT

0.86+

COVIDTITLE

0.86+

zeroQUANTITY

0.85+

one wayQUANTITY

0.85+

FreeRTOSTITLE

0.84+

zero trustQUANTITY

0.82+

LambdaTITLE

0.8+

Amazon webORGANIZATION

0.8+

years agoDATE

0.78+

one small iterationQUANTITY

0.77+

security cybersecurity summitEVENT

0.76+

first inauguralQUANTITY

0.75+

DevOpsTITLE

0.74+

Fortinet security summitEVENT

0.73+

championships security summitEVENT

0.72+

SiliconORGANIZATION

0.71+

CISOORGANIZATION

0.71+

SnowflakeORGANIZATION

0.71+

S3COMMERCIAL_ITEM

0.69+

EdgeTITLE

0.68+

thingsQUANTITY

0.58+

casesQUANTITY

0.52+

Security HubTITLE

0.51+

5GORGANIZATION

0.34+

Ruvi Kitov, Tufin | Fortinet Security Summit 2021


 

>>From around the globe. It's the cube covering Fortinet security summit brought to you by Fortinet. >>Okay. Welcome back everyone. To the cubes, coverage of Fortinets championship golf tournament, we're here for the cybersecurity summit. David got a great guest, Ruby cutoff CEO, and co-founder of Tufin great to have you on. Thank you for coming on the cube. We were chatting before. Came on. Camera, big talk. You just gave it. Thanks mom. Thanks >>For having me >>Not a bad place here. Golf tournament, golf and cybersecurity, kind of go together. You know, keep the ball in the middle of the fairway. You know, don't let it get out of bounds, you know, >>And it's a beautiful place. So, uh, very happy to be here and be a premier sponsor of the event. >>Congratulations and a good, good to have you on let's get into the cybersecurity. We were talking before we came on camera around how transformation is really hard. We went to the cloud is really hard refactoring. You're just really hard, but security is really, really hard. That's true. So how do you look at how security is perceived in companies? Is there dynamics that are being amplified by the rapid moved movement to the cloud? You seeing apps being developed really fast changes fast. What's the, what's the barometer of the industry right now? Sure, >>Sure. It's interesting. And this hasn't really changed in the past, but we've seen like exacerbated getting worse and worse. I think a lot of companies security is actually seen as a blocker and frankly security is probably the most hated department in the organization because a lot of times, first of all, the security says no, but also they just take their time. So if you think about organizations, enterprises, they run on top of their enterprise applications. They have applications that their own in-house developers are writing, and those developers are changing their apps all the time. They're driving change in it as well. So you end up having dozens of change requests from developers want to open connectivity. You want to go from point a to point B on the network. They open a ticket. It reaches the network security team that ticket might take several days until it's implemented in production. So the level of service that security provides the application teams today is really not very high. So you can really understand why security is not, um, looked upon favorably by the rest of the organization. >>And some organizations. My perception is, is that, you know, the hardcore security teams that have been around for awhile, they've got standards and they're hardcore, a new app comes in, it's gotta be approved. Something's gotta get done. And it's slower, right? It slows people down the perception. It could be slow. How is it changing? Yes, >>So it changing because when you're moving to the cloud and a lot of organizations are adopting the cloud in many ways, private cloud, public cloud hybrid cloud, you know, they're working in cloud native environments and those environments, you know, the developers are, they own the keys to the kingdom, right? They're managing AWS Azure, Google cloud to managing get hub. You know, they got the place to themselves. So they're pushing changes in their apps without asking it for permission. So they're suddenly exposed to this is how fast it can really be. And while anything that they do in the on-prem or sort of traditional applications is still moving very slowly unless they're using an automated approach to policy. So one of the things that I spoke about today is the need for organizations to adopt a policy centric approach. So they need to define a policy of who can talk to whom and what conduct to what across the entire organizational network, whether it's firewalls routers, which is cloud platforms. >>And then once you have that policy, you can start automated based on the policy. So the concept is somebody opens a ticket, a developer wants to make a change. They want a ticket in service. Now remedy that ticket reaches, uh, some system that's going to check for compliance against the policy. If you're able to immediately tell if that change is compliant or not, then you're able to make that split-second decision, which might take an analyst a couple of days, and then you can design the perfect minimal change to implement on the network. That is really agile, right? That's what developers want to see. And a lot of security departments are really struggling with that today. >>Why, why are they? That seems like a no brainer because policy-based innovation has been around in the network layer for many, many years decades. Right? We'll see, makes things go better, faster. Why would they be against it? Where were they? >>Yeah. So they're not really against it. I think it's just the sheer complexity and size of today's networks is nothing compared to where it was 10 years ago. So you have tens to hundreds of firewalls in large enterprises, thousands of routers and switches, load balancers, private cloud SDN, like NSX and ACI public cloud Kubernetes. It's just a plethora of networking. So we're thinking of it as proliferation of networking is getting worse and worse, especially with IOT and now moving to the cloud. So it is just so complex that if you don't have specialized tools, there's absolutely no way they'll, you'll be able to. >>So your talk must so gone over well, because I do a lot of interviews and I hear developers talking about shift left, right? Which is, you know, basically vernacular for do security in the dev CIC D pipelining. So while you're there rather than having to go fix the bugs later, this seems to be a hot trend. People like it, they want it, they want to check it off, get it done, move on this policy-based automation, help them here. >>It does in some ways, I mean, so you need a policy for the cloud as well, but there's a different challenge that I see altogether in the cloud. And one of the challenges that we're saying is that there's actually a political divide. You have network security folks who are managing, you know, firewalls routers, switches, and maybe the hub to the cloud. And then inside the spokes inside the cloud itself, you have a different team, cloud operators, cloud security folks. And those two teams don't really talk to each other. Some companies have set up centers of excellence, where they're trying to bring all the experts together. But most companies, network security, folks who want to understand what's happening inside the cloud are sort of given the Heisman. They're not invited to meetings. Um, and there's lack of which I think is tragic because it's not going to go over well. So there's huge challenges in security in the cloud. And unless these two departments are going to talk to each other and work together, we're not going to get anywhere near the level of security that we need. >>The cloud team, the cloud guys, if you will, you know, quote guys or gals and the security guys and gals, they're not getting along. What's the, what's the, is it historical? Just legacy structures? Is it more of my department? I own the keys to the kingdom. So go through me kind of the vibe, or is it more of just evolution of the, developer's going to say, I'm going to go around you like shadow it, um, created the cloud. Is there like a shadow security, but trend around this? >>Yeah, there is. And I think it stems from what we covered in the beginning, which is, you know, app developers are now used to and trained to fear security. Every change they want on the on-prem network takes a week, right? They're moving to the cloud. Suddenly they're able to roam freely, do things quickly. If network security folks come by and say, oh, we want to take a look at those changes. What they're hearing, the music is all we're going to slow you down. And the last thing cloud guys want to hear is that we're going to slow you down. So they have they're fearfully. You know, they're, they're rightly afraid of what's going to happen. If they enable a very cumbersome and slow process, we got to work differently. Right? So there's new paradigms with dev DevSecOps where security is built into the CIC pipeline, where it doesn't slow down app developers, but enables compliance and visibility into the cloud environments at the same time. Great stuff. >>Great insight. I want to ask you your, one of your things in your top that I found interesting. And I like to have you explain it in more detail is you think security can be an enabler for digital transformation. Digital transformation can kick the wrong yeah. With transforming. Okay. Everyone knows that, but security, how does security become that enabler? >>So, I mean, today security is a, um, as a blocker to digital transformation. I think anybody that claims, Hey, we're on a path to digital transformation. We're automated, we're digitally transformed. And yet you asked the right people and you find out every change takes a week on the network. You're not digitally transformed, right? So if you adopt a, a framework where you're able to make changes in a compliant secure matter and make changes in minutes, instead of days, suddenly you'll be able to provide a level of service to app developers like they're getting in the cloud, that's digital transformation. So I see the network change process as pretty much the last piece of it that has not been digitally transformed yet. >>And this is where a lot of opportunity is. Exactly. All right. So talk about what you guys are doing to solve that problem, because you know, this is a big discussion. Obviously security is on everyone's mind. They're reactive to proactive that buying every tool they can platforms are coming out. You're starting to see a control plane. You're starting to see things like collective intelligence networks forming, uh, what's the solution to all this, >>Right? So what we've developed is a security policy layer that sits on top of all the infrastructure. So we've got, uh, four products in the two for an orchestration suite where we can connect to all the major firewalls, router, switches, cloud platforms, private cloud SDN. So we see the configuration in all those different platforms. We know what's happening on the ground. We build a typology model. That is one of the industry's best apology models that enables us to query and say, okay, from point a to point B, which firewalls, router switches and cloud platforms will you traverse. And then we integrate it with ticketing system, like a remedy or service now, so that the user experiences a developer opens a ticket for a change that ticket gets into Tufin. We check it against the policy that was defined by the security managers, the security manager defined a policy of who can talk to whom and what conducted what across the physical network and the cloud. >>So we can tell within a split second, is this compliant or not? If it's not compliant, we don't waste an engineer's time. We kick it back to the original user. But if it is compliant, we use that typology model to perform network change design. So we design the perfect minimal change to implement an every firewall router switch cloud platform. And then the last mile is we provision that change automatically. So we're able to make a change in minutes, instead of days would dramatically better security and accuracy. So the ROI on Tufin is not just security, but agility balanced with security at the same time. So you like the rules of the road, >>But the roads are changing all the time. That's how do you keep track of what's going on? You must have to have some sort of visualization technology when you lay out the topology and things start to be compliant, and then you might see opportunity to do innovative buckets. Hey, you know, I love this policy, but I'm, I'm going to work on my policy because sure. Got to up your game on policy and continue to iterate. Is that how do they, how do your customers Daniel? >>So listen, we we're, uh, we're not a tiny company anymore. We've grown. We went public in April of 2019 race and capital. We have over 500 employees, we sold over 2000 customers worldwide. So, um, you know, when customers ask us for advice, we come in and help them with consulting or professional services in terms of deployment. And the other piece is we gotta keep up all the time with what's happening with Fortnite. For example, as, as one of our strategic partners, every time fortnight makes the change we're on the beta program. So we know about a code change. We're able to test them the lab we know about their latest features. We got to keep up with all that. So that takes a lot of engineering efforts. We've hired a lot of engineers and we're hiring more. Uh, so it takes a lot of investment to do this at scale. And we're able to deliver that for our customers. >>I want the relationship with 400. I see you're here at the golf tournament. You're part of the pavilion. You're part of the tournament by the way. Congratulations. Great, great, great event. Thank you. What's the relationship with food and air from a product and a customer technology standpoint, >>We're working closely with Fortnite, where they're a strategic partner of ours. We're integrated into their Fordham manager, APIs. We're a fabric ready solution for them. So obviously working closely. Some of our biggest customers are fortnight's biggest customers will get the opportunity to sponsor this event, which is great tons of customers here and very interesting conversations. So we're very happy with that relationship. >>This is good. Yeah. So that ask you, what have you learned? I think you got great business success. Looking back now to where we are today, the speed of the market, what's your big takeaway in terms of how security changed and it continues to be challenging and these opportunities, what was the big takeaway for you? >>Well, I guess if you were like spanning my career, uh, the big takeaway is, uh, first of all, and just in startup world, patients think things come to those away, but also, um, you know, just, you got to have the basics, right? What we do is foundational. And there were times when people didn't believe in what we do or thought, you know, this is minor. This is not important as people move to the cloud, this won't matter. Oh, it matters. It matters not just in on-prem and it matters in the cloud as well. You gotta have a baseline of a policy and you gotta base everything around that. Um, and so w we've sort of had that mantra from day one and we were right. And we're, we're very happy to be where we are today. Yeah. >>And, you know, as a founder, a co-founder of the company, you know, most of the most successful companies I observed is usually misunderstood for a long time. That's true. Jesse's favorite quote on the cube. He's now the CEO of Amazon said we were misunderstood for a long time. I'm surprised it took people this long to figure out what we were doing. And, and that was good. A good thing. So, you know, just having that north star vision, staying true to the problem when there were probably opportunities that you are like, oh, we, you know, pressure or sure. Yeah. I mean, you stayed the course. What was the, what was the key thing? Grit focused. Yes. >>Looking to startup life. It's sorta like being in sales. We, we got told no, a thousand times before we got told yes. Or maybe a hundred times. So, uh, you gotta, you gotta be, um, you got to persevere. You gotta be really confident in what you're doing and, uh, just stay the course. And we felt pretty strongly about what we're building, that the technology was right. That the need of the market was right. And we just stuck to our guns. >>So focus on the future. What's the next five, five years look like, what's your focus? What's the strategic imperative for you guys. What's your, what's your, what do you mean working on? >>So there's several things that on the business side, we're transitioning to a subscription-based model and we're moving into SAS. One of our products is now a SAS based product. So that's very important to us. We also are now undergoing a shift. So we have a new version called Tufin Aurora Tufin Aurora is a transformation. It's our next generation product. Uh, we're rearchitected the entire, uh, underlying infrastructure to be based on microservices so we could be cloud ready. So that's a major focus in terms of engineering, uh, and in terms of customers, you know, we're, we're selling to larger and larger enterprises. And, uh, we think that this policy topic is critical, not just in the on-prem, but in the cloud. So in the next three years, as people move more and more to the cloud, we believe that what we do will be, become even more relevant as organization will straddle on-premise networks and the cloud. So >>Safe to say that you believe that policy based architecture is the key to automation. >>Absolutely. You can't automate what you don't know, and you can't people, like I mentioned this in my talk, people say, oh, I can do this. I can cook up an Ansible script and automate, all right, you'll push a change, but what is the logic? Why did you make that decision? Is it based on something you've got to have a core foundation? And that foundation is the policy >>Really great insight. Great to have you on the cube. You've got great success and working knowledge and you're in the right place. And you're skating to where the puck is and will be, as they say, congratulations on your success. Thank >>You very much. Thanks for having >>Me. Okay. Keep coming here. The Fortinet championship summit day, cybersecurity summit, 40 minutes golf tournament here in Napa valley. I'm John Firmicute. Thanks for watching.

Published Date : Sep 14 2021

SUMMARY :

security summit brought to you by Fortinet. and co-founder of Tufin great to have you on. You know, don't let it get out of bounds, you know, And it's a beautiful place. Congratulations and a good, good to have you on let's get into the cybersecurity. So if you think about organizations, enterprises, they run on top of their enterprise applications. My perception is, is that, you know, the hardcore security teams that have been around for awhile, and those environments, you know, the developers are, they own the keys to the kingdom, And then once you have that policy, you can start automated based on the policy. That seems like a no brainer because policy-based innovation has been around in the network layer So you have tens to hundreds of firewalls Which is, you know, basically vernacular for do security in the dev CIC You have network security folks who are managing, you know, firewalls routers, switches, The cloud team, the cloud guys, if you will, you know, quote guys or gals and the security And the last thing cloud guys want to hear is that we're going to slow you down. And I like to have you explain it in So if you So talk about what you guys are doing to solve that problem, So we see the configuration So you like the rules of the road, You must have to have some sort of visualization technology when you lay out the topology and things start And the other piece is we gotta keep up all the time You're part of the tournament by the way. So we're very happy with that relationship. I think you got great business but also, um, you know, just, you got to have the basics, And, you know, as a founder, a co-founder of the company, you know, most of the most successful companies I observed is So, uh, you gotta, So focus on the future. as people move more and more to the cloud, we believe that what we do will be, become even more relevant You can't automate what you don't know, and you can't people, Great to have you on the cube. You very much. Thanks for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavidPERSON

0.99+

April of 2019DATE

0.99+

John FirmicutePERSON

0.99+

Ruvi KitovPERSON

0.99+

AmazonORGANIZATION

0.99+

Napa valleyLOCATION

0.99+

twoQUANTITY

0.99+

tensQUANTITY

0.99+

FortniteORGANIZATION

0.99+

JessePERSON

0.99+

TufinPERSON

0.99+

FortinetORGANIZATION

0.99+

AWSORGANIZATION

0.99+

thousandsQUANTITY

0.99+

DanielPERSON

0.99+

oneQUANTITY

0.99+

two departmentsQUANTITY

0.99+

two teamsQUANTITY

0.99+

FordhamORGANIZATION

0.99+

over 500 employeesQUANTITY

0.99+

over 2000 customersQUANTITY

0.99+

TufinORGANIZATION

0.98+

todayDATE

0.98+

10 years agoDATE

0.98+

a weekQUANTITY

0.97+

ACIORGANIZATION

0.96+

four productsQUANTITY

0.95+

NSXORGANIZATION

0.91+

Fortinet Security Summit 2021EVENT

0.91+

SASORGANIZATION

0.89+

DevSecOpsTITLE

0.88+

FortniteTITLE

0.86+

point BOTHER

0.85+

five yearsQUANTITY

0.84+

GoogleORGANIZATION

0.83+

dozens of change requestsQUANTITY

0.83+

next three yearsDATE

0.83+

cybersecurity summitEVENT

0.83+

Fortinet security summitEVENT

0.82+

Ruby cutoffPERSON

0.82+

hundred timesQUANTITY

0.81+

Fortinet championship summit dayEVENT

0.8+

hundreds of firewallsQUANTITY

0.8+

AzureTITLE

0.79+

AnsibleORGANIZATION

0.78+

CIC DTITLE

0.78+

Fortinets championshipEVENT

0.77+

40 minutes golfQUANTITY

0.75+

thousand timesQUANTITY

0.74+

TufinTITLE

0.74+

firstQUANTITY

0.71+

day oneQUANTITY

0.7+

cloudTITLE

0.69+

One of our productsQUANTITY

0.65+

400ORGANIZATION

0.65+

northORGANIZATION

0.63+

Aurora Tufin AuroraCOMMERCIAL_ITEM

0.6+

fiveQUANTITY

0.59+

point aOTHER

0.57+

KubernetesTITLE

0.55+

thingsQUANTITY

0.53+

routersQUANTITY

0.5+

daysQUANTITY

0.46+

HeismanTITLE

0.35+

Glenn Katz, Comcast | Fortinet Security Summit 2021


 

>> It's The Cube covering Fortinet Security Summit brought to you by Fortinet. >> Hey and welcome back to the cubes coverage of Fortinets championship series. Cybersecurity summit here in Napa valley Fortinet is sponsoring the PGA tour event, kicking off the season here, and the cubes here as part of the coverage. And today is cybersecurity day where they bring their top customers in. We got Glenn Katz SVP, general manager, Comcast Enterprise Solutions. Glenn, thanks for coming on The Cube. Thanks for taking time out of your day. - Thank you no This is great. This is great. >> Interviewer: Tell me to explain what you guys do in the Comcast business enterprise group. >> That's our Comcast business. We're a part of Comcast overall. I always like to explain what Comcast really is. If you look at Comcast, it's a technology innovation company by itself that happens to focus on communications and media type of, of markets, right? And if you look at the Comcast side there on the communication side, it's really everything residential with customers. Then there's the us Comcast business and we're the fastest growing entity over the last 15 years within Comcast. And we started in small business, voice, video, and data to small businesses. Then we moved up to provide fiber ethernet type of a transport to mid-market. And then my group started in 2014. And what we do is focus on managed services. It doesn't matter who the transport layer is for enterprise Fortune 1000 type companies. And then when you layer in all these managed wider network services. So that's my business unit. >> Interviewer: Well, we appreciate it we're a customer by the way in Palo Alto >> Glen: Oh great >> So give a shout out to you guys. Let's get into the talk you're giving here about cybersecurity, because I mean, right now with the pandemic, people are working at home. Obviously everyone knows the future of work is hybrid now you're going to see more decentralized defy and or virtual spaces where people are going to want to work anywhere and businesses want to have that extension, right? What people are talking about, and it's not new, but it's kind of new in the sense of reality, right? You've got to execute. This is a big challenge. >> Glen: It is - What's your thoughts on that, >> Well it's a big challenge. And one of the things that I'll try to, I'll speak to this afternoon here, which is at least from the enterprise perspective, which includes the headquarters, the enterprise, the branch locations, the digital commerce, everywhere else, commerce is being done. It's not just at a store anymore. It's everywhere. Even if you only have a store and then you have the remote worker aspect. I mean, they do that to your point earlier. We're not in that fortress sort of security mentality anymore. There's no more DMZs it's done. And so you've got to get down to the zero trust type of network architecture. And how do you put that together? And how does that work? Not just for remote workers that have to access the enterprise applications, but also for simple, you know, consumers or the business customers of these, of these enterprises that have to do business from over the phone or in the store. >> Interviewer: What are the some of the challenges you hear from your customers, obviously, business of the defend themselves now the, the, the attacks are there. There's no parameters. You mentioned no fortress. There's more edge happening, right? Like I said, people at home, what are the top challenges that you're hearing from customers? >> So the biggest challenge, and this is, I would think this is, this is mostly focused on the enterprise side of it is that the is two interesting phenomenons going on. This is sort of beginnings before the pandemic. And then of course the pandemic, the role of the CIO has been elevated to now, they have a real seat at the table. Budgets are increasing to a point, but the expertise needed in these, in these it departments for these large enterprises, it's, it's impossible to do what you were just talking about, which is create a staff of people that can do everything from enterprise applications, e-commerce analytics, the network. How do you secure that network all the way down to the end users? Right? So it's that middle portion. That's the biggest challenge because that takes a lot of work and a lot of effort. And that's where folks like Comcast can come in and help them out. That's their biggest challenge. They can handle the enterprise, they can handle the remote workers. They can handle their own applications, which are continually trying to be, you know, have to be it's competitive out there. It's that middle area, that communications layer that their challenged with. >> Interviewer: Yeah. And John Madison's EVP, CMO Ford. It's always talking about negative unemployment in cybersecurity. Nevermind just the staff that do cyber >> Glen: That's exactly right, that's given. If you're a business, you can't hire people fast enough and you might not have the budget for you want to manage service. So how do you get cyber as a service? >> Glen: Well, so it's even bigger than that. It's not just the cyber as a service because it's now a big package. That's what SASE really is SASE is Secure Access Service Edge. But think of it where I think of it is you've got remote users, remote workers, mobile apps on one side, you've got applications, enterprise or commercial that are now moved into different cloud locations. And in the middle, you've got two real fundamental layers, the network. And, and that includes uh, the actual transport, the software defined wide area, networking components, everything that goes with that, that's the network as a service. And then you've got the secure web gateway portion, which includes everything to secure all the data, going back and forth between your remote laptop, the point of sales. And let's say the cloud based applications, right? So that's really the center stage right there. >> Interviewer: And the cloud has brought more service at the top of the stack. I mean, people thought down stack up stack is kind of like a geeky terms. You're talking about innovation. If you're down stack with network and transport, those are problems that you have to solve on behalf of your customers And make that almost invisible. And that's your job >> That's our job. That's our job is to service provider What's interesting is though back in the day, I mean, when, I mean, back in the day, it could have been 10 years ago in 20. You really, you know, you had stable networks, they were ubiquitous, they were expensive and they were slow. That's kind of the MPLS legacy TDM. Yeah. So you just put them in and you walked away and you still did all your enterprise. You still did all of your applications, but you had your own private data centers. Everything was nicer. It was that fortress mentality right now. It's different. Now everybody needs broadband. Well guess what? Comcast is a big company, but we don't have broadband everywhere. ATT doesn't have it. Verizon doesn't have it Charter doesn't have it. Right. So you need, so now to think about that from enterprise, I'm going to go, I'll give you an example. All of our customers to fulfill a nationwide network, just for the broadband infrastructure, that's, you know, redundant. If you want to think of it that way we, we source probably 200 to 300 different providers to provide an ubiquitous network nationwide for broadband. Then we wrap a layer of the SD wan infrastructure for that, as an example, over the top of that, right? You can't do that by yourself. I mean, people try and they fail. And that's the role of a managed service provider like us is to pull all that together. Take that away. We have that expertise. >> Interviewer: I think this is a really interesting point. Let's just unpack that just for a second. Yeah. In the old days, we want to do an interconnect. You had an agreement. You did, you have your own stuff, do an interconnected connect. >> Glen: Yep. >> Now this, all this mishmash, you got to traverse multiple hops, different networks. >> Glen: That's right >> Different owners, different don't know what's on that. So you guys have to basically stitch this together, hang it together and make it work. And you guys put software on the top and make sure it's cool is that how it works? >> Glen: Yeah. Software and different technology components for the SD wan. And then we would deliver the shore and manager all that. And that's, that's where I really like what's happening in the industry, at least in terminology, which is they try, you have to try to simplify that because it's very, very complicated, but I'm going to give you the network as a service mean, I'm going to give you all the transport and you have to don't have to worry about it. I'm going to rent you the, the SD wan technology. And then I'm going to have in my gateways all these security components for a firewall as a service, zero trust network access, cloud brokerage services. So I will secure all of your data as you go to the cloud and do all of that for you. That's really what we, that's what we bring to the table. And that's what is really, really hard for enterprises to do today. Just because they can't, the expertise needed to do that is just not there. >> Interviewer: Well, what's interesting is that first you have to do it now because the reality of your business now is you don't do it. You won't have customers, but you're making it easier for them. So they don't have to think about it. - [Glen] That's right. >> But now you bring in hybrid networking hybrid cloud, they call it or multi-cloud right. It's essentially a distributed computing and essentially what you're doing, but with multiple typologies, >> Glen: that's right. >> Interviewer: I got an edge device. - [Glen] That's right. If I'm a business. - [Glen] That's right. >> That's where it could be someone working at home >> Glen: That's right. - Or it could be my retail >> Or whatever it could be. So edge is just an extension of what you guys already do. And is that right? Am I getting that right? >> Glen: Yeah that's exactly right. And, and, but the point is, is to make it economic and to make it really work for the end user. If you're a branch, you may have a, a application that's still being run via VPN, but you also need wifi internet for your customers because you want to use your mobile device. They've entered into your store and you want to be able to track that right. And push something to them. And then you've got the actual store applications could be point of sales could be back of house comparing that's going up to AWS. Azura whatever. Right. And that all has to be, it all has to come from one particular branch and someone has to be able to manage that capability. >> Interviewer: It's funny, - Its so different >> Interviewer: just as you're talking, I'm just thinking, okay. Facial recognition, high, high bandwidth requirements, >> Glen: Huge high bandwidth requirements >> Processing at the edge becomes huge. >> Glen: It does. >> So that becomes a new dynamic. >> Glen: It does. It's got to be more dynamic. It's not a static IP end point. >> Glen: Well, I'll give you another an example. Let's say it's, it seems silly, but it's so important from a business perspective, your quick service restaurant, the amount of digital sales from applications are just skyrocketing. And if you yourself, and particularly in the pandemic, you order something, or that goes up to the cloud, comes back through, goes to the point of sales. And then the, the back of house network in a particular restaurant, if that doesn't get there, because one line of you only have one internet connection and it's down, which sometimes happens, right? You lose business, you lose that customer. It's so important. So what's being pushed down to the edge is, you know, reliable broadband hybrid networks, where you have a primary wire line and a secondary wire line, maybe a tertiary wireless or whatever. And then a box, a device that can manage between those two so that you can keep that 99.9, 9% availability at your branch, just for those simple types of applications. >> Interviewer: You know Glenn, you as you're talking most people, when we talk tech, like this is mostly inside the ropes, Hey, I can get it. But most people can relate with the pandemic because they've ordered with their phone on - [Glen] Exactly right >> With the QR code. - [Glen] That's exactly right >> They see the menu - [Glen] That's right >> They get now what's happening - [Glen] That's right that their phone is now connected to the service. >> Glen: That's right >> This is not going away. The new normal. >> Glen: No, it's absolutely here. And what I've seen are there are many, many companies that already knew this and understood this pre pandemic. And they were, they had already changed their infrastructure to really fit what I was calling that network as a service in the SASE model, in different ways. Then there were a bunch that didn't, and I'm not going to name names, but you can look at those companies and you can see how they're, they're struggling terribly. But then there was this. Now there's a, a much bigger push and privatization again, see, I was sending, Hey, I asked for this before. It's not like the CIO didn't know, but management said, well, maybe it wasn't important. Now it is. And so you're seeing this actual amazing surge in business requests and requirements to go to the model that we're all talking about here, which is that SASE type of implementation high-speed broadband. That's not going away for the same reason. And you need a resilient network, right? Yes. >> Interesting. Best practice. Let's just take that advice to the, to the audience. I want to get your thoughts because people who didn't do any R and D or experimentation prior to the pandemic, didn't have cloud. Wasn't thinking about this new architecture got caught flat-footed. -Exactly. >> And they're hurting and or out of business. >> Correct. >> If people who were on the right side of that took advantage as a tailwind and they got lifts. >> That's exactly right. >> So what is the best practice? How should a business think about putting their toe in the water a little bit or jumping in and getting immersed in the new, new architecture? What advice would you give? Because people don't want to be in the wrong side of history. >> No, they don't. >> What's your guy's best practice? >> I may sound biased, but I'm really not trying to be biased. And this'll be some of the I'll speak about here later today. You have to try it. You, as the end user, the enterprise customer, to, to fulfill these types of needs, you've got to really probe your managed service providers. You've got to understand which ones, not just can give you a nice technology presentation and maybe a POC, but who's going to be there for the longterm who has the economic wherewithal to be able to give the resources needed to do what I was talking about, which is you're going to outsource your entire network to me and your sh, and a good portion of your security for the network to a service provider. that service provider has to be able to provide all that has to be able to have the financial capabilities, to be able to provide you with an operating type of model, not you have to buying equipment all the time. That service provider has to be able to have teams that can deliver all of that 200 to 300 different types of providers aggregate all that, and then be there for day two. Simple thing. Like if you know, most companies, if you're not a really large location, you can't afford to, you know, double types of routers that are connected. And if one fails you have fail over, right, most of them will have one router and they'll have, but they'll have two backup paths. Well, what happens is that router or switch, single switch fails? You need to have a meantime to repair a four hours. I mean, that's kind of basic and well do that. How do you do that? You've got to have depots around the entire country. These are the types of questions that any enterprise customers should be probing their managed service provider, right? It's not just about the technology. It's about how can you deliver this and assure this going forward. >> And agility too cause when, if, if things do change rapidly, being agile... >> Exactly >> means shifting and being flexible with your business. >> That's exactly right. And that's important. That's a really important question. And the agility comes from this financial agility, right? Like new threat, new box. I want, I want this old one. I'm going to upgrade to a different type of service. The service providers should be able to do that without me having to force you to go get some more CapEx and buy some more stuff. Cause that's number one. But the other agility is every enterprise is different. Every enterprise believes that its network is the only network in the world and they have opinions and they've tested different technologies. And you're going to have to adapt a little bit to that. And if you don't, you're not going to get out of this. >> It's funny. The old days non-disruptive operations was like a benefit, we have non-disrupt- now it's a table stakes. You can't disrupt businesses. - You can't. You can't at the branch at the remote worker. If you're on a zoom call or whatever, or you're on a teams call, we've all been there. We're still doing it. If it breaks in the middle of a presentation to a customer that's problem. >> Glenn thanks for coming on the cube with great insight. >> Oh great. This was fun. >> Are you exciting and plays golf? You're going to get out there on the range? >> I played, I played golf a lot when I was younger, but I haven't. And so I have a few other things I do, but I guess I'm going to have to learn now that we're also a sponsor of PGA, so yeah, for sure. >> Great. Well, great to have you on - All right thank you and great talk. Thanks for coming on and sharing your insight. >> This was great. I appreciate okay. >> Keep coverage here. Napa valley with Fortinet's Cybersecurity Summit as part of their PGA tour event, that's happening this weekend. I'm John for the Cube. Thanks for watching.

Published Date : Sep 14 2021

SUMMARY :

brought to you by Fortinet. and the cubes here as in the Comcast business enterprise group. And if you look at the So give a shout out to you guys. do that to your point earlier. you hear from your customers, is that the is two interesting just the staff that do cyber So how do you get cyber as a service? And in the middle, those are problems that you have to solve And that's the role of a managed did, you have your own stuff, you got to traverse multiple And you guys put software on the top but I'm going to give you the that first you have to do it now But now you bring in hybrid - [Glen] That's right. Glen: That's right. of what you guys already do. And that all has to be, Interviewer: just as you're talking, It's got to be more dynamic. to the edge is, you know, is mostly inside the ropes, With the QR code. connected to the service. This is not going away. And you need a resilient network, right? prior to the pandemic, And they're hurting the right side of that took to be in the wrong side of for the network to a service provider. And agility too cause when, flexible with your business. having to force you to go get You can't at the branch the cube with great insight. This was fun. but I guess I'm going to Well, great to have I appreciate okay. I'm John for the Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
ComcastORGANIZATION

0.99+

GlennPERSON

0.99+

2014DATE

0.99+

GlenPERSON

0.99+

VerizonORGANIZATION

0.99+

Glenn KatzPERSON

0.99+

Glenn KatzPERSON

0.99+

John MadisonPERSON

0.99+

Palo AltoLOCATION

0.99+

JohnPERSON

0.99+

200QUANTITY

0.99+

AWSORGANIZATION

0.99+

ATTORGANIZATION

0.99+

Comcast Enterprise SolutionsORGANIZATION

0.99+

99.9, 9%QUANTITY

0.99+

Napa valleyLOCATION

0.99+

twoQUANTITY

0.99+

CharterORGANIZATION

0.99+

10 years agoDATE

0.98+

two interesting phenomenonsQUANTITY

0.98+

four hoursQUANTITY

0.98+

Fortinet Security SummitEVENT

0.98+

pandemicEVENT

0.97+

one lineQUANTITY

0.97+

SASETITLE

0.97+

firstQUANTITY

0.97+

one sideQUANTITY

0.97+

oneQUANTITY

0.96+

CapExORGANIZATION

0.96+

one routerQUANTITY

0.96+

todayDATE

0.96+

300 different providersQUANTITY

0.95+

PGAEVENT

0.94+

two real fundamental layersQUANTITY

0.94+

FortinetORGANIZATION

0.94+

day twoQUANTITY

0.94+

one internet connectionQUANTITY

0.93+

PGAORGANIZATION

0.92+

this afternoonDATE

0.92+

zeroQUANTITY

0.91+

Fortinet Security Summit 2021EVENT

0.89+

AzuraORGANIZATION

0.88+

FortinetEVENT

0.87+

later todayDATE

0.86+

20QUANTITY

0.85+

one particular branchQUANTITY

0.85+

Cybersecurity SummitEVENT

0.84+

SVPPERSON

0.84+

two backupQUANTITY

0.84+

last 15 yearsDATE

0.82+

a secondQUANTITY

0.82+

300 different typesQUANTITY

0.76+

single switchQUANTITY

0.75+

Sandra Wheatley, Fortinet | Fortinet Security Summit 2021


 

>> Narrator: From around the globe, it's theCUBE, covering Fortinet Security Summit brought to you by Fortinet. >> Welcome to theCUBE. I'm Lisa Martin. We are live at the Fortinet Championship, the PGA Tour Kickoff to the 2021-2022 FedEx Regular Season Cup. And this is so exciting to be here with Fortinet, to be at an in-person event, and to be talking about a very important topic of cybersecurity. One of our alumni is back with me, Sandra Wheatley is here, the SVP of Marketing, Threat Intelligence, and Influencer Communications at Fortinet. Sandra, it's great to see you. >> You too, Lisa. Thank you for having me. >> This is a great event. >> Yeah, it's awesome, yeah. >> Great to be outdoors, great to see people again, and great for Fortinet for being one of the first to come back to in-person events. One of the things I would love to understand is here we are at the PGA tour, what's the relationship with Fortinet and the PGA Tour? >> Well, first of all, I think the PGA tour is an amazing brand. You just have to look around here and it's extremely exciting, but beyond the brand, there's a lot of synergies between the PGA tour and Fortinet CSR initiatives, particularly around STEM, diversity inclusion, as well as veterans rescaling. And so some of the proceeds from the Fortinet Championship will go to benefit local nonprofits and the local community. So that's something we're very excited about overall. >> Lisa: Is this a new partnership? >> It is a new partnership and we will be the Fortinet Championship sponsor for about the next five years. So we're looking forward to developing this partnership and this relationship, and benefiting a lot of nonprofits in the future. >> Excellent, that's a great cause. One of the things, when you and I last saw each other by Zoom earlier in the summer, we were talking about the cybersecurity skills gap. And it's in its fifth consecutive year, and you had said some good news on the front was that data show that instead of needing four million professionals to fill that gap, it's down to three, and now there's even better news coming from Fortinet. Talk to me about the pledge that you just announced to train one million people in the next five years. >> Absolutely, we're very excited about this. You know, Fortinet has been focused on reducing the skills gap for many years now. It continues to be one of the biggest issues for cybersecurity leaders if you think about it. You know, we still need about 3.1 million professionals to come into the industry. We have made progress, but the need is growing at about 400,000 a year. So it's something that public and private partnerships need to tackle. So last week we did announce that we are committed to training a million professionals over the next five years. We're very excited about that. We're tackling this problem in many, many ways. And this really helps our customers and our partners. If you really think about it, in addition to the lack of skills, they're really tackling cybersecurity surface that's constantly changing. In our most recent FortiGuard's threat report, we saw that ransomware alone went up 10 times over the last year. So it's something that we all have to focus on going forward. And this is our way of helping the industry overall. >> It's a huge opportunity. I had the opportunity several times to speak with Derek Manky and John Maddison over the summer, and just looking at what happened in the first half, the threat landscape, we spoke last year, looking at the second half, and ransomware as a service, the amount of money that's involved in that. The fact that we are in this, as Fortinet says, this work from anywhere environment, which is probably going to be somewhat persistent with the attack surface expanding, devices on corporate networks out of the home, there's a huge opportunity for people to get educated, trained, and have a great job in cybersecurity. >> Absolutely, I like to say there's no job security like cybersecurity, and it is. I mean, I've only been in this industry about, I'm coming up on six years, and it's definitely the most dynamic industry of all of the IT areas that I've worked in. The opportunities are endless, which is why it's a little bit frustrating to see this big gap in skills, particularly around the area of women and minorities. Women make up about 20%, and minorities are even less, maybe about 3%. And so this is a huge focus of ours. And so through our Training Advancement Agenda, our TAA initiative, we have several different pillars to attack this problem. And at the core of that is our Network Security Expert Training or NSC training and certification program. We made that freely available to everybody at the beginning of COVID. It was so successful, at one point we we're seeing someone register every five minutes. And that was so successful, we extended that indefinitely. And so to date, we've had about almost 700,000 certifications. So it's just an amazing program. The other pillars are Security Academy Program, where we partner with nonprofits and academia to train young students. And we have something like 419 academies in 88 countries. >> Lisa: Wow. >> And then the other area that's very important to us is our Veterans Program. You know, we have about 250,000 veterans every year, transfer out of the service, looking for other jobs in the private sector. And so not only do we provide our training free, but we do resume building, mentoring, all of these types of initiatives. And we've trained about 2,000 veterans and spouses, and about 350 of those have successfully got jobs. So that's something we'll continue to focus on. >> That's such a great effort. As the daughter of a Vietnam combat veteran, that really just hits me right in the heart. But it's something that you guys have been dedicated for. This isn't something new, this isn't something that is coming out of a result of the recent executive order from the Biden administration. Fortinet has been focused on training and helping to close that gap for a while. >> That's exactly true. While we made the commitment to train a million people on the heels of the Biden administration at Cybersecurity Summit about two weeks ago, we have been focused on this for many years. And actually, a lot of the global companies that were part of that summit happened to be partners on this initiative with us. For example, we work with the World Economic Forum, IBM, and Salesforce offer our NSC training on their training platforms. And this is an area that we think it's really important and we'll continue to partner with larger organizations over time. We're also working with a lot of universities, both in the Bay Area, local like Berkeley, and Stanford and others to train more people. So it's definitely a big commitment for us and has been for many years. >> It'll be exciting to see over the next few years, the results of this program, which I'm sure will be successful. Talk to me a little bit about this event here. Fortinet is 100% partner driven company, more than 300 or so partners and customers here. Tell me a little bit about what some of the interesting topics are that are going to be discussed today. >> Sure, yeah, so we're delighted to bring our partners and customers together. They will be discussing some of the latest innovations in cybersecurity, as well as some of the challenges and opportunities. We are seeing, you know, during COVID we saw a lot of change with regards to cybersecurity, especially with remote working. So we'll discuss our partnership with LYNX that we just announced. We'll also be talking about some of the emerging technologies like CTNA, 5G, SASE, cloud, and really understanding how we can best help protect our customers and our partners. So it's very exciting. In addition to our Technology Summit, we have a technology exhibition here with many of our big sponsors and partners. So it's definitely going to be a lot of dynamic conversation over the next few days. >> We've seen so much change in the last year and a half. That's just an understatement. But one of the things that you touched on this a minute ago, and we're all feeling this is is when we all had to shift to work from home. And here we are using corporate devices on home networks. We're using more devices, the edge is expanding, and that became a huge security challenge for enterprises to figure out how do we secure this. Because for some percentage, and I think John Maddison mentioned a few months ago to me, at least 25% will probably stay remote. Enterprises have to figure out how to keep their data secure as people are often the weakest link. Tell me about what you guys announced with LYNX that will help facilitate that. >> Well, we're announcing an enterprise grade security offering for people who are working remotely. And the nice thing about this offering is it's very easy to set up and implement, so consumers and others can easily set this up. It also provides a dashboard for the enterprise, IT organization to, they can see who's on the network, devices, everything else. So this should really help because we did see a big increase in attacks, really targeting remote workers. As cyber criminals try to use their home as a foothold into the enterprise. So we're very excited about this partnership, and definitely see big demand for this going forward. >> Well, can you tell me about the go-to market for that and where can enterprises and people get it? >> Well, we're still working through that. I know you'll talk with John later on, he'll have more details on that. But definitely, we'll be targeting both of our different sets of customers and the channel for this. And I definitely think this is something that will, it's something that enterprises are definitely looking for, and there'll be more to come on this over the next few months. >> It's so needed. The threat landscape just exploded last year, and it's in a- >> Sandra: Yeah, absolutely. >> Suddenly your home. Maybe your kids are home, your spouse is working, you're distracted, ransomware, phishing emails, so legitimate. >> Sandra: They do. >> Lisa: But the need for what you're doing with LYNX is absolutely essential these days. >> Sandra: Yeah, these threats are so sophisticated. They're really difficult. And the other thing we did in addition to LYNX was as we got into COVID, we saw that, or the most successful organizations were really using this as an opportunity to invest for the longterm in cybersecurity. We also saw that, and this continues to be the case that, the insider threat continues to be one of the biggest challenges, where an employee will accidentally hit on a phishing email. So we did roll out an infosec awareness training, and we made that free for all of our customers and partners. So we're trying to do everything we can to really help our customers through this demanding time. >> Lisa: Right, what are some of the feedback that you're hearing from customers? I'm sure they're very appreciative of the education, the training, the focus effort from Fortinet. >> Sandra: Absolutely, it's definitely huge. And more and more we're seeing partners who want to work with us and collaborate with us on these initiatives. We've had a really positive response from some of the companies that I mentioned earlier, some of the big global names. And we're very excited about that. So we feel like we have some key initiatives on pillars, and we'll continue to expand on those and bring more partners to work with us over time. >> Lisa: Expansion as the business is growing amazingly well. Tell me a little bit about that. >> Sandra: Yeah, I think, in our last quarter we announced our largest billings growth for many, many years. And so, Fortinet, we're been very fortunate over the last few years, has continued to grow faster than the market. We now have half a million customers, and I think our platform approach to security is really being adopted heavily. And we continue to see a lot of momentum, especially around our solutions like SD-WAN. I think we're the only vendor who provides security in SD-WAN appliance. And so that's been a key differentiator for us. The other thing that's increasingly important, especially with the rollout of 5G is performance. And, you know, Fortinet, from the very beginning, created its own customized ASX or SPU, which really provides the best performance in security compute ratings in the industry. So all of this is really helping us with our growth, and we're very excited about the opportunities ahead. >> Lisa: And last question, on that front, what are some of the things that you're excited about as we wrap up 2021 calendar year and go into 2022? >> Sandra: Well, this been very exciting year for Fortinet. And I think we're in a great position to take advantage of many of the different growth areas we're seeing in this new and changing space. And, you know, we're all on board and ready to take advantage of those opportunities, and really fire ahead. >> Lisa: Fire ahead, I like that. Sandra, thank you so much for joining me today, talking about the commitment, the long standing commitment that Fortinet has to training everybody from all ages, academia, veterans, to help close that cybersecurity skills gap. And such an interesting time that we've had. There's so much opportunity, and it's great to see how committed you are to helping provide those opportunities to people of all ages, races, you name it. >> Sandra: Thank you, Lisa, I really appreciate it. >> Lisa: Ah, likewise. For Sandra Wheatley, I'm Lisa Martin. You're watching theCube at the Fortinet Championship Security Summit. (soft bright music)

Published Date : Sep 14 2021

SUMMARY :

the globe, it's theCUBE, the PGA Tour Kickoff to the 2021-2022 Thank you for having me. Fortinet and the PGA Tour? And so some of the proceeds for about the next five years. in the next five years. and private partnerships need to tackle. happened in the first half, and it's definitely the in the private sector. and helping to close that gap for a while. on the heels of the Biden administration the results of this program, So it's definitely going to be But one of the things that you And the nice thing about this offering and the channel for this. It's so needed. so legitimate. Lisa: But the need for and this continues to be the case that, appreciative of the education, from some of the companies Lisa: Expansion as the business from the very beginning, the different growth areas and it's great to see I really appreciate it. at the Fortinet Championship

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
SandraPERSON

0.99+

JohnPERSON

0.99+

FortinetORGANIZATION

0.99+

IBMORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

LYNXORGANIZATION

0.99+

Sandra WheatleyPERSON

0.99+

LisaPERSON

0.99+

six yearsQUANTITY

0.99+

10 timesQUANTITY

0.99+

Derek MankyPERSON

0.99+

John MaddisonPERSON

0.99+

2022DATE

0.99+

2021DATE

0.99+

SalesforceORGANIZATION

0.99+

last yearDATE

0.99+

100%QUANTITY

0.99+

last weekDATE

0.99+

oneQUANTITY

0.99+

419 academiesQUANTITY

0.99+

Bay AreaLOCATION

0.99+

OneQUANTITY

0.99+

one million peopleQUANTITY

0.99+

first halfQUANTITY

0.99+

FortiGuardORGANIZATION

0.99+

second halfQUANTITY

0.99+

more than 300QUANTITY

0.99+

about 3%QUANTITY

0.99+

88 countriesQUANTITY

0.99+

a million professionalsQUANTITY

0.99+

about 20%QUANTITY

0.98+

half a million customersQUANTITY

0.98+

Fortinet Championship Security SummitEVENT

0.98+

Cybersecurity SummitEVENT

0.98+

four million professionalsQUANTITY

0.98+

StanfordORGANIZATION

0.98+

World Economic ForumORGANIZATION

0.98+

BidenORGANIZATION

0.98+

last quarterDATE

0.98+

bothQUANTITY

0.98+

todayDATE

0.97+

Fortinet ChampionshipEVENT

0.97+

fifth consecutive yearQUANTITY

0.97+

2021-2022 FedEx Regular Season CupEVENT

0.97+

about 3.1 million professionalsQUANTITY

0.97+

Fortinet Security SummitEVENT

0.96+

about 400,000 a yearQUANTITY

0.96+

about 350QUANTITY

0.96+

about 250,000 veteransQUANTITY

0.96+

VietnamLOCATION

0.95+

last year and a halfDATE

0.95+

Fortinet Security Summit 2021EVENT

0.94+

a million peopleQUANTITY

0.94+

firstQUANTITY

0.94+

threeQUANTITY

0.94+

Jason Nolan, Eze Castle & Pat Hurley, Acronis | CUBEConversation, November 2019


 

from the silicon angle media office in Boston Massachusetts it's the queue now here's your host Stu minimun hi I'm Stu minimun and this is a special cube conversation from our Boston area studio following up from the Cronus global cyber summit it happened recently down in Miami Beach Florida John Fourier was a host there you can always go to the cube net to get all of the content here happy to welcome to the program first I've got Pat Hurley who's the vice president and general manager of Americas for a Cronus and joining him as one of his partners Jason Nolan who's the vice president of business development at S Castle both you locally-based thank you so much for joining us great to be here thanks for having us - all right so Pat why don't we start with you we talked a little bit earlier with William tall about some of the announcements give us some of the things and that specifically might be it'd be important to to the partners like Jason well first of all was a fantastic event was our inaugural cyber summit we had great attendance from our partners and getting a lot of feedback about the content that was there actually Jason was one of our panel speakers we got a lot of very positive feedback there as well fantastic event for us the the food was even great so we enjoyed that it was on Miami Beach fantastic location so from our side we thought was a very successful event now the biggest challenge we will have is making even that much better next year yeah did you get the stone crab while you were down there Jason who is unbelievable huh yeah so you were out the show you got to sit on some panels you know you were feeling the energy it was great to interact for the audience and kind of hear the questions that they had and the excitement and the energy around the messaging was really really powerful all right so bring us a little bit into the solutions how are they benefiting you know all of your partners absolutely so for those of you guys who don't know really who Acronis does a lot of people know us really as a backup company from back in the day maybe consumer backup maybe small medium-sized business on-premise backup solutions we've completely transformed the company over the last few years and how we talk about cyber protection which is the combination of cybersecurity and and and data protection we frame that in some tenants that we call sabes so safety accessibility privacy authenticity and security we take those solutions delivering the partners like as cast so that they can then wrap additional services around their customer base to increase the ARPU that they're getting there increase the margin that they're collecting from their customers and obviously deliver an end-to-end complete cyber protection solution all right so Jason you're here is the voice of the customer so as Castle what are your customers telling you and how does that resonate with them so for our customers data protection has always been important they've had to address the number one rule is never lose the data and with the cyber threats today always changing they're not sure what to do so they turn to us as their service provider to help guide them through you know to make sure that they're not one of the next companies on the news and it's nice as a service provider to be able to combine those those services and products with a vendor like a Cronus so that we can provide more value we can strengthen relationships and not have 300 vendors that we have to work with all right my understanding you spend a lot of time with the financial institutions absolutely they don't want to be the next one you know on the front page of the paper in the news on the radio and the like so anything specifically for them that that's worth calling out so I think with the financial services companies having the ability to protect their data their portfolio that they hold you know so important to their business they don't want anyone to have access to that and if any of their so they have to meet the requirements of the investors they have to meet the requirements of the financial institutions and make sure that they're following all of the different guidelines and depending on which markets are in what countries are in they all have different data sovereignty rules they have to deal with gdpr and so there's a lot of different areas that they need to navigate and so they as castle as a service provider we help them understand you know and kind of build that in as a standard and that's what we've done with the Cronus is we've built in the data protection strategy and now we can look at adding in the cybersecurity components to our portfolio to help give them that comprehensive suite and then I you can imagine how it takes a lot of different solutions to pack those together to provide an end band solution for their customers I think one of the beauties of recurrence is that we allow you to provide multiple services in a single pane of glass so you get a lot of very smart people on your team that have to manage multiple solutions what we try to provide is that single opportunity that single solution they learn one thing where they can be backup disaster recovery secure files things are all in one platform allow them to kind of minimize the number of solutions they need to be experts on to provide their customers the highest level service all right Jason security is a very much a multi-faceted you know ever-growing landscape out there tell us how is castle partners with the Cronus and how it fits into your your overall services so our partnership with the Cronus first started with data protection it was one of the first solutions that we were able to find that was able to fit every use case so as a platform as a service provider we're supporting on-premise legacy equipment our hosted VMware cloud infrastructure multi-tenant and infrastructure as your every flavor of cloud services you could imagine because we want the customer to have the solution that fits their needs the best and what we were looking for and a Cronus was able to provide for us was one platform of data protection that was able to be universal across all the different use cases so that's where it starts as a foundation always protecting the data always having a backup in multiple locations and all of our data centers worldwide and now to be able to layer on top of that some of the cybersecurity components in one single pane of glass is only going to allow us to give a better level of service to our customers and Panna I expect that a lot of stuff that we talked about with the financial services translate to many other industries yeah I mean the of the day data's data right and you could talk about different verticals how they use that data the other day it's all about protecting the data making sure your data is secure making sure you have an authentic copy of your data making sure that everything is secure so for us you know we we are known as a backup company but backup is kind of going away you need a more complete solution so one of the things that all these guide bad bad doers out they're doing is they're really trying to go after your backups and trying to lock them down because they understand that that's a first place you're gonna go to try to recover from a ransomware attack our solutions are based on artificial intelligence allowing the machine learning capabilities within our solutions to detect those from from the beginning from to prevent our customers from a zero-day attack so that you're not relying on that one backup to make sure your infrastructure can get back up and running you know and Jason maybe just frame for us the relationship between you and your customers and security you hear everything from you know certain cloud providers are like you know well you know we're like your landlord you know you made her lock your doors and take care of all that stuff and others are more you know hey we're gonna you know really go belly to belly with you and make sure that we've done everything bulletproof with you but what do you hear these days and what we're hearing from the customers is that they're looking to everyone is looking to migrate either start their cloud strategy if they haven't if they've been you know behind the curve if they've had a cloud strategy they were looking to increase we've actually had some customers want to maybe come out of the hyperscale as already so there's a lot of different use cases a lot of different journeys that the customers run and I think helping them navigate so what we've been able to do is as part of our services is wrap around the different cloud services a layer of security at each component so there's that perimeter network the you know there's all of the firewalls next-gen firewalls are now are a requirement they're no longer optional mobile devices endpoint protection network security fishing spearfishing user education there's so many different things that that their own employees need to be aware of that they never had to worry about before and it's it's almost you know like 20 years ago when disaster recovery emerged on the market cybersecurity now is front and center and if you're not paying attention to it at some point it's gonna come up and bite them so we're working with our customers to make sure they never have to deal with that yeah and I think an important part of that it's no longer just the data center right it's all those edge devices right we live in a very connect world data is transferred across multiple devices every day so there's different points where there's a vulnerability that could be identified and you can't just rely on an end user to make sure that they're protecting me well and especially if I know when I was having the earlier conversation with William we're talking about the smbs you know you know if the enterprise I've got my C so and I've got my team and I'm gonna work on that if I'm the SMB well it might be a generalist that security is under the bucket of all the other things that they need to do and therefore they're going to need to turn to their platforms and their partners to help them with a lot of this I mean to say they go to the IT guy right who say well he resolves everything at the end of the day enterprises have big budgets to spend on the stuff I heard something for the analysts reports that you know they're talking about high-level guy at Bank America so what's your budget for cybersecurity I have a budget that ever needs to be spent we're gonna spend on that to make sure that our customers data is secure what we really try to do is package lot of that stuff together to make it affordable complete secure for any customers no I absolutely think most of your customers don't have the billions of dollars to be able to say that they've at least done what they needed to do to make sure that they've they've done all they can so Jason I'll give you the final word first and Pat for you know things that you took away from the show and bring in to your customers so a in the panel discussion we had at the show we were asked to talk about different experiences as a service provider and one of the things that was really important for us that came from the audience was you know what does it take to switch how do you select your vendors and I think what's often overlooked by service riders is the cost of choosing a vendor and what we mean by that is if we were to choose the wrong vendor there is a huge cost of operations to switch from one vendor to the other where you're taking a very limited resource pool of the people on the operations team that are usually focused on on boarding new customers servicing the existing customer base generating revenue who now have to go to non revenue operations just to make that heavy-lift of a transition so picking the partnership with the Kronus was really important to us we made that change and it's been the best decision we've ever made yeah just to piggyback off of that we're not someone that our partners right so we considered as Castle be very strong channel partner of ours they give us reach into that mm custer community the other day they're really the experts we're providing some technology they can rely upon upon to provide a secure complete solution for their customers but that was really the key takeaway for me as you're able to interact face-to-face with your partners directly you're able to hear some of the pain points that they deal with on a daily basis it's not over email so I don't know phone calling on a zoom or WebEx you know you're talking face-to-face these guys understand those real-time problems and working toward solutions together at one big event so that's been fantastic we hope to double attendance for the next event and bring even more partners into the fold pen Jason thank you so much for sharing your takeaways from the Acronis global cybersecurity summit I'm Stu Mittleman and thanks as always for watching the cute

Published Date : Nov 7 2019

**Summary and Sentiment Analysis are not been shown because of improper transcript**

ENTITIES

EntityCategoryConfidence
Pat HurleyPERSON

0.99+

JasonPERSON

0.99+

Jason NolanPERSON

0.99+

Miami BeachLOCATION

0.99+

John FourierPERSON

0.99+

Eze CastlePERSON

0.99+

Bank AmericaORGANIZATION

0.99+

BostonLOCATION

0.99+

Stu minimunPERSON

0.99+

WilliamPERSON

0.99+

300 vendorsQUANTITY

0.99+

PatPERSON

0.99+

Stu minimunPERSON

0.99+

Boston MassachusettsLOCATION

0.99+

next yearDATE

0.99+

Stu MittlemanPERSON

0.99+

November 2019DATE

0.99+

KronusORGANIZATION

0.99+

CronusORGANIZATION

0.99+

20 years agoDATE

0.98+

todayDATE

0.98+

William tallPERSON

0.97+

AcronisORGANIZATION

0.97+

billions of dollarsQUANTITY

0.97+

CastleORGANIZATION

0.97+

single solutionQUANTITY

0.96+

oneQUANTITY

0.96+

bothQUANTITY

0.96+

firstQUANTITY

0.96+

one platformQUANTITY

0.96+

one thingQUANTITY

0.94+

one vendorQUANTITY

0.93+

doubleQUANTITY

0.93+

first solutionsQUANTITY

0.92+

Miami Beach FloridaLOCATION

0.91+

each componentQUANTITY

0.91+

single opportunityQUANTITY

0.91+

one big eventQUANTITY

0.87+

S CastleLOCATION

0.85+

single paneQUANTITY

0.85+

PannaORGANIZATION

0.84+

first placeQUANTITY

0.81+

Cronus global cyber summitEVENT

0.8+

one single pane ofQUANTITY

0.78+

one backupQUANTITY

0.74+

castORGANIZATION

0.72+

lotQUANTITY

0.72+

last few yearsDATE

0.71+

gdprTITLE

0.68+

Acronis global cybersecurity summitEVENT

0.67+

CUBEConversationEVENT

0.65+

VMwareTITLE

0.62+

Americas forORGANIZATION

0.61+

every flavorQUANTITY

0.59+

every use caseQUANTITY

0.55+

every dayQUANTITY

0.52+

presidentPERSON

0.47+