HPE Compute Security - Kevin Depew, HPE & David Chang, AMD
>>Hey everyone, welcome to this event, HPE Compute Security. I'm your host, Lisa Martin. Kevin Dee joins me next Senior director, future Surfer Architecture at hpe. Kevin, it's great to have you back on the program. >>Thanks, Lisa. I'm glad to be here. >>One of the topics that we're gonna unpack in this segment is, is all about cybersecurity. And if we think of how dramatically the landscape has changed in the last couple of years, I was looking at some numbers that H P V E had provided. Cybercrime will reach 10.5 trillion by 2025. It's a couple years away. The average total cost of a data breach is now over 4 million, 15% year over year crime growth predicted over the next five years. It's no longer if we get hit, it's when it's how often. What's the severity? Talk to me about the current situation with the cybersecurity landscape that you're seeing. >>Yeah, I mean the, the numbers you're talking about are just staggering and then that's exactly what we're seeing and that's exactly what we're hearing from our customers is just absolutely key. Customers have too much to lose. The, the dollar cost is just, like I said, staggering. And, and here at HP we know we have a huge part to play, but we also know that we need partnerships across the industry to solve these problems. So we have partnered with, with our, our various partners to deliver these Gen 11 products. Whether we're talking about partners like a M D or partners like our Nick vendors, storage card vendors. We know we can't solve the problem alone. And we know this, the issue is huge. And like you said, the numbers are staggering. So we're really, we're really partnering with, with all the right players to ensure we have a secure solution so we can stay ahead of the bad guys to try to limit the, the attacks on our customers. >>Right. Limit the damage. What are some of the things that you've seen particularly change in the last 18 months or so? Anything that you can share with us that's eye-opening, more eye-opening than some of the stats we already shared? >>Well, there, there's been a massive number of attacks just in the last 12 months, but I wouldn't really say it's so much changed because the amount of attacks has been increasing dramatically over the years for many, many, many years. It's just a very lucrative area for the bad guys, whether it's ransomware or stealing personal data, whatever it is, it's there. There's unfortunately a lot of money to be made into it, made from it, and a lot of money to be lost by the good guys, the good guys being our customers. So it's not so much that it's changed, it's just that it's even accelerating faster. So the real change is, it's accelerating even faster because it's becoming even more lucrative. So we have to stay ahead of these bad guys. One of the statistics of Microsoft operating environments, the number of tax in the last year, up 50% year over year, that's a huge acceleration and we've gotta stay ahead of that. We have to make sure our customers don't get impacted to the level that these, these staggering number of attacks are. The, the bad guys are out there. We've gotta protect, protect our customers from the bad guys. >>Absolutely. The acceleration that you talked about is, it's, it's kind of frightening. It's very eye-opening. We do know that security, you know, we've talked about it for so long as a, as a a C-suite priority, a board level priority. We know that as some of the data that HPE e also sent over organizations are risking are, are listing cyber risks as a top five concern in their organization. IT budgets spend is going up where security is concerned. And so security security's on everyone's mind. In fact, the cube did, I guess in the middle part of last, I did a series on this really focusing on cybersecurity as a board issue and they went into how companies are structuring security teams changing their assumptions about the right security model, offense versus defense. But security's gone beyond the board, it's top of mind and it's on, it's in an integral part of every conversation. So my question for you is, when you're talking to customers, what are some of the key challenges that they're saying, Kevin, these are some of the things the landscape is accelerating, we know it's a matter of time. What are some of those challenges and that they're key pain points that they're coming to you to help solve? >>Yeah, at the highest level it's simply that security is incredibly important to them. We talked about the numbers. There's so much money to be lost that what they come to us and say, is security's important for us? What can you do to protect us? What can you do to prevent us from being one of those statistics? So at a high level, that's kind of what we're seeing at a, with a little more detail. We know that there's customers doing digital transformations. We know that there's customers going hybrid cloud, they've got a lot of initiatives on their own. They've gotta spend a lot of time and a lot of bandwidth tackling things that are important to their business. They just don't have the bandwidth to worry about yet. Another thing which is security. So we are doing everything we can and partnering with everyone we can to help solve those problems for customers. >>Cuz we're hearing, hey, this is huge, this is too big of a risk. How do you protect us? And by the way, we only have limited bandwidth, so what can we do? What we can do is make them assured that that platform is secure, that we're, we are creating a foundation for a very secure platform and that we've worked with our partners to secure all the pieces. So yes, they still have to worry about security, but there's pieces that we've taken care of that they don't have to worry about and there's capabilities that we've provided that they can use and we've made that easy so they can build su secure solutions on top of it. >>What are some of the things when you're in customer conversations, Kevin, that you talk about with customers in terms of what makes HPE E'S approach to security really unique? >>Well, I think a big thing is security is part of our, our dna. It's part of everything we do. Whether we're designing our own asics for our bmc, the ilo ASIC ILO six used on Gen 11, or whether it's our firmware stack, the ILO firmware, our our system, UFI firmware, all those pieces in everything we do. We're thinking about security. When we're building products in our factory, we're thinking about security. When we're think designing our supply chain, we're thinking about security. When we make requirements on our suppliers, we're driving security to be a key part of those components. So security is in our D N a security's top of mind. Security is something we think about in everything we do. We have to think like the bad guys, what could the bad guy take advantage of? What could the bad guy exploit? So we try to think like them so that we can protect our customers. >>And so security is something that that really is pervasive across all of our development organizations, our supply chain organizations, our factories, and our partners. So that's what we think is unique about HPE is because security is so important and there's a whole lot of pieces of our reliance servers that we do ourselves that many others don't do themselves. And since we do it ourselves, we can make sure that security's in the design from the start, that those pieces work together in a secure manner. So we think that gives us a, an advantage from a security standpoint. >>Security is very much intention based at HPE e I was reading in some notes, and you just did a great job of talking about this, that fundamental security approach, security is fundamental to defend against threats that are increasingly complex through what you also call an uncompromising focus to state-of-the-art security and in in innovations built into your D N A. And then organizations can protect their infrastructure, their workloads, their data from the bad guys. Talk to us briefly in our final few minutes here, Kevin, about fundamental uncompromising protected the value in it for me as an HPE customer. >>Yeah, when we talk about fundamental, we're talking about the those fundamental technologies that are part of our platform. Things like we've integrated TPMS and sorted them down in our platforms. We now have platform certificates as a standard part of the platform. We have I dev id and probably most importantly, our platforms continue to support what we really believe was a groundbreaking technology, Silicon Root of trust and what that's able to do. We have millions of lines of firmware code in our platforms and with Silicon Root of trust, we can authenticate all of those lines of firmware. Whether we're talking about the the ILO six firmware, our U E I firmware, our C P L D in the system, there's other pieces of firmware. We authenticate all those to make sure that not a single line of code, not a single bit has been changed by a bad guy, even if the bad guy has physical access to the platform. >>So that silicon route of trust technology is making sure that when that system boots off and that hands off to the operating system and then eventually the customer's application stack that it's starting with a solid foundation, that it's starting with a system that hasn't been compromised. And then we build other things into that silicon root of trust, such as the ability to do the scans and the authentications at runtime, the ability to automatically recover if we detect something has been compromised, we can automatically update that compromised piece of firmware to a good piece before we've run it because we never want to run firmware that's been compromised. So that's all part of that Silicon Root of Trust solution and that's a fundamental piece of the platform. And then when we talk about uncompromising, what we're really talking about there is how we don't compromise security. >>And one of the ways we do that is through an extension of our Silicon Root of trust with a capability called S Spdm. And this is a technology that we saw the need for, we saw the need to authenticate our option cards and the firmware in those option cards. Silicon Root Prota, Silicon Root Trust protects against many attacks, but one piece it didn't do is verify the actual option card firmware and the option cards. So we knew to solve that problem we would have to partner with others in the industry, our nick vendors, our storage controller vendors, our G vendors. So we worked with industry standards bodies and those other partners to design a capability that allows us to authenticate all of those devices. And we worked with those vendors to get the support both in their side and in our platform side so that now Silicon Rivers and trust has been extended to where we protect and we trust those option cards as well. >>So that's when, when what we're talking about with Uncompromising and with with Protect, what we're talking about there is our capabilities around protecting against, for example, supply chain attacks. We have our, our trusted supply chain solution, which allows us to guarantee that our server, when it leaves our factory, what the server is, when it leaves our factory, will be what it is when it arrives at the customer. And if a bad guy does anything in that transition, the transit from our factory to the customer, they'll be able to detect that. So we enable certain capabilities by default capability called server configuration lock, which can ensure that nothing in the server exchange, whether it's firmware, hardware, configurations, swapping out processors, whatever it is, we'll detect if a bad guy did any of that and the customer will know it before they deploy the system. That gets enabled by default. >>We have an intrusion detection technology option when you use by the, the trusted supply chain that is included by default. That lets you know, did anybody open that system up, even if the system's not plugged in, did somebody take the hood off and potentially do something malicious to it? We also enable a capability called U EFI secure Boot, which can go authenticate some of the drivers that are located on the option card itself. Those kind of capabilities. Also ilo high security mode gets enabled by default. So all these things are enabled in the platform to ensure that if it's attacked going from our factory to the customer, it will be detected and the customer won't deploy a system that's been maliciously attacked. So that's got >>It, >>How we protect the customer through those capabilities. >>Outstanding. You mentioned partners, my last question for you, we've got about a minute left, Kevin is bring AMD into the conversation, where do they fit in this >>AMD's an absolutely crucial partner. No one company even HP can do it all themselves. There's a lot of partnerships, there's a lot of synergies working with amd. We've been working with AMD for almost 20 years since we delivered our first AM MD base ProLiant back in 2004 H HP ProLiant, DL 5 85. So we've been working with them a long time. We work with them years ahead of when a processor is announced, we benefit each other. We look at their designs and help them make their designs better. They let us know about their technology so we can take advantage of it in our designs. So they have a lot of security capabilities, like their memory encryption technologies, their a MD secure processor, their secure encrypted virtualization, which is an absolutely unique and breakthrough technology to protect virtual machines and hypervisor environments and protect them from malicious hypervisors. So they have some really great capabilities that they've built into their processor, and we also take advantage of the capabilities they have and ensure those are used in our solutions and in securing the platform. So a really such >>A great, great partnership. Great synergies there. Kevin, thank you so much for joining me on the program, talking about compute security, what HPE is doing to ensure that security is fundamental, that it is unpromised and that your customers are protected end to end. We appreciate your insights, we appreciate your time. >>Thank you very much, Lisa. >>We've just had a great conversation with Kevin Depu. Now I get to talk with David Chang, data center solutions marketing lead at a md. David, welcome to the program. >>Thank, thank you. And thank you for having me. >>So one of the hot topics of conversation that we can't avoid is security. Talk to me about some of the things that AMD is seeing from the customer's perspective, why security is so important for businesses across industries. >>Yeah, sure. Yeah. Security is, is top of mind for, for almost every, every customer I'm talking to right now. You know, there's several key market drivers and, and trends, you know, in, out there today that's really needing a better and innovative solution for, for security, right? So, you know, the high cost of data breaches, for example, will cost enterprises in downtime of, of the data center. And that time is time that you're not making money, right? And potentially even leading to your, to the loss of customer confidence in your, in your cust in your company's offerings. So there's real costs that you, you know, our customers are facing every day not being prepared and not having proper security measures set up in the data center. In fact, according to to one report, over 400 high-tech threats are being introduced every minute. So every day, numerous new threats are popping up and they're just, you know, the, you know, the bad guys are just getting more and more sophisticated. So you have to take, you know, measures today and you have to protect yourself, you know, end to end with solutions like what a AM MD and HPE has to offer. >>Yeah, you talked about some of the costs there. They're exorbitant. I've seen recent figures about the average, you know, cost of data breacher ransomware is, is close to, is over $4 million, the cost of, of brand reputation you brought up. That's a great point because nobody wants to be the next headline and security, I'm sure in your experiences. It's a board level conversation. It's, it's absolutely table stakes for every organization. Let's talk a little bit about some of the specific things now that A M D and HPE E are doing. I know that you have a really solid focus on building security features into the EPIC processors. Talk to me a little bit about that focus and some of the great things that you're doing there. >>Yeah, so, you know, we partner with H P E for a long time now. I think it's almost 20 years that we've been in business together. And, and you know, we, we help, you know, we, we work together design in security features even before the silicons even, you know, even born. So, you know, we have a great relationship with, with, with all our partners, including hpe and you know, HPE has, you know, an end really great end to end security story and AMD fits really well into that. You know, if you kind of think about how security all started, you know, in, in the data center, you, you've had strategies around encryption of the, you know, the data in, in flight, the network security, you know, you know, VPNs and, and, and security on the NS. And, and even on the, on the hard drives, you know, data that's at rest. >>You know, encryption has, you know, security has been sort of part of that strategy for a a long time and really for, you know, for ages, nobody really thought about the, the actual data in use, which is, you know, the, the information that's being passed from the C P U to the, the, the memory and, and even in virtualized environments to the, the, the virtual machines that, that everybody uses now. So, you know, for a long time nobody really thought about that app, you know, that third leg of, of encryption. And so a d comes in and says, Hey, you know, this is things that as, as the bad guys are getting more sophisticated, you, you have to start worrying about that, right? And, you know, for example, you know, you know, think, think people think about memory, you know, being sort of, you know, non-persistent and you know, when after, you know, after a certain time, the, the, you know, the, the data in the memory kind of goes away, right? >>But that's not true anymore because even in in memory data now, you know, there's a lot of memory modules that still can retain data up to 90 minutes even after p power loss. And with something as simple as compressed, compressed air or, or liquid nitrogen, you can actually freeze memory dams now long enough to extract the data from that memory module for up, you know, up, up to two or three hours, right? So lo more than enough time to read valuable data and, and, and even encryption keys off of that memory module. So our, our world's getting more complex and you know, more, the more data out there, the more insatiable need for compute and storage. You know, data management is becoming all, all the more important, you know, to keep all of that going and secure, you know, and, and creating security for those threats. It becomes more and more important. And, and again, especially in virtualized environments where, you know, like hyperconverged infrastructure or vir virtual desktop memories, it's really hard to keep up with all those different attacks, all those different attack surfaces. >>It sounds like what you were just talking about is what AMD has been able to do is identify yet another vulnerability Yes. Another attack surface in memory to be able to, to plug that hole for organizations that didn't, weren't able to do that before. >>Yeah. And, you know, and, and we kind of started out with that belief that security needed to be scalable and, and able to adapt to, to changing environments. So, you know, we, we came up with, you know, the, you know, the, the philosophy or the design philosophy that we're gonna continue to build on those security features generational generations and stay ahead of those evolving attacks. You know, great example is in, in the third gen, you know, epic C P U, that family that we had, we actually created this feature called S E V S N P, which stands for SECURENESS Paging. And it's really all around this, this new attack where, you know, your, the, the, you know, it's basically hypervisor based attacks where people are, you know, the bad actors are writing in to the memory and writing in basically bad data to corrupt the mem, you know, to corrupt the data in the memory. So s e V S and P is, was put in place to help, you know, secure that, you know, before that became a problem. And, you know, you heard in the news just recently that that becoming a more and more, more of a bigger issue. And the great news is that we had that feature built in, you know, before that became a big problem. >>And now you're on the fourth gen, those epic crosses talk of those epic processes. Talk to me a little bit about some of the innovations that are now in fourth gen. >>Yeah, so in fourth gen we actually added, you know, on top of that. So we've, we've got, you know, the sec the, the base of our, our, what we call infinity guard is, is all around the secure boot. The, you know, the, the, the, the secure root of trust that, you know, that we, we work with HPE on the, the strong memory encryption and the S E V, which is the secure encrypted virtualization. And so remember those s s and p, you know, incap capabilities that I talked about earlier. We've actually, in the fourth gen added two x the number of sev v s and P guests for even higher number of confidential VMs to support even more customers than before. Right? We've also added more guest protection from simultaneous multi threading or S M T side channel attacks. And, you know, while it's not officially part of Infinity Guard, we've actually added more APEC acceleration, which greatly benefits the security of those confidential VMs with the larger number of VCPUs, which basically means that you can build larger VMs and still be secured. And then lastly, we actually added even stronger a e s encryption. So we went from 128 bit to 256 bit, which is now military grade encryption on top of that. And, you know, and, and that's really, you know, the de facto crypto cryptography that is used for most of the applications for, you know, customers like the US federal government and, and all, you know, the, is really an essential element for memory security and the H B C applications. And I always say if it's good enough for the US government, it's good enough for you. >>Exactly. Well, it's got to be, talk a little bit about how AMD is doing this together with HPE a little bit about the partnership as we round out our conversation. >>Sure, absolutely. So security is only as strong as the layer below it, right? So, you know, that's why modern security must be built in rather than, than, you know, bolted on or, or, or, you know, added after the fact, right? So HPE and a MD actually developed this layered approach for protecting critical data together, right? Through our leadership and, and security features and innovations, we really deliver a set of hardware based features that, that help decrease potential attack surfaces. With, with that holistic approach that, you know, that safeguards the critical information across system, you know, the, the entire system lifecycle. And we provide the confidence of built-in silicon authentication on the world's most secure industry standard servers. And with a 360 degree approach that brings high availability to critical workloads while helping to defend, you know, against internal and external threats. So things like h hp, root of silicon root of trust with the trusted supply chain, which, you know, obviously AMD's part of that supply chain combined with AMD's Infinity guard technology really helps provide that end-to-end data protection in today's business. >>And that is so critical for businesses in every industry. As you mentioned, the attackers are getting more and more sophisticated, the vulnerabilities are increasing. The ability to have a pa, a partnership like H P E and a MD to deliver that end-to-end data protection is table stakes for businesses. David, thank you so much for joining me on the program, really walking us through what am MD is doing, the the fourth gen epic processors and how you're working together with HPE to really enable security to be successfully accomplished by businesses across industries. We appreciate your insights. >>Well, thank you again for having me, and we appreciate the partnership with hpe. >>Well, you wanna thank you for watching our special program HPE Compute Security. I do have a call to action for you. Go ahead and visit hpe com slash security slash compute. Thanks for watching.
SUMMARY :
Kevin, it's great to have you back on the program. One of the topics that we're gonna unpack in this segment is, is all about cybersecurity. And like you said, the numbers are staggering. Anything that you can share with us that's eye-opening, more eye-opening than some of the stats we already shared? So the real change is, it's accelerating even faster because it's becoming We do know that security, you know, we've talked about it for so long as a, as a a C-suite Yeah, at the highest level it's simply that security is incredibly important to them. And by the way, we only have limited bandwidth, So we try to think like them so that we can protect our customers. our reliance servers that we do ourselves that many others don't do themselves. and you just did a great job of talking about this, that fundamental security approach, of code, not a single bit has been changed by a bad guy, even if the bad guy has the ability to automatically recover if we detect something has been compromised, And one of the ways we do that is through an extension of our Silicon Root of trust with a capability ensure that nothing in the server exchange, whether it's firmware, hardware, configurations, That lets you know, into the conversation, where do they fit in this and in securing the platform. Kevin, thank you so much for joining me on the program, Now I get to talk with David Chang, And thank you for having me. So one of the hot topics of conversation that we can't avoid is security. numerous new threats are popping up and they're just, you know, the, you know, the cost of, of brand reputation you brought up. know, the data in, in flight, the network security, you know, you know, that app, you know, that third leg of, of encryption. the data from that memory module for up, you know, up, up to two or three hours, It sounds like what you were just talking about is what AMD has been able to do is identify yet another in the third gen, you know, epic C P U, that family that we had, Talk to me a little bit about some of the innovations Yeah, so in fourth gen we actually added, you know, Well, it's got to be, talk a little bit about how AMD is with that holistic approach that, you know, that safeguards the David, thank you so much for joining me on the program, Well, you wanna thank you for watching our special program HPE Compute Security.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
David Chang | PERSON | 0.99+ |
Kevin | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Kevin Dee | PERSON | 0.99+ |
AMD | ORGANIZATION | 0.99+ |
Kevin Depew | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
2004 | DATE | 0.99+ |
15% | QUANTITY | 0.99+ |
HP | ORGANIZATION | 0.99+ |
10.5 trillion | QUANTITY | 0.99+ |
HPE E | ORGANIZATION | 0.99+ |
H P E | ORGANIZATION | 0.99+ |
360 degree | QUANTITY | 0.99+ |
over $4 million | QUANTITY | 0.99+ |
2025 | DATE | 0.99+ |
fourth gen. | QUANTITY | 0.99+ |
fourth gen | QUANTITY | 0.99+ |
over 4 million | QUANTITY | 0.99+ |
DL 5 85 | COMMERCIAL_ITEM | 0.99+ |
256 bit | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
three hours | QUANTITY | 0.98+ |
amd | ORGANIZATION | 0.98+ |
128 bit | QUANTITY | 0.98+ |
over 400 high-tech threats | QUANTITY | 0.98+ |
HPE | ORGANIZATION | 0.98+ |
Infinity Guard | ORGANIZATION | 0.98+ |
one piece | QUANTITY | 0.98+ |
almost 20 years | QUANTITY | 0.98+ |
one | QUANTITY | 0.97+ |
millions of lines | QUANTITY | 0.97+ |
single bit | QUANTITY | 0.97+ |
50% | QUANTITY | 0.97+ |
one report | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
hpe | ORGANIZATION | 0.96+ |
third gen | QUANTITY | 0.96+ |
today | DATE | 0.96+ |
both | QUANTITY | 0.96+ |
H P V E | ORGANIZATION | 0.96+ |
first | QUANTITY | 0.95+ |
two | QUANTITY | 0.95+ |
third leg | QUANTITY | 0.94+ |
last couple of years | DATE | 0.93+ |
Silicon Rivers | ORGANIZATION | 0.92+ |
up to 90 minutes | QUANTITY | 0.92+ |
S Spdm | ORGANIZATION | 0.9+ |
ILO | ORGANIZATION | 0.88+ |
AM | ORGANIZATION | 0.88+ |
US government | ORGANIZATION | 0.86+ |
single line | QUANTITY | 0.85+ |
last 18 months | DATE | 0.82+ |
Gen 11 | QUANTITY | 0.81+ |
last 12 months | DATE | 0.81+ |
AM MD base ProLiant | COMMERCIAL_ITEM | 0.8+ |
next five years | DATE | 0.8+ |
up to two | QUANTITY | 0.8+ |
Protect | ORGANIZATION | 0.79+ |
couple years | QUANTITY | 0.79+ |
Protect Your Data & Recover from Cyberthreats & Ransomware in Minutes
>>Welcome back to the cubes coverage of H P S. Green Lake announcement. We've been following Green Lake and the cadence of announcements making. Now we're gonna talk about ransomware, ransomware become a household term. But what people really don't understand is that virtually any bad actor can become a ransomware criminal by going on the dark web hiring a ransomware as a service sticking, putting a stick into a server and taking a piece of the action and that is a really insidious threat. Uh, the adversaries are extremely capable, so we're going to dig into that with Omar assad, who's the storage platform, lead cloud data services at H P E and Deepak verma vice president of product Zito, which is now an H P E company Gentlemen, welcome to the cube. Good to see you. Thank you. >>Thank you. Welcome. Pleasure to be here. So >>over you heard my little narrative upfront. How does the Xarelto acquisition fit into that discourse? >>Thank you. Dave first of all, we're extremely excited to welcome Sir toe into the HP family. Uh, the acquisition of Puerto expands the Green Lake offerings from H P E uh, into the data protection as a service and ransomware protection as a service capabilities and it at the same time accelerates the transformation that the HP storage businesses going through as it transforms itself into more of a cloud native business, which sort of follows on from the May 4th announcements that you helped us cover. Uh, this enables the HP sales teams to now expand the data protection perimeter and to start offering data protection as a service and ransomware as a service with the best in class technologies uh, from a protection site as well as from ransomware recovery side of the house. And so we're all the way down already trying to integrate uh, you know, the little offerings as part of the Green lake offerings and extending support through our services organization. And the more of these announcements are gonna roll out later in the month. >>And I think that's what you want to see from it as a service offering. You want to see a fast cadence of new services that are not a box by a box that are applying. No, it's services that you want to access. So let's, let's talk about before we get into the tech, can we talk about how you're helping customers deal with ransomware? Maybe some of the use cases that you're seeing. >>First of all, extremely excited to be part of the HP family now. Um, Quick history and that we've been around for about 11 years. We've had about 9000 plus customers and they all benefit from essentially the same technology that we invented 11 years ago. First and foremost, one of the use cases has been continuous data protection. So were built on the CdP platform, which means extremely low RTO S and R P O S for recovery. I'll give you example there um, United Airlines is an application that cost them $1 million dollars for every hour that they're down. They use traditional approaches. That would be a lot of loss with Zito, we have that down two seconds of loss in case and the application goes down. So that's kind of core and fundamental to our plaque. The second uh critical use case that for us has been simplicity. A lot of customers have said we make the difficult, simple. So DRS is a complex uh process. Um, give you an example there. Hcea Healthcare Consolidated four different disaster recovery platforms into a single platform in Puerto and saved about $10 million dollars a year. So it's making that operations of having disaster recovery process is much simpler. Um the third kind of critical use case for us as uh, the environment has evolved as the landscape has involved has been around hybrid cloud. So being able to take customers to the platforms that they want to go to that's critical for us And for our customers an example, there is Kingston technology's so Kingston tried some competitive products to move to Azure, it would take them about 24 hours to recover 30 VMS or so with zero technology. They will get about all their 1000 VMS up in Azure instantaneously. So these are three use cases that were foundational. Built. Built the company in the tech. >>Nice. Thank you. Thank you for that. So simple works well these days, especially with all this complexity we have to deal with. Can we get into the secret sauce a little bit. I mean CdP has been around forever. What do you guys do that? That's different. Maybe you can talk about that. Sure. >>Um it's cdp based, I think we've perfected the technology. It's less about being able to just copy the data. It's more about what you do when things go bump. We've made it simpler with driven economies of scale lower and being platform agnostic. We've really brought that up across to whatever platforms once upon a time it was moving from physical to virtual or even across different virtualization platforms and then being able to move across to whatever cloud platform customer may want or or back >>to cbP continuous data protection by the way for the audience that may not know that go ahead. And >>one of the additional points that I want to add to the box comment over here is the the basics of platform independence is what really drew uh hp technologists into the technology because you know, one of the things we have many, we have the high end platform with the H B electra nine Kv of the electro six kids the midrange platform. Then we have a bunch of file and object offerings on the side. What zero does it University universally applies to all those technologies and along with, you know, as you pair them up with our computer offerings to offer a full stack but now the stack is disaster recovery capable. Natively with the integration of certo, you know, one of the things that, you know, Deepak talked about about the as your migrations that a lot of the customers are talking about cloud is also coming up as a D our use case for a lot of our customers, customers, you know, you know, as we went through thousands of customers interviews one of the, one of the key things that came back was investing in a D our data center which is just waiting there for a disaster to happen. It's a very expensive insurance policy. So absurd. Oh, through its native capabilities allows customers to do is to just use public cloud as a D our target and and as a service, it just takes care of all the format conversions and recoveries and although that's completely automated inside the platform and and we feel that, you know, when you combine this either at the high end of data center storage offering or the middle age offering with this replication, D. R. And ransomware protection built into the same package, working under the same hood, it just simplifies and streamlines the customers deployment. >>Come here a couple of things. So first of all historically, if you wanted to recover to appoint within let's say, you know, 10 seconds, five seconds you have to pay up. Big time. Number one. Number two is you couldn't test your D. R. It was too risky. So people just had it in, they had a checkbox on compliance but they actually couldn't really test it because they were afraid they were going to lose data. So it sounds like you're solving both of those problems or >>or you know we remember the D. R. Test where it was a weekend. It was an event right? It was the event and at the end of july that the entire I. T. Organizing honey >>it's not gonna be home this weekend. Exactly what >>we've changed. That is a click of a button. You can D. R. Test today if you want to you can have disaster recovery still running. You can D. R. Test in Azure bring up your environment an isolated network bubble, make sure everything's running and bring it and bring it down. The interesting thing is the technology was invented back when our fear in the industry was losing a data center was losing power was catastrophic, natural disasters. But the technology has lent itself very well to the new threats which which are very much around ransomware as you mentioned because it's a type of disaster. Somebody's going after your data. Physical servers are still around but you still need to go back to a point in time and you need to do that very quickly. So the technology has really just found itself uh appealing to new challenges. >>If a customer asks you can I really eliminate cyber attacks, where should I put my my if I had 100 bucks to spend. Should I spend it on you know layers and defense should I spend it on recovery. Both, what would you tell them? >>I think it's a balanced answer. I think prevention is 100% impossible. Uh It's really I'd say spend it in in thirds. You want to spend a third of it and and prevention a third of it maybe in detection and then a third of it in uh recovery. So it's really that balancing act that means you can't leave the front door open but then have a lot of recovery techniques invested in. It has to be it has to be a balance and it's also not a matter of if it's a matter of when so we invest in all three areas. Hopefully two of them will work to your advantage. >>You dave you you should always protect your perimeter. I mean that that goes without saying but then as you invest in other aspects of the business, as Deepak mentioned, recovery needs to be fast and quick recovery whether from your recovering from a backup disaster. Are you covering from a data center disaster a corrupted file or from a ransomware attack. A couple of things that zero really stitches together like journal based recovery has been allowed for a while but making journal based recovery platform independent in a seamless fashion with the click of a button within five seconds go back to where your situation was. That gives you the peace of mind that even if the perimeter was breached, you're still protected, you know, five minutes into the problem And, and that's the peace of mind, which along with data protection as a service, disaster recovery as a service and now integrating this, you know, recovery from ransomware along with it in a very simple, easy to consume package is what drew us into the >>more you can do this you said on the use the cloud as a target. I could use the cloud as an air gap if I wanted to. It sounds like it's cloud Native, correct? Just wrap your stack in kubernetes and shove it in the cloud and have a host and say we're cloud to No, really I'm serious. So >>absolutely, we we looked at that approach and that that's where the challenge comes in, Right? So I give you the example of Kingston technology just doesn't scale, it's not fast enough. What we did was developed a platform for cloud Native. We consume cloud services where necessary in order to provide that scalability. So one example in Azure is being able to use scale set. So think about a scenario where you just declare a disaster, you've got 1000 VMS to move over, we can spin up the workers that need to do the work to get 1000 VMS spin them down. So you're up and running instantaneously and that involves using cloud Native uh tools and technologies, >>can we stay on that for a minute, So take take us through an example of what life was like would be like without zero trying to recover and what it's like with Puerto resources, complexity time maybe you could sort of paint a picture. Sure. >>Let me, I'll actually use an example from a customer 10 Kata. They uh develop defensive fabrics, especially fabric. So think about firefighters, think about our men and women abroad that need protective clothing that developed the fibers behave. They were hit by ransomware by crypto locker. That this was before zero. Unfortunately it took they took about a two week uh data loss. It took them weeks to recover that environment, bring it back up and the confidence was pretty low. They invested in, they looked at our technology, they invested in the technology and then they were hit with a different variant of crypto locker immediately. The the IT administrators and the ITS folks there were relieved right, they had a sense of confidence to say yes we can recover. And the second time around they had data loss of about 10 seconds, they could recover within a few minutes. So that's the before and after picture giving customers that confidence to say yep, a breach happened, we tried our best but now it's up to recovery and I can recover without having to dig tapes out from some vault and hopefully have a good copy of data sitting there and then try that over and over again and there's a tolerance right before a time before which business will not be able to sustain itself. So what we want to do is minimize that for businesses so that they can recover as quickly as possible with as little data loss as possible. >>Thank you for that. So, Omar, there's a bigger sort of cyber recovery agenda that you have as part of, of green lake, I'm sure. What, what should we expect, what's next? Where do you want to take this? >>So uh excellent question point in the future day. So one of the things that you helped us, uh you know, unveil uh in May was the data services. Cloud console. Data services. Cloud console was the first uh sort of delivery as we took the storage business as it is and start to transform into more of a cloud native business. We introduced electra uh which is the cloud native hardware with the customers buy for persistent storage within their data center. But then data services, cloud console truly cemented that cloud operational model. Uh We separated the management from, from the devices itself and sort of lifted it up as a sas service into the public, public cloud. So now what you're gonna see is, you know, more and more data and data management services come up on the data services. Cloud console and and zero is going to be one of the first ones. Cloud physics was another one that we we talked about, but zero is the is the true data management service that is going to come up on data services, cloud console as part of the Green Lake services agenda that that HP has in the customer's environ and then you're gonna see compliance as a service. You're going to see data protection as a service. You're gonna see disaster recovery as a service. But the beautiful thing about it is, is choice with simplicity as these services get loaded up on data services, clown console. All our customers instantly get it. There's nothing to install, there's nothing to troubleshoot uh, there's nothing to size. All those capabilities are available on the console, customers go in and just start consuming Xarelto capabilities from a management control plane, Disaster recovery control plan are going to be available on the data services, cloud console, automatically detecting electro systems, rian Bear systems, container based systems, whichever our customers have deployed and from there is just a flip of a button. Another way to look at it is it sort of gives you that slider that you have data protection or back up on one side, you've got disaster recovery on one side, you've got ransomware protection on on the extreme right side, you can just move a slider across and choose the service level that you want without worrying about best practices, installation, application integration. All of that just takes control from the data services, cloud concepts. >>Great, great summary because historically you would have to build that right now. You can buy it as a service. You can programmatically, you know, deploy it and that's a game changer. Have to throw it over the fence to some folks. That's okay. Now, you know, make it make it work and then they change the code and you come back a lot of finger pointing. It's now it's your responsibility. >>Absolutely. Absolutely. We're excited to provide Zito continue provides the desert of customers but also integrate with the Green Green Lake platform and let the rest of Green Lake customers experience some of the sort of technology and really make that available as a service. >>That's great. This is a huge challenge for customers. I mean they do, I pay their ransom. Do not pay the ransom. If I pay the ransom the FBI is going to come after me. But if I don't pay the ransom, I'm not gonna get the crypto key. So solutions like this are critical. You certainly see the president pushing for that. The United States government said, hey, we got to do a better job. Good job guys, Thanks for for sharing your story in the cube and congratulations. Thank >>you. Thank you David. >>All right. And thank you for watching everybody. Uh this is the, I want to tell you that everything that you're seeing today as part of the Green Lake announcement is going to be available on demand as part of the HP discover more. So you got to check that out. Thank you. You're watching the cube. >>Mhm mm.
SUMMARY :
Uh, the adversaries are extremely capable, so we're going to dig into that with Omar assad, Pleasure to be here. over you heard my little narrative upfront. itself into more of a cloud native business, which sort of follows on from the May 4th announcements that you And I think that's what you want to see from it as a service offering. First and foremost, one of the use cases has been Thank you for that. It's more about what you do when things go bump. to cbP continuous data protection by the way for the audience that may not know that go ahead. technologists into the technology because you know, one of the things we have many, we have the high end platform with So first of all historically, if you wanted to recover to appoint within let's say, or you know we remember the D. R. Test where it was a weekend. it's not gonna be home this weekend. back to a point in time and you need to do that very quickly. Both, what would you tell them? So it's really that balancing act that means you can't leave the front door You dave you you should always protect your perimeter. more you can do this you said on the use the cloud as a target. So think about a scenario where you just declare a disaster, you've got 1000 VMS to move over, complexity time maybe you could sort of paint a picture. So that's the before and after picture giving customers that confidence to Thank you for that. So one of the things that you You can programmatically, you know, deploy it and that's a game changer. of the sort of technology and really make that available as a service. If I pay the ransom the FBI is going to come after me. Thank you David. So you got to check that out.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Omar | PERSON | 0.99+ |
100 bucks | QUANTITY | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
1000 VMS | QUANTITY | 0.99+ |
H P E | ORGANIZATION | 0.99+ |
Deepak | PERSON | 0.99+ |
May 4th | DATE | 0.99+ |
10 seconds | QUANTITY | 0.99+ |
HP | ORGANIZATION | 0.99+ |
100% | QUANTITY | 0.99+ |
five minutes | QUANTITY | 0.99+ |
United Airlines | ORGANIZATION | 0.99+ |
five seconds | QUANTITY | 0.99+ |
Kingston | ORGANIZATION | 0.99+ |
two seconds | QUANTITY | 0.99+ |
May | DATE | 0.99+ |
second time | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
$1 million dollars | QUANTITY | 0.99+ |
Omar assad | PERSON | 0.99+ |
Both | QUANTITY | 0.99+ |
Azure | TITLE | 0.99+ |
three use cases | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
Dave | PERSON | 0.98+ |
today | DATE | 0.98+ |
second | QUANTITY | 0.98+ |
about 10 seconds | QUANTITY | 0.98+ |
30 VMS | QUANTITY | 0.98+ |
11 years ago | DATE | 0.98+ |
Puerto | LOCATION | 0.98+ |
thousands of customers | QUANTITY | 0.97+ |
Hcea Healthcare | ORGANIZATION | 0.97+ |
both | QUANTITY | 0.97+ |
Zito | ORGANIZATION | 0.97+ |
zero | QUANTITY | 0.97+ |
about 11 years | QUANTITY | 0.97+ |
United States government | ORGANIZATION | 0.96+ |
about 24 hours | QUANTITY | 0.96+ |
third | QUANTITY | 0.96+ |
Green Lake | ORGANIZATION | 0.96+ |
third kind | QUANTITY | 0.95+ |
D. R. Test | EVENT | 0.94+ |
Green Lake | LOCATION | 0.94+ |
H P S. Green Lake | ORGANIZATION | 0.93+ |
about a two week | QUANTITY | 0.93+ |
three | QUANTITY | 0.93+ |
about 9000 plus customers | QUANTITY | 0.93+ |
about $10 million dollars a year | QUANTITY | 0.93+ |
single platform | QUANTITY | 0.92+ |
Cloud physics | TITLE | 0.91+ |
one side | QUANTITY | 0.89+ |
Xarelto | TITLE | 0.89+ |
one example | QUANTITY | 0.88+ |
10 Kata | ORGANIZATION | 0.86+ |
minutes | QUANTITY | 0.85+ |
end of july | DATE | 0.84+ |
Deepak verma | PERSON | 0.83+ |
two of | QUANTITY | 0.82+ |
first ones | QUANTITY | 0.82+ |
Lake | ORGANIZATION | 0.81+ |
Puerto | ORGANIZATION | 0.81+ |
Green Green Lake | ORGANIZATION | 0.78+ |
Number two | QUANTITY | 0.78+ |
a minute | QUANTITY | 0.78+ |
Barbara Hallmans, HPE | Microsoft Ignite 2019
>>live from Orlando, Florida It's the cue covering Microsoft Ignite Brought to you by Cho He City Welcome >>back, everyone to the Cubes Live coverage of Microsoft IC Night. 26,000 people were here. The cube, the middle of the show floor. It's an exciting time. I'm your host. Rebecca Night, along with my co host, Stew Minutemen. We're joined by Barbara Homans. She is the director. Global ecosystem strategy and micro ecosystem lead at HP Thank you so much for coming on the Cube direct from Munich. Yes, Rebecca. Glad to be here. So you have You have two Rolls Global Ecosystem Strategy and Michael Microsoft's ecosystem lead. Explain how those work and how they there is synergy between those two roles. Yeah, I mean, I started >>off with the Microsoft role, but what we figured out is that actually, the world is much bigger than just one alliance, and that's why we call ourselves the Ecosystem. So it's all about driving alliances from different partner speed as I speed Eyes V's or also smaller partners in different segments and build a whole ecosystem play. That's what I'm attempting to do. >>So how do HB and Microsoft worked together. So we've >>seen partnering for 30 years strong, strong relationship with Microsoft and really nice to see. Also today, you know some of the H p e solutions on stage and even deepening our partnership. We have several areas. Probably 34 I can talk about in the next few minutes on how we work together with Microsoft specifically. >>Yeah. So? So Barbara, You know, I think most of us remember back, you know, early if you're talking about windows and office and you know HP here what's now part of HP Inc? Not sure. As many people know about all of the places that H p e Partners, obviously on the server side, it makes sense. But Azure is something. And the Azure arc announcement Help us understand, you know, Azure stack and beyond. Where? HP. Ethan with Microsoft on the Enterprise side. >>Perfect. Absolutely. We have still in Microsoft. Oh, am business where we have actually service attached with licenses. That's not going away rights. We absolutely. It's a strong business class. We work very closely around sequel with Microsoft, and that's also worried this whole azure arc announcement fits in. But it's more than just a sequel right with this as your arc. For me, it's a announcement around deepening relationships. Both. We're interested in a hybrid strategy. I really like Thio here from Satya today. How important hybrid is for Microsoft and this announcement as your ark. That's in public preview now, right? Well, give somewhat details on that. So we'd love to work with customers on that we actually our part of the public review and if anyone is interested, love to hear from customers. Please come to me, Barbara Holman's and we'll hook you up and get into the program. It's really about the hybrid piece, right that we both worked >>in Barbara H. P. E. If my understanding plays on both sides of it, it's not just in the data center with some gear there, but as you said, there's a sequel. The application side, you know, hybrid HP, you know, plays across the board, >>Indeed, So I don't know if you know about HB is actually a expert MSP partner for Azure. We got that last year. We're very proud of what I think we're one of 50 world by its partners. That also means we can actually offer Manage Service's Migration Service is helping people to move to an azure based clout. And that actually came partially because off our position off CTP Cloud Technology Partners, but also read pixie in the UK, and there are no old part off our point. Next service is group, and so as such, we have numerous customers were actually helped into the public cloud. Help them to find the right place. Because if you don't know if you've seen the video from Eric Poodle, that was part of the announcement today as well around as your ark, this is all about finding the right mix off your applications, and this is where we work together and a perfect fit. >>What are some of the biggest challenges you're seeing from your cut from your customers in terms of how you might, how Azure Arc might be the solution for them >>so as your ark? It's hard to say at this >>stage, because I just really don't work for Michael >>Self. So, yeah, we have to ask these people. But again, what I understand division is really that way will be able to manage hybrid environments in a in a better way, and again, this is what HP You know, we have a lot off our tour, of course, but we also announce that our hardware, all of that, will be available as a service within the next two for years. So we're moving in that direction in addition to Azure. And I think this will help customers to take adventures in the end. But it's hard to say Right, So you on this. This is very new. At this stage, the odds are right >>and this is a Microsoft show, not on HP show, but I I read somewhere that you had done a talk. Fear no cloud with H. P m. Our company's afraid. I mean, how would you describe the atmosphere with the companies that you work with? I worked >>in the cloud space, but for the last 10 years or longer, you know, it was on different parts off the industry there and from the early adoption. Really. People looking into you know, should I trust my data in this specific with this cloud provider or which applications am I gonna move? And I think today people have lost the fear a little bit, but they still don't know what to put where and there's applications, you do not want to move in a cloud. There's others that you for your specific company, you don't want to move, and another company may do that. And that's what we're trying to help them, right? So don't you don't have to fear the cloud you can. Actually, we can help you to adopt it at your pace in your way and so that you take most of the advantage out of it. >>But Barbara would love to hear any color you could give from the joint HP, EA and Microsoft customers very much. The announcement today feels like it completely. It's an update on the hybrid message, but A B and Microsoft have been working together on solutions like Azure Stack for a number of years. So what? What's working well today? What do you think you know? This will mean down the road a CZ. Some of these solutions start start to mature even further. >>Maybe moving to another area that HB and Microsoft worked very well together is around the modern workplace practice, and in there we just had a really nice win with Portia thing, actually in Austria, but planning to roll this out no further than that, and h b E's team has helped them to move from the current applicator from the current environment. Thio up two dates. Microsoft 3 65 Environment There's em OD in the UK and it's fast twice if I can talk about M. O D on stage here and they said yes, another customer that we should help to move to a Microsoft 3 65 environment. So there's numerous customers that trust HP with Microsoft in moving their their information to the to the clouds. Yeah, that's one example Asha Stack we have. You know, there's several customers that hard won about ashes. Takis. Difficult to talk about the customers because a lot of them are in the government sector on. So you know, there's a few that we can talk about, but they're mostly service providers, but the really big names, unfortunately, we can talk about because of the conference shit Confidentiality. Yeah, >>trust is one of the things that we keep hearing so much of it about at this conference. Satya Nadella talked about it on the main stage this morning in terms of the relationship that you have and HP standing in the technology world. How do you feel trust with customers? And how do you make sure you are maintaining that? That bond of trust and also the reputation of being a trustworthy partner? >>Yeah, I think I love you know, I love Saturdays, Point on trust because that actually makes the difference between you. Just deliver hardware and you walk away. And this is probably coming back to Azure stack Hop, as it's called now, right? You know, we've been told actually by Microsoft that we've accomplished with the customers from a delivery from a You know, we don't just walk away and say Good luck with the equipment you're on your own really helped them thio and make sure it's working for them. So for me, that's the key that you can come back to a customer afterwards and the customer will actually have you in your office again. >>Well, Barbara, I think back for most of my career what one of the hallmarks of an H. P e solution Was that the turnkey offering we know from, you know, ordering through delivery through, you know, up and running. HP has been streamlining that you know, I think back my entire career cloud has been not necessarily the simplest solutions out there. So maybe give us directionally. How does HPD partner with Microsoft on dhe your customers toe make? I would easier as WeII go through this journey >>S O s aside. Whereas your expert MSP partner a such we have done several of course trainings with Microsoft. We make sure that our people are educated on it way have, you know, with red pixy in the UK it's now part of point next, but I love to say the name because people really associate still with this a specific, strong and trustworthy team. You really build up a very good practice with Microsoft. There's, you know, local deal clinics where we really work in the specific deal. Steal by deal on how we can make it better for the customer. So a lot off local engagement. But for me, that all happens in country. Write me at a global level. I can only help them and steered a little bit. But that's also for me trust. It's a person to person relationship that happens in country. >>And would you say there are big differences country to country in terms of how willingly trust you and and and then how long it takes to build that relationship. >>So I'm gonna get in >>trouble now with some of the country. >>No, I you know the >>somewhere, even your CEO. >>You know, it's no, I mean you and I personally lift in Canada for a while, and so for me, it's some people are harder, you know, you need to get to know them. But then trust is even deeper then some of the others. But I have to say, it's all we're I mean, we're, I would say, from all those who look at h p were really a global company, right? And from this goes from Japan, Thio South Pacific too. You know, many countries in Asia will be very successful with ashes, stack specifically and always in Europe, the Middle East, all the way to North America, South America. So, I mean, that's the nice thing about HPD, I would say for the customers as well that they really get a global view on DA, a global company that can trust. >>So you're here, Ed ignite from Germany. What are the kinds of conversations you're having. And what do you think you're gonna take back with you when you go back to the office next week? So the other piece >>and we have ah, quite big. Both hear it at the event, right? We have a very nice edge line 8000 with us, which is kind of a ruggedized us or a smaller version. It's kindof almost my hand back, kind of to carry along, which has caught a lot of interest from the customers. So just standing there, watching the customers, asking, What is it? Can you tell me more about it? Rest is, you know, I love the bus and I love the actually part of the Microsoft Advisory Council for inspired, which is the partner event, right? But I love the bus to see here what's what's going on and always like to see how other people what they do, what they what they do at these events and then just Microsoft. I think it's wonderful, wonderful company. The inspiration. The story today was just into end a great story with great customer stories as well. So she does to the Microsoft team. Well done. >>Congratulations. Your gear was highlighted in the keynote this morning, so I'm sure that's driving a lot of traffic through for people Thio CC the latest. >>I would >>hope Superdome flex was there and then the actual stick. Both of them were there. So we worked hard for that. Thank you, Michael Self, for giving us the opportunity to be present and the keynote today. Well, >>thank you so much for coming on the Cube. It was a pleasure having you on Barbara. >>Thank you, Rebecca. Thank you. Stupid. >>I'm Rebecca Knight. First to minimum. Stay tuned for more of cubes. Live coverage of Microsoft ignite.
SUMMARY :
So you have You have two Rolls Global Ecosystem Strategy and Michael Microsoft's ecosystem off with the Microsoft role, but what we figured out is that actually, the world is much bigger than So how do HB and Microsoft worked together. Also today, you know some of the H p e solutions on stage And the Azure arc announcement Help us understand, you know, Azure stack and beyond. It's really about the hybrid piece, right that we both worked it's not just in the data center with some gear there, but as you said, there's a sequel. Indeed, So I don't know if you know about HB is actually a expert MSP partner for Azure. it's hard to say Right, So you on this. I mean, how would you describe the atmosphere with the in the cloud space, but for the last 10 years or longer, you know, it was on different parts But Barbara would love to hear any color you could give from the joint HP, on. So you know, there's a few that we can talk about, but they're mostly about it on the main stage this morning in terms of the relationship that you have and HP So for me, that's the key that you can come back to a customer afterwards that you know, I think back my entire career cloud has been not it way have, you know, with red pixy in the UK it's now And would you say there are big differences country to country in terms of how willingly me, it's some people are harder, you know, you need to get to know them. And what do you think you're gonna take back with you when you go back to the office next week? But I love the bus to see here what's a lot of traffic through for people Thio CC the latest. So we worked hard for that. thank you so much for coming on the Cube. Thank you, Rebecca. First to minimum.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Rebecca | PERSON | 0.99+ |
Barbara Homans | PERSON | 0.99+ |
Barbara | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Rebecca Knight | PERSON | 0.99+ |
Michael Self | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Austria | LOCATION | 0.99+ |
Canada | LOCATION | 0.99+ |
Satya Nadella | PERSON | 0.99+ |
Munich | LOCATION | 0.99+ |
UK | LOCATION | 0.99+ |
HP | ORGANIZATION | 0.99+ |
Rebecca Night | PERSON | 0.99+ |
Barbara Hallmans | PERSON | 0.99+ |
HPD | ORGANIZATION | 0.99+ |
Asia | LOCATION | 0.99+ |
EA | ORGANIZATION | 0.99+ |
Barbara Holman | PERSON | 0.99+ |
Ethan | PERSON | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
Michael | PERSON | 0.99+ |
North America | LOCATION | 0.99+ |
Both | QUANTITY | 0.99+ |
Middle East | LOCATION | 0.99+ |
Microsoft Advisory Council | ORGANIZATION | 0.99+ |
South America | LOCATION | 0.99+ |
last year | DATE | 0.99+ |
Germany | LOCATION | 0.99+ |
next week | DATE | 0.99+ |
26,000 people | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Barbara H. P. E. | PERSON | 0.99+ |
30 years | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
H p e Partners | ORGANIZATION | 0.99+ |
two roles | QUANTITY | 0.99+ |
Takis | PERSON | 0.99+ |
both sides | QUANTITY | 0.99+ |
Eric Poodle | PERSON | 0.99+ |
one | QUANTITY | 0.98+ |
two dates | QUANTITY | 0.98+ |
HB | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.98+ |
two | QUANTITY | 0.98+ |
Thio | PERSON | 0.97+ |
HP Inc | ORGANIZATION | 0.97+ |
M. O D | PERSON | 0.96+ |
twice | QUANTITY | 0.96+ |
Azure Stack | TITLE | 0.95+ |
Japan | LOCATION | 0.95+ |
h b E | ORGANIZATION | 0.94+ |
Azure | TITLE | 0.94+ |