Daisy Urfer, Algolia & Jason Ling, Apply Digital | AWS Startup Showcase S2 E3
(introductory riff) >> Hey everyone. Welcome to theCUBE's presentation of the "AWS Startup Showcase." This is Season 2, Episode 3 of our ongoing series that features great partners in the massive AWS partner ecosystem. This series is focused on, "MarTech, Emerging Cloud-Scale Customer Experiences." I'm Lisa Martin, and I've got two guests here with me to talk about this. Please welcome Daisy Urfer, Cloud Alliance Sales Director at Algolia, and Jason Lang, the Head of Product for Apply Digital. These folks are here to talk with us today about how Algolia's Search and Discovery enables customers to create dynamic realtime user experiences for those oh so demanding customers. Daisy and Jason, it's great to have you on the program. >> Great to be here. >> Thanks for having us. >> Daisy, we're going to go ahead and start with you. Give the audience an overview of Algolia, what you guys do, when you were founded, what some of the gaps were in the market that your founders saw and fixed? >> Sure. It's actually a really fun story. We were founded in 2012. We are an API first SaaS solution for Search and Discovery, but our founders actually started off with a search tool for mobile platforms, so just for your phone and it quickly expanded, we recognize the need across the market. It's been a really fun place to grow the business. And we have 11,000 customers today and growing every day, with 30 billion searches a week. So we do a lot of business, it's fun. >> Lisa: 30 billion searches a week and I saw some great customer brands, Locost, NBC Universal, you mentioned over 11,000. Talk to me a little bit about some of the technologies, I see that you have a search product, you have a recommendation product. What are some of those key capabilities that the products deliver? 'Cause as we know, as users, when we're searching for something, we expect it to be incredibly fast. >> Sure. Yeah. What's fun about Algolia is we are actually the second largest search engine on the internet today to Google. So we are right below the guy who's made search of their verb. So we really provide an overall search strategy. We provide a dashboard for our end users so they can provide the best results to their customers and what their customers see. Customers want to see everything from Recommend, which is our recommended engine. So when you search for that dress, it shows you the frequently bought together shoes that match, things like that, to things like promoted items and what's missing in the search results. So we do that with a different algorithm today. Most in the industry rank and they'll stack what you would want to see. We do kind of a pair for pair ranking system. So we really compare what you're looking for and it gives a much better result. >> And that's incredibly critical for users these days who want results in milliseconds. Jason, you, Apply Digital as a partner of Algolia, talk to us about Apply Digital, what it is that you guys do, and then give us a little bit of insight on that partnership. >> Sure. So Apply Digital was originally founded in 2016 in Vancouver, Canada. And we have offices in Vancouver, Toronto, New York, LA, San Francisco, Mexico city, Sao Paulo and Amsterdam. And we are a digital experiences agency. So brands and companies, and startups, and all the way from startups to major global conglomerates who have this desire to truly create these amazing digital experiences, it could be a website, it could be an app, it could be a full blown marketing platform, just whatever it is. And they lack either the experience or the internal resources, or what have you, then they come to us. And and we are end-to-end, we strategy, design, product, development, all the way through the execution side. And to help us out, we partner with organizations like Algolia to offer certain solutions, like an Algolia's case, like search recommendation, things like that, to our various clients and customers who are like, "Hey, I want to create this experience and it's going to require search, or it's going to require some sort of recommendation." And we're like, "Well, we highly recommend that you use Algolia. They're a partner of ours, they've been absolutely amazing over the time that we've had the partnership. And that's what we do." And honestly, for digital experiences, search is the essence of the internet, it just is. So, I cannot think of a single digital experience that doesn't require some sort of search or recommendation engine attached to it. So, and Algolia has just knocked it out of the park with their experience, not only from a customer experience, but also from a development experience. So that's why they're just an amazing, amazing partner to have. >> Sounds like a great partnership. Daisy, let's point it back over to you. Talk about some of those main challenges, Jason alluded to them, that businesses are facing, whether it's e-commerce, SaaS, a startup or whatnot, where search and recommendations are concerned. 'Cause we all, I think I've had that experience, where we're searching for something, and Daisy, you were describing how the recommendation engine works. And when we are searching for something, if I've already bought a tent, don't show me more tent, show me things that would go with it. What are some of those main challenges that Algolia solution just eliminates? >> Sure. So I think, one of the main challenges we have to focus on is, most of our customers are fighting against the big guides out there that have hundreds of engineers on staff, custom building a search solution. And our consumers expect that response. You expect the same search response that you get when you're streaming video content looking for a movie, from your big retailer shopping experiences. So what we want to provide is the ability to deliver that result with much less work and hassle and have it all show up. And we do that by really focusing on the results that the customers need and what that view needs to look like. We see a lot of our customers just experiencing a huge loss in revenue by only providing basic search. And because as Jason put it, search is so fundamental to the internet, we all think it's easy, we all think it's just basic. And when you provide basic, you don't get the shoes with the dress, you get just the text response results back. And so we want to make sure that we're providing that back to our customers. What we see average is even, and everybody's going mobile. A lot of times I know I do all my shopping on my phone a lot of the time, and 40%-50% better relevancy results for our customers for mobile users. That's a huge impact to their use case. >> That is huge. And when we talked about patients wearing quite thin the last couple of years. But we have this expectation in our consumer lives and in our business lives if we're looking for SaaS or software, or whatnot, that we're going to be able to find what we want that's relevant to what we're looking for. And you mentioned revenue impact, customer churn, brand reputation, those are all things that if search isn't done well, to your point, Daisy, if it's done in a basic fashion, those are some of the things that customers are going to experience. Jason, talk to us about why Algolia, what was it specifically about that technology that really led Apply Digital to say, "This is the right partner to help eliminate some of those challenges that our customers could face?" >> Sure. So I'm in the product world. So I have the wonderful advantage of not worrying about how something's built, that is left, unfortunately, to the poor, poor engineers that have to work with us, mad scientist, product people, who are like, "I want, make it do this. I don't know how, but make it do this." And one of the big things is, with Algolia is the lift to implement is really, really light. Working closely with our engineering team, and even with our customers/users and everything like that, you kind of alluded to it a little earlier, it's like, at the end of the day, if it's bad search, it's bad search. It just is. It's terrible. And people's attention span can now be measured in nanoseconds, but they don't care how it works, they just want it to work. I push a button, I want something to happen, period. There's an entire universe that is behind that button, and that's what Algolia has really focused on, that universe behind that button. So there's two ways that we use them, on a web experience, there's the embedded Search widget, which is really, really easy to implement, documentation, and I cannot speak high enough about documentation, is amazing. And then from the web aspect, I'm sorry, from the mobile aspect, it's very API fort. And any type of API implementation where you can customize the UI, which obviously you can imagine our clients are like, "No we want to have our own front end. We want to have our own custom experience." We use Algolia as that engine. Again, the documentation and the light lift of implementation is huge. That is a massive, massive bonus for why we partnered with them. Before product, I was an engineer a very long time ago. I've seen bad documentation. And it's like, (Lisa laughing) "I don't know how to imple-- I don't know what this is. I don't know how to implement this, I don't even know what I'm looking at." But with Algolia and everything, it's so simple. And I know I can just hear the Apply Digital technology team, just grinding sometimes, "Why is a product guy saying that (mumbles)? He should do it." But it is, it just the lift, it's the documentation, it's the support. And it's a full blown partnership. And that's why we went with it, and that's what we tell our clients. It's like, listen, this is why we chose Algolia, because eventually this experience we're creating for them is theirs, ultimately it's theirs. And then they are going to have to pick it up after a certain amount of time once it's theirs. And having that transition of, "Look this is how easy it is to implement, here is all the documentation, here's all the support that you get." It just makes that transition from us to them beautifully seamless. >> And that's huge. We often talk about hard metrics, but ease of use, ease of implementation, the documentation, the support, those are all absolutely business critical for the organization who's implementing the software, the fastest time to value they can get, can be table stakes, and it can be on also a massive competitive differentiator. Daisy, I want to go back to you in terms of hard numbers. Algolia has a recent force or Total Economic Impact, or TEI study that really has some compelling stats. Can you share some of those insights with us? >> Yeah. Absolutely. I think that this is the one of the most fun numbers to share. We have a recent report that came out, it shared that there's a 382% Return on Investment across three years by implementing Algolia. So that's increase to revenue, increased conversion rate, increased time on your site, 382% Return on Investment for the purchase. So we know our pricing's right, we know we're providing for our customers. We know that we're giving them the results that we need. I've been in the search industry for long enough to know that those are some amazing stats, and I'm really proud to work for them and be behind them. >> That can be transformative for a business. I think we've all had that experience of trying to search on a website and not finding anything of relevance. And sometimes I scratch my head, "Why is this experience still like this? If I could churn, I would." So having that ability to easily implement, have the documentation that makes sense, and get such high ROI in a short time period is hugely differentiated for businesses. And I think we all know, as Jason said, we measure response time in nanoseconds, that's how much patience and tolerance we all have on the business side, on the consumer side. So having that, not just this fast search, but the contextual search is table stakes for organizations these days. I'd love for you guys, and on either one of you can take this, to share a customer example or two, that really shows the value of the Algolia product, and then also maybe the partnership. >> So I'll go. We have a couple of partners in two vastly different industries, but both use Algolia as a solution for search. One of them is a, best way to put this, multinational biotech health company that has this-- We built for them this internal portal for all of their healthcare practitioners, their HCPs, so that they could access information, data, reports, wikis, the whole thing. And it's basically, almost their version of Wikipedia, but it's all internal, and you can imagine the level of of data security that it has to be, because this is biotech and healthcare. So we implemented Algolia as an internal search engine for them. And the three main reasons why we recommended Algolia, and we implemented Algolia was one, HIPAA compliance. That's the first one, it's like, if that's a no, we're not playing. So HIPAA compliance, again, the ease of search, the whole contextual search, and then the recommendations and things like that. It was a true, it didn't-- It wasn't just like a a halfhearted implementation of an internal search engine to look for files thing, it is a full blown search engine, specifically for the data that they want. And I think we're averaging, if I remember the numbers correctly, it's north of 200,000 searches a month, just on this internal portal specifically for their employees in their company. And it's amazing, it's absolutely amazing. And then conversely, we work with a pretty high level adventure clothing brand, standard, traditional e-commerce, stable mobile application, Lisa, what you were saying earlier. It's like, "I buy everything on my phone," thing. And so that's what we did. We built and we support their mobile application. And they wanted to use for search, they wanted to do a couple of things which was really interesting. They wanted do traditional search, search catalog, search skews, recommendations, so forth and so on, but they also wanted to do a store finder, which was kind of interesting. So, we'd said, all right, we're going to be implementing Algolia because the lift is going to be so much easier than trying to do everything like that. And we did, and they're using it, and massively successful. They are so happy with it, where it's like, they've got this really contextual experience where it's like, I'm looking for a store near me. "Hey, I've been looking for these items. You know, I've been looking for this puffy vest, and I'm looking for a store near me." It's like, "Well, there's a store near me but it doesn't have it, but there's a store closer to me and it does have it." And all of that wraps around what it is. And all of it was, again, using Algolia, because like I said earlier, it's like, if I'm searching for something, I want it to be correct. And I don't just want it to be correct, I want it to be relevant. >> Lisa: Yes. >> And I want it to feel personalized. >> Yes. >> I'm asking to find something, give me something that I am looking for. So yeah. >> Yeah. That personalization and that relevance is critical. I keep saying that word "critical," I'm overusing it, but it is, we have that expectation that whether it's an internal portal, as you talked about Jason, or it's an adventure clothing brand, or a grocery store, or an e-commerce site, that what they're going to be showing me is exactly what I'm looking for, that magic behind there that's almost border lines on creepy, but we want it. We want it to be able to make our lives easier whether we are on the consumer side, whether we on the business side. And I do wonder what the Go To Market is. Daisy, can you talk a little bit about, where do customers go that are saying, "Oh, I need to Algolia, and I want to be able to do that." Now, what's the GTM between both of these companies? >> So where to find us, you can find us on AWS Marketplace which another favorite place. You can quickly click through and find, but you can connect us through Apply Digital as well. I think, we try to be pretty available and meet our customers where they are. So we're open to any options, and we love exploring with them. I think, what is fun and I'd love to talk about as well, in the customer cases, is not just the e-commerce space, but also the content space. We have a lot of content customers, things about news, organizations, things like that. And since that's a struggle to deliver results on, it's really a challenge. And also you want it to be relevant, so up-to-date content. So it's not just about e-commerce, it's about all of your solution overall, but we hope that you'll find us on AWS Marketplace or anywhere else. >> Got it. And that's a great point, that it's not just e-commerce, it's content. And that's really critical for some industry, businesses across industries. Jason and Daisy, thank you so much for joining me talking about Algolia, Apply Digital, what you guys are doing together, and the huge impact that you're making to the customer user experience that we all appreciate and know, and come to expect these days is going to be awesome. We appreciate your insights. >> Thank you. >> Thank you >> For Daisy and Jason, I'm Lisa Martin. You're watching "theCUBE," our "AWS Startup Showcase, MarTech Emerging Cloud-Scale Customer Experiences." Keep it right here on "theCUBE" for more great content. We're the leader in live tech coverage. (ending riff)
SUMMARY :
and Jason Lang, the Head of Give the audience an overview of Algolia, And we have 11,000 customers that the products deliver? So we do that with a talk to us about Apply Digital, And to help us out, we and Daisy, you were describing that back to our customers. that really led Apply Digital to say, And one of the big things is, the fastest time to value they and I'm really proud to work And I think we all know, as Jason said, And all of that wraps around what it is. I'm asking to find something, and that relevance and we love exploring with them. and the huge impact that you're making We're the leader in live tech coverage.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jason | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Daisy | PERSON | 0.99+ |
Jason Lang | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Vancouver | LOCATION | 0.99+ |
Apply Digital | ORGANIZATION | 0.99+ |
2012 | DATE | 0.99+ |
Sao Paulo | LOCATION | 0.99+ |
Amsterdam | LOCATION | 0.99+ |
Mexico | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
Jason Ling | PERSON | 0.99+ |
2016 | DATE | 0.99+ |
Locost | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Algolia | ORGANIZATION | 0.99+ |
LA | LOCATION | 0.99+ |
NBC Universal | ORGANIZATION | 0.99+ |
40% | QUANTITY | 0.99+ |
New York | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
two guests | QUANTITY | 0.99+ |
Daisy Urfer | PERSON | 0.99+ |
One | QUANTITY | 0.99+ |
two ways | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
11,000 customers | QUANTITY | 0.99+ |
382% | QUANTITY | 0.99+ |
HIPAA | TITLE | 0.99+ |
both | QUANTITY | 0.99+ |
Toronto | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
theCUBE | TITLE | 0.98+ |
today | DATE | 0.98+ |
first one | QUANTITY | 0.98+ |
single | QUANTITY | 0.98+ |
three years | QUANTITY | 0.98+ |
Algolia | PERSON | 0.98+ |
50% | QUANTITY | 0.97+ |
over 11,000 | QUANTITY | 0.97+ |
30 billion searches a week | QUANTITY | 0.96+ |
theCUBE | ORGANIZATION | 0.94+ |
Horizon3.ai Signal | Horizon3.ai Partner Program Expands Internationally
hello I'm John Furrier with thecube and welcome to this special presentation of the cube and Horizon 3.ai they're announcing a global partner first approach expanding their successful pen testing product Net Zero you're going to hear from leading experts in their staff their CEO positioning themselves for a successful Channel distribution expansion internationally in Europe Middle East Africa and Asia Pacific in this Cube special presentation you'll hear about the expansion the expanse partner program giving Partners a unique opportunity to offer Net Zero to their customers Innovation and Pen testing is going International with Horizon 3.ai enjoy the program [Music] welcome back everyone to the cube and Horizon 3.ai special presentation I'm John Furrier host of thecube we're here with Jennifer Lee head of Channel sales at Horizon 3.ai Jennifer welcome to the cube thanks for coming on great well thank you for having me so big news around Horizon 3.aa driving Channel first commitment you guys are expanding the channel partner program to include all kinds of new rewards incentives training programs help educate you know Partners really drive more recurring Revenue certainly cloud and Cloud scale has done that you got a great product that fits into that kind of Channel model great Services you can wrap around it good stuff so let's get into it what are you guys doing what are what are you guys doing with this news why is this so important yeah for sure so um yeah we like you said we recently expanded our Channel partner program um the driving force behind it was really just um to align our like you said our Channel first commitment um and creating awareness around the importance of our partner ecosystems um so that's it's really how we go to market is is through the channel and a great International Focus I've talked with the CEO so you know about the solution and he broke down all the action on why it's important on the product side but why now on the go to market change what's the what's the why behind this big this news on the channel yeah for sure so um we are doing this now really to align our business strategy which is built on the concept of enabling our partners to create a high value high margin business on top of our platform and so um we offer a solution called node zero it provides autonomous pen testing as a service and it allows organizations to continuously verify their security posture um so we our company vision we have this tagline that states that our pen testing enables organizations to see themselves Through The Eyes of an attacker and um we use the like the attacker's perspective to identify exploitable weaknesses and vulnerabilities so we created this partner program from a perspective of the partner so the partner's perspective and we've built It Through The Eyes of our partner right so we're prioritizing really what the partner is looking for and uh will ensure like Mutual success for us yeah the partners always want to get in front of the customers and bring new stuff to them pen tests have traditionally been really expensive uh and so bringing it down in one to a service level that's one affordable and has flexibility to it allows a lot of capability so I imagine people getting excited by it so I have to ask you about the program What specifically are you guys doing can you share any details around what it means for the partners what they get what's in it for them can you just break down some of the mechanics and mechanisms or or details yeah yep um you know we're really looking to create business alignment um and like I said establish Mutual success with our partners so we've got two um two key elements that we were really focused on um that we bring to the partners so the opportunity the profit margin expansion is one of them and um a way for our partners to really differentiate themselves and stay relevant in the market so um we've restructured our discount model really um you know highlighting profitability and maximizing profitability and uh this includes our deal registration we've we've created deal registration program we've increased discount for partners who take part in our partner certification uh trainings and we've we have some other partner incentives uh that we we've created that that's going to help out there we've we put this all so we've recently Gone live with our partner portal um it's a Consolidated experience for our partners where they can access our our sales tools and we really view our partners as an extension of our sales and Technical teams and so we've extended all of our our training material that we use internally we've made it available to our partners through our partner portal um we've um I'm trying I'm thinking now back what else is in that partner portal here we've got our partner certification information so all the content that's delivered during that training can be found in the portal we've got deal registration uh um co-branded marketing materials pipeline management and so um this this portal gives our partners a One-Stop place to to go to find all that information um and then just really quickly on the second part of that that I mentioned is our technology really is um really disruptive to the market so you know like you said autonomous pen testing it's um it's still it's well it's still still relatively new topic uh for security practitioners and um it's proven to be really disruptive so um that on top of um just well recently we found an article that um that mentioned by markets and markets that reports that the global pen testing markets really expanding and so it's expected to grow to like 2.7 billion um by 2027. so the Market's there right the Market's expanding it's growing and so for our partners it's just really allows them to grow their revenue um across their customer base expand their customer base and offering this High profit margin while you know getting in early to Market on this just disruptive technology big Market a lot of opportunities to make some money people love to put more margin on on those deals especially when you can bring a great solution that everyone knows is hard to do so I think that's going to provide a lot of value is there is there a type of partner that you guys see emerging or you aligning with you mentioned the alignment with the partners I can see how that the training and the incentives are all there sounds like it's all going well is there a type of partner that's resonating the most or is there categories of partners that can take advantage of this yeah absolutely so we work with all different kinds of Partners we work with our traditional resale Partners um we've worked we're working with systems integrators we have a really strong MSP mssp program um we've got Consulting partners and the Consulting Partners especially with the ones that offer pen test services so we they use us as a as we act as a force multiplier just really offering them profit margin expansion um opportunity there we've got some technology partner partners that we really work with for co-cell opportunities and then we've got our Cloud Partners um you'd mentioned that earlier and so we are in AWS Marketplace so our ccpo partners we're part of the ISP accelerate program um so we we're doing a lot there with our Cloud partners and um of course we uh we go to market with uh distribution Partners as well gotta love the opportunity for more margin expansion every kind of partner wants to put more gross profit on their deals is there a certification involved I have to ask is there like do you get do people get certified or is it just you get trained is it self-paced training is it in person how are you guys doing the whole training certification thing because is that is that a requirement yeah absolutely so we do offer a certification program and um it's been very popular this includes a a seller's portion and an operator portion and and so um this is at no cost to our partners and um we operate both virtually it's it's law it's virtually but live it's not self-paced and we also have in person um you know sessions as well and we also can customize these to any partners that have a large group of people and we can just we can do one in person or virtual just specifically for that partner well any kind of incentive opportunities and marketing opportunities everyone loves to get the uh get the deals just kind of rolling in leads from what we can see if our early reporting this looks like a hot product price wise service level wise what incentive do you guys thinking about and and Joint marketing you mentioned co-sell earlier in pipeline so I was kind of kind of honing in on that piece sure and yes and then to follow along with our partner certification program we do incentivize our partners there if they have a certain number certified their discount increases so that's part of it we have our deal registration program that increases discount as well um and then we do have some um some partner incentives that are wrapped around meeting setting and um moving moving opportunities along to uh proof of value gotta love the education driving value I have to ask you so you've been around the industry you've seen the channel relationships out there you're seeing companies old school new school you know uh Horizon 3.ai is kind of like that new school very cloud specific a lot of Leverage with we mentioned AWS and all the clouds um why is the company so hot right now why did you join them and what's why are people attracted to this company what's the what's the attraction what's the vibe what do you what do you see and what what do you use what did you see in in this company well this is just you know like I said it's very disruptive um it's really in high demand right now and um and and just because because it's new to Market and uh a newer technology so we are we can collaborate with a manual pen tester um we can you know we can allow our customers to run their pen test um with with no specialty teams and um and and then so we and like you know like I said we can allow our partners can actually build businesses profitable businesses so we can they can use our product to increase their services revenue and um and build their business model you know around around our services what's interesting about the pen test thing is that it's very expensive and time consuming the people who do them are very talented people that could be working on really bigger things in the in absolutely customers so bringing this into the channel allows them if you look at the price Delta between a pen test and then what you guys are offering I mean that's a huge margin Gap between street price of say today's pen test and what you guys offer when you show people that they follow do they say too good to be true I mean what are some of the things that people say when you kind of show them that are they like scratch their head like come on what's the what's the catch here right so the cost savings is a huge is huge for us um and then also you know like I said working as a force multiplier with a pen testing company that offers the services and so they can they can do their their annual manual pen tests that may be required around compliance regulations and then we can we can act as the continuous verification of their security um um you know that that they can run um weekly and so it's just um you know it's just an addition to to what they're offering already and an expansion so Jennifer thanks for coming on thecube really appreciate you uh coming on sharing the insights on the channel uh what's next what can we expect from the channel group what are you thinking what's going on right so we're really looking to expand our our Channel um footprint and um very strategically uh we've got um we've got some big plans um for for Horizon 3.ai awesome well thanks for coming on really appreciate it you're watching thecube the leader in high tech Enterprise coverage [Music] [Music] hello and welcome to the Cube's special presentation with Horizon 3.ai with Raina Richter vice president of emea Europe Middle East and Africa and Asia Pacific APAC for Horizon 3 today welcome to this special Cube presentation thanks for joining us thank you for the invitation so Horizon 3 a guy driving Global expansion big international news with a partner first approach you guys are expanding internationally let's get into it you guys are driving this new expanse partner program to new heights tell us about it what are you seeing in the momentum why the expansion what's all the news about well I would say uh yeah in in international we have I would say a similar similar situation like in the US um there is a global shortage of well-educated penetration testers on the one hand side on the other side um we have a raising demand of uh network and infrastructure security and with our approach of an uh autonomous penetration testing I I believe we are totally on top of the game um especially as we have also now uh starting with an international instance that means for example if a customer in Europe is using uh our service node zero he will be connected to a node zero instance which is located inside the European Union and therefore he has doesn't have to worry about the conflict between the European the gdpr regulations versus the US Cloud act and I would say there we have a total good package for our partners that they can provide differentiators to their customers you know we've had great conversations here on thecube with the CEO and the founder of the company around the leverage of the cloud and how successful that's been for the company and honestly I can just Connect the Dots here but I'd like you to weigh in more on how that translates into the go to market here because you got great Cloud scale with with the security product you guys are having success with great leverage there I've seen a lot of success there what's the momentum on the channel partner program internationally why is it so important to you is it just the regional segmentation is it the economics why the momentum well there are it's there are multiple issues first of all there is a raising demand in penetration testing um and don't forget that uh in international we have a much higher level in number a number or percentage in SMB and mid-market customers so these customers typically most of them even didn't have a pen test done once a year so for them pen testing was just too expensive now with our offering together with our partners we can provide different uh ways how customers could get an autonomous pen testing done more than once a year with even lower costs than they had with with a traditional manual paint test so and that is because we have our uh Consulting plus package which is for typically pain testers they can go out and can do a much faster much quicker and their pain test at many customers once in after each other so they can do more pain tests on a lower more attractive price on the other side there are others what even the same ones who are providing um node zero as an mssp service so they can go after s p customers saying okay well you only have a couple of hundred uh IP addresses no worries we have the perfect package for you and then you have let's say the mid Market let's say the thousands and more employees then they might even have an annual subscription very traditional but for all of them it's all the same the customer or the service provider doesn't need a piece of Hardware they only need to install a small piece of a Docker container and that's it and that makes it so so smooth to go in and say okay Mr customer we just put in this this virtual attacker into your network and that's it and and all the rest is done and within within three clicks they are they can act like a pen tester with 20 years of experience and that's going to be very Channel friendly and partner friendly I can almost imagine so I have to ask you and thank you for calling the break calling out that breakdown and and segmentation that was good that was very helpful for me to understand but I want to follow up if you don't mind um what type of partners are you seeing the most traction with and why well I would say at the beginning typically you have the the innovators the early adapters typically Boutique size of Partners they start because they they are always looking for Innovation and those are the ones you they start in the beginning so we have a wide range of Partners having mostly even um managed by the owner of the company so uh they immediately understand okay there is the value and they can change their offering they're changing their offering in terms of penetration testing because they can do more pen tests and they can then add other ones or we have those ones who offer 10 tests services but they did not have their own pen testers so they had to go out on the open market and Source paint testing experts um to get the pen test at a particular customer done and now with node zero they're totally independent they can't go out and say okay Mr customer here's the here's the service that's it we turn it on and within an hour you're up and running totally yeah and those pen tests are usually expensive and hard to do now it's right in line with the sales delivery pretty interesting for a partner absolutely but on the other hand side we are not killing the pain testers business we do something we're providing with no tiers I would call something like the foundation work the foundational work of having an an ongoing penetration testing of the infrastructure the operating system and the pen testers by themselves they can concentrate in the future on things like application pen testing for example so those Services which we we're not touching so we're not killing the paint tester Market we're just taking away the ongoing um let's say foundation work call it that way yeah yeah that was one of my questions I was going to ask is there's a lot of interest in this autonomous pen testing one because it's expensive to do because those skills are required are in need and they're expensive so you kind of cover the entry level and the blockers that are in there I've seen people say to me this pen test becomes a blocker for getting things done so there's been a lot of interest in the autonomous pen testing and for organizations to have that posture and it's an overseas issue too because now you have that that ongoing thing so can you explain that particular benefit for an organization to have that continuously verifying an organization's posture yep certainly so I would say um typically you are you you have to do your patches you have to bring in new versions of operating systems of different Services of uh um operating systems of some components and and they are always bringing new vulnerabilities the difference here is that with node zero we are telling the customer or the partner package we're telling them which are the executable vulnerabilities because previously they might have had um a vulnerability scanner so this vulnerability scanner brought up hundreds or even thousands of cves but didn't say anything about which of them are vulnerable really executable and then you need an expert digging in one cve after the other finding out is it is it really executable yes or no and that is where you need highly paid experts which we have a shortage so with notes here now we can say okay we tell you exactly which ones are the ones you should work on because those are the ones which are executable we rank them accordingly to the risk level how easily they can be used and by a sudden and then the good thing is convert it or indifference to the traditional penetration test they don't have to wait for a year for the next pain test to find out if the fixing was effective they weren't just the next scan and say Yes closed vulnerability is gone the time is really valuable and if you're doing any devops Cloud native you're always pushing new things so pen test ongoing pen testing is actually a benefit just in general as a kind of hygiene so really really interesting solution really bring that global scale is going to be a new new coverage area for us for sure I have to ask you if you don't mind answering what particular region are you focused on or plan to Target for this next phase of growth well at this moment we are concentrating on the countries inside the European Union Plus the United Kingdom um but we are and they are of course logically I'm based into Frankfurt area that means we cover more or less the countries just around so it's like the total dark region Germany Switzerland Austria plus the Netherlands but we also already have Partners in the nordics like in Finland or in Sweden um so it's it's it it's rapidly we have Partners already in the UK and it's rapidly growing so I'm for example we are now starting with some activities in Singapore um um and also in the in the Middle East area um very important we uh depending on let's say the the way how to do business currently we try to concentrate on those countries where we can have um let's say um at least English as an accepted business language great is there any particular region you're having the most success with right now is it sounds like European Union's um kind of first wave what's them yes that's the first definitely that's the first wave and now we're also getting the uh the European instance up and running it's clearly our commitment also to the market saying okay we know there are certain dedicated uh requirements and we take care of this and and we're just launching it we're building up this one uh the instance um in the AWS uh service center here in Frankfurt also with some dedicated Hardware internet in a data center in Frankfurt where we have with the date six by the way uh the highest internet interconnection bandwidth on the planet so we have very short latency to wherever you are on on the globe that's a great that's a great call outfit benefit too I was going to ask that what are some of the benefits your partners are seeing in emea and Asia Pacific well I would say um the the benefits is for them it's clearly they can they can uh talk with customers and can offer customers penetration testing which they before and even didn't think about because it penetrates penetration testing in a traditional way was simply too expensive for them too complex the preparation time was too long um they didn't have even have the capacity uh to um to support a pain an external pain tester now with this service you can go in and say even if they Mr customer we can do a test with you in a couple of minutes within we have installed the docker container within 10 minutes we have the pen test started that's it and then we just wait and and I would say that is we'll we are we are seeing so many aha moments then now because on the partner side when they see node zero the first time working it's like this wow that is great and then they work out to customers and and show it to their typically at the beginning mostly the friendly customers like wow that's great I need that and and I would say um the feedback from the partners is that is a service where I do not have to evangelize the customer everybody understands penetration testing I don't have to say describe what it is they understand the customer understanding immediately yes penetration testing good about that I know I should do it but uh too complex too expensive now with the name is for example as an mssp service provided from one of our partners but it's getting easy yeah it's great and it's great great benefit there I mean I gotta say I'm a huge fan of what you guys are doing I like this continuous automation that's a major benefit to anyone doing devops or any kind of modern application development this is just a godsend for them this is really good and like you said the pen testers that are doing it they were kind of coming down from their expertise to kind of do things that should have been automated they get to focus on the bigger ticket items that's a really big point so we free them we free the pain testers for the higher level elements of the penetration testing segment and that is typically the application testing which is currently far away from being automated yeah and that's where the most critical workloads are and I think this is the nice balance congratulations on the international expansion of the program and thanks for coming on this special presentation really I really appreciate it thank you you're welcome okay this is thecube special presentation you know check out pen test automation International expansion Horizon 3 dot AI uh really Innovative solution in our next segment Chris Hill sector head for strategic accounts will discuss the power of Horizon 3.ai and Splunk in action you're watching the cube the leader in high tech Enterprise coverage foreign [Music] [Music] welcome back everyone to the cube and Horizon 3.ai special presentation I'm John Furrier host of thecube we're with Chris Hill sector head for strategic accounts and federal at Horizon 3.ai a great Innovative company Chris great to see you thanks for coming on thecube yeah like I said uh you know great to meet you John long time listener first time caller so excited to be here with you guys yeah we were talking before camera you had Splunk back in 2013 and I think 2012 was our first splunk.com and boy man you know talk about being in the right place at the right time now we're at another inflection point and Splunk continues to be relevant um and continuing to have that data driving Security in that interplay and your CEO former CTO of his plug as well at Horizon who's been on before really Innovative product you guys have but you know yeah don't wait for a breach to find out if you're logging the right data this is the topic of this thread Splunk is very much part of this new international expansion announcement uh with you guys tell us what are some of the challenges that you see where this is relevant for the Splunk and Horizon AI as you guys expand uh node zero out internationally yeah well so across so you know my role uh within Splunk it was uh working with our most strategic accounts and so I looked back to 2013 and I think about the sales process like working with with our small customers you know it was um it was still very siled back then like I was selling to an I.T team that was either using this for it operations um we generally would always even say yeah although we do security we weren't really designed for it we're a log management tool and we I'm sure you remember back then John we were like sort of stepping into the security space and and the public sector domain that I was in you know security was 70 of what we did when I look back to sort of uh the transformation that I was witnessing in that digital transformation um you know when I look at like 2019 to today you look at how uh the IT team and the security teams are being have been forced to break down those barriers that they used to sort of be silent away would not commute communicate one you know the security guys would be like oh this is my box I.T you're not allowed in today you can't get away with that and I think that the value that we bring to you know and of course Splunk has been a huge leader in that space and continues to do Innovation across the board but I think what we've we're seeing in the space and I was talking with Patrick Coughlin the SVP of uh security markets about this is that you know what we've been able to do with Splunk is build a purpose-built solution that allows Splunk to eat more data so Splunk itself is ulk know it's an ingest engine right the great reason people bought it was you could build these really fast dashboards and grab intelligence out of it but without data it doesn't do anything right so how do you drive and how do you bring more data in and most importantly from a customer perspective how do you bring the right data in and so if you think about what node zero and what we're doing in a horizon 3 is that sure we do pen testing but because we're an autonomous pen testing tool we do it continuously so this whole thought I'd be like oh crud like my customers oh yeah we got a pen test coming up it's gonna be six weeks the week oh yeah you know and everyone's gonna sit on their hands call me back in two months Chris we'll talk to you then right not not a real efficient way to test your environment and shoot we saw that with Uber this week right um you know and that's a case where we could have helped oh just right we could explain the Uber thing because it was a contractor just give a quick highlight of what happened so you can connect the doctor yeah no problem so um it was uh I got I think it was yeah one of those uh you know games where they would try and test an environment um and with the uh pen tester did was he kept on calling them MFA guys being like I need to reset my password we need to set my right password and eventually the um the customer service guy said okay I'm resetting it once he had reset and bypassed the multi-factor authentication he then was able to get in and get access to the building area that he was in or I think not the domain but he was able to gain access to a partial part of that Network he then paralleled over to what I would assume is like a VA VMware or some virtual machine that had notes that had all of the credentials for logging into various domains and So within minutes they had access and that's the sort of stuff that we do you know a lot of these tools like um you know you think about the cacophony of tools that are out there in a GTA architect architecture right I'm gonna get like a z-scale or I'm going to have uh octum and I have a Splunk I've been into the solar system I mean I don't mean to name names we have crowdstriker or Sentinel one in there it's just it's a cacophony of things that don't work together they weren't designed work together and so we have seen so many times in our business through our customer support and just working with customers when we do their pen tests that there will be 5 000 servers out there three are misconfigured those three misconfigurations will create the open door because remember the hacker only needs to be right once the defender needs to be right all the time and that's the challenge and so that's what I'm really passionate about what we're doing uh here at Horizon three I see this my digital transformation migration and security going on which uh we're at the tip of the spear it's why I joined sey Hall coming on this journey uh and just super excited about where the path's going and super excited about the relationship with Splunk I get into more details on some of the specifics of that but um you know well you're nailing I mean we've been doing a lot of things on super cloud and this next gen environment we're calling it next gen you're really seeing devops obviously devsecops has already won the it role has moved to the developer shift left is an indicator of that it's one of the many examples higher velocity code software supply chain you hear these things that means that it is now in the developer hands it is replaced by the new Ops data Ops teams and security where there's a lot of horizontal thinking to your point about access there's no more perimeter huge 100 right is really right on things one time you know to get in there once you're in then you can hang out move around move laterally big problem okay so we get that now the challenges for these teams as they are transitioning organizationally how do they figure out what to do okay this is the next step they already have Splunk so now they're kind of in transition while protecting for a hundred percent ratio of success so how would you look at that and describe the challenge is what do they do what is it what are the teams facing with their data and what's next what are they what are they what action do they take so let's use some vernacular that folks will know so if I think about devsecops right we both know what that means that I'm going to build security into the app it normally talks about sec devops right how am I building security around the perimeter of what's going inside my ecosystem and what are they doing and so if you think about what we're able to do with somebody like Splunk is we can pen test the entire environment from Soup To Nuts right so I'm going to test the end points through to its I'm going to look for misconfigurations I'm going to I'm going to look for um uh credential exposed credentials you know I'm going to look for anything I can in the environment again I'm going to do it at light speed and and what what we're doing for that SEC devops space is to you know did you detect that we were in your environment so did we alert Splunk or the Sim that there's someone in the environment laterally moving around did they more importantly did they log us into their environment and when do they detect that log to trigger that log did they alert on us and then finally most importantly for every CSO out there is going to be did they stop us and so that's how we we do this and I think you when speaking with um stay Hall before you know we've come up with this um boils but we call it fine fix verifying so what we do is we go in is we act as the attacker right we act in a production environment so we're not going to be we're a passive attacker but we will go in on credentialed on agents but we have to assume to have an assumed breach model which means we're going to put a Docker container in your environment and then we're going to fingerprint the environment so we're going to go out and do an asset survey now that's something that's not something that Splunk does super well you know so can Splunk see all the assets do the same assets marry up we're going to log all that data and think and then put load that into this long Sim or the smoke logging tools just to have it in Enterprise right that's an immediate future ad that they've got um and then we've got the fix so once we've completed our pen test um we are then going to generate a report and we can talk about these in a little bit later but the reports will show an executive summary the assets that we found which would be your asset Discovery aspect of that a fix report and the fixed report I think is probably the most important one it will go down and identify what we did how we did it and then how to fix that and then from that the pen tester or the organization should fix those then they go back and run another test and then they validate like a change detection environment to see hey did those fixes taste play take place and you know snehaw when he was the CTO of jsoc he shared with me a number of times about it's like man there would be 15 more items on next week's punch sheet that we didn't know about and it's and it has to do with how we you know how they were uh prioritizing the cves and whatnot because they would take all CBDs it was critical or non-critical and it's like we are able to create context in that environment that feeds better information into Splunk and whatnot that brings that brings up the efficiency for Splunk specifically the teams out there by the way the burnout thing is real I mean this whole I just finished my list and I got 15 more or whatever the list just can keeps growing how did node zero specifically help Splunk teams be more efficient like that's the question I want to get at because this seems like a very scale way for Splunk customers and teams service teams to be more so the question is how does node zero help make Splunk specifically their service teams be more efficient so so today in our early interactions we're building customers we've seen are five things um and I'll start with sort of identifying the blind spots right so kind of what I just talked about with you did we detect did we log did we alert did they stop node zero right and so I would I put that you know a more Layman's third grade term and if I was going to beat a fifth grader at this game would be we can be the sparring partner for a Splunk Enterprise customer a Splunk Essentials customer someone using Splunk soar or even just an Enterprise Splunk customer that may be a small shop with three people and just wants to know where am I exposed so by creating and generating these reports and then having um the API that actually generates the dashboard they can take all of these events that we've logged and log them in and then where that then comes in is number two is how do we prioritize those logs right so how do we create visibility to logs that that um are have critical impacts and again as I mentioned earlier not all cves are high impact regard and also not all or low right so if you daisy chain a bunch of low cves together boom I've got a mission critical AP uh CPE that needs to be fixed now such as a credential moving to an NT box that's got a text file with a bunch of passwords on it that would be very bad um and then third would be uh verifying that you have all of the hosts so one of the things that splunk's not particularly great at and they'll literate themselves they don't do asset Discovery so dude what assets do we see and what are they logging from that um and then for from um for every event that they are able to identify one of the cool things that we can do is actually create this low code no code environment so they could let you know Splunk customers can use Splunk sword to actually triage events and prioritize that event so where they're being routed within it to optimize the Sox team time to Market or time to triage any given event obviously reducing MTR and then finally I think one of the neatest things that we'll be seeing us develop is um our ability to build glass cables so behind me you'll see one of our triage events and how we build uh a Lockheed Martin kill chain on that with a glass table which is very familiar to the community we're going to have the ability and not too distant future to allow people to search observe on those iocs and if people aren't familiar with it ioc it's an instant of a compromise so that's a vector that we want to drill into and of course who's better at Drilling in the data and smoke yeah this is a critter this is an awesome Synergy there I mean I can see a Splunk customer going man this just gives me so much more capability action actionability and also real understanding and I think this is what I want to dig into if you don't mind understanding that critical impact okay is kind of where I see this coming got the data data ingest now data's data but the question is what not to log you know where are things misconfigured these are critical questions so can you talk about what it means to understand critical impact yeah so I think you know going back to the things that I just spoke about a lot of those cves where you'll see um uh low low low and then you daisy chain together and they're suddenly like oh this is high now but then your other impact of like if you're if you're a Splunk customer you know and I had it I had several of them I had one customer that you know terabytes of McAfee data being brought in and it was like all right there's a lot of other data that you probably also want to bring but they could only afford wanted to do certain data sets because that's and they didn't know how to prioritize or filter those data sets and so we provide that opportunity to say hey these are the critical ones to bring in but there's also the ones that you don't necessarily need to bring in because low cve in this case really does mean low cve like an ILO server would be one that um that's the print server uh where the uh your admin credentials are on on like a printer and so there will be credentials on that that's something that a hacker might go in to look at so although the cve on it is low is if you daisy chain with somebody that's able to get into that you might say Ah that's high and we would then potentially rank it giving our AI logic to say that's a moderate so put it on the scale and we prioritize those versus uh of all of these scanners just going to give you a bunch of CDs and good luck and translating that if I if I can and tell me if I'm wrong that kind of speaks to that whole lateral movement that's it challenge right print serve a great example looks stupid low end who's going to want to deal with the print server oh but it's connected into a critical system there's a path is that kind of what you're getting at yeah I use Daisy Chain I think that's from the community they came from uh but it's just a lateral movement it's exactly what they're doing in those low level low critical lateral movements is where the hackers are getting in right so that's the beauty thing about the uh the Uber example is that who would have thought you know I've got my monthly Factor authentication going in a human made a mistake we can't we can't not expect humans to make mistakes we're fallible right the reality is is once they were in the environment they could have protected themselves by running enough pen tests to know that they had certain uh exposed credentials that would have stopped the breach and they did not had not done that in their environment and I'm not poking yeah but it's an interesting Trend though I mean it's obvious if sometimes those low end items are also not protected well so it's easy to get at from a hacker standpoint but also the people in charge of them can be fished easily or spearfished because they're not paying attention because they don't have to no one ever told them hey be careful yeah for the community that I came from John that's exactly how they they would uh meet you at a uh an International Event um introduce themselves as a graduate student these are National actor States uh would you mind reviewing my thesis on such and such and I was at Adobe at the time that I was working on this instead of having to get the PDF they opened the PDF and whoever that customer was launches and I don't know if you remember back in like 2008 time frame there was a lot of issues around IP being by a nation state being stolen from the United States and that's exactly how they did it and John that's or LinkedIn hey I want to get a joke we want to hire you double the salary oh I'm gonna click on that for sure you know yeah right exactly yeah the one thing I would say to you is like uh when we look at like sort of you know because I think we did 10 000 pen tests last year is it's probably over that now you know we have these sort of top 10 ways that we think and find people coming into the environment the funniest thing is that only one of them is a cve related vulnerability like uh you know you guys know what they are right so it's it but it's it's like two percent of the attacks are occurring through the cves but yeah there's all that attention spent to that and very little attention spent to this pen testing side which is sort of this continuous threat you know monitoring space and and this vulnerability space where I think we play a such an important role and I'm so excited to be a part of the tip of the spear on this one yeah I'm old enough to know the movie sneakers which I loved as a you know watching that movie you know professional hackers are testing testing always testing the environment I love this I got to ask you as we kind of wrap up here Chris if you don't mind the the benefits to Professional Services from this Alliance big news Splunk and you guys work well together we see that clearly what are what other benefits do Professional Services teams see from the Splunk and Horizon 3.ai Alliance so if you're I think for from our our from both of our uh Partners uh as we bring these guys together and many of them already are the same partner right uh is that uh first off the licensing model is probably one of the key areas that we really excel at so if you're an end user you can buy uh for the Enterprise by the number of IP addresses you're using um but uh if you're a partner working with this there's solution ways that you can go in and we'll license as to msps and what that business model on msps looks like but the unique thing that we do here is this C plus license and so the Consulting plus license allows like a uh somebody a small to mid-sized to some very large uh you know Fortune 100 uh consulting firms use this uh by buying into a license called um Consulting plus where they can have unlimited uh access to as many IPS as they want but you can only run one test at a time and as you can imagine when we're going and hacking passwords and um checking hashes and decrypting hashes that can take a while so but for the right customer it's it's a perfect tool and so I I'm so excited about our ability to go to market with uh our partners so that we understand ourselves understand how not to just sell to or not tell just to sell through but we know how to sell with them as a good vendor partner I think that that's one thing that we've done a really good job building bring it into the market yeah I think also the Splunk has had great success how they've enabled uh partners and Professional Services absolutely you know the services that layer on top of Splunk are multi-fold tons of great benefits so you guys Vector right into that ride that way with friction and and the cool thing is that in you know in one of our reports which could be totally customized uh with someone else's logo we're going to generate you know so I I used to work in another organization it wasn't Splunk but we we did uh you know pen testing as for for customers and my pen testers would come on site they'd do the engagement and they would leave and then another release someone would be oh shoot we got another sector that was breached and they'd call you back you know four weeks later and so by August our entire pen testings teams would be sold out and it would be like well even in March maybe and they're like no no I gotta breach now and and and then when they do go in they go through do the pen test and they hand over a PDF and they pack on the back and say there's where your problems are you need to fix it and the reality is that what we're going to generate completely autonomously with no human interaction is we're going to go and find all the permutations of anything we found and the fix for those permutations and then once you've fixed everything you just go back and run another pen test it's you know for what people pay for one pen test they can have a tool that does that every every Pat patch on Tuesday and that's on Wednesday you know triage throughout the week green yellow red I wanted to see the colors show me green green is good right not red and one CIO doesn't want who doesn't want that dashboard right it's it's exactly it and we can help bring I think that you know I'm really excited about helping drive this with the Splunk team because they get that they understand that it's the green yellow red dashboard and and how do we help them find more green uh so that the other guys are in red yeah and get in the data and do the right thing and be efficient with how you use the data know what to look at so many things to pay attention to you know the combination of both and then go to market strategy real brilliant congratulations Chris thanks for coming on and sharing um this news with the detail around the Splunk in action around the alliance thanks for sharing John my pleasure thanks look forward to seeing you soon all right great we'll follow up and do another segment on devops and I.T and security teams as the new new Ops but and super cloud a bunch of other stuff so thanks for coming on and our next segment the CEO of horizon 3.aa will break down all the new news for us here on thecube you're watching thecube the leader in high tech Enterprise coverage [Music] yeah the partner program for us has been fantastic you know I think prior to that you know as most organizations most uh uh most Farmers most mssps might not necessarily have a a bench at all for penetration testing uh maybe they subcontract this work out or maybe they do it themselves but trying to staff that kind of position can be incredibly difficult for us this was a differentiator a a new a new partner a new partnership that allowed us to uh not only perform services for our customers but be able to provide a product by which that they can do it themselves so we work with our customers in a variety of ways some of them want more routine testing and perform this themselves but we're also a certified service provider of horizon 3 being able to perform uh penetration tests uh help review the the data provide color provide analysis for our customers in a broader sense right not necessarily the the black and white elements of you know what was uh what's critical what's high what's medium what's low what you need to fix but are there systemic issues this has allowed us to onboard new customers this has allowed us to migrate some penetration testing services to us from from competitors in the marketplace But ultimately this is occurring because the the product and the outcome are special they're unique and they're effective our customers like what they're seeing they like the routineness of it many of them you know again like doing this themselves you know being able to kind of pen test themselves parts of their networks um and the the new use cases right I'm a large organization I have eight to ten Acquisitions per year wouldn't it be great to have a tool to be able to perform a penetration test both internal and external of that acquisition before we integrate the two companies and maybe bringing on some risk it's a very effective partnership uh one that really is uh kind of taken our our Engineers our account Executives by storm um you know this this is a a partnership that's been very valuable to us [Music] a key part of the value and business model at Horizon 3 is enabling Partners to leverage node zero to make more revenue for themselves our goal is that for sixty percent of our Revenue this year will be originated by partners and that 95 of our Revenue next year will be originated by partners and so a key to that strategy is making us an integral part of your business models as a partner a key quote from one of our partners is that we enable every one of their business units to generate Revenue so let's talk about that in a little bit more detail first is that if you have a pen test Consulting business take Deloitte as an example what was six weeks of human labor at Deloitte per pen test has been cut down to four days of Labor using node zero to conduct reconnaissance find all the juicy interesting areas of the of the Enterprise that are exploitable and being able to go assess the entire organization and then all of those details get served up to the human to be able to look at understand and determine where to probe deeper so what you see in that pen test Consulting business is that node zero becomes a force multiplier where those Consulting teams were able to cover way more accounts and way more IPS within those accounts with the same or fewer consultants and so that directly leads to profit margin expansion for the Penn testing business itself because node 0 is a force multiplier the second business model here is if you're an mssp as an mssp you're already making money providing defensive cyber security operations for a large volume of customers and so what they do is they'll license node zero and use us as an upsell to their mssb business to start to deliver either continuous red teaming continuous verification or purple teaming as a service and so in that particular business model they've got an additional line of Revenue where they can increase the spend of their existing customers by bolting on node 0 as a purple team as a service offering the third business model or customer type is if you're an I.T services provider so as an I.T services provider you make money installing and configuring security products like Splunk or crowdstrike or hemio you also make money reselling those products and you also make money generating follow-on services to continue to harden your customer environments and so for them what what those it service providers will do is use us to verify that they've installed Splunk correctly improved to their customer that Splunk was installed correctly or crowdstrike was installed correctly using our results and then use our results to drive follow-on services and revenue and then finally we've got the value-added reseller which is just a straight up reseller because of how fast our sales Cycles are these vars are able to typically go from cold email to deal close in six to eight weeks at Horizon 3 at least a single sales engineer is able to run 30 to 50 pocs concurrently because our pocs are very lightweight and don't require any on-prem customization or heavy pre-sales post sales activity so as a result we're able to have a few amount of sellers driving a lot of Revenue and volume for us well the same thing applies to bars there isn't a lot of effort to sell the product or prove its value so vars are able to sell a lot more Horizon 3 node zero product without having to build up a huge specialist sales organization so what I'm going to do is talk through uh scenario three here as an I.T service provider and just how powerful node zero can be in driving additional Revenue so in here think of for every one dollar of node zero license purchased by the IT service provider to do their business it'll generate ten dollars of additional revenue for that partner so in this example kidney group uses node 0 to verify that they have installed and deployed Splunk correctly so Kitty group is a Splunk partner they they sell it services to install configure deploy and maintain Splunk and as they deploy Splunk they're going to use node 0 to attack the environment and make sure that the right logs and alerts and monitoring are being handled within the Splunk deployment so it's a way of doing QA or verifying that Splunk has been configured correctly and that's going to be internally used by kidney group to prove the quality of their services that they've just delivered then what they're going to do is they're going to show and leave behind that node zero Report with their client and that creates a resell opportunity for for kidney group to resell node 0 to their client because their client is seeing the reports and the results and saying wow this is pretty amazing and those reports can be co-branded where it's a pen testing report branded with kidney group but it says powered by Horizon three under it from there kidney group is able to take the fixed actions report that's automatically generated with every pen test through node zero and they're able to use that as the starting point for a statement of work to sell follow-on services to fix all of the problems that node zero identified fixing l11r misconfigurations fixing or patching VMware or updating credentials policies and so on so what happens is node 0 has found a bunch of problems the client often lacks the capacity to fix and so kidney group can use that lack of capacity by the client as a follow-on sales opportunity for follow-on services and finally based on the findings from node zero kidney group can look at that report and say to the customer you know customer if you bought crowdstrike you'd be able to uh prevent node Zero from attacking and succeeding in the way that it did for if you bought humano or if you bought Palo Alto networks or if you bought uh some privileged access management solution because of what node 0 was able to do with credential harvesting and attacks and so as a result kidney group is able to resell other security products within their portfolio crowdstrike Falcon humano Polito networks demisto Phantom and so on based on the gaps that were identified by node zero and that pen test and what that creates is another feedback loop where kidney group will then go use node 0 to verify that crowdstrike product has actually been installed and configured correctly and then this becomes the cycle of using node 0 to verify a deployment using that verification to drive a bunch of follow-on services and resell opportunities which then further drives more usage of the product now the way that we licensed is that it's a usage-based license licensing model so that the partner will grow their node zero Consulting plus license as they grow their business so for example if you're a kidney group then week one you've got you're going to use node zero to verify your Splunk install in week two if you have a pen testing business you're going to go off and use node zero to be a force multiplier for your pen testing uh client opportunity and then if you have an mssp business then in week three you're going to use node zero to go execute a purple team mssp offering for your clients so not necessarily a kidney group but if you're a Deloitte or ATT these larger companies and you've got multiple lines of business if you're Optive for instance you all you have to do is buy one Consulting plus license and you're going to be able to run as many pen tests as you want sequentially so now you can buy a single license and use that one license to meet your week one client commitments and then meet your week two and then meet your week three and as you grow your business you start to run multiple pen tests concurrently so in week one you've got to do a Splunk verify uh verify Splunk install and you've got to run a pen test and you've got to do a purple team opportunity you just simply expand the number of Consulting plus licenses from one license to three licenses and so now as you systematically grow your business you're able to grow your node zero capacity with you giving you predictable cogs predictable margins and once again 10x additional Revenue opportunity for that investment in the node zero Consulting plus license my name is Saint I'm the co-founder and CEO here at Horizon 3. I'm going to talk to you today about why it's important to look at your Enterprise Through The Eyes of an attacker the challenge I had when I was a CIO in banking the CTO at Splunk and serving within the Department of Defense is that I had no idea I was Secure until the bad guys had showed up am I logging the right data am I fixing the right vulnerabilities are my security tools that I've paid millions of dollars for actually working together to defend me and the answer is I don't know does my team actually know how to respond to a breach in the middle of an incident I don't know I've got to wait for the bad guys to show up and so the challenge I had was how do we proactively verify our security posture I tried a variety of techniques the first was the use of vulnerability scanners and the challenge with vulnerability scanners is being vulnerable doesn't mean you're exploitable I might have a hundred thousand findings from my scanner of which maybe five or ten can actually be exploited in my environment the other big problem with scanners is that they can't chain weaknesses together from machine to machine so if you've got a thousand machines in your environment or more what a vulnerability scanner will do is tell you you have a problem on machine one and separately a problem on machine two but what they can tell you is that an attacker could use a load from machine one plus a low from machine two to equal to critical in your environment and what attackers do in their tactics is they chain together misconfigurations dangerous product defaults harvested credentials and exploitable vulnerabilities into attack paths across different machines so to address the attack pads across different machines I tried layering in consulting-based pen testing and the issue is when you've got thousands of hosts or hundreds of thousands of hosts in your environment human-based pen testing simply doesn't scale to test an infrastructure of that size moreover when they actually do execute a pen test and you get the report oftentimes you lack the expertise within your team to quickly retest to verify that you've actually fixed the problem and so what happens is you end up with these pen test reports that are incomplete snapshots and quickly going stale and then to mitigate that problem I tried using breach and attack simulation tools and the struggle with these tools is one I had to install credentialed agents everywhere two I had to write my own custom attack scripts that I didn't have much talent for but also I had to maintain as my environment changed and then three these types of tools were not safe to run against production systems which was the the majority of my attack surface so that's why we went off to start Horizon 3. so Tony and I met when we were in Special Operations together and the challenge we wanted to solve was how do we do infrastructure security testing at scale by giving the the power of a 20-year pen testing veteran into the hands of an I.T admin a network engineer in just three clicks and the whole idea is we enable these fixers The Blue Team to be able to run node Zero Hour pen testing product to quickly find problems in their environment that blue team will then then go off and fix the issues that were found and then they can quickly rerun the attack to verify that they fixed the problem and the whole idea is delivering this without requiring custom scripts be developed without requiring credential agents be installed and without requiring the use of external third-party consulting services or Professional Services self-service pen testing to quickly Drive find fix verify there are three primary use cases that our customers use us for the first is the sock manager that uses us to verify that their security tools are actually effective to verify that they're logging the right data in Splunk or in their Sim to verify that their managed security services provider is able to quickly detect and respond to an attack and hold them accountable for their slas or that the sock understands how to quickly detect and respond and measuring and verifying that or that the variety of tools that you have in your stack most organizations have 130 plus cyber security tools none of which are designed to work together are actually working together the second primary use case is proactively hardening and verifying your systems this is when the I that it admin that network engineer they're able to run self-service pen tests to verify that their Cisco environment is installed in hardened and configured correctly or that their credential policies are set up right or that their vcenter or web sphere or kubernetes environments are actually designed to be secure and what this allows the it admins and network Engineers to do is shift from running one or two pen tests a year to 30 40 or more pen tests a month and you can actually wire those pen tests into your devops process or into your detection engineering and the change management processes to automatically trigger pen tests every time there's a change in your environment the third primary use case is for those organizations lucky enough to have their own internal red team they'll use node zero to do reconnaissance and exploitation at scale and then use the output as a starting point for the humans to step in and focus on the really hard juicy stuff that gets them on stage at Defcon and so these are the three primary use cases and what we'll do is zoom into the find fix verify Loop because what I've found in my experience is find fix verify is the future operating model for cyber security organizations and what I mean here is in the find using continuous pen testing what you want to enable is on-demand self-service pen tests you want those pen tests to find attack pads at scale spanning your on-prem infrastructure your Cloud infrastructure and your perimeter because attackers don't only state in one place they will find ways to chain together a perimeter breach a credential from your on-prem to gain access to your cloud or some other permutation and then the third part in continuous pen testing is attackers don't focus on critical vulnerabilities anymore they know we've built vulnerability Management Programs to reduce those vulnerabilities so attackers have adapted and what they do is chain together misconfigurations in your infrastructure and software and applications with dangerous product defaults with exploitable vulnerabilities and through the collection of credentials through a mix of techniques at scale once you've found those problems the next question is what do you do about it well you want to be able to prioritize fixing problems that are actually exploitable in your environment that truly matter meaning they're going to lead to domain compromise or domain user compromise or access your sensitive data the second thing you want to fix is making sure you understand what risk your crown jewels data is exposed to where is your crown jewels data is in the cloud is it on-prem has it been copied to a share drive that you weren't aware of if a domain user was compromised could they access that crown jewels data you want to be able to use the attacker's perspective to secure the critical data you have in your infrastructure and then finally as you fix these problems you want to quickly remediate and retest that you've actually fixed the issue and this fine fix verify cycle becomes that accelerator that drives purple team culture the third part here is verify and what you want to be able to do in the verify step is verify that your security tools and processes in people can effectively detect and respond to a breach you want to be able to integrate that into your detection engineering processes so that you know you're catching the right security rules or that you've deployed the right configurations you also want to make sure that your environment is adhering to the best practices around systems hardening in cyber resilience and finally you want to be able to prove your security posture over a time to your board to your leadership into your regulators so what I'll do now is zoom into each of these three steps so when we zoom in to find here's the first example using node 0 and autonomous pen testing and what an attacker will do is find a way to break through the perimeter in this example it's very easy to misconfigure kubernetes to allow an attacker to gain remote code execution into your on-prem kubernetes environment and break through the perimeter and from there what the attacker is going to do is conduct Network reconnaissance and then find ways to gain code execution on other machines in the environment and as they get code execution they start to dump credentials collect a bunch of ntlm hashes crack those hashes using open source and dark web available data as part of those attacks and then reuse those credentials to log in and laterally maneuver throughout the environment and then as they loudly maneuver they can reuse those credentials and use credential spraying techniques and so on to compromise your business email to log in as admin into your cloud and this is a very common attack and rarely is a CV actually needed to execute this attack often it's just a misconfiguration in kubernetes with a bad credential policy or password policy combined with bad practices of credential reuse across the organization here's another example of an internal pen test and this is from an actual customer they had 5 000 hosts within their environment they had EDR and uba tools installed and they initiated in an internal pen test on a single machine from that single initial access point node zero enumerated the network conducted reconnaissance and found five thousand hosts were accessible what node 0 will do under the covers is organize all of that reconnaissance data into a knowledge graph that we call the Cyber terrain map and that cyber Terrain map becomes the key data structure that we use to efficiently maneuver and attack and compromise your environment so what node zero will do is they'll try to find ways to get code execution reuse credentials and so on in this customer example they had Fortinet installed as their EDR but node 0 was still able to get code execution on a Windows machine from there it was able to successfully dump credentials including sensitive credentials from the lsas process on the Windows box and then reuse those credentials to log in as domain admin in the network and once an attacker becomes domain admin they have the keys to the kingdom they can do anything they want so what happened here well it turns out Fortinet was misconfigured on three out of 5000 machines bad automation the customer had no idea this had happened they would have had to wait for an attacker to show up to realize that it was misconfigured the second thing is well why didn't Fortinet stop the credential pivot in the lateral movement and it turned out the customer didn't buy the right modules or turn on the right services within that particular product and we see this not only with Ford in it but we see this with Trend Micro and all the other defensive tools where it's very easy to miss a checkbox in the configuration that will do things like prevent credential dumping the next story I'll tell you is attackers don't have to hack in they log in so another infrastructure pen test a typical technique attackers will take is man in the middle uh attacks that will collect hashes so in this case what an attacker will do is leverage a tool or technique called responder to collect ntlm hashes that are being passed around the network and there's a variety of reasons why these hashes are passed around and it's a pretty common misconfiguration but as an attacker collects those hashes then they start to apply techniques to crack those hashes so they'll pass the hash and from there they will use open source intelligence common password structures and patterns and other types of techniques to try to crack those hashes into clear text passwords so here node 0 automatically collected hashes it automatically passed the hashes to crack those credentials and then from there it starts to take the domain user user ID passwords that it's collected and tries to access different services and systems in your Enterprise in this case node 0 is able to successfully gain access to the Office 365 email environment because three employees didn't have MFA configured so now what happens is node 0 has a placement and access in the business email system which sets up the conditions for fraud lateral phishing and other techniques but what's especially insightful here is that 80 of the hashes that were collected in this pen test were cracked in 15 minutes or less 80 percent 26 of the user accounts had a password that followed a pretty obvious pattern first initial last initial and four random digits the other thing that was interesting is 10 percent of service accounts had their user ID the same as their password so VMware admin VMware admin web sphere admin web Square admin so on and so forth and so attackers don't have to hack in they just log in with credentials that they've collected the next story here is becoming WS AWS admin so in this example once again internal pen test node zero gets initial access it discovers 2 000 hosts are network reachable from that environment if fingerprints and organizes all of that data into a cyber Terrain map from there it it fingerprints that hpilo the integrated lights out service was running on a subset of hosts hpilo is a service that is often not instrumented or observed by security teams nor is it easy to patch as a result attackers know this and immediately go after those types of services so in this case that ILO service was exploitable and were able to get code execution on it ILO stores all the user IDs and passwords in clear text in a particular set of processes so once we gain code execution we were able to dump all of the credentials and then from there laterally maneuver to log in to the windows box next door as admin and then on that admin box we're able to gain access to the share drives and we found a credentials file saved on a share Drive from there it turned out that credentials file was the AWS admin credentials file giving us full admin authority to their AWS accounts not a single security alert was triggered in this attack because the customer wasn't observing the ILO service and every step thereafter was a valid login in the environment and so what do you do step one patch the server step two delete the credentials file from the share drive and then step three is get better instrumentation on privileged access users and login the final story I'll tell is a typical pattern that we see across the board with that combines the various techniques I've described together where an attacker is going to go off and use open source intelligence to find all of the employees that work at your company from there they're going to look up those employees on dark web breach databases and other forms of information and then use that as a starting point to password spray to compromise a domain user all it takes is one employee to reuse a breached password for their Corporate email or all it takes is a single employee to have a weak password that's easily guessable all it takes is one and once the attacker is able to gain domain user access in most shops domain user is also the local admin on their laptop and once your local admin you can dump Sam and get local admin until M hashes you can use that to reuse credentials again local admin on neighboring machines and attackers will start to rinse and repeat then eventually they're able to get to a point where they can dump lsas or by unhooking the anti-virus defeating the EDR or finding a misconfigured EDR as we've talked about earlier to compromise the domain and what's consistent is that the fundamentals are broken at these shops they have poor password policies they don't have least access privilege implemented active directory groups are too permissive where domain admin or domain user is also the local admin uh AV or EDR Solutions are misconfigured or easily unhooked and so on and what we found in 10 000 pen tests is that user Behavior analytics tools never caught us in that lateral movement in part because those tools require pristine logging data in order to work and also it becomes very difficult to find that Baseline of normal usage versus abnormal usage of credential login another interesting Insight is there were several Marquee brand name mssps that were defending our customers environment and for them it took seven hours to detect and respond to the pen test seven hours the pen test was over in less than two hours and so what you had was an egregious violation of the service level agreements that that mssp had in place and the customer was able to use us to get service credit and drive accountability of their sock and of their provider the third interesting thing is in one case it took us seven minutes to become domain admin in a bank that bank had every Gucci security tool you could buy yet in 7 minutes and 19 seconds node zero started as an unauthenticated member of the network and was able to escalate privileges through chaining and misconfigurations in lateral movement and so on to become domain admin if it's seven minutes today we should assume it'll be less than a minute a year or two from now making it very difficult for humans to be able to detect and respond to that type of Blitzkrieg attack so that's in the find it's not just about finding problems though the bulk of the effort should be what to do about it the fix and the verify so as you find those problems back to kubernetes as an example we will show you the path here is the kill chain we took to compromise that environment we'll show you the impact here is the impact or here's the the proof of exploitation that we were able to use to be able to compromise it and there's the actual command that we executed so you could copy and paste that command and compromise that cubelet yourself if you want and then the impact is we got code execution and we'll actually show you here is the impact this is a critical here's why it enabled perimeter breach affected applications will tell you the specific IPS where you've got the problem how it maps to the miter attack framework and then we'll tell you exactly how to fix it we'll also show you what this problem enabled so you can accurately prioritize why this is important or why it's not important the next part is accurate prioritization the hardest part of my job as a CIO was deciding what not to fix so if you take SMB signing not required as an example by default that CVSs score is a one out of 10. but this misconfiguration is not a cve it's a misconfig enable an attacker to gain access to 19 credentials including one domain admin two local admins and access to a ton of data because of that context this is really a 10 out of 10. you better fix this as soon as possible however of the seven occurrences that we found it's only a critical in three out of the seven and these are the three specific machines and we'll tell you the exact way to fix it and you better fix these as soon as possible for these four machines over here these didn't allow us to do anything of consequence so that because the hardest part is deciding what not to fix you can justifiably choose not to fix these four issues right now and just add them to your backlog and surge your team to fix these three as quickly as possible and then once you fix these three you don't have to re-run the entire pen test you can select these three and then one click verify and run a very narrowly scoped pen test that is only testing this specific issue and what that creates is a much faster cycle of finding and fixing problems the other part of fixing is verifying that you don't have sensitive data at risk so once we become a domain user we're able to use those domain user credentials and try to gain access to databases file shares S3 buckets git repos and so on and help you understand what sensitive data you have at risk so in this example a green checkbox means we logged in as a valid domain user we're able to get read write access on the database this is how many records we could have accessed and we don't actually look at the values in the database but we'll show you the schema so you can quickly characterize that pii data was at risk here and we'll do that for your file shares and other sources of data so now you can accurately articulate the data you have at risk and prioritize cleaning that data up especially data that will lead to a fine or a big news issue so that's the find that's the fix now we're going to talk about the verify the key part in verify is embracing and integrating with detection engineering practices so when you think about your layers of security tools you've got lots of tools in place on average 130 tools at any given customer but these tools were not designed to work together so when you run a pen test what you want to do is say did you detect us did you log us did you alert on us did you stop us and from there what you want to see is okay what are the techniques that are commonly used to defeat an environment to actually compromise if you look at the top 10 techniques we use and there's far more than just these 10 but these are the most often executed nine out of ten have nothing to do with cves it has to do with misconfigurations dangerous product defaults bad credential policies and it's how we chain those together to become a domain admin or compromise a host so what what customers will do is every single attacker command we executed is provided to you as an attackivity log so you can actually see every single attacker command we ran the time stamp it was executed the hosts it executed on and how it Maps the minor attack tactics so our customers will have are these attacker logs on one screen and then they'll go look into Splunk or exabeam or Sentinel one or crowdstrike and say did you detect us did you log us did you alert on us or not and to make that even easier if you take this example hey Splunk what logs did you see at this time on the VMware host because that's when node 0 is able to dump credentials and that allows you to identify and fix your logging blind spots to make that easier we've got app integration so this is an actual Splunk app in the Splunk App Store and what you can come is inside the Splunk console itself you can fire up the Horizon 3 node 0 app all of the pen test results are here so that you can see all of the results in one place and you don't have to jump out of the tool and what you'll show you as I skip forward is hey there's a pen test here are the critical issues that we've identified for that weaker default issue here are the exact commands we executed and then we will automatically query into Splunk all all terms on between these times on that endpoint that relate to this attack so you can now quickly within the Splunk environment itself figure out that you're missing logs or that you're appropriately catching this issue and that becomes incredibly important in that detection engineering cycle that I mentioned earlier so how do our customers end up using us they shift from running one pen test a year to 30 40 pen tests a month oftentimes wiring us into their deployment automation to automatically run pen tests the other part that they'll do is as they run more pen tests they find more issues but eventually they hit this inflection point where they're able to rapidly clean up their environment and that inflection point is because the red and the blue teams start working together in a purple team culture and now they're working together to proactively harden their environment the other thing our customers will do is run us from different perspectives they'll first start running an RFC 1918 scope to see once the attacker gained initial access in a part of the network that had wide access what could they do and then from there they'll run us within a specific Network segment okay from within that segment could the attacker break out and gain access to another segment then they'll run us from their work from home environment could they Traverse the VPN and do something damaging and once they're in could they Traverse the VPN and get into my cloud then they'll break in from the outside all of these perspectives are available to you in Horizon 3 and node zero as a single SKU and you can run as many pen tests as you want if you run a phishing campaign and find that an intern in the finance department had the worst phishing behavior you can then inject their credentials and actually show the end-to-end story of how an attacker fished gained credentials of an intern and use that to gain access to sensitive financial data so what our customers end up doing is running multiple attacks from multiple perspectives and looking at those results over time I'll leave you two things one is what is the AI in Horizon 3 AI those knowledge graphs are the heart and soul of everything that we do and we use machine learning reinforcement techniques reinforcement learning techniques Markov decision models and so on to be able to efficiently maneuver and analyze the paths in those really large graphs we also use context-based scoring to prioritize weaknesses and we're also able to drive collective intelligence across all of the operations so the more pen tests we run the smarter we get and all of that is based on our knowledge graph analytics infrastructure that we have finally I'll leave you with this was my decision criteria when I was a buyer for my security testing strategy what I cared about was coverage I wanted to be able to assess my on-prem cloud perimeter and work from home and be safe to run in production I want to be able to do that as often as I wanted I want to be able to run pen tests in hours or days not weeks or months so I could accelerate that fine fix verify loop I wanted my it admins and network Engineers with limited offensive experience to be able to run a pen test in a few clicks through a self-service experience and not have to install agent and not have to write custom scripts and finally I didn't want to get nickeled and dimed on having to buy different types of attack modules or different types of attacks I wanted a single annual subscription that allowed me to run any type of attack as often as I wanted so I could look at my Trends in directions over time so I hope you found this talk valuable uh we're easy to find and I look forward to seeing seeing you use a product and letting our results do the talking when you look at uh you know kind of the way no our pen testing algorithms work is we dynamically select uh how to compromise an environment based on what we've discovered and the goal is to become a domain admin compromise a host compromise domain users find ways to encrypt data steal sensitive data and so on but when you look at the the top 10 techniques that we ended up uh using to compromise environments the first nine have nothing to do with cves and that's the reality cves are yes a vector but less than two percent of cves are actually used in a compromise oftentimes it's some sort of credential collection credential cracking uh credential pivoting and using that to become an admin and then uh compromising environments from that point on so I'll leave this up for you to kind of read through and you'll have the slides available for you but I found it very insightful that organizations and ourselves when I was a GE included invested heavily in just standard vulnerability Management Programs when I was at DOD that's all disa cared about asking us about was our our kind of our cve posture but the attackers have adapted to not rely on cves to get in because they know that organizations are actively looking at and patching those cves and instead they're chaining together credentials from one place with misconfigurations and dangerous product defaults in another to take over an environment a concrete example is by default vcenter backups are not encrypted and so as if an attacker finds vcenter what they'll do is find the backup location and there are specific V sender MTD files where the admin credentials are parsippled in the binaries so you can actually as an attacker find the right MTD file parse out the binary and now you've got the admin credentials for the vcenter environment and now start to log in as admin there's a bad habit by signal officers and Signal practitioners in the in the Army and elsewhere where the the VM notes section of a virtual image has the password for the VM well those VM notes are not stored encrypted and attackers know this and they're able to go off and find the VMS that are unencrypted find the note section and pull out the passwords for those images and then reuse those credentials across the board so I'll pause here and uh you know Patrick love you get some some commentary on on these techniques and other things that you've seen and what we'll do in the last say 10 to 15 minutes is uh is rolled through a little bit more on what do you do about it yeah yeah no I love it I think um I think this is pretty exhaustive what I like about what you've done here is uh you know we've seen we've seen double-digit increases in the number of organizations that are reporting actual breaches year over year for the last um for the last three years and it's often we kind of in the Zeitgeist we pegged that on ransomware which of course is like incredibly important and very top of mind um but what I like about what you have here is you know we're reminding the audience that the the attack surface area the vectors the matter um you know has to be more comprehensive than just thinking about ransomware scenarios yeah right on um so let's build on this when you think about your defense in depth you've got multiple security controls that you've purchased and integrated and you've got that redundancy if a control fails but the reality is that these security tools aren't designed to work together so when you run a pen test what you want to ask yourself is did you detect node zero did you log node zero did you alert on node zero and did you stop node zero and when you think about how to do that every single attacker command executed by node zero is available in an attacker log so you can now see you know at the bottom here vcenter um exploit at that time on that IP how it aligns to minor attack what you want to be able to do is go figure out did your security tools catch this or not and that becomes very important in using the attacker's perspective to improve your defensive security controls and so the way we've tried to make this easier back to like my my my the you know I bleed Green in many ways still from my smoke background is you want to be able to and what our customers do is hey we'll look at the attacker logs on one screen and they'll look at what did Splunk see or Miss in another screen and then they'll use that to figure out what their logging blind spots are and what that where that becomes really interesting is we've actually built out an integration into Splunk where there's a Splunk app you can download off of Splunk base and you'll get all of the pen test results right there in the Splunk console and from that Splunk console you're gonna be able to see these are all the pen tests that were run these are the issues that were found um so you can look at that particular pen test here are all of the weaknesses that were identified for that particular pen test and how they categorize out for each of those weaknesses you can click on any one of them that are critical in this case and then we'll tell you for that weakness and this is where where the the punch line comes in so I'll pause the video here for that weakness these are the commands that were executed on these endpoints at this time and then we'll actually query Splunk for that um for that IP address or containing that IP and these are the source types that surface any sort of activity so what we try to do is help you as quickly and efficiently as possible identify the logging blind spots in your Splunk environment based on the attacker's perspective so as this video kind of plays through you can see it Patrick I'd love to get your thoughts um just seeing so many Splunk deployments and the effectiveness of those deployments and and how this is going to help really Elevate the effectiveness of all of your Splunk customers yeah I'm super excited about this I mean I think this these kinds of purpose-built integration snail really move the needle for our customers I mean at the end of the day when I think about the power of Splunk I think about a product I was first introduced to 12 years ago that was an on-prem piece of software you know and at the time it sold on sort of Perpetual and term licenses but one made it special was that it could it could it could eat data at a speed that nothing else that I'd have ever seen you can ingest massively scalable amounts of data uh did cool things like schema on read which facilitated that there was this language called SPL that you could nerd out about uh and you went to a conference once a year and you talked about all the cool things you were splunking right but now as we think about the next phase of our growth um we live in a heterogeneous environment where our customers have so many different tools and data sources that are ever expanding and as you look at the as you look at the role of the ciso it's mind-blowing to me the amount of sources Services apps that are coming into the ciso span of let's just call it a span of influence in the last three years uh you know we're seeing things like infrastructure service level visibility application performance monitoring stuff that just never made sense for the security team to have visibility into you um at least not at the size and scale which we're demanding today um and and that's different and this isn't this is why it's so important that we have these joint purpose-built Integrations that um really provide more prescription to our customers about how do they walk on that Journey towards maturity what does zero to one look like what does one to two look like whereas you know 10 years ago customers were happy with platforms today they want integration they want Solutions and they want to drive outcomes and I think this is a great example of how together we are stepping to the evolving nature of the market and also the ever-evolving nature of the threat landscape and what I would say is the maturing needs of the customer in that environment yeah for sure I think especially if if we all anticipate budget pressure over the next 18 months due to the economy and elsewhere while the security budgets are not going to ever I don't think they're going to get cut they're not going to grow as fast and there's a lot more pressure on organizations to extract more value from their existing Investments as well as extracting more value and more impact from their existing teams and so security Effectiveness Fierce prioritization and automation I think become the three key themes of security uh over the next 18 months so I'll do very quickly is run through a few other use cases um every host that we identified in the pen test were able to score and say this host allowed us to do something significant therefore it's it's really critical you should be increasing your logging here hey these hosts down here we couldn't really do anything as an attacker so if you do have to make trade-offs you can make some trade-offs of your logging resolution at the lower end in order to increase logging resolution on the upper end so you've got that level of of um justification for where to increase or or adjust your logging resolution another example is every host we've discovered as an attacker we Expose and you can export and we want to make sure is every host we found as an attacker is being ingested from a Splunk standpoint a big issue I had as a CIO and user of Splunk and other tools is I had no idea if there were Rogue Raspberry Pi's on the network or if a new box was installed and whether Splunk was installed on it or not so now you can quickly start to correlate what hosts did we see and how does that reconcile with what you're logging from uh finally or second to last use case here on the Splunk integration side is for every single problem we've found we give multiple options for how to fix it this becomes a great way to prioritize what fixed actions to automate in your soar platform and what we want to get to eventually is being able to automatically trigger soar actions to fix well-known problems like automatically invalidating passwords for for poor poor passwords in our credentials amongst a whole bunch of other things we could go off and do and then finally if there is a well-known kill chain or attack path one of the things I really wish I could have done when I was a Splunk customer was take this type of kill chain that actually shows a path to domain admin that I'm sincerely worried about and use it as a glass table over which I could start to layer possible indicators of compromise and now you've got a great starting point for glass tables and iocs for actual kill chains that we know are exploitable in your environment and that becomes some super cool Integrations that we've got on the roadmap between us and the Splunk security side of the house so what I'll leave with actually Patrick before I do that you know um love to get your comments and then I'll I'll kind of leave with one last slide on this wartime security mindset uh pending you know assuming there's no other questions no I love it I mean I think this kind of um it's kind of glass table's approach to how do you how do you sort of visualize these workflows and then use things like sore and orchestration and automation to operationalize them is exactly where we see all of our customers going and getting away from I think an over engineered approach to soar with where it has to be super technical heavy with you know python programmers and getting more to this visual view of workflow creation um that really demystifies the power of Automation and also democratizes it so you don't have to have these programming languages in your resume in order to start really moving the needle on workflow creation policy enforcement and ultimately driving automation coverage across more and more of the workflows that your team is seeing yeah I think that between us being able to visualize the actual kill chain or attack path with you know think of a of uh the soar Market I think going towards this no code low code um you know configurable sore versus coded sore that's going to really be a game changer in improve or giving security teams a force multiplier so what I'll leave you with is this peacetime mindset of security no longer is sustainable we really have to get out of checking the box and then waiting for the bad guys to show up to verify that security tools are are working or not and the reason why we've got to really do that quickly is there are over a thousand companies that withdrew from the Russian economy over the past uh nine months due to the Ukrainian War there you should expect every one of them to be punished by the Russians for leaving and punished from a cyber standpoint and this is no longer about financial extortion that is ransomware this is about punishing and destroying companies and you can punish any one of these companies by going after them directly or by going after their suppliers and their Distributors so suddenly your attack surface is no more no longer just your own Enterprise it's how you bring your goods to Market and it's how you get your goods created because while I may not be able to disrupt your ability to harvest fruit if I can get those trucks stuck at the border I can increase spoilage and have the same effect and what we should expect to see is this idea of cyber-enabled economic Warfare where if we issue a sanction like Banning the Russians from traveling there is a cyber-enabled counter punch which is corrupt and destroy the American Airlines database that is below the threshold of War that's not going to trigger the 82nd Airborne to be mobilized but it's going to achieve the right effect ban the sale of luxury goods disrupt the supply chain and create shortages banned Russian oil and gas attack refineries to call a 10x spike in gas prices three days before the election this is the future and therefore I think what we have to do is shift towards a wartime mindset which is don't trust your security posture verify it see yourself Through The Eyes of the attacker build that incident response muscle memory and drive better collaboration between the red and the blue teams your suppliers and Distributors and your information uh sharing organization they have in place and what's really valuable for me as a Splunk customer was when a router crashes at that moment you don't know if it's due to an I.T Administration problem or an attacker and what you want to have are different people asking different questions of the same data and you want to have that integrated triage process of an I.T lens to that problem a security lens to that problem and then from there figuring out is is this an IT workflow to execute or a security incident to execute and you want to have all of that as an integrated team integrated process integrated technology stack and this is something that I very care I cared very deeply about as both a Splunk customer and a Splunk CTO that I see time and time again across the board so Patrick I'll leave you with the last word the final three minutes here and I don't see any open questions so please take us home oh man see how you think we spent hours and hours prepping for this together that that last uh uh 40 seconds of your talk track is probably one of the things I'm most passionate about in this industry right now uh and I think nist has done some really interesting work here around building cyber resilient organizations that have that has really I think helped help the industry see that um incidents can come from adverse conditions you know stress is uh uh performance taxations in the infrastructure service or app layer and they can come from malicious compromises uh Insider threats external threat actors and the more that we look at this from the perspective of of a broader cyber resilience Mission uh in a wartime mindset uh I I think we're going to be much better off and and will you talk about with operationally minded ice hacks information sharing intelligence sharing becomes so important in these wartime uh um situations and you know we know not all ice acts are created equal but we're also seeing a lot of um more ad hoc information sharing groups popping up so look I think I think you framed it really really well I love the concept of wartime mindset and um I I like the idea of applying a cyber resilience lens like if you have one more layer on top of that bottom right cake you know I think the it lens and the security lens they roll up to this concept of cyber resilience and I think this has done some great work there for us yeah you're you're spot on and that that is app and that's gonna I think be the the next um terrain that that uh that you're gonna see vendors try to get after but that I think Splunk is best position to win okay that's a wrap for this special Cube presentation you heard all about the global expansion of horizon 3.ai's partner program for their Partners have a unique opportunity to take advantage of their node zero product uh International go to Market expansion North America channel Partnerships and just overall relationships with companies like Splunk to make things more comprehensive in this disruptive cyber security world we live in and hope you enjoyed this program all the videos are available on thecube.net as well as check out Horizon 3 dot AI for their pen test Automation and ultimately their defense system that they use for testing always the environment that you're in great Innovative product and I hope you enjoyed the program again I'm John Furrier host of the cube thanks for watching
SUMMARY :
that's the sort of stuff that we do you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Patrick Coughlin | PERSON | 0.99+ |
Jennifer Lee | PERSON | 0.99+ |
Chris | PERSON | 0.99+ |
Tony | PERSON | 0.99+ |
2013 | DATE | 0.99+ |
Raina Richter | PERSON | 0.99+ |
Singapore | LOCATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Patrick | PERSON | 0.99+ |
Frankfurt | LOCATION | 0.99+ |
John | PERSON | 0.99+ |
20-year | QUANTITY | 0.99+ |
hundreds | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
20 years | QUANTITY | 0.99+ |
seven minutes | QUANTITY | 0.99+ |
95 | QUANTITY | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
2.7 billion | QUANTITY | 0.99+ |
March | DATE | 0.99+ |
Finland | LOCATION | 0.99+ |
seven hours | QUANTITY | 0.99+ |
sixty percent | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Sweden | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
six weeks | QUANTITY | 0.99+ |
seven hours | QUANTITY | 0.99+ |
19 credentials | QUANTITY | 0.99+ |
ten dollars | QUANTITY | 0.99+ |
Jennifer | PERSON | 0.99+ |
5 000 hosts | QUANTITY | 0.99+ |
Horizon 3 | TITLE | 0.99+ |
Wednesday | DATE | 0.99+ |
30 | QUANTITY | 0.99+ |
eight | QUANTITY | 0.99+ |
Asia Pacific | LOCATION | 0.99+ |
American Airlines | ORGANIZATION | 0.99+ |
Deloitte | ORGANIZATION | 0.99+ |
three licenses | QUANTITY | 0.99+ |
two companies | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
European Union | ORGANIZATION | 0.99+ |
six | QUANTITY | 0.99+ |
seven occurrences | QUANTITY | 0.99+ |
70 | QUANTITY | 0.99+ |
three people | QUANTITY | 0.99+ |
Horizon 3.ai | TITLE | 0.99+ |
ATT | ORGANIZATION | 0.99+ |
Net Zero | ORGANIZATION | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
less than two percent | QUANTITY | 0.99+ |
less than two hours | QUANTITY | 0.99+ |
2012 | DATE | 0.99+ |
UK | LOCATION | 0.99+ |
Adobe | ORGANIZATION | 0.99+ |
four issues | QUANTITY | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
next year | DATE | 0.99+ |
three steps | QUANTITY | 0.99+ |
node 0 | TITLE | 0.99+ |
15 minutes | QUANTITY | 0.99+ |
hundred percent | QUANTITY | 0.99+ |
node zero | TITLE | 0.99+ |
10x | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
7 minutes | QUANTITY | 0.99+ |
one license | QUANTITY | 0.99+ |
second thing | QUANTITY | 0.99+ |
thousands of hosts | QUANTITY | 0.99+ |
five thousand hosts | QUANTITY | 0.99+ |
next week | DATE | 0.99+ |
Vikas Ratna and James Leach | Cisco Future Cloud 2021
>> From around the globe it's theCube. Presenting Future Cloud. One event, a world of opportunities. Brought to you by Cisco. >> We're here with Vikas Ratna, who's the director of product management for ECS at Cisco and James Leach is the director of business development for UCS at Cisco as well. We're going to talk about computing in the age of hybrid cloud. Welcome gentlemen, great to see you. >> Thank you. >> Thank you. >> Vikas let's start with you and talk a little bit about computing architectures. We know that they're evolving, they're supporting new data intensive and other workloads, especially as high-performance workload requirements, what's Cisco's point of view on all this? And specifically, I'm interested in your thoughts on fabrics, I mean, it's kind of your wheelhouse, you've got accelerators, What are the workloads that are driving these evolving technologies and how is it impacting customers? What are you seeing? >> Sure, Dave. First of all, very excited to be here today. You're absolutely right. The pace of innovation and foundational platform ingredients have just been phenomenal in recent years. The fabric, accelerators, the drives, the processing power, the core density all have been evolving at just an amazing pace and the pace will only pick up further, but ultimately it is all about applications and the way applications leverage those innovations. And we do see applications evolving quite rapidly. The new classes of applications are evolving to absorb those innovations and deliver much better business values, very, very exciting times, Dave, but talking about the impact on the customers, well these innovations have helped them pretty positively. We do see significant challenges in the data center with a point product based approach of delivering these platform innovations to the applications. What has happened is these innovations today are being packaged as point products to meet the needs of a specific application. And as you know, the different applications have their different needs. Some applications need more tributes, others need more memory, yet others need, you know, more cores. Some need different kinds of fabrics. As a result, if you walk into a data center today, it is pretty common to see many different point products in the data center. This creates a manageability challenge. Imagine the aspect of managing, you know, several different form factors, one you, to you, purpose-built servers or the variety of, you know, blade form factor. You know, this reminds me of the situation we had before smartphones arrived. You remember the days when you, when we used to have a GPS device for navigation system, a cool music device for listening to the music, a phone device for making a call, camera for taking the photos. Right? And we were all excited about it. It's when the smartphones arrived that we realized all those cool innovations could be delivered in a much simpler, much convenient, and easy to consume it through one device and, you know, and that could completely transform our experience. So we see the customers who are benefiting from these innovations to have a way to consume those things in a much more simplistic way than they are able to do it today. >> And I like, look, it's always been about the applications, but to your point, the applications are now moving at a much faster pace. The customer experience is, expectation, is way escalated. And when you combine all these, I love your analogy there Vikas, because when you combine all these capabilities, it allows us to develop new applications, new capabilities, new customer experiences. So that's the, I always say, the next 10 years, they ain't going to be like the last. And James, public cloud obviously is heavily influencing compute design and customer operating models. You know, it's funny, when the public cloud first hit the market, everyone, we were swooning about oh, low cost, standard off-the-shelf servers, you know, and storage devices, but it quickly became obvious that customers needed more. So I wonder if you could comment on this. How are the trends that we've seen from the hyperscalers, how are they filtering into on-prem infrastructure and maybe, you know, maybe there's some differences there as well that you could address? >> Absolutely. So, you know, I'd say first of all, quite frankly, you know, public cloud has completely changed the expectations of how our customers want to consume compute, right? So customers, especially in a public cloud environment, they've gotten used to, or, you know, come to accept that they should consume from the application out, right? They want a very application-focused view, a services-focused view of the world. They don't want to think about infrastructure, right? They want to think about their application. They want to move outward, right? So, this means that the infrastructure basically has to meet the application where it lives. So what that means for us is that, you know, we're taking a different approach. We've decided that, you know, we're not going to chase this, you know, single pane of glass view of the world, which, you know, frankly our customers don't want. They don't want a single pane of glass. What they want is a single operating model. They want an operating model that's similar to what they can get with the public cloud, but they want it across all of their cloud options. They want it across private cloud, across hybrid cloud options, as well. So what that means is they don't want to just consume infrastructure services. They want all of their cloud services from this operating model. So that means that they may want to consume infrastructure services for automation orchestration, but they also need Kubernetes services. They also need virtualization services. They may need Terraform, workload optimization. All of these services have to be available from within the operating model, a consistent operating model, right? So it doesn't matter whether you're talking about private cloud, hybrid cloud, anywhere, where the application lives doesn't matter. What matters is that we have a consistent model, that we think about it from the application out, and frankly, I'd say, you know, this has been the stumbling block for private cloud. Private cloud is hard, right? This is why it hasn't been really solved yet. This is why we had to take a brand new approach. And frankly, it's why we're super excited about X Series and intersight as that, you know, operating model that fits the hybrid cloud better than anything else we've seen. >> This is a Cube first, first time's a technology vendor has ever said that it's not about a single pane of glass because I've been hearing for decades we're going to deliver a single pane of glass. It's going to be seamless and it never happens. It's like a single version of the truth. It's aspirational. And it's just not reality. So can we stay on the X Series for a minute, James, maybe in this context, but in the launch that we saw today, it was like a fire hose of announcements. So, how does the X Series fit into the strategy with intersight, and hybrid cloud in this operating model that you're talking about? >> Right. So, I think it goes hand-in-hand, right? The two pieces go together very well. So we have, you know, this idea of a single operating model that is definitely, you know, something that our customers demand, right? It's what we have to have, but at the same time we need to solve the problems Vikas was talking about before, we need a single infrastructure to go along with that single operating model. So no longer do we need to have silos within the infrastructure that give us different operating models or different sets of benefits, when you want infrastructure that can kind of do all of those configurations, all those applications. And then, you know, the operating model is very important because that's where we abstract the complexity that could come with just throwing all that technology at the infrastructure. So that, you know, this is, you know, the way that we think about it is the data center is not centered, right? It's no longer centered. Applications live everywhere. Infrastructure lives everywhere. And, you know, we need to have that consistent operating model, but we need to do things within the infrastructure as well to take full advantage, right? So we want all the SaaS benefits of a CICD model of, you know, the intersight can bring, we want all of that, you know, proactive recommendation engine with the power of AI behind it, we want the connected support experience. We want all of that, but we want to do it across a single infrastructure. And we think that that's how they tie together. That's why one or the other doesn't really solve the problem, but both together. That's why we're here. That's why we're super excited. >> So Vikas, I make you laugh a little bit. When I was an analyst at IDC, I was a bit deep into infrastructure, And then when I left, I was doing, I was working with application development heads. And like you said, infrastructure, it was just a roadblock, but it was so the tongue-in-cheek is when Cisco announced UCS a decade ago, I totally missed it. I didn't understand it. I thought it was Cisco getting into the traditional server business. And it wasn't until I dug in that I realized that your vision was really to transform infrastructure deployment and management. And change the model. It was like, okay, I got that wrong. But, so let's talk about the, the ecosystem and the joint development efforts that are going on there. X Series, how does it fit into this converged infrastructure business that you've built and grown with partners? You've got storage partners like NetApp and Pure. You got ISV partners in the ecosystem. We see Cohesity, it's been a while since we hung out with all these companies at the Cisco live, hopefully next year, but tell us what's happening in that regard. >> No, absolutely. I'm looking forward to seeing you in the Cisco live next year, Dave. Absolutely. You brought up a very good point. UCS is about the ecosystem that it brings together. It's about making our customers bring up the entire infrastructure, from the core foundational hardware all the way to the application level so that they can all go off and running pretty quick. That converse infrastructure has been one of the cornerstones of our strategy, as you pointed out, in the last decade. And I'm very glad to share that conversed infrastructure continues to be a very popular architecture for several enterprise applications even today. In fact, it is the preferred architecture for mission critical applications, where performance, resiliency, latency, are the critical requirements. They are almost de facto standards for large scale deployments of virtualize and business critical databases and so forth. With X Series, with our partnerships, with our restorative partners, those architectures will absolutely continue and will get better. But in addition, it's a hybrid cloud world. So we are now bringing in the benefits of conversed infrastructure to the world of hybrid cloud. We'll be supporting the hybrid cloud applications now with the CA infrastructure that we have built together with our strong partnership with the store as partners to tell you with the same benefits to the new age applications as well. >> Yeah and that's what customers want, they want that cloud operating model. Right? Go ahead, please. >> I was just going to say, you know, that the CA model will continue to thrive. It will transition out, it will expand the use cases now for the newer use cases that we were beginning to see, Dave, absolutely. >> Great. Thank you for that. And James, like I said earlier today, we heard this huge announcement, a lot of parts to it. And we heard, you know, KD talk about this initiative is, it's really computing built for the next decade. I mean, I like that because it shows some vision and that you've got, you know, a roadmap, that you've thought through the coming changes in workloads and infrastructure management and some of the technology that you can take advantage of beyond just the, you know, one or two product cycles. So, but I want to understand what you've done here specifically that you feel differentiates you from other competitive architectures in the industry. >> Sure. You know, that's a great question. number one. Number two, I'm frankly a little bit concerned at times for customers in general, for our customers, customers in general, because if you look at what's in the market, right? These rinse and repeat systems that were effectively just rehashes of the same old design, right? That we've seen since before 2009 when we brought UCS to market, these are what we're seeing over and over and over again, that's not really going to work anymore, frankly. And I think that people are getting lulled into a false sense of security by seeing those things continually put in the market. We've rethought this from the ground up because frankly, you know, future-proofing starts now, right? If you're not doing it right today, future-proofing isn't even on your radar because you're not even, you're not even today-proofed. So we've rethought the entire chassis, the entire architecture, from the ground up. Okay. If you look at other vendors, if you look at other solutions in the market, what you'll see is things like, you know management inside the chassis. That's a great example. Daisy chaining them together. Like, who needs that? Who wants that? Like, that kind of complexity is, first of all, it's ridiculous. Second of all, if you want to manage across clouds you have to do it from the cloud, right? It's just common sense. You have to move management where it can have the scale and the scope that it needs to impact, you know, your entire domain, your world, which is much larger now than it was before. We're talking about true hybrid cloud here. Right? So, we had to, you know, solve certain problems that existed in the traditional architecture. You know, I can't tell you how many times I heard you know, talk about, you know, the mid plane is a great example. Well, you know, the mid plane in a chassis is a limiting factor. It limits us on how much we can connect or how much bandwidth we have available to the chassis. It limits us on air flow and other things. So how do you solve that problem? Simple. Just get rid of it. Like we just, we took it out, right? It's now no longer a problem. We designed an architecture that doesn't need it. It doesn't rely on it, no forklift upgrades. So as we start moving down the path of needing liquid cooling, or maybe we need to take advantage of some new high performance, low latency fabrics. We can do that with almost no problem at all, right? So we don't have any forklift upgrades. Park your forklift on the side. You won't need it anymore because you can upgrade granularly. You can move along as technologies come into existence that maybe don't even exist today. They may not even be on our radar today to take advantage of but I like to think of these technologies. You know, they're really important to our customers. These are, you know, we can call them disruptive technologies. The reality is that we don't want to disrupt our customers with these technologies. We want to give them these technologies so they can go out and be disruptive themselves, right? And this is the way that we've designed this, from the ground up, to be easy consume and to take advantage of what we know about today and what's coming in the future that we may not even know about. So we think this is a way to give our customers that ultimate capability, flexibility, and future-proofing. >> I like that phrase, true hybrid cloud. It's one that we've used for years. But to me, this is all about that horizontal infrastructure that can support that vision of what true hybrid cloud is. You could support the mission critical applications. You can develop on the system and you can support a variety of workloads. You're not locked into, you know, one narrow stovepipe. And that does have legs. Vikas and James, thanks so much for coming on the program. Great to see you. >> Thank you, we appreciate the time. >> Thank you. >> And thank you for watching. This is Dave Volante for theCube, the leader in digital event coverage. (uplifting music)
SUMMARY :
Brought to you by Cisco. and James Leach is the director What are the workloads that are driving Imagine the aspect of managing, you know, and maybe, you know, first of all, quite frankly, you know, the launch that we saw today, So we have, you know, this idea and the joint development as partners to tell you Yeah and that's what customers want, I was just going to say, you know, that And we heard, you know, KD talk about So, we had to, you know, You can develop on the system And thank you for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Vikas | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Michael | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Katherine Kostereva | PERSON | 0.99+ |
Steve | PERSON | 0.99+ |
Steve Wood | PERSON | 0.99+ |
James | PERSON | 0.99+ |
Paul | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Andy Anglin | PERSON | 0.99+ |
Eric Kurzog | PERSON | 0.99+ |
Kerry McFadden | PERSON | 0.99+ |
Eric | PERSON | 0.99+ |
Ed Walsh | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Jeff Clarke | PERSON | 0.99+ |
Landmark | ORGANIZATION | 0.99+ |
Australia | LOCATION | 0.99+ |
Katherine | PERSON | 0.99+ |
Andy | PERSON | 0.99+ |
Gary | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
two hours | QUANTITY | 0.99+ |
Paul Gillin | PERSON | 0.99+ |
Forrester | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Jeff | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
2002 | DATE | 0.99+ |
Mandy Dhaliwal | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
five | QUANTITY | 0.99+ |
Starbucks | ORGANIZATION | 0.99+ |
PolyCom | ORGANIZATION | 0.99+ |
US | LOCATION | 0.99+ |
San Jose | LOCATION | 0.99+ |
Boston | LOCATION | 0.99+ |
James Leach & Vikas Ratna
>> Presenter: From around the globe. It's theCUBE present a future cloud one event a world of opportunities brought to you by Cisco. >> We're here with Vikas Ratina, who's the director of product management for ECS at Cisco and James Leach is the director of business development for UCS at Cisco as well. We're going to talk about computing in the age of hybrid cloud. Welcome gentlemen. Great to see you. >> Thank you. >> Thank you. >> Vikas let's start with you and talk about a little bit about computing architectures. We know that they're evolving they're supporting new data intensive and other workloads especially as high-performance workload requirements. What's Cisco's point of view on all this and we're specifically interested in your thoughts on fabrics. I mean, it's kind of your wheelhouse, you've got accelerators. What are the workloads that are driving these evolving technologies and how is it impacting customers? What are you seeing? >> Sure, Deb, first of all, very excited to be here today. You're absolutely right. The pace of innovation and foundational platform ingredients have just been phenomenal in recent years. The fabric, the accelerators, the drives, the processing power, the core density, all have been evolving at just an amazing pace and the pace will only pick up further. But ultimately it is all about applications and the way applications levels those innovations. And we do see applications evolving quite rapidly. The new classes of applications are evolving to absorb those innovations and deliver much better business values, very very exciting timestamp, but talking about the impact on the customers. Well these innovations have helped them pretty positively. We do see significant challenges in the data center with a point product based approach of delivering these platform innovations to the applications. What has happened is, these innovations today are being packaged as one point products, to meet the needs of a specific application. And as you know the different applications have different needs. Some applications need more tributes, others need more memory, yet others need, you know more course, some need different kinds of fabrics. As a result, if you walk into a data center today, it is pretty common to see many different point products in the data center. This creates a manageability challenge. Imagine the aspect of managing, you know several different form factors one you to you, a purpose-built servers the variety of, you know, ablate form factor. You know, this reminds me of the situation we had before smartphones arrived. You remember the days when you when we used to have a GPS device for navigation system. A cool music device for listening to the music. A phone device for making a call, camera for taking the photos that we were all excited about it. It's when smartphones arrived, that we realized all those cool innovations could be delivered in a much simpler, much convenient and easy to consume way through one device. And you know that could completely transform our experience. So we see the customers who are benefiting from these innovations, to have a way to consume those things in a much more simplistic way than they are able to do today. >> And I liked I mean it's always been about the applications but to your point, the applications are not moving at a much faster pace. The customer experience is his expectation is way escalated and when you combine all these, I love your analogy there Vikas because when you combine all these capabilities it allows us to develop new applications, new capabilities, new customer experiences. So that's, I always say that the next 10 years they ain't going to be like the last. And James' public cloud obviously is heavily influencing compute design and customer operating models. You know, it's funny when the public cloud first hit the market, everyone was swooning about oh low cost, standard off the shelf servers you know, and storage devices but it quickly became obvious that that customers needed more. So I wonder if you could comment on this. How are the trends that we've seen from the hyper scalers? How are they filtering into on-prem infrastructure and maybe, you know maybe there's some differences there as well that you could address. >> Absolutely. So, you know I'd say first of all, quite frankly, you know public cloud has completely changed the expectations of how our customers want to consume compute, right? So customers, especially in a public cloud environment they've gotten used to or you know, come to accept that they should consume from the application out, right? They want a very application focused view a services focused view of the world. They don't want to think about infrastructure, right? They want to think about their application. They want to move outward, right? So the, this means that the infrastructure basically has to meet the application where it lives. So what that means for us is that, you know we're taking a different approach. We've decided that, you know we're not going to chase this, you know, single pane of glass view of the world, which, you know, frankly our customers don't want. They don't want a single pane of glass. What they want is a single operating model. They want an operating model that's similar to what they can get with the public cloud, but they want it across all of their cloud options. They want it across private cloud, across hybrid cloud options as well. So what that means is they don't want to just consume infrastructure services, they want all of their cloud services from this operating model. So that means that they may want to consume infrastructure services for automation orchestration but they also need Kubernetes services. They also need virtualization services. They may need Terraform, workload optimization. All of these services have to be available from within the operating model, a consistent operating model, right? So it doesn't matter whether you're talking about private cloud, hybrid cloud, anywhere, where the application lives doesn't matter. What matters is that we have a consistent model that as we think about it from the application out and frankly I'd say, you know, this has been the stumbling block for private cloud. Private cloud is hard, right? This is why it hasn't been really solved yet. This is why we had to take a brand new approach. And frankly, it's why we're super excited about X series. and intersite as that you know operating model that fits the hybrid cloud better than anything else we've seen. >> There's theCUBE's first times a technology vendor has ever said, that it's not about a single pane of glass cause I've been hearing for decades we're going to deliver a single pane of glass. It's going to be seamless and it never happens. It's like a single version of the truth. It's aspirational and it's just not reality. So can we stay on the X series for a minute, James. >> Sure. >> And maybe in this context but in the launch that we saw today it was like a fire hose of announcement. So how does the X series fit into the strategy with intersite, in hybrid cloud and this operating model that you're talking about? >> Right, so I think it goes hand in hand, right? The two pieces go together very well. So we have, you know, this idea of a single operating model that is definitely, you know, something that our customers demand, right? It's what we have to have, but at the same time we need to solve the problems Vikas was talking about before. We need a single infrastructure to go along with that single operating model. So no longer do we need to have silos within the infrastructure that give us different operating models or different sets of benefits, we need one infrastructure that can kind of do all of those configurations, all those applications and then, you know, the operating model was very important because that's where we abstract the complexity that could come with just throwing all that technology at the infrastructure. So that, you know, this is, you know, the way that we think about it as the data center is not centered, right? It's no longer centered. Applications live everywhere, infrastructure lives everywhere. And, you know we need to have that consistent operating model but we need to do things within the infrastructure as well to take full advantage, right? So we want all the SaaS benefits of a CICD model of you know, the intersite can bring we want all of that, you know, proactive recommendation engine with the power of AI behind it. We want the connected support experience. We want all of that but we want to do it across a single infrastructure. And we think that that's how they tie together. That's why one or the other doesn't really solve the problem, but both together, that's why we're here that's why we're super excited. >> So Vikas I, I make you laugh a little bit. When I was an analyst at IDC, I was a bit deep in infrastructure and then when I left, I was doing, I was working with application development heads and like you said, a infrastructure it was just a roadblock. But with, so the target cheek is when Cisco announced UCS a decade ago, I totally missed it. I didn't understand it. I thought it was Cisco getting into the traditional server business and it wasn't until I dug in then I realized that your vision was really to transform infrastructure deployment and management and it changed the model. I was like, okay, I got that wrong. But so let's talk about the ecosystem and the joint development efforts that are going on there. X series, how does it fit into this converged infrastructure business that you've built and grown with partners. You've got storage partners like NetApp and pure. You got ISV partners in the ecosystem. We see Cohesity has been a while since we hung out with all these companies at the Cisco live hopefully next year but tell us what's happening in that regard. >> Now, absolutely. I'm looking forward to seeing you in the Cisco live next year. Absolutely. You brought up a very good point. UCS is about the ecosystem that it brings together. It's about making our customers bring up the entire infrastructure from the core foundational hardware all the way to the application level so that they can all go off and running pretty quick. The converged infrastructure has been one of the cornerstones of our strategy as you pointed out in the last decade. And I'm very glad to share that converged infrastructure continues to be very popular architecture for several enterprise applications even today. In fact, it is the preferred architecture for mission critical applications, where performance, resiliency, latency are the critical you know requirements. They are almost a de facto standards for large scale deployments of virtualize and business critical databases and so forth. With x-series, with our partnerships, with our storage partners, those architectures will absolutely continue and will get better. But in addition, it's a hybrid cloud world. So we are now bringing in the benefits of converged infrastructure to the world of hybrid cloud. We'll be supporting the hybrid cloud applications now with the CI infrastructure that we have built together with our strong partnership with our storage partners to deliver the same benefits to the new AEs applications as well. >> Yeah and that's customers want, they want that cloud operating model, right? Go ahead, please. >> I was just going to say the x series model will continue to thrive. It will transition our, it will expand the use cases now for the newer use cases that we were beginning to, you know say to if it absolutely right. >> Great. Thank you for that. And James, I said earlier today, we heard this this huge announcement, a lot of parts to it. And we heard, you know, KD talk about this initiative is it's really computing built for the next decade. I mean, I like that because it shows some vision and you've got, you know a roadmap that you've thought through the coming changes in workloads and infrastructure management and some of the technology that you can take advantage of beyond just the you know, one or two product cycles. So, but I want to understand what you've done here specifically that you feel differentiates you from other competitive architectures in the industry. >> Sure. You know, that's a great question, number one. Number two, I'm frankly a little bit concerned at times for customers in general for our customers customers in general because if you look at what's in the market, right? These rinse and repeat systems that were effectively just rehashes of the same old design, right? That we've seen since before 2009 when we brought UCS to market, these are what we're seeing over and over and over again that's not really going to work anymore, frankly. And I think that people are getting lulled into a false sense of security by seeing those things continually putting in the market. We rethought this from the ground up because frankly you know, future-proofing starts now, right? If you're not doing it right today, future-proofing isn't even on your radar because you're not even today proofed. So we've rethought the entire chassis, the entire architecture from the ground up. Okay, if you look at other vendors, if you look at other solutions in the market, what you'll see is things like, you know management inside the chassis. That's a great example. Daisy chaining them together, like who needs that? Who wants that? Like that kind of complexity is first of all, it's ridiculous. Second of all, if you want to manage across clouds you have to do it from the cloud, right? It's just common sense. You have to move management where it can have the scale and the scope that it needs to impact, you know your entire domain, your world which is much larger now than it was before. We're talking about true hybrid cloud here, right? So we had to solve certain problems that existed in the traditional architecture. You know, I can't tell you how many times I heard you know, talk about, you know, the mid-plane is a great example. We, you know, the mid and a chassis is a limiting factor. It limits us on how much we can connect or how much bandwidth we have available to the chassis. It limits us on air flow and other things. So how do you solve that problem? Simple, just get rid of it. Like we just, we took it out, right? It's no longer a problem. We designed an architecture that doesn't need it. It doesn't rely on it. No forklift upgrades. So as we start moving down the path of needing liquid cooling or maybe we need to take advantage of some new high-performance low-latency fabrics, we can do that with almost no problem at all, right? So we don't have any forklift upgrades, parker forklift on the side. You won't need it anymore because you can upgrade gradually. You can move along as technologies come in to existence that maybe don't even exist today. They may not even be on our radar today to take advantage of but I like to think of these technologies they're really important to our customers. These are, you know we can call them disruptive technologies. The reality is that we don't want to disrupt our customers with these technologies. We don't want to give them these technologies so they can go out and be disruptive themselves, right? And this is the way that we've designed this from the ground up to be easy consume and to take advantage of what we know about today and what's coming in the future that we may not even know about. So do we think this is a way to give our customers that ultimate capability, flexibility and future-proofing. >> I like, I like that phrase true hybrid cloud. It's one that we've used for years. And but to me, this is all about that horizontal infrastructure that can support that vision of what true hybrid cloud is. You could support the mission, critical applications. You could develop on the system and you can support a variety of workloads. You're not locked into, you know, one narrow stovepipe and that does have legs. Vikas and James thanks so much for coming on the program. Great to see you. >> Thank you. >> And thank you for watching. This is Dave Vellante for theCUBE the leader in digital event coverage. (upbeat music)
SUMMARY :
brought to you by Cisco. and James Leach is the director What are the workloads You remember the days when you that the next 10 years they that fits the hybrid cloud better So can we stay on the X but in the launch that we saw today So we have, you know, and it changed the model. are the critical you know requirements. Yeah and that's customers want, for the newer use cases of beyond just the you know, needs to impact, you know You could develop on the system the leader in digital event coverage.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
James | PERSON | 0.99+ |
Vikas | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
James Leach | PERSON | 0.99+ |
two pieces | QUANTITY | 0.99+ |
Deb | PERSON | 0.99+ |
next year | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
ECS | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
UCS | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
next decade | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
IDC | ORGANIZATION | 0.99+ |
James' | PERSON | 0.99+ |
one device | QUANTITY | 0.98+ |
first times | QUANTITY | 0.98+ |
one infrastructure | QUANTITY | 0.98+ |
single infrastructure | QUANTITY | 0.97+ |
one point | QUANTITY | 0.97+ |
last decade | DATE | 0.96+ |
a decade ago | DATE | 0.94+ |
first | QUANTITY | 0.94+ |
Second | QUANTITY | 0.94+ |
single pane | QUANTITY | 0.94+ |
x-series | TITLE | 0.94+ |
single version | QUANTITY | 0.94+ |
X series | TITLE | 0.94+ |
earlier today | DATE | 0.93+ |
Cohesity | ORGANIZATION | 0.9+ |
decades | QUANTITY | 0.9+ |
Vikas | ORGANIZATION | 0.84+ |
Vikas Ratna | PERSON | 0.83+ |
a minute | QUANTITY | 0.83+ |
single pane of glass | QUANTITY | 0.82+ |
Vikas Ratina | PERSON | 0.82+ |
single pane of glass | QUANTITY | 0.81+ |
KD | PERSON | 0.81+ |
next 10 years | DATE | 0.79+ |
single operating | QUANTITY | 0.78+ |
single operating model | QUANTITY | 0.78+ |
Kubernetes | ORGANIZATION | 0.77+ |
Daisy | PERSON | 0.76+ |
theCUBE | ORGANIZATION | 0.74+ |
2009 | DATE | 0.68+ |
Terraform | ORGANIZATION | 0.65+ |
X | COMMERCIAL_ITEM | 0.64+ |
NetApp | ORGANIZATION | 0.63+ |
years | QUANTITY | 0.62+ |
Cisco live | EVENT | 0.6+ |
series | TITLE | 0.59+ |
x series | TITLE | 0.51+ |
Number two | QUANTITY | 0.47+ |
live | EVENT | 0.45+ |
Yaron Haviv, Iguazio | KubeCon + CloudNativeCon NA 2019
>>Live from San Diego, California at the cube covering to clock in cloud native con brought to you by red hat, the cloud native computing foundation and its ecosystem Marsh. >>Welcome back. This is the cubes coverage of CubeCon cloud date of con 2019 in San Diego, 12,000 in attendance. I'm just two minute and my cohost is John trier. And welcome back to the program. A multi-time cube alumni. You're on Aviv, who is the CTO and cofounder of a Gwoza. We've had quite a lot of, you know, founders, CTOs, you know, their big brains at this show, your own. So you know, let, let, let's start, you know, there's, there's really a gathering, uh, there's a lot of effort building out, you know, a very complicated ecosystem. Give us first, kind of your overall impressions of the show in this ecosystem. Yeah, so we're very early on on Desecco system. We were one of the first in the first batch of CNCF members when there were a few dozens of those. Not like a thousand of those. Uh, so I've been, I've been to all those shows. >>Uh, we're part of the CNCF committees for different things. And any initiating, I think this has become much more mainstream. I told you before, it's sort of the new van world. You know, I lot a lot more, uh, all day infrastructure vendors along with middleware and application vendor are coming here. All right, so, so one of the things we like having you on the program you're on is you don't pull any punches. So we've seen certain waves of technology come with big promise and fall short, you know, big data was going to allow us to leverage everything and you know, large percentage of, uh, solutions, you know, had to stop or be pulled back. Um, give us, what's the cautionary tale that we should learn and make sure that we don't repeat, you know, so I've been a CTO for many years in different companies and, and what everyone used to say about it, I'm always right. >>I'm only one year off usually. I'm usually a little more optimistic. So, you know, we've been talking about Cloudera and Hadoop world sort of going down and Kubernetes and cloud services, essentially replacing them. We were talking about it four years ago and what do you see that's actually happening? You know, with the collapse of my par and whore, then we're going to Cloudera things are going down, customer now Denon guys, we need equivalent solution for Kubernetes. We're not going to maintain two clusters. So I think in general we've been, uh, picking on many of those friends. We've, we've invented serverless before it was even called serverless with, with nuclear and now we're expanding it further and now we see the new emerging trends really around machine learning and AI. That's sort of the big thing. I'm surprised, you know, that's our space where essentially you're doing a data science platform as a service fully automated around serverless constructs so people can, can develop things really, really quickly. >>And what I see that, you know, third of the people I talk to are, have some relations to machine learning and AI. Yeah. Maybe explain that for our audience a little bit. Because when, you know, Kubernetes first started very much an infrastructure discussion, but the last year or two, uh, very much application specific, we hear many people talking about those data use cases, AI and ML early days. But you know how, how does that fit into the overall? It's simple. You know there, if you're moving to the cloud are two workloads. There is lift and shift workloads and there are new workloads. Okay, lift and ship. Why? Why bother moving them to Kubernetes? Okay, so you end up with new workloads. Everyone is trying to be cloud native server, elastic services and all that. Everyone has to feed data and machine learning into those new applications. This is why you see those trends that talk about old data integration, various frameworks and all that in that space. >>So I don't think it's by coincidence. I think it's, that's because new applications incorporate the intelligence. That's why you hear a lot of the talk about those things. What I loved about the architecture, what you just said is like people don't want to run into another cluster. I don't want to run two versions of Kubernetes, you know, if I'm moving there you, because you, but you're still built on that, that kind of infrastructure framework and, and knowledge of, of how to do serverless and how to make more nodes and fewer nodes and persistent storage and all that sort of good stuff and uh, and, and run TensorFlow and run, you know, all these, all these big data apps. But you can, um, you can talk about that just as a, as a, the advantage to your customer cause you could, it seems like you could, you could run it on top of GKE. >>You could run it on prem. I could run my own Coobernetti's you could, you could just give me a, uh, so >> we, we say Kubernetes is not interesting. I didn't know. I don't want anyone to get offended. Okay. But Kubernetes is not the big deal. The big deal is organizations want to be competitive in this sort of digital world. They need to build new applications. Old ones are sort of in sort of a maintenance mode. And the big point is about delivering new application with elastic scaling because your, your customers may, may be a million people behind some sort of, uh, you know, uh, app. Okay. Um, so that's the key thing and Kubernetes is a way to deliver those microservices. But what we figured out, it's still very complicated for people. Okay. Especially in, in the data science work. Uh, he takes him a few weeks to deliver a model on a Jupiter notebook, whatever. >>And then productizing it is about the year. That's something we've seen between six months to a year to productize things that are relatively simple. Okay. And that's because people think about the container, the TensorFlow, the Kuda driver, whatever, how to scale it, how to make it perform, et cetera. So let's, we came up with is traditionally there's a notion of serverless, which is abstraction with very slow performance, very limited set of use cases. We sell services about elastic scaling paper, use, full automation around dev ops and all that. Okay. Why cannot apply to other use cases are really high concurrency, high-speed batch, no distributed training, distributed workload. Because we're coming, if you know my background, you know, been beeping in Mellanox and other high-performance companies. So where I have a, we have a high performance DNA so we don't know how to build things are extremely slow. >>It sort of irritates me. So the point is that how can we apply this notion of abstraction and scaling and all that to variety of workloads and this is essentially what it was. It is a combination of high speed data technology for like, you know, moving data around on between those function and extremely high speed set though functions that work on the different domains of data collection and ingestion, data analytics, you know, machine learning, training and CIN learning model serving. So a customer can come on on our platform and we have testimonials around that, that you know, things that they thought about building on Amazon or even on prem for months and months. They'd built in our platform in few weeks with fewer people because the focus is on building the application. The focus is not about joining your Kubernetes. Now we go to customers, some of them are large banks, et cetera. >>They say, Alrighty, likes Kubernetes, we have our own Kubernetes. So you know what, we don't butter. Initially we, we used to bring our own Kubernetes, but then you know, I don't mind, you know, we do struggle sometimes because our level of expertise in Coobernetti's is way more sophisticated than what they have to say. Okay, we've installed Kubernetes and we come with our software stack. No you didn't, you know, you didn't configure the security, they didn't configure ingress, et cetera. So sometimes it's easier for us to bring, but we don't want him to get into this sort of tension with it. Our focus is to accelerate development on the new application that are intelligent, you know, move applications from, if you think of the traditional data analytics and data science, it's about reporting and what people want to do. And some applications we've announced this week and application around real time cyber collection, it's being used in some different governments is that you can collect a lot of information, SMS, telephony, video, et cetera. >>And in real time you could detect terrorists. Okay. So those application requires high concurrency always on rolling upgrades, things that weren't there in the traditional BI, Oracle, you know, kind of reporting. So you have this wave of putting intelligence into more highly concurrent online application. It requires all the dev ops sort of aspects, but all the data analytics and machine learning aspects to to come to come along. Alright. So speaking of those workloads for, for machine learning, uh, cube flow is a project, uh, moving the, moving in that space along it. Give us the update there. Yeah. So, so there is sort of a rising star in the Kubernetes community around how to automate machine learning workflows. That's cube flow. Uh, I'm personally, I one of the committers and killed flow and what we've done, because it's very complicated cause Google developed the cube cube flow as one of the services on, on a GKE. >>Okay. And the tweaked everything. It works great in GK, even that it's relatively new technology and people want to move around it in a more generic. So one of the things in our platform is a managed cube flow that works natively with all the rest of the solutions. And other thing that we've done is we make it, we made it fully. So instead of queue flow approach is very con, you know, Kubernetes oriented containers, the ammos, all that. Uh, in our flavor of Coupa we can just create function and you just like chain functions and you click and it runs. Just, you've mentioned a couple of times, uh, how does serverless, as you defined it, fit in with, uh, Coobernetti's? Is that working together just functions on top or I'm just trying to make here, >> you'll, you'll hear different things. I think when most people say serverless, they mean sort of front end application things that are served low concurrency, a Terra, you know, uh, when we mean serverless, it's, we have eight different engines that each one is very good in, in different, uh, domain like distributed deep learning, you know, distributed machine learning, et cetera. >>And we know how to fit the thing into any workloads. So for me, uh, we deliver the elastic scaling, the paper use and the ease of use of sort of no dev ops across all the eight workloads that we're addressing. For most people it's like a single Dreek phony. And I think really that the future is, is moving to that. And if you think about serverless, there's another aspect here which is very important for machine learning and Israel's ability. I'm not going to develop any algorithm in the world. Okay. There are a bunch of companies or users or developers that can develop an algorithm and I can just consume it. So the future in data science but not just data science is essentially to have like marketplaces of algorithms premade or analytic tools or maybe even vendors licensing their technology through sort of prepackaged solution. >>So we're a great believer of forget about the infrastructure, focus on the business components and Daisy chain them in to a pipeline like UFO pipeline and run them. And that will allow you most reusability that, you know, lowest amount of cost, best performance, et cetera. That's great. I just want to double click on the serverless idea one more time, but, so you're, you're developing, it's an architectural pattern, uh, and you're developing these concepts yourself. You're not actually, sometimes the concept gets confused with the implementations of other people's serverless frameworks or things like that. Is that, is that correct? I think there are confusion. I'm getting asked a lot of times. How do you compare your technology compared to let's say a? You've heard the term gay native is just a technology or open FAS or, yeah. Hold on. Pfizer's a CGIs or Alito. An open community is very nice for hobbies, but if you're an enterprise and it's security, Eldep integration, authentication for anything, you need DUIs, you need CLI, you need all of those things. >>So Amazon provides that with Lambda. Can you compare Lambda to K native? No. Okay. Native is, I need to go from get and build and all that. Serverless is about taking a function and clicking and deploying. It's not about building. And the problem is that this conference is about people, it people in crowd for people who like to build. So they, they don't like to get something that work. They want to get the build the Lego building blocks so they can play. So in our view, serverless is not open FAS or K native. Okay. It's something that you click and it works and have all the enterprise set of features. We've extended it to different levels of magnitude of performance. I'll give you an anecdote. I did a comparison for our customer asking me the same question, not about Canadian, but this time Lambda. How do you guys compare with London? >>Know Nokia is extremely high performance. You know we are doing up to 400,000 events on a single process and the customer said, you know what, I have a use case. I need like 5,000 events per second. How do you guys compare a total across all my functions? How do you compare against Lambda? We went into, you know the price calculator, 5,000 events per second on Lambda. That's $50,000 okay. $50,000 we do about, let's say even in simple function, 60,000 per process, $500 VM on Amazon, $500 VM on Amazon with our technology stick, 2000 transactions per second, 5,000 events per second on Lambda. That's 50,000. Okay. 100 times more expensive. So it depends on the design point. We designed our solution to be extremely efficient, high concurrency. If you just need something to do a web hook, use Lambda, you know, if you are trying to build a high concurrency application efficient, you know, an enterprise application on it, on a serverless architecture construct come to us. >>Yeah. So, so just a, I'll pause at this for you because a, it reminds me what you were talking about about the builders here in the early days of VMware to get it to work the way I wanted to. People need to participate and build it and there's the Ikea effect. If I actually helped build it a little bit, I like it more to get to the vast majority, uh, to uh, adopt those things. It needs to become simplified and I can't have, you know, all the applications move over to this environment if I have to constantly tweak that. Everything. So that's the trend we've been really seeing this year is some of that simplification needs to get there. There's focus on, you know, the operators, the day two operations, the applications so that anybody can get there without having to build themselves. So we know there's still work to be done. >>Um, but if we've crossed the chasm and we want the majority to now adopt this, it can't be that I have to customize it. It needs to be more turnkey. Yeah. And I think it's a friendly and attitude between what you'll see in Amazon reinvent in couple of weeks. And then what you see here, because there is those, the focus of we're building application a what kind of tools and the Jess is gonna just launch today on the, on the floor. Okay. So we can just consume it and build our new application. They're not thinking, how did Andy just, he built his tools. Okay. And I think that's the opposite here is like how can you know Ali's is still working inside underneath dude who cares about his team. You know, you care about having connectivity between two points and and all that. How do you implement it that, you know, let someone else take care of it and then you can apply your few people that you have on solving your business problem, not on infrastructure. >>You know, I just met a guy, came to our booth, we've seen our demo. Pretty impressive how we rise people function and need scales and does everything automatically said we want to build something like you're doing, you know, not really like only 10% of what you just showed me. And we have about six people and for three months where it just like scratching our head. I said, okay, you can use our platform, pay us some software license and now you'll get, you know, 10 times more functionality and your six people can do something more useful. Says right, let's do a POC. So, so that's our intention and I think people are starting to get it because Kubernetes is not easy. Again, people tell me we installed Kubernete is now installed your stack and then they haven't installed like 20% of all the things that you need to stop so well your own have Eve always pleasure to catch up with you. Thanks for the all the updates and I know we'll catch up with you again soon. Sure. All right. For John Troyer, I'm Stu Miniman. We'll be back with more coverage here from CubeCon cloud date of con in San Diego. Thanks for watching the cube.
SUMMARY :
clock in cloud native con brought to you by red hat, the cloud native computing foundation So you know, All right, so, so one of the things we like having you on the program you're on is you don't pull any punches. I'm surprised, you know, that's our space where essentially you're doing a data science platform as a service And what I see that, you know, third of the people I talk to are, have some relations to machine learning you know, if I'm moving there you, because you, but you're still built on that, that kind of infrastructure I could run my own Coobernetti's you could, you could just give me a, uh, so sort of, uh, you know, uh, app. Because we're coming, if you know my background, you know, been beeping in Mellanox and other high-performance companies. and we have testimonials around that, that you know, things that they thought about building on Amazon or even I don't mind, you know, we do struggle sometimes because our level of expertise in Coobernetti's is Oracle, you know, kind of reporting. you know, Kubernetes oriented containers, the ammos, all that. in different, uh, domain like distributed deep learning, you know, distributed machine learning, And if you think about serverless, most reusability that, you know, lowest amount of cost, best performance, It's something that you click and it works and have all the enterprise set of features. a web hook, use Lambda, you know, if you are trying to build a high concurrency application you know, all the applications move over to this environment if I have to constantly tweak that. And I think that's the opposite here is like how can you know Ali's is still working inside I said, okay, you can use our platform, pay us some software license and now you'll get, you know,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
$50,000 | QUANTITY | 0.99+ |
John Troyer | PERSON | 0.99+ |
John trier | PERSON | 0.99+ |
$500 | QUANTITY | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
Andy | PERSON | 0.99+ |
Nokia | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
three months | QUANTITY | 0.99+ |
10 times | QUANTITY | 0.99+ |
two points | QUANTITY | 0.99+ |
San Diego | LOCATION | 0.99+ |
50,000 | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
six months | QUANTITY | 0.99+ |
six people | QUANTITY | 0.99+ |
San Diego, California | LOCATION | 0.99+ |
two minute | QUANTITY | 0.99+ |
Kubernete | TITLE | 0.99+ |
Yaron Haviv | PERSON | 0.99+ |
20% | QUANTITY | 0.99+ |
100 times | QUANTITY | 0.99+ |
Kubernetes | TITLE | 0.99+ |
Lambda | TITLE | 0.99+ |
Iguazio | PERSON | 0.99+ |
one year | QUANTITY | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Pfizer | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
four years ago | DATE | 0.99+ |
CNCF | ORGANIZATION | 0.99+ |
two clusters | QUANTITY | 0.98+ |
12,000 | QUANTITY | 0.98+ |
KubeCon | EVENT | 0.98+ |
CubeCon | EVENT | 0.98+ |
Jess | PERSON | 0.97+ |
a year | QUANTITY | 0.97+ |
Lego | ORGANIZATION | 0.97+ |
last year | DATE | 0.97+ |
CloudNativeCon | EVENT | 0.97+ |
first batch | QUANTITY | 0.97+ |
each one | QUANTITY | 0.97+ |
today | DATE | 0.96+ |
Desecco | ORGANIZATION | 0.96+ |
weeks | QUANTITY | 0.96+ |
5,000 events per second | QUANTITY | 0.96+ |
Ali | PERSON | 0.96+ |
two versions | QUANTITY | 0.96+ |
one | QUANTITY | 0.96+ |
two workloads | QUANTITY | 0.95+ |
10% | QUANTITY | 0.95+ |
two | QUANTITY | 0.94+ |
Mellanox | ORGANIZATION | 0.94+ |
dozens | QUANTITY | 0.94+ |
Gwoza | ORGANIZATION | 0.94+ |
5,000 events per second | QUANTITY | 0.94+ |
single | QUANTITY | 0.93+ |
third | QUANTITY | 0.93+ |
up to 400,000 events | QUANTITY | 0.93+ |
60,000 per process | QUANTITY | 0.92+ |
this year | DATE | 0.91+ |
this week | DATE | 0.91+ |
a million people | QUANTITY | 0.9+ |
Eve | PERSON | 0.9+ |
5,000 events per second | QUANTITY | 0.9+ |
Denon | ORGANIZATION | 0.89+ |
2000 transactions per second | QUANTITY | 0.88+ |
Alito | ORGANIZATION | 0.87+ |
Aviv | PERSON | 0.85+ |
about six people | QUANTITY | 0.85+ |
Coobernetti | ORGANIZATION | 0.85+ |
eight workloads | QUANTITY | 0.84+ |
red hat | ORGANIZATION | 0.83+ |
Hadoop | TITLE | 0.82+ |
Cloudera | ORGANIZATION | 0.81+ |
thousand | QUANTITY | 0.79+ |
Canadian | LOCATION | 0.79+ |
Keith Townsend, VMware | VTUG Winter Warmer 2019
>> From Gillette Stadium in Foxboro, Massachusetts, if the queue covering Vita Winter warmer, twenty nineteen brought to you by Silicon Angle media. >> Hi, I'm stew Minutemen. And this is the Cube Worldwide Leader and live tech coverage. >> We're on the ground here at the V Tug winter warmer, and it is twenty nineteen. It's actually, the thirteenth year of this event was one of the original, if not the original Veum, where user groups covers virtual ization, cloud computing and even Mohr, always great to be able to get back to the community, get some good interviews and no better person helped me start with my first interview at a show of the year. But good friend of the program, Keith Towns and he is the CTO advisor. And he's also now a slew front architect with the M. Where Keith. Thanks for joining >> us. Thanks for having me on the cute. >> Yeah. So, Keith, I mean, you were host of our program for a number of years. You're now, you know, back working on the vendor side. But you know, you know this community. You know what I always say in my career, There, certain communities, an ecosystem where there's just love to be a part of it. And the virtual ization group. You know, I've been part of it for a long time. You know, Veum, wear and beyond, though, you know people that you know, they get excited, They geek out on the technology and they love to share. And that's why we come to events like this. >> Yeah, it is amazing. Just, you know, the every every show is getting smaller, but maybe with the session of a Ws re event, but I don't think the intensity has shrunk at all. You get around friends, you know, we're just at a desk and one of the ten days, actually, how did I get a job doing X? And the community was like, Oh, you just talk to the people at this table. So it is. It is a great, great commute. >> Yeah, it's an interesting dynamic you talk about. You know, we've seen the huge growth in Meetups in user groups and regional shows. You know, vm Where does Veum World but the VM world being where forums around the globe. I'm sure you probably have to go for a few of those they've been doing well. I'm right back in my emcee Daisy M. C. Did a number of those. So we see you. Amazon Reinvent is growing, but oh, my God, they're regional shows are ridiculous. I I've said some of those regional shows either different communities or different localities can actually be even better than some of the big shows on. You know, we love Keith. We're happy to welcome you here to the home of the NFC Championship. New England Patriots ur >> First off, Congratulations. The wait went a little better for you to bare sand and say, You know what? Tom Brady won't play forever, so enjoy it. This is amazing backdrop through him. Little finish that you've not involved. Invited me to a veto before now. >> Oh. Oh, I'm sorry, Keith. It's It's a community thing that absolutely got to come. Absolutely. I've had friends. Most of them. It is local. I'm talking to users from Maine and Massachusetts, Rhode Island and Connecticut and like so you gave a keynote this morning and you didn't True fashion. You did a block post about reality check leading in, and I thought it was a great way for us to start is, You know, there's so much change in the industry, uh, those of us that are technologies that you know, we're super excited because there's so much new stuff. It's not like Oh, jeez, you know, twenty nineteen is probably going to be just like twenty eighteen. It's like, Oh, my gosh, what did I do in twenty eighteen? What do I have to change? How do I keep up? How do I manage it? I would love to get your viewpoint. You know what's going on with Keith? And you're talking about a lot of users, so you know how help share, You know, what is the reality? Check that everybody's going >> to know. We're talking about a pre recording in the banter. Just, you know, whether it's, you know, Vienna where we're hip Theo and all the stuff that Casey Kelsey Hightower is going out with Cooper Netease. Then as you spent spent out to serve earless, uh, infrastructures Cole scripting it centre. There's much to learn that you're a bit overwhelmed and we're seeing this out. You know, as I'm talking to executive CTO CEOs, VP of infrastructure, they're filling the same kind of excitement at the same time. Overwhelmed this Like what? What's what's really You know, we had the big cloud movements over a few years ago where I think we're at the height cycle where organizations are starting to understand that. You know, Cloud isn't the destination is part of a strategy, and everyone seems to be in the throes of figuring out what that means for us. We're just on the crowd chat, talking about multi Cloud and the drivers around. Multi Cloud. You guys did a great job hosting that cloud shit chat, nothing. We saw the gambit off where people are. You know, uh, there's not really a business rationality people who are really in the throes of trying to figure it out. >> Yeah, actually, I love to comment friend of ours that we've had on the program before, Bobby Allen from Cloud General said when he's working with companies, if they ask for a three year strategy plan, he said, I will not do it unless we guarantee that we will go revisit it every six months because I looked back. You know, Clay Christensen, you no way talks about strategy is strategy is a point in time thing, not something that you write it in stone. I've been saying for a couple of years cloud strategies that companies today is, they wrote it in ink and the ink still drying. And, you know, you're probably going to need toe, you know, go through it and change it because it is changing fast and therefore, you know, huge. Out I started Deploy something. Oh, wait, what about the next thing? Or there's some new practice or something to do it. So it is challenging because I need to run my business. Today. I got to set my budget for the year, usually, um and it's I need to be agile. But, you know, I can't constantly be tearing everything up and you're not going to be throwing it out or re training and skills. I mean, there's so many challenges. >> So still, you might remember when when I was on the other side of the the table. I, uh it was meant at somewhat of a D that Veum where moves at the speed of the aisle, and it was picked up as Maury compliment. But >> it was a >> big I'll be honest that it was a dig. And what I've learned the past few months is that Veum, where has to move at the speed of the CIA, is no longer and It's not just being wherever the community has and the CIA always faced with that we could do a few years ago. A cloud strategy, and that thing can sit on the desk for a year, and it would still be valid. But the bobbies point, if you're going to do a strategy and three year strategy, got to revisit that every six months and this agility that were not accustomed to previously in the industry, we have to now become super agile and figure out how do we keep the lights on and innovate at the pace That business, these witches? Pretty good chance. >> Yeah, it's attorney were beginning the year I made a comment personally said, You know, I'm not a big believer in, you know, setting. You know, Resolutions. Mohr. You know, let's set goals Your runner, I do some biking and it's like, Okay, you know, I've got a big race I want to do this year. I'm gonna work myself, you know, towards that goal and raise the money. You've got a certain target and something that you could do over the year. It's and there's no way that you do that, cos you know they've got goals that they need to accomplish and business. And it's great to say, Oh, well, we need to be more efficient. We need to do some down something different. But, you know, reality is, you know, it's not just digital transformation of modernizing. It was, you know. Oh, okay. Do I need to transform my backup? You know, data protection, you know, huge activity going on in the marketplace right now, you know? So, what >> is sixty million noon investment in one >> week? Exactly. You know, the wave of hyper convergence is one that really changed a lot of architectures and had people change. You know, we've talked cloud computing. They're what are some of the, You know, some of the big, you know, movements that you see, you know, will you? Tracking the industry? It was kind of the the intel refunds for a cycle, and, you know, Oh, well, it's the next version of Microsoft or, you know, Veum, where operating system would be one of those big, you know, kind of ticked. Talks of what? What are some of the big commonalities that you're seeing Al? So they're actually moving people to >> new things without a doubt. There is one conversation that customers cannot get the enough of. And I had Ah, on my little vlog. I had game being from Vienna, where V P off the Storch and Business availability unit and I challenged her on the via Where? Vision around this. But customers cannot get enough of having a conversation around data. What they What do they do with data? And how does a move data? How did they get compute closest to data? How did we get data they're closest to? They're re sources. We talked about it on the multi cloud conversation, but by far conversations are around. Howto they extract value from data had really protect data, and howto they make sure their compliant with the data is something that that's driving a lot of innovation and a lot of conversation. A lot of interest. >> Yeah, Keith, it's a great one. When I look at you know, our research team, that wicked bond data is that the center of everything. In many ways, the failings of big data was talking about, You know, the challenges. I have infrastructure. No, the growth and the variety and blah, blah, blah and everything that's not what important to the business they don't care about, You know, it's like, Oh, well, there's a storage problem in a network problem. It's the business says there's data, you know? Do I protect my bird business to make sure that I'm not a risk? You know, all the things like DDP are coming And can I livered value? Do I Can I get new lines of business? Can I generate revenue out of that? And I've seen early signs that we've learned this whole, You know, a I m l movement. You know, data, Really? At the center. All right, we've seen enough storage. We went from talking about storing data to about, you know, that data ecosystem, Andi, even computing and I ot data where data needs to be, how I work it. Absolutely a center. So, yeah, it's great to hear that. Customers are identifying that. We've been doing like, chief data officer events for many years. You know, where does data live? Is that a CEO Thing? Is that a different part of the business? I don't know if you've got anything you're seeing from, you know, your customers is Tau, >> who owns the Data initiative, So it's really interesting. I had a conversation with a major bank, and it was a one on one with the CDO and what I thought was the most tricky part of the conversation is that here, Not only does he report directly into the CIA, which you know is to be expected, but he meets regularly with the board of directors. So data were seen. I've seen these seedy old rolls being popped up, and it's not just about the technology as you mentioned. It's about the whole approach about this asset that we have. It's so critical that worth creating a sea level position that today might reporting to the CEO but is most definitely accountable to the border director. >> Well, yeah, Keith, it's that the trend we've been watching for a while, as it used to be, it was a cost center. And, you know, it's kind of, you know, that's what it was considered today. If it isn't in, you know, direct relationship, working with the business, the business will go find somebody else to do it. The whole stealthy movement. You know, I can go find an answer for what I'm doing. I think about project I've worked on in my career and been like, I wish it was easy. You know, fifteen years ago, it was today to do those. But we see security's a board level discussion data as a board level discussion is excellent. And all of those things that traditionally you would think that own them. Having awareness and visibility and information communication flow between the board in the C suite is great progress. You >> know, it's interesting. I was a big proponent of this prior to coming on The vendor side is that vendors have to start having conversations outside of it. So traditional infrastructure of injustice, his goal. Hurry, right saw and where the whole the Dale emcee Dale Technologies they have to skill up and have conversations with CIA moles. Seo's CEO Ole's H R directors because the these buying centers now have power to go out and buy solutions. You know, talked about in my no keynote this morning. You know how many people have worked day? How many people have salesforce applications? They had nothing to do when I had no nothing to do with the procurement of off these solutions. The ball is moving outside of just traditional for court technology is starting to get to the point where regular users can consume business users can consume these massive, massive solutions based on technology and just happens to be a label. The technology, whether sales Force worked in >> Sochi, thought on this this whole point there want to ask you, In my career, there's often been groups inside a business that didn't get along. And we, you know, built silos. You know, the storage in the network team don't get along cloud and traditional I t You know what we're fighting? You know who owns it? Turf wars Managing that, You know, have we built silos in multi cloud today? Is everybody holding hands and, you know, pointing the business in the same direction, you could kind of give us the good the bad. So what? We need to work on going forward. >> I think the good is that you know that the umbrella of infrastructure starting to work as a single. Uh, you So you have storage, compu networking, even configuration man groups that were kind of confrontational before and territorial. Those groups are starting. Tio. Come on. Their one senior manager or one senior executive looking at? How do you provide services as a group and providing those services? I think we're we're starting to see Silos is actually the developer versus the infrastructure group is developers just wantto FBI, too. A set of services. They want infrastructure to get away. Developers themselves. Haven't you know, kind of katende enough of the scars from heaven have to do operations, So there's a different view off the world. And, uh, today I think developers haven't yet getting the budget power off operations. But the business wants solutions, and they're going out there competing with traditional Teo get the dollars to run the services in the cloud or or wherever, however they consumed them, whether it's, you know, just saw Chick fil a's deploying two thousand ten points to run six thousand containers at the edge. Is that something that's run by tears? That something wrong? Run by developers? I don't know. Check feeling well enough to know about. This is what we're seeing in >> industry. Yeah. All right. Well, keep towns. And always a pleasure to catch up with you. Thanks so much for joining us. Be sure to check him out see Teo advisor on Twitter, check out his blogged. And of course, thank you so much for watching. We'll be back. Uh, lots more coverage here at V tug. Winter warmer, twenty nineteen. Thanks for watching.
SUMMARY :
Vita Winter warmer, twenty nineteen brought to you by Silicon Angle media. And this is the Cube Worldwide Leader and live tech coverage. Keith Towns and he is the CTO advisor. But you know, you know this community. You get around friends, you know, we're just at a desk and one of We're happy to welcome you here to the home of the NFC Championship. you to bare sand and say, You know what? It's not like Oh, jeez, you know, twenty nineteen is probably going to be just like twenty eighteen. You know, Cloud isn't the destination is part of a you know, you're probably going to need toe, you know, go through it and change it because it is changing fast and therefore, So still, you might remember when when I was on the other side of the the table. But the bobbies point, if you're going to do a strategy and three year strategy, You know, I'm not a big believer in, you know, setting. They're what are some of the, You know, some of the big, you know, movements that you see, How did they get compute closest to data? It's the business says there's data, you know? and it's not just about the technology as you mentioned. And, you know, it's kind of, you know, that's what it was considered today. You know, talked about in my no keynote this morning. You know, the storage in the network team don't get along cloud and traditional I t You however they consumed them, whether it's, you know, just saw Chick fil a's deploying two And of course, thank you so much for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Keith | PERSON | 0.99+ |
Maine | LOCATION | 0.99+ |
Bobby Allen | PERSON | 0.99+ |
Connecticut | LOCATION | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
Vienna | LOCATION | 0.99+ |
Clay Christensen | PERSON | 0.99+ |
Rhode Island | LOCATION | 0.99+ |
Keith Towns | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
sixty million | QUANTITY | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Keith Townsend | PERSON | 0.99+ |
Massachusetts | LOCATION | 0.99+ |
Silicon Angle | ORGANIZATION | 0.99+ |
New England Patriots | ORGANIZATION | 0.99+ |
Gillette Stadium | LOCATION | 0.99+ |
Maury | PERSON | 0.99+ |
three year | QUANTITY | 0.99+ |
Tom Brady | PERSON | 0.99+ |
ten days | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
today | DATE | 0.99+ |
Daisy M. C. | PERSON | 0.99+ |
thirteenth year | QUANTITY | 0.99+ |
fifteen years ago | DATE | 0.99+ |
Dale Technologies | ORGANIZATION | 0.99+ |
Cube | ORGANIZATION | 0.98+ |
first interview | QUANTITY | 0.98+ |
Foxboro, Massachusetts | LOCATION | 0.98+ |
a year | QUANTITY | 0.98+ |
one conversation | QUANTITY | 0.97+ |
Chick fil a | ORGANIZATION | 0.96+ |
one | QUANTITY | 0.96+ |
twenty eighteen | QUANTITY | 0.96+ |
two thousand ten points | QUANTITY | 0.95+ |
Teo | ORGANIZATION | 0.95+ |
First | QUANTITY | 0.95+ |
NFC Championship | EVENT | 0.94+ |
Sochi | ORGANIZATION | 0.94+ |
single | QUANTITY | 0.93+ |
Cole | PERSON | 0.93+ |
Cloud General | ORGANIZATION | 0.92+ |
Mohr | PERSON | 0.91+ |
one senior executive | QUANTITY | 0.91+ |
this year | DATE | 0.9+ |
Ole | ORGANIZATION | 0.9+ |
M. Where | PERSON | 0.89+ |
Veum | ORGANIZATION | 0.88+ |
Amazon | ORGANIZATION | 0.88+ |
Vita | EVENT | 0.87+ |
this morning | DATE | 0.87+ |
one senior manager | QUANTITY | 0.87+ |
wave of hyper convergence | EVENT | 0.86+ |
twenty nineteen | QUANTITY | 0.85+ |
V tug | ORGANIZATION | 0.85+ |
twenty | QUANTITY | 0.84+ |
ORGANIZATION | 0.83+ | |
Dale | ORGANIZATION | 0.83+ |
six thousand containers | QUANTITY | 0.83+ |
few years ago | DATE | 0.79+ |
2019 | DATE | 0.75+ |
Storch | LOCATION | 0.74+ |
Andi | PERSON | 0.73+ |
intel | ORGANIZATION | 0.73+ |
Seo | ORGANIZATION | 0.73+ |
VMware | LOCATION | 0.73+ |
six months | QUANTITY | 0.72+ |
Theo | PERSON | 0.71+ |
stew Minutemen | PERSON | 0.7+ |
V Tug | EVENT | 0.67+ |
Cloud | ORGANIZATION | 0.67+ |
Tau | PERSON | 0.64+ |
CEO | PERSON | 0.61+ |
Netease | ORGANIZATION | 0.59+ |
CDO | ORGANIZATION | 0.58+ |
Alice Steinglass, Code.org - CloudNOW Awards 2017
>> Hi, I'm Lisa Martin on the ground with The Cube at Google Headquarters for the sixth annual CloudNOW Top Women and Cloud Awards event. Very excited to be joined by one of the award winners tonight, Alice Steinglass the President of Code.org. Congrats on the award and welcome to The Cube >> Thank you. >> It's great to have you here but first of all tell us about Code.Org. It's a pretty big organization and so what's it all about? >> Yeah, so our goal is that every student should have the opportunity to learn Computer Science. And we're focused on equity and diversity. I was surprised to learn that most schools today don't teach Computer Science. And it's not that most kids don't take Computer Science, it's that even if they wanted to most K12 schools today, the kid can't even take a Computer Science class if they want to. And this unfairly affects students of color, students in poor schools, they even have less of that opportunity today. And so our goal is that every school should offer Computer Science and every child should have the opportunity to take it. >> That's outstanding. How long have you been involved in Code.org and what inspires you to donate so much of your time to this organization? >> Yeah, so I joined about a little bit over two years ago. I'd been working in the tech industry for about 15 years, so I'd seen first hand what the lack of opportunity looks like and I was volunteering in my free time, helping out in schools and I just really wanted to make that my full-time job. I also think as a woman in Computer Science I remember walking into my first Computer Science class and it's a lecture hall with 500 people and you just feel like you're sort of in the wrong place. And it can be intimidating and I think especially when you don't know all the words or all the buzz words, you can feel like, I don't know what that word means, I don't know what BBS is right? So therefore I don't belong in Computer Science and it turns out, you don't need to know what a BBS is to do Computer Science. It's basically Reddit and nobody needs to know Reddit to do Computer Science. >> But that's a really great point that there's a lot of intimidation from kids at young ages, "Do I belong here?" "I like it but..." Like you said, there are things like acronyms that can intimidate someone. But some of the stats I was reading that 25% of students in the US have an account but this isn't just in the United States, you guys are doing some great things globally to get kids involved. So tell us a little bit about the global expansion of Code.org. >> Yeah, so almost half of our students come from around the world. And I think that it's not just about America, it's about every student deserves this opportunity. It's actually cool, most of our translation work, almost all of it is done by volunteer translators and we have organizations around the world like, Programa Il futuro in Italy who has translated all of our content into Italian and is working with the Italian Government and making it part of the national curriculum in Italy. Working with partners in Mexico and all over the world, who are doing great work and right here at home. You don't have to go far away, we're partnered with the Oakland School District which is right here. And we're partnered with San Francisco and all sorts of schools right here in America don't have that opportunity and so that's what we're focused on fixing. Because I was talking about, it's challenging when you don't know it and giving the students an opportunity to learn that in High School gives them the confidence to go and do this if they want to in college. I was lucky, I had a high school Computer Science class and I had a teacher who believed in me. And it makes a huge difference. >> Absolutely. >> So we want to give all students that chance. >> That confidence that you mentioned really is key. If you can just help, you probably think one person, just feel a little bit better that if, "Hey I don't know what this acronym is, how many other people don't know?" and that can just really build upon that. Something that I think is really cool that I've just learned about is the Hour of Code. Tell us about that because this is the perfect week to be talking about it. >> Yeah, you are interviewing me during CS education week. And one way you can celebrate CS education week is the Hour of Code. The Hour of Code has become an international movement. We've had tens of millions of students participating all over the world. This week alone there are over a 100,000 different Hour of Code events that are organized. You can see a map of them all over the world. An Hour of Code is a way of letting a student try Computer Science because I can tell you till I'm blue in the face that it's fun, or that it's interesting or that you can do it. But we see a much bigger impact when students actually try it. Last year we had thousands of students, which we measured. Questions like, I like Computer Science or I want to study Computer Science before and after they tried an Hour of Code. And what we saw was that it really makes a huge difference to try it. But you know the group that it mattered the most to? High school girls. High school girls. >> Fantastic. >> Yeah. Because they had this impression that Computer Science wasn't for them. But then after trying it, they said, "Oh you know what? It's not about sitting around and coding the Fibonacci Series." You can do that with code but you can also make apps and you can design websites and you can create things that have this creativity aspect and they wanted to go on and take it. Most students who do the Hour of Code go beyond the Hour of Code. And our goal with the Hour of Code is not to do one hour of code. One hour of code is not Computer Science, you're not going to learn that much right? >> Right. Getting your toe wet maybe? >> Yeah, get your toe wet. But the real goal is to help teacher teach years of Computer Science. To go from that to saying, "I can teach Computer Science." It's about the students and helping them take it and it's about the teachers and helping them teach it. Most of what we do at Code.org is helping teachers who never learned Computer Science when they went to school, learn Computer Science and learn how to teach it to their students. Because our teachers, they didn't learn Computer Science right? >> Right. >> And so we're asking them to teach the subject which is critically important in the 21st century. But it's a challenge. >> It is. Do you have any favorite stories of maybe a student or a teacher or both that tried this and their eyes were opened, "Wow, this is way more than I thought it was." >> So, there's a local teacher near Seattle, his name is Juan and he also was not a Computer Scientist. He had never taken Computer Science, I think he was teaching Political Science. I'm not sure, but I think that's what he was teaching. And he came to our workshops and he said, "Hey, I can do this. I can teach Computer Science." And we have one week workshops over the summer to help the teachers learn how to teach it. And curriculum and professional development that we provide for schools at no cost to the school to help them get started teaching Computer Science. And he took that leap and he did it. And he said, he went into one of his classes and he's in a district that is mostly under represented minorities and he looked at his class, and his class was all male and there were not very many of the under represented minorities in his class and he said, "Well, I've got to fix this." So he went out and he went to the choir class and he found this woman, our Sally and he said to her, "Hey why are you not in Computer Science right now?" and she said, "Oh, I don't know. I don't even like to sing." >> Oh my gosh, wow. >> So he just marched her right up. He got the form, he switched her over to Computer Science. He got her friend Daisy, he got a whole bunch of women in his class. And they loved it. And our Sally took that class and she kept going and she took Python. >> Wow. >> And she's applying to colleges right now and she wants to be a Computer Science major. >> That's amazing. Recruiting from choir. >> Right. And her parents never went to college. One of them never went to high school. And for her this is an opportunity to be part of all the things that we see in Silicon Valley. And I want to see her do it. >> Great story. Last question, the CloudNOW, and this is the Sixth Annual Top Women in Cloud Award. Congratulations on winning and how did you hear about this and what does it mean to you? >> I think it's a great award. I really love that CloudNOW is doing work to encourage equity and to encourage women in the tech space. I think that has a lot of synergy with the work we're doing at Code.org. Trying to encourage women and young women to be able to have this opportunity and be able to take these courses. And you know, it's okay if they don't want to go into the tech space. Most of them won't but if they have the opportunity to see these courses I hope some of them will be inspired and that when they are inspired they'll have that background, so they can. And for the other ones who go into all sorts of different fields, whether it be design or education or medicine, or marketing or who knows? Knowing how Computer Science works, I think is a critical set of skills for all people everywhere in this day and age. >> I agree. It'll be a great part of their foundation. Well, speaking of inspiration, you've been quite inspirational. Again congratulations Alice on the award and thank you for stopping by the Cube. >> Thanks. >> You've been watching the Cube a lot and we're on ground at Google for the six annual CloudNOW, Top Women in Cloud Awards. I'm Lisa Martin, thanks for joining. We'll be right back.
SUMMARY :
Very excited to be joined by one of the It's great to have you here but first of all should have the opportunity to learn Computer Science. and what inspires you to donate so much of your time or all the buzz words, you can feel like, that 25% of students in the US have an account and giving the students an opportunity to learn that that I've just learned about is the Hour of Code. or that you can do it. You can do that with code but you can also make apps Getting your toe wet maybe? and it's about the teachers and helping them teach it. And so we're asking them to teach the subject that tried this and their eyes were opened, and he said, "Well, I've got to fix this." He got the form, he switched her over to Computer Science. And she's applying to colleges right now Recruiting from choir. And for her this is an opportunity to be part Last question, the CloudNOW, and this is the and be able to take these courses. and thank you for stopping by the Cube. and we're on ground at Google
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Alice Steinglass | PERSON | 0.99+ |
Daisy | PERSON | 0.99+ |
Mexico | LOCATION | 0.99+ |
Alice | PERSON | 0.99+ |
Italy | LOCATION | 0.99+ |
Seattle | LOCATION | 0.99+ |
America | LOCATION | 0.99+ |
Sally | PERSON | 0.99+ |
21st century | DATE | 0.99+ |
US | LOCATION | 0.99+ |
25% | QUANTITY | 0.99+ |
Juan | PERSON | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Last year | DATE | 0.99+ |
one week | QUANTITY | 0.99+ |
500 people | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
one hour | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
One hour | QUANTITY | 0.99+ |
CloudNOW | ORGANIZATION | 0.99+ |
Oakland School District | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
This week | DATE | 0.99+ |
Italian Government | ORGANIZATION | 0.99+ |
thousands of students | QUANTITY | 0.98+ |
BBS | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
ORGANIZATION | 0.98+ | |
Code.org | ORGANIZATION | 0.98+ |
tonight | DATE | 0.98+ |
ORGANIZATION | 0.97+ | |
CloudNOW Top Women and Cloud Awards | EVENT | 0.97+ |
Code.Org | ORGANIZATION | 0.96+ |
about 15 years | QUANTITY | 0.96+ |
one | QUANTITY | 0.96+ |
CloudNOW Awards 2017 | EVENT | 0.95+ |
The Cube | ORGANIZATION | 0.95+ |
San Francisco | LOCATION | 0.94+ |
Python | TITLE | 0.93+ |
today | DATE | 0.93+ |
Hour of Code | EVENT | 0.92+ |
tens of millions of students | QUANTITY | 0.92+ |
one person | QUANTITY | 0.92+ |
one way | QUANTITY | 0.9+ |
Hour of Code | TITLE | 0.89+ |
CloudNOW | EVENT | 0.87+ |
Programa Il futuro | ORGANIZATION | 0.87+ |
over two years ago | DATE | 0.87+ |
Google Headquarters | LOCATION | 0.82+ |
over a 100,000 different | QUANTITY | 0.79+ |
six annual | QUANTITY | 0.77+ |
Fibonacci | PERSON | 0.77+ |
Italian | LOCATION | 0.75+ |
President | PERSON | 0.66+ |
one of the award winners | QUANTITY | 0.63+ |
Top Women in Cloud Award | TITLE | 0.63+ |
them | QUANTITY | 0.6+ |
Hour of | EVENT | 0.59+ |
Series | TITLE | 0.58+ |
sixth | QUANTITY | 0.58+ |
Sixth | QUANTITY | 0.57+ |
Cloud Awards | EVENT | 0.56+ |
K12 | OTHER | 0.55+ |
Annual | EVENT | 0.5+ |
Cube | ORGANIZATION | 0.46+ |
Top Women in | TITLE | 0.45+ |
annual | EVENT | 0.39+ |
Cube | COMMERCIAL_ITEM | 0.37+ |