Image Title

Search Results for FortiGate 6000:

Vince Hwang | KubeCon + CloudNativeCon NA 2021


 

>>Good morning from Los Angeles, Lisa Martin here at Qube con cloud native con north America, 2021. This is the cubes third day, a wall-to-wall coverage. So great to be back at an event in person I'm excited to be joined by Vince Wang, senior director of products at 49. We're going to talk security and Kubernetes then welcome to the program. >>Thank you for having me. >>So I always love talking to 40 minutes. Cybersecurity is something that is such an impersonal interest of mine. The fording that talks about the importance of integrating security and compliance and the dev sec ops workflow across the container life cycle. Why is this important and how do you help companies achieve it? >>Well, as companies are making digital innovations, they're trying to move faster and as to move faster, or many companies are shifting towards a cloud native approach, uh, rapid integrations, rapid development, and rapid deployment, uh, but sometimes speed, you know, there's a benefit to that, but there's also the downside of that, where, you know, you can lose track of issues and you can, uh, introduce a human error in a problem. So as part of the, as part of the, the, the means to deliver fast while maintaining his six year approach, where both the company and the organizations delivering it and their end customers, it's important to integrate security throughout the entire life cycle. From the moment you start planning and development, and people's in process to when you're developing it and then deploying and running in production, um, the entire process needs to be secured, monitored, and, um, and vetted regularly with good quality, um, processes, deep visibility, and an integrated approach to the problem. Um, and I think the other thing to also consider is in this day and age with the current situation with COVID, there's a lot of, uh, development of employment in terms of what I call NASA dental Baltic cloud, where you're deploying applications in random places, in places that are unplanned because you need speed and that, uh, diversity of infrastructure and diversity of, uh, of clouds and development and things to consider then, uh, produces a lot of, uh, you know, uh, opportunities for security and, and challenges to come about. >>And we've seen so much change from a security perspective, um, the threat landscape over the last 18 months. So it's absolutely critical that the integration happens shifting left. Talk to us about now let's switch topics. Application teams are adopting CIC D uh, CICB workflows. Why does security need to be at the center of that adoption? >>Well, it goes back to my earlier point where when you're moving fast, your organizations are doing, um, you're building, deploying, running continuously and monitoring, and then improving, right? So the idea is you're, you're creating smaller, incremental changes, throwing it to the cloud, running it, adjusting it. So then you're, you're rapidly integrating and you're rapidly developing and delivery. And again, it comes down to that, that rapid nature, uh, things can happen. There's, there's more, uh, more points of touching and there's more points of interactions. And, you know, and again, when you're moving that fast, it's really easy to, um, miss things along the way. So as you have security as a core fundamental element of that DNA, as you're building it, uh, that that's in parallel with everything you're doing, you just make sure that, um, when you do deliver something that is the most secure application possible, you're not exposing your customers or your organizations to unforeseen risks that just kind of sits there. >>Uh, and I think part of that is if you think about cloud infrastructure, misconfiguration is still number one, uh, biggest problem with, uh, with security on the, in the cloud space, there's, uh, tasks and vulnerabilities those, we all know, and there's there's means to control that, but the configurations, when you're storing the data, the registries, all these different considerations that go into a cloud environment, those are the things that organizations need visibility on. And, um, the ability to, to adopt their processes, to be proactive in those things and know what they, uh, do. They just need to know what, what then, where are they're operating in, um, to kind of make these informed decisions. >>That visibility is key. When you're talking with customers in any industry, what are the top three, let's say recommendations to say, here's how you can reduce your exposure to security vulnerabilities in the CIS CD pipeline. What are some of the things that you recommend there to reduce the risk? >>There's a couple, oh, obviously security as a fundamental practice. We've been talking about that. So that's number one, key number. The second thing that I would say would be, uh, when you're adopting solutions, you need to consider the fact that there is a very much of a heterogeneous environment in today's, uh, ecosystem, lots of different clouds, lots of different tools. So integration is key. The ability to, um, have choices of deployment, uh, in terms of where you wanted to play. You don't want to deploy based upon the technology limitations. You want to deploy and operate your business to meet your business needs and having the right of integrations and toolings to, uh, have that flexibility. Now, option is key. And I think the third thing is once you have security, the choices, then you can treat, you create a situation where there's a lot of, uh, you know, process overhead and operational overhead, and you need a platform, a singular cybersecurity platform to kind of bring it all in that can work across multiple technologies and environments, and still be able to control at the visibility and consolidate, uh, policies and nationally consistent across all closet points. >>So we're to the DevOps folks, what are some of the key considerations that they need to take into >>Account to ensure that their container strategy isn't compromising security? Well, I think it comes down to having to think outside of just dev ops, right? You have to, we talk about CIC D you have to think beyond just the build process beyond just where things live. You have to think continuous life cycles and using a cyber security platform that brings it together, such as we have the Fortinet security fabric that does that tying a lot of different integration solutions. We work well within their core, but theirs have the ability to integrate well into various environments that provide that consistent policies. And I think that's the other thing is it's not just about integration. It's about creating that consistency across class. And the reality is also for, I think today's dev ops, many organizations are in transition it's, you know, as, as much as we all think and want to kind of get to that cloud native point in time, the reality is there's a lot of legacy things. >>And so dev ops set ups, the DevSecOps, all these different kind of operational functions need to consider the fact that everything is in transition. There are legacy applications, they are new cloud native top first type of application delivery is using containers of various technologies. And there needs to be a, again, that singular tool, the ability to tie this all together as a single pane of glass, to be able to then navigate emerge between legacy deployments and applications with the new way of doing things and the future of doing things with cloud native, uh, and it comes down again to, to something like the Fortinet security fabric, where we're tying things together, having solutions that can deploy on any cloud, securing any application on any cloud while bringing together that consistency, that visibility and the single point management, um, and to kind of lower that operational overhead and introduce security as part of the entire life cycle. >>Do you have a Vincent example of a customer that 49 has worked with that has done this, that you think really shows the value of what you're able to enable them to achieve? >>We do. We do. We have lots of customers, so can name any one specific customer for various reasons, you know, it's security after all. Um, but the, the most common use cases when customers look at it, that when you, we talked to a CIO, CSO CTO is I think that's a one enter they ask us is, well, how do we, how do we manage in this day and age making these cloud migrations? Everyone? I think the biggest challenge is everyone is in a different point in time in their cloud journey. Um, there's if you talk to a handful of customers or a rueful customers, you're not going to find one single organization that's going to be at the same point in time that matches them yet another person, another organization, in terms of how they're going about their cloud strategies, where they're deploying it at what stage of evolution there are in their organizational transformations. >>Um, and so what they're looking for is that, that that's the ability to deploy and security any application on any topic throughout their entire application life cycle. Um, and so, so the most common things that, that our customers are looking for, um, and, you know, they're doing is they're looking to secure things on the network and then interconnected to the cloud with, uh, to deliver that superior, uh, application experience. So they were deploying something like the security fabric. Uh, again, you know, Fordanet has a cybersecurity approach to that point and securing the native environments. They're looking at dev ops, they're deploying tooling to provide, uh, you know, security posture management, plus a few posture management to look at the things that are doing that, the registries, their environment, the dev environment, to then securing their cloud, uh, networks, uh, like what we do with our FortiGate solutions, where we're deploying things from the dev ops. >>I feel secure in the cloud environment with our FortiGate environments across all the various multitudes of cloud providers, uh, like, uh, AWS Azure, Google cloud, and that time that together with, with some secure, um, interconnections with SD LAN, and then tying that into the liver and productions, um, on the web application side. So it's a very much a continuous life cycle, and we're looking at various things. And again, the other example we have is because of the different places in different, uh, in terms of Tod journeys, that the number one key is the ability to then have that flexibility deployment to integrate well into existing infrastructure and build a roadmap out for, uh, cloud as they evolve. Because when you talk to customers today, um, they're not gonna know where they're going to be tomorrow. They know they need to get there. Uh, they're not sure how they're going to get there. And so what they're doing now is they're getting to cloud as quickly as they can. And then they're looking for flexibility to then kind of adjust and they need a partner like Fordanet to kind of bring that partnership and advisorship to, uh, to those organizations as they make their, their, their strategies clearer and, uh, adjust to new business demands. >>Yeah. That partnership is key there. So afforded it advocates, the importance of taking a platform approach to the application life cycle. Talk to me about what that means, and then give me like the top three considerations that customers need to be considering for this approach. >>Sure. Number one is how flexible is that deployment in terms of, do you, do customers have the option to secure and deploy any application, any cloud, do they have the flexibility of, um, integrating security into their existing toolings and then, uh, changing that out as they need, and then having a partner and a customer solution that kind of grows with that? I think that's the number one. Number two is how well are these, uh, integrations or these flexible options tied together? Um, like what we do with the security fabric, where everything kind of starts with, uh, the idea of a central management console that's, you know, uh, and consistent policies and security, um, from the get-go. And I think the third is, is looking at making sure that the, the, the security integrations, the secure intelligence is done in real time, uh, with a quality source of information, uh, and, and points of, uh, of responsiveness, um, what we do with four guard labs. >>For example, we have swell of large, um, machine learning infrastructure where have supported by all the various customer inputs and great intelligence organizations, but real time intelligence and percussion as part of that deployment life cycle. Again, this kind of really brings it all together, where organizations looking for application security and, and trying to develop in a CSED fashion. And you have the ability to then have security from the get, go hide ident to the existing toolings for flexibility, visibility, and then benefits from security all along the way with real time, you know, uh, you know, leading edge security, that then kind of brings that, that sense of confidence and reassurance as they're developing, they don't need to worry about security. Security should just be part of that. And they just need to worry about solving the customer problems and, uh, and, you know, delivering business outcomes and results. >>That's it, right? It's all about those business outcomes, but delivering that competence is key. Vince, thank you for joining me on the program today, talking through what 49 is doing, how you're helping customers to integrate security and compliance into the dev dev sec ops workflow. We appreciate your insights. >>Thank you so much for your time. I really appreciate it. My >>Pleasure for vents Wang. I'm Lisa Martin. You're watching the cube live from Los Angeles, uh, cube con and cloud native con 21 stick around at Dave Nicholson will join me next with my next guest.

Published Date : Oct 22 2021

SUMMARY :

So great to be back at an event in person I'm excited to be joined by Vince Wang, So I always love talking to 40 minutes. and things to consider then, uh, produces a lot of, uh, need to be at the center of that adoption? Well, it goes back to my earlier point where when you're moving fast, your organizations Uh, and I think part of that is if you think about cloud infrastructure, misconfiguration let's say recommendations to say, here's how you can reduce your exposure to security vulnerabilities And I think the third thing is once you have security, the choices, You have to, we talk about CIC D you have to think beyond just the build process beyond And there needs to be a, again, that singular tool, the ability to tie this all together as Um, there's if you talk to a handful of customers or a rueful customers, you're not going to find one single and then interconnected to the cloud with, uh, to deliver that superior, They know they need to get there. Talk to me about what that means, and then give me like the top three considerations that and points of, uh, of responsiveness, um, what we do with four guard labs. And they just need to worry about solving the customer problems and, uh, and, you know, to integrate security and compliance into the dev dev sec ops workflow. Thank you so much for your time. uh, cube con and cloud native con 21 stick around at Dave Nicholson will join me next

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

VincePERSON

0.99+

Vince WangPERSON

0.99+

Vince HwangPERSON

0.99+

NASAORGANIZATION

0.99+

six yearQUANTITY

0.99+

Los AngelesLOCATION

0.99+

40 minutesQUANTITY

0.99+

FordanetORGANIZATION

0.99+

tomorrowDATE

0.99+

third dayQUANTITY

0.99+

second thingQUANTITY

0.99+

Dave NicholsonPERSON

0.99+

thirdQUANTITY

0.98+

CloudNativeConEVENT

0.98+

todayDATE

0.98+

bothQUANTITY

0.98+

KubeConEVENT

0.98+

2021DATE

0.98+

third thingQUANTITY

0.98+

north AmericaLOCATION

0.97+

threeQUANTITY

0.97+

Qube con cloud native conORGANIZATION

0.94+

top threeQUANTITY

0.89+

CIC DTITLE

0.89+

FortinetORGANIZATION

0.88+

last 18 monthsDATE

0.88+

BalticLOCATION

0.86+

coupleQUANTITY

0.86+

cloud native conEVENT

0.85+

VincentPERSON

0.83+

cube conEVENT

0.82+

WangPERSON

0.81+

FortiGateORGANIZATION

0.81+

single paneQUANTITY

0.8+

oneQUANTITY

0.8+

NA 2021EVENT

0.79+

first typeQUANTITY

0.77+

Number twoQUANTITY

0.76+

GoogleORGANIZATION

0.76+

encePERSON

0.76+

four guard labsQUANTITY

0.75+

KubernetesORGANIZATION

0.74+

singleQUANTITY

0.73+

DevSecOpsTITLE

0.7+

one specific customerQUANTITY

0.69+

one single organizationQUANTITY

0.68+

cubesORGANIZATION

0.64+

number oneQUANTITY

0.63+

AWS AzureORGANIZATION

0.58+

COVIDOTHER

0.57+

49PERSON

0.56+

49QUANTITY

0.52+

49ORGANIZATION

0.52+

singularQUANTITY

0.52+

cloudTITLE

0.5+

CICBTITLE

0.41+

Harry Dewhirst, Linksys | Fortinet Security Summit 2021


 

>>From around the globe. It's the cube covering Fortinet security summit brought to you by Fortinet. >>Welcome back to Napa Lisa Martin here at the 40, that championship security summit. I'm pleased to welcome the CEO of links us who joins me next. Harry do Hurst, Harry, welcome to the program. Great to you're here we are in an in-person event. One, which is fantastic. Two we're outdoors, three we're in Napa. >>What's not to love. >>There's nothing, nothing not to love. So you had a session this morning. Talk to me about some of the things that you shared with attendees. >>So the session was, was talking about hybrid work and really the how to make that successful. And, you know, we, as a business have really focused making it, not just work for companies, but for companies to thrive and to really embrace, um, the hybrid work and, and, and extract the Mo the most benefit from it. So we, we spoke about the challenges that, that, that, uh, that has, and some of the solutions to, uh, to solving those challenges. >>Tell me about some of the solutions I'm very familiar with as someone who has been working from home for 18 months, some of the challenges I know, understand it too, from an enterprise security perspective, but what are some of the solutions that links us CS? >>So the solutions are fall into kind of three main categories. The first is of course having the best and latest wireless technologies. So that's wifi six wifi, um, it's of course, needs to be coupled with having a good pipe into your home, or all leveraging 5g and other wireless technologies to have, have great connectivity, then having mesh networking to enable it to be wall-to-wall coverage, seamless roaming between, between all the devices to mean that your, your network infrastructure within the home is very robust. Th th the second kind of pillar of, of, of solution is, is around. Now, you can bring enterprise grade security into the home. Typically it would sit in server cupboards in, in, in, in offices and now, um, with, with us and fortunate, we've created a product which brings that enterprise grade technology for the first time into the, into the home. So it managers no longer have to, um, compromise when it comes to security and they can apply the same policies that they would be doing in an office of 10,000 people to 10,000 offices that are in individual's homes. And, and that's a kind of a first, first world first, I would say, but, um, is going to be critical. And again, it, it, it's about moving from it's good enough to let's make it amazing. Um, and let's not compromise on something as critical as security and safety. >>Absolutely. We know we've spoken a lot with 40 net today and over the last year and a half about the massive changes to the threat landscape, the expansion of it, especially with this pivot, when suddenly there were all of these devices, personal devices on home networks, corporate devices on home networks, it's really changed, not just the threat landscape, but also what enterprises need to do. You guys, you mentioned this new announcement came out yesterday, the Linx has homework solution powered by Fordanet talk to us about that, the Genesis of it, and what we're enterprises can actually get access to this. >>Sure. So, so yeah, this is a product that really it's been a meeting of minds. You know, lynxes, lynxes are a leader and have been a leader since the very beginning of wireless. And, and we are, you know, a leader today. Um, Fortnite of course, we're a leader in enterprise security. So the two combined providing the best in class, uh, home internet experience coupled with, um, the, the security, which can be managed by the business. So when as a, as a, as an end user, as a, as a, as an employee, when I plug in this equipment, it automatically phones home to, to, to, to link LyncSys. And then in turn to force net, we know that it's Harriet LyncSys, that that has been been plugged in. It will spin up a network for me, personally, and my family to use in the home. So the, the benefit to the, to the, to the consumer is that there's a fantastic wifi, six mesh solution throughout their home, which is most likely a significant upgrade on their Verizon equipment or whatever it might be. Um, and it's been spins up a corporate network and that corporate network for all intensive purposes is, is imitating exactly like if you were sitting at your desk in the office, in the corporate office. So it becomes an extension of the corporate network. Um, and as I say, it sits behind, behind the FortiGate. >>Talk to me about the Genesis of the solution. Was it the pandemic, because lynxes has seen the challenges from the consumer centric point of view. Talk to me about really kind of the catalyst for these two powerhouses coming together. >>So it was actually something that we were working on three pandemic and fortunate work. We're, we're, we're also looking at how to support the remote work because remote work is not like totally new, this, this pandemic has rapidly accelerated it, but, um, there was already a market and growing, this has just accelerated it. So both businesses independently of one another, where we're kind of toying with it. So when, when we then kind of came together, it was, it was a no brainer. And there was a kind of light bulb moment. And, and we, we realized that the combined solution with the two businesses and bringing together the expertise from both was really, would be how, how we would succeed. >>Do you see any in the last, I know it was just announced yesterday, but any, any industries in particular that you think are really like low-hanging fruit for this type of technology? >>I mean, I think finance is of course, um, you know, there's the high stakes poker in, in that industry. So, um, same goes for healthcare, um, and, and, and even education. So ones that where security is paramount of, and of course security is paramount everywhere, but those ones in particular, given the nature of, of the, those industries. So, so we really expect to see banking, finance, healthcare, uh, pharma, as, as key verticals that we would, uh, we would expect to be successful. >>Okay, excellent. Well, one of the challenges with the ransomware increases, the 40 net threat landscape report showed it's nearly up 11% in the last 12 months. Of course, we have that rapid pivot to work from home 18 months ago, and ransomware and phishing and, and techniques and social engineering getting so much more sophisticated and personalized. Now you've got someone working from home who probably has a million distractions, kids, spouses, et cetera. So easy to click on a link that for most of it looks very legitimate. So having a solution like this in place is really critical for >>Absolutely. And, and I think, you know, until those vulnerabilities are sealed, you know, the attacks will continue. And this solution is part of the, the, the soul for that. Because as soon as, as soon as these, these holes in the bucket of a tape shut, um, you know, the, the appetite to, to invest time in, in attacks, we'll, we'll, we'll fade, >>Hopefully that's the direction that we need to see it going, right. Not up until the right down. Talk to me about, so you mentioned from the it perspective, I'm looking for the benefits for an enterprise, it organization, centralized visibility, they can see in terms of productivity. I imagine it's much better for the end user, but give me that kind of it business perspective, how does this help them come together? >>So for all intents and purposes, the it manager will see within their, their fortunate, uh, interface, these devices, these links devices in people's homes, just in the same way that they would see 40 gates in their office in New York or their office in Pittsburgh. So, um, you know, it really is this, there were 15,000 people in five offices. There's now 15,000 people in 15,000 offices, and, but they can push and manage an and, and push those security, um, policies seamlessly down to all 15,000. They can categorize them. They can, they can do fall intensive purposes. Those, those employees are sitting in the, in one of their facilities. And, and that's really the, the bar that I believe companies should be holding themselves to because, um, it, it provides security for the company. It provides security for the employee, and of course, then by them being able to connect efficiently and secure securely and with great speed and no interruption, that's good for productivity, which is good for the company's profitability. >>Absolutely. It's all interconnected. And this is tuned for video conferencing. Is that >>Yes. So, so we've actually partnered with, um, both zoom and teams, Microsoft teams to, um, we've done an integration with them whereby we're able to identify and optimize that traffic within the network. So, so that adds an added benefit to, to users of those services. And we'll, we'll, we'll be rolling out further, um, partnerships with other key, um, utilities that enable that to optimization to, to, to help it be streamlined. >>So prioritize zoom and teams for the parents kick the kids >>Off. I mean, we've all experienced. The apple TV gets fired up, zoom goes down or, or fought for fortnight, uh, gaming sessions cause you know, havoc within the home. So it it's that application prioritization and optimization that, that I think will also really benefit, um, companies and the employees. The, the frustration is immense. >>I agree I've experienced some of that, but what you're really doing is providing a very secure lifeline that the enterprise needs, the employee needs. It, it's all tied together, productive employees, that our customer experience that our products and services it's, it's really these days, especially considering we don't know how much longer this is going to persist. We expect that there will be some amount of hybrid that will probably be permanent, but that's a lifeline. >>Yes, no, absolutely. I think to your point around the permanence of this, you know, of course we're not all going to be hermits and leave live at home forever, but that, you know, I think this has opened both companies and individuals eyes to what's possible. And I think if you implement these, these types of measures, then you you're setting it up for success. And, and, um, you know, I believe that the solution that we've launched is, is a part of the, the, the piece of the puzzle. >>Maybe the acceleration of it had a bit of a silver lining from what we've all experienced in the last 18 months. Yes. Yes. Talk to me about some of the comments and the feedback that you got from your session this morning. I'm sure people are very excited to hear about what you're doing. >>Yeah. I mean, since, since the announcement came out yesterday, there's been, there's been certainly a lot of interests in appetite. Um, and yeah, we're super excited about the reception it's received. Um, I think that a lot of people that are like, oh, wow, of course, why, why wouldn't this exist already? Um, and, and when you look at it like that, it kind of is obvious, but it, you know, no one expected of course the pandemic and therefore the, no one was ready for it and it's taken us a year or so to, to get a product that's, that's, that's viable and ready and going to be going to be really, really, um, a great utility for companies, but there really was nothing else out there. >>It is surprising in a sense, but then you're right. No one was prepared for the pandemic. We didn't see it coming. And we didn't think that this was a situation that we were going to have to prepare for, let alone live for as long as, as TBD, long as we have. >>Yeah, no, absolutely. That's um, I think it caught everyone by surprise. I think maybe if, if it had happened several years later than the hybrid work movement had started, it was in its infancy. It got very, very quickly ramped up to adulthood. >>I definitely >>Did. So, uh, so great news, very exciting. What you guys are doing with 49. I'm sure that there's going to be great customer feedback. We'll be excited to watch what happens as it gets deployed and rolled out and see how this really transforms the enterprise experience, the employee experience. And I imagine this is a great differentiator for links us business. No. Um, I think it's, it's a really exciting next chapter of, of our, of our history. You know, we've been around for 30 plus years and, um, I think this is, this is a real step change in, in, in where we're focused and I'm super excited about the future. >>I like that change in the future. Well, here we are in beautiful Napa. You said you're not a golfer, but your wife has, >>My wife is golfing. I I'm going to be keeping very many fingers crossed tomorrow during the program for this, for the safety of the spectators. >>That's awesome that she's in the program and here you are settled with all these meetings and all those >>Things. >>Exactly. Well, Harry, it's been a pleasure talking to you. Thank you for joining me on the program, explaining the links as homework solution powered by 49 and all the great things that are going to come from that. Thank you for Harry. Do Hurst. I'm Lisa Martin. You're watching the cube and Napa at the 40 minute security championship.

Published Date : Sep 14 2021

SUMMARY :

security summit brought to you by Fortinet. Welcome back to Napa Lisa Martin here at the 40, that championship security summit. Talk to me about some of the things that and some of the solutions to, uh, to solving those challenges. coverage, seamless roaming between, between all the devices to mean that a half about the massive changes to the threat landscape, the expansion of it, So it becomes an extension of the corporate network. Talk to me about the Genesis of the solution. So it was actually something that we were working on three pandemic and fortunate work. I mean, I think finance is of course, um, you know, there's the high So easy to click on a link that for most of it looks very legitimate. of a tape shut, um, you know, the, the appetite to, Talk to me about, so you mentioned from the it perspective, I'm looking for the benefits for an enterprise, It provides security for the employee, and of course, then by them being able to connect And this is tuned for video conferencing. to optimization to, to, to help it be streamlined. So it it's that application prioritization the enterprise needs, the employee needs. and, um, you know, I believe that the solution that we've launched is, is a part of the, the, Talk to me about some of the comments and the feedback you know, no one expected of course the pandemic and therefore the, And we didn't think that this was a situation that we were going to have to prepare for, I think maybe if, if it had happened several years later than the hybrid I'm sure that there's going to be great customer feedback. I like that change in the future. I I'm going to be keeping very many fingers crossed tomorrow during the program powered by 49 and all the great things that are going to come from that.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

HarryPERSON

0.99+

MicrosoftORGANIZATION

0.99+

PittsburghLOCATION

0.99+

New YorkLOCATION

0.99+

VerizonORGANIZATION

0.99+

NapaLOCATION

0.99+

five officesQUANTITY

0.99+

15,000 peopleQUANTITY

0.99+

15,000 peopleQUANTITY

0.99+

15,000 officesQUANTITY

0.99+

18 monthsQUANTITY

0.99+

yesterdayDATE

0.99+

two businessesQUANTITY

0.99+

lynxesORGANIZATION

0.99+

10,000 officesQUANTITY

0.99+

TwoQUANTITY

0.99+

tomorrowDATE

0.99+

a yearQUANTITY

0.99+

15,000QUANTITY

0.99+

Harry DewhirstPERSON

0.99+

bothQUANTITY

0.99+

twoQUANTITY

0.99+

FortinetORGANIZATION

0.99+

30 plus yearsQUANTITY

0.99+

10,000 peopleQUANTITY

0.99+

LinxORGANIZATION

0.99+

OneQUANTITY

0.99+

threeQUANTITY

0.99+

first timeQUANTITY

0.99+

40 gatesQUANTITY

0.98+

both businessesQUANTITY

0.98+

firstQUANTITY

0.98+

40 minuteQUANTITY

0.98+

six meshQUANTITY

0.98+

todayDATE

0.97+

this morningDATE

0.97+

both companiesQUANTITY

0.96+

18 months agoDATE

0.96+

two powerhousesQUANTITY

0.96+

LinksysORGANIZATION

0.95+

several years laterDATE

0.95+

second kindQUANTITY

0.94+

LyncSysTITLE

0.93+

oneQUANTITY

0.92+

pandemicEVENT

0.92+

40 netORGANIZATION

0.91+

40 net threatQUANTITY

0.88+

last 18 monthsDATE

0.88+

FortiGateORGANIZATION

0.86+

40EVENT

0.86+

three main categoriesQUANTITY

0.83+

11%QUANTITY

0.83+

last 12 monthsDATE

0.83+

Fortinet Security Summit 2021EVENT

0.82+

5gOTHER

0.8+

apple TVCOMMERCIAL_ITEM

0.79+

last year and a halfDATE

0.76+

Fortinet security summitEVENT

0.73+

49QUANTITY

0.72+

FordanetORGANIZATION

0.61+

HarrietPERSON

0.47+

FortniteORGANIZATION

0.46+

million distractionsQUANTITY

0.44+

Patrice Perche, Fortinet | Fortinet Accelerate 2019


 

>> Narrator: Live from Orlando, Florida. It's theCUBE. Covering Accelerate 19. Brought to you by Fortinet. >> Welcome back to theCUBE. We are live in Orlando, Florida for Fortinet Accelerate 2019. I'm Lisa Martin with my co-host for the day Peter Burroughs. Peter and I are pleased to welcome back to theCUBE Patrice Perche, the senior executive vice president of world wide sales and support from Fortinet. Patrice, it's a pleasure to have you, fresh from the Keynote Stage, here on theCUBE program. >> Yeah, well thank you for inviting me here. It's a great opportunity. >> So lots of people this morning and an energy infused keynote starting from all this loud music that I loved and helped wake me up, so thanks to your events team for that. About 4000 attendees, >> Patrice: Yeah. >> From 40 countries. You have a ton of partners here. You can hear a lot of the noise behind us. I'd like you to share with our audience the connection that you made in your keynote about what you guys shared last Accelerate 2018 and the connection to the world economic forum from just a few months ago. >> Okay well, the last year we definitely in fact exposed our strategy in term of the product, in term of the go to market and of course how we can increase in fact the value proposition to our customer, it was all about the fabric and the eco-system that we build around the fabric. So we have been of course since now 12 months working hard on expanding and growing what I call the Phase two of the fabric and when Cain went to Davos which the World Economic Forum is held early in January. And when we got all this, I would say a vision from Klaus Schwab which is the Chairman and Founder of the World Economic Forum. Explaining that the false revolution that we are all going through. The Cyber Security its a massive, I would say problem for them and it will be a key point for the future because they will enable, in fact, most of those take technology and use it that we will go for this revolution, so >> Peter: It's intrinsic. >> It's intrinsic, they call it guardian. So it really is something that if we can't, fix this problem, it's all about digital trust. So none of the user, you, myself we will not trust maybe voting system, or you cannot trust. We know that everything is going digital. And they expressed the need for of course the education, because you need to educate and you need to, increase the skilled people especially with cyber-security as we have a huge shortfall about 1.5million, some say even two million for next year. They need also need to work as an eco-system. So, for them the eco-system is really to see public, private collaboration but also Government, technologies, companies like us. And that's in fact the purpose of Davos. To bring all this different, in fact groups and be able to talk and share and define some line for the future. And for us of-course, the concept of the eco-system is all about building around in fact this major problem that we are facing, has all the traits. In fact, a collective approach where everybody can add value. We as a vendor we build technology, we build a lot of value but we can't be with each of the customers. So and we want to build a partnership not only with the partner but also with the customer because cyber security is a real time problem. So when something happen, you need to jump, and you need to make sure that all the line is set and then everybody can work together to fix the problem. So this eco-system really resonates value well for us after we was talking last year at the Accelerate. And the last I will say pillar for the Economic Forum is about of course Education and clearly I was mentioning one of the Engineers from the SERP which is nuclear agency in Europe Januity she said that 3D, of course the problem is that with these robots we will have a lot of jobs that will be omitted. So they talk about 800 million. So it's a massive number but it sees more than an opportunity to up-skill people. So the education is really helping of course especially the young generation to go and to up-skill it and especially on the cyber security. Because, as everything is going digital, we have to secure everything so it's really, these pieces will grow much beyond that what we think today. Those three pillars are the Education, the Eco-system and of course the Technology. And the good news is that Ken was representing in fact cyber security at the Davos, so it was also a great moment for us to see in fact pushing 14 at that stage of level of discussion so. Those three pillars: Education, Technology and Eco-system of course fit very well with our strategy that we build and that's why I decided to share a bit this morning. It's not everybody going to such a place. And what really resonate well in term of the strategy and the vision we are in fact pursuing so that's what we are doing. >> So I want to build on something that you said to do so I want to paraphrase. Peter who is much smarter than I am, Peter Drucker who observed many years ago there's a difference in strategies between what he called: value in exchange was his presumption that what I am selling is valuable. And value in utility which is a presumption that the value stems from how the something is used. And that notion of partnership that Fortinet has put in place with its customers so they can get value in utility is so crucially important. And you talked a bit this morning about you know the different levels of customization, and how you are going to allow customers to engage you and apply technology to suit their business. Could you take a bit about that especially based on your experience in the field? >> Yeah so as I mention I think we, it has been also our sales strategy from day one. So we always consider that in order to succeed, we need to work through the partners and through the people that are very close to our customer. And as technology evolves of course it's a real challenge to keep them at the level. Even for us, internally, we used to understand and be always at the top level about the new technology that we are putting in place. We imagine that, just for the employees, it's a challenge so we do a lot of training. But then for the partner it's another challenge. So, I think we have been always trying to help them to of course evolving on this expertise, but we don't see that the cloud of course there is a certain I will say a trend about Okay lets go Direct because we don't. The cloud can allow to sell direct to the customer so you don't need those channels. So there's no value for them. We don't see that in the cyber security because it's a much more complex environment and I think that is why we have been successful. We even see some of our competitor, they tempted to go on this direction. I think it's maybe one of the challenges we'll face in the future. So for us they key message I was trying to give this morning to the partner is really that we count on them, it's a partnership, it's very important and of course when we adapt our partner program we want to learn from them to make sure that the three pillars of this program will fit well with their, in fact, view because of course we are from a vendor in certain perspective, they have of course a different perspective on their side. What I was mentioning the goal to market because we see that some are very specialized on the cloud, some are specialized on the premise. We have to define what is the go to market here. What kind of expertise there are in fact having because as you can see we have very broad product of frame cover, you know from almost everything, so from OT, IT, even imbedded. So, we are working with partners that are, as an example, on the connected car. That's for maybe the next two years where we will secure those car. They are not the typical or traditional partner that you see on the networking business so, we try to adapt in fact our engagement with them and make sure that in fact we build a value proposition that can fit in fact for the customer requirement. So it's really about be very close and try to have a bit of a-la-carte kind of approach. And not try to enforce a very historical view that we had in fact, to be honest. But okay, you have like three tiers, depending of level of business and then you sign. So it's really moving away from that. >> I want to stay in this notion of partners because I think it's so crucially important. You talked about the skills that they have the capabilities that they have, but your partners in general are amongst the companies that have to learn the most about cyber security. Because they are the ones that are trying to match technology to the outcomes the customers have. That leads to a question about your education programs. I got to believe that there is, that even as you're trying to educate your enterprise customers, you're also really investing in your enterprise, in upgrading and up scaling your partnership. Talk a bit about the relationship of education and Eco-system from a very practical standpoint. >> Yeah so it's a very good point because of course we need to help them to evolve and as an example we have seen traditional IT partner, interested to evolve on this OT security but they didn't have too much skill so it was new for them. So we see the purpose of building this NSC training vocation course which we have eight level, which started in 2015 and we have about now almost 200 000 certified engineers. A very large portion of those Engineers come from partners. So, on this program, in fact the origin of the program, depending on where you want to play. If it's cloud, you will have to go for NSC4. If you want to go beyond a OT, it can be NSC5. We build in fact this expertise and we ask them also to of course follow those course so the engagement with us, the requirement will be also that they have the right certified Engineer. Depending on level of engagement they want to work with us. So we build this course which is a lot of work and we have a lot of, a big team to make this happen. We have to refresh constantly because it's evolving almost every day. But as for this, the great value, you may have seen it pass on the networking sites. Cisco made a bit similar approach, which was very successful. I think we went like three years ago on thinking about this and that's what we are achieving right now and we are in fact the most I will say advanced in such a report and I think it's all NSC certification is becoming a bit stand out in the market. Both from end-user but the partner. And even going as we was mentioning, we are also working with the Academics to build in fact and train in fact new Engineers that will come in the market in the next two to three years. So we help them on, it's not pure about product, it's really about cyber security expertise that we have and of course we help them on understanding a bit how the Fortinet value can deploy on the customer, so that aspect and we try to target of course young I will say people going for university but also veterans who we had program to bring those veterans because they're also looking we are talking about up skilling. That's a perfect example on bringing a change to them. And I think it's high level, maybe it's a bit, you know think that we have a high potential. But we want of course to help on resolving the overall challenge to be unemployed. I can tell you that if you invest time and you get a certification on cyber security you will never have any problems with a job. So that's a bit the overall idea we have behind this education and certification. And truly the partner, I will say, evolution in terms of their expertise, it's based about this NSC. >> Alright Patrice as we kind of get towards the end here, let's talk about outcomes. Peter mentioned that word, I know that when I was looking at my notes here that in Q4 of 2018, service providers, and managed security service providers represented 11 of the top 25 deals. You guys also closed a massive seven figure deal in Europe. Let's talk about outcomes that Fortinet and your partner eco-system are helping businesses achieve at the business level. Not just in terms of obviously improving security but are you helping businesses generate new revenue streams, skip to new products on market faster, identify attacks and become pro active? What is one of those really key outcomes that you are proud of? >> I think the, and I was part of the presentation last year. We all, I would say on this digital transformation journey. Whole company, even us. We're evolving with much more tools, much automation. So I think every sector, whether it's public or private company, has to go for this evolution. The biggest challenge is all about digital so again the blocking point is about security. So last year we explained about how we can help with positioning our platform in the security fabric to run to this obstacle and that was the purpose of the security transformation that we was talking last year. And I know it's some, even complete as relayed a message, it was interesting that it was part of all. So I think it was really trying to unlock this digital transformation that add business benefit because at the end this whole, those company will evolve in the future, generate more profit, be more efficient, leverage, I would say, the data that they are collecting from almost everywhere. From customer but also the sensor, and transform this to a more business intelligence and then I will say generate in fact future revenue and future dollars from that. That has been a bit the idea behind. So we definitely help on evolving and going through this digital transformation journey. I think we had few example of course as one of our customers, they deploying world wide on their gas-station. A better customer journey. Typically of course you calm, you try to make your gas and you want to be connected. And they try to increase of course by upselling a lot of things. So of course you have your go for the coffee machine, you can even buy many goods. We have been deploying you know, with secure access so they have secure access they go for the internet so that's where we play with segmentation. But our wireless which is fully connected also to the Fortigate and the analytic tools allow them to do business intelligence in term of where people are moving inside you know the shops. And then, you know, redesign and rethink about okay, how they move here. So that's, that allow them to accelerate even more business or decide that maybe this spot doesn't work well, so they push that to the side and they evolve. That's depicted the value of all this intelligence and we can grasp from the data that we collect to transform to a business value. >> So I want to make one comment before we close here and that is that I don't know the degree to which people really understand the relationship between secure networking and digital business. Data is an interesting asset. It could be shared, it could be copied, it could be easily corrupted. In many respects over the next five years we believe that people will recognize that network security is the basis for privatizing data. It is what you do to turn data into an asset. I don't think people have made that connection, to the degree that they need to. >> No I agree, I agree because maybe the mindset they think about network, they think about wired. In fact we are talking about 5G, we are talking about Wireless so the data is that what we want to protect because we don't want that people stole your personal information or even company. >> It's more than protect. You want to create the asset. >> Yes, we integrate the asset. And then of course when we talk about network it's no longer wires, of course it's much more virtual I would say networks. And that's the misinterpretation and why they feel okay the network is moving away. No, it's even more in the future. And as Cain mentioned early this morning: I think the edge will become much more important in future because the compute power that we are having now on every device and even. That will in fact allow to of course generate much more data. Yeah and you need to protect. You notice when you need to go and to consolidate this into the cloud. So it's really, the age will become a very important aspect. But this will be a hybrid and that's what we feel as Fortinet we've been building in fact the very comprehensive offer and to the partner and to our customer. We just want, in fact to give them the time to move at their pace. But they have everything ready for today. That's a bit the concept. >> Well if only we had more time Patrice, we could keep going and going. Thank you so much for sharing some time on the program today talking about your GTM, what you are doing to educate partners and customers and this tremendous potential that Fortinet is attacking. We appreciate your time. >> Thank you very much, I appreciate it too. >> We want to thank you for watching for Peter Burroughs, I'm Lisa Martin. You're watching theCUBE. (upbeat music)

Published Date : Apr 9 2019

SUMMARY :

Brought to you by Fortinet. Peter and I are pleased to welcome back to theCUBE Yeah, well thank you for inviting me here. so thanks to your events team for that. You can hear a lot of the noise behind us. in term of the go to market strategy and the vision we are in fact that the value stems from how the something is used. and make sure that in fact we build a value proposition You talked about the skills that they have So that's a bit the overall idea we have 11 of the top 25 deals. So of course you have your go for the coffee machine, I don't know the degree to which people about Wireless so the data is that what we want You want to create the asset. So it's really, the age will become a very important aspect. what you are doing to educate partners and customers We want to thank you for watching for

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

PeterPERSON

0.99+

CiscoORGANIZATION

0.99+

Patrice PerchePERSON

0.99+

2015DATE

0.99+

EuropeLOCATION

0.99+

PatricePERSON

0.99+

11QUANTITY

0.99+

FortinetORGANIZATION

0.99+

Peter DruckerPERSON

0.99+

Peter BurroughsPERSON

0.99+

last yearDATE

0.99+

Klaus SchwabPERSON

0.99+

KenPERSON

0.99+

two millionQUANTITY

0.99+

40 countriesQUANTITY

0.99+

Orlando, FloridaLOCATION

0.99+

12 monthsQUANTITY

0.99+

World Economic ForumORGANIZATION

0.99+

CainPERSON

0.99+

2019DATE

0.99+

next yearDATE

0.99+

14QUANTITY

0.98+

JanuityPERSON

0.98+

BothQUANTITY

0.98+

AccelerateORGANIZATION

0.98+

DavosLOCATION

0.98+

oneQUANTITY

0.97+

three tiersQUANTITY

0.97+

almost 200 000 certified engineersQUANTITY

0.97+

seven figureQUANTITY

0.97+

todayDATE

0.97+

About 4000 attendeesQUANTITY

0.97+

three years agoDATE

0.97+

three pillarsQUANTITY

0.97+

eight levelQUANTITY

0.97+

about 800 millionQUANTITY

0.96+

one commentQUANTITY

0.96+

theCUBEORGANIZATION

0.94+

eachQUANTITY

0.93+

three yearsQUANTITY

0.93+

about 1.5millionQUANTITY

0.93+

few months agoDATE

0.92+

DavosORGANIZATION

0.91+

Q4 of 2018DATE

0.91+

early this morningDATE

0.91+

day oneQUANTITY

0.89+

this morningDATE

0.89+

Keynote StageEVENT

0.86+

many years agoDATE

0.85+

AccelerateEVENT

0.84+

twoQUANTITY

0.83+

World Economic ForumEVENT

0.8+

partnersQUANTITY

0.76+

25 dealsQUANTITY

0.73+

NSC5TITLE

0.73+

Fortinet AccelerateORGANIZATION

0.71+

topQUANTITY

0.71+

FortigateORGANIZATION

0.68+

Accelerate 19TITLE

0.68+

NSC4TITLE

0.66+

next two yearsDATE

0.66+

next five yearsDATE

0.66+

early in JanuaryDATE

0.64+

Ken Xie, Fortinet | Fortinet Accelerate 2018


 

>>Live from Las Vegas. It's theCUBE. Covering Fortinet Accelerate 18. Brought to you by Fortinet. >> Welcome to Fortinet Accelerate 2018. I'm Lisa Martin with theCUBE and we're excited to be here doing our second year of coverage of this longstanding event. My cohost for the day is Peter Burris; excited to be co-hosting with Peter again, and we're very excited to be joined by the CEO, Founder, and Chief Chairman of Fortinet, Ken Xie, Ken welcome back to theCUBE. >> Thank you, Lisa, thank you, Peter. Happy to be here. >> It's great to be here for us as well, and the title of your Keynote was Leading the Change in Security Transformation, but something as a marketer I geeked out on before that, was the tagline of the event, Strength in Numbers. You shared some fantastic numbers that I'm sure you're quite proud of. In 2017, $1.8 in billing, huge growth in customer acquisitions 17.8 thousand new customers acquired in 2017 alone, and you also shared that Forinet protects around 90% of the Global S&P 100. Great brands and logos you shared Apple, Coca Cola, Oracle. Tell us a little bit more and kind of as an extension of your Keynote, this strength in numbers that you must be very proud of. >> Yeah, I'm an engineer background, always liked the number, and not only we become much bigger company, we actually has 25 to 30% global employment in a network security space. That give a huge customer base and last year sales grow 19% and we keeping leading the space with a new product we just announced today. The FortiGate 6000 and also the FortiOS 6.0. So all this changing the landscape and like I said last year we believe the space is in a transition now, they've got a new generation infrastructure security, so we want to lead again. We started the company 18 years ago to get into we called a UTM network firewall space. We feel infrastructure security is very important now. And that we want to lead in the transition and lead in the change. >> So growth was a big theme or is a big theme. Some of the things that we're also interesting is another theme of really this evolution, this landscape I think you and Peter will probably get into more the technology, but give our viewers a little bit of an extension of what you shared in your keynote about the evolution. These three generations of internet and network security. >> Yeah, when I first start my network security career the first company I was study at Stanford University, I was in the 20s. It was very exciting is that a space keeping changing and grow very fast, that makes me keeping have to learning everyday and that I like. And then we start a company call Net Screen when it was early 30s, that's my second company. We call the first generation network security which secured a connection into the trust company environment and the Net Screens a leader, later being sold for $4 billion. Then starting in 2000, we see the space changing. Basically you only secure the connection, no longer enough. Just like a today you only validate yourself go to travel with a ticket no longer enough, they need to see what you carry, what's the what's the luggage has, right. So that's where we call them in application and content security they call the UTM firewall, that's how Fortinet started. That's the second generation starting replacing the first generation. But compared to 18 years ago, since change it again and nowadays the data no longer stay inside company, they go to the mobile device, they go to the cloud, they call auditive application go to the IoT is everywhere. So that's where the security also need to be changed and follow the important data secure the whole infrastructure. That's why keeping talking from last year this year is really the infrastructure security that secure fabric the starting get very important and we want to lead in this space again like we did 18 years ago starting Fortinet. >> Ken, I'd like to tie that, what you just talked about, back to this notion of strength in numbers. Clearly the bad guys that would do a company harm are many and varied and sometimes they actually work together. There's danger in numbers Fortinet is trying to pull together utilizing advanced technologies, new ways of using data and AI and pattern recognition and a lot of other things to counter effect that. What does that say about the nature of the relationships that Fortinet is going to have to have with its customers going forward? How is that evolving, the idea of a deeper sharing? What do you think? >> Actually, the good guy also started working together now. We formed the they call it the Cyber Threat Alliance, the CTA, and Fortinet is one of the founding company with the five other company including Palo Alto Network, Check Point and McAfee and also feel a Cisco, there's a few other company all working together now. We also have, we call, the Fabric-Ready Program which has 42 big partners including like IBM, Microsoft, Amazon, Google, all this bigger company because to defend the latest newest Fabric threat you have to be working together and that also protect the whole infrastructure. You also need a few company working together and it's a because on average every big enterprise they deploy 20 to 30 different products from different company. Management cost is number one, the highest cost in the big enterprise security space because you have to learn so many different products from so many different vendor, most of them competitor and now even working together, now communicate together. So that's where we want to change the landscape. We want to provide how infrastructure security can work better and not only partner together but also share the data, share the information, share the intelligence. >> So fundamentally there is the relationship is changing very dramatically as a way of countering the bad actors by having the good actors work more closely together and that drives a degree of collaboration coordination and a new sense of trust. But you also mentioned that the average enterprise is 20 to 30 fraud based security products. Every time you introduce a new product, you introduce some benefits you introduce some costs, potentially some new threat surfaces. How should enterprises think about what is too many, what is not enough when they start thinking about the partnerships that needed put together to sustain that secure profile? >> In order to have the best protection today you need to secure the whole infrastructure, the whole cyberspace. Network security still the biggest and also grow very fast and then there's the endpoint and there's a like a cloud security, there's a whole different application, email, web and all the other cloud all the other IoT. You really need to make sure all these different piece working together, communicate together and the best way is really, they have to have a single panel of our management service. They can look at them, they can make it integrate together they can automate together, because today's attack can happen within seconds when they get in the company network. It's very difficult for human to react on that. That's where how to integrate, how to automate, this different piece, that is so important. That's where the Fabric approach, the infrastructure approach get very important. Otherwise, you cannot react quick enough, in fact, to defend yourself in a current environment. On the other side for your question, how many vendor do you have, I feel the less the better. At least they have to work together. If they're not working together, will make it even more difficult to defend because each part they not communicate and not react and not automate will make the job very, very difficult and that's where all this working together and the less vendor they can all responsible for all your security it's better. So that's where we see some consolidation in the space. They do still have a lot of new company come up, like you mentioned, there's close to 2,000 separate security company. A lot of them try to address the point solution. I mentioned there's a four different level engineer after engineer work there because I see 90% company they do the detection. There's a certain application you can detect the intrusion and then the next level is where they after you attack what are going to do about it. Is it really the prevention setting kick in automatic pull out the bad actor. After that, then you need to go to the integration because there's so many different products, so many different piece you need to working together, that's the integration. Eventually the performance and cost. Because security on average still cost 100 times more expensive under same traffic and also much slower compared to the routing switch in networking device. That's what the performance cost. Also starting in the highest level, that's also very difficult to handle. >> So, we're just enough to start with the idea of data integration, secure data integration amongst the security platform, so enough to do as little as possible, as few as possible to do that, but enough to cover all the infrastructure. >> Yes, because the data is all a whole different structure. You no longer does have to trust environment. Because even inside the company, there's so many different way you can access to the outside, whether it by your mobile device so there's a multiple way you can connect on the internet and today in the enterprise 90% connection goes to Wi-Fi now it's not goes to a wired network, that's also difficult to manage. So that's where we will hide it together and make it all working together it's very important. >> So, in the spirit of collaboration, collaborating with vendors. When you're talking with enterprises that have this myriad security solutions in place now, how are they helping to guide and really impact Fortinet's technologies to help them succeed. What's that kind of customer collaboration like, I know you meet with a lot of customers, how are they helping to influence the leading security technologies you deliver? >> We always want to listen the customer. They have the highest priority, they gave us the best feedback. Like the presentation they talked about there's a case from Olerica which is where they have a lot of branch office and they want to use in the latest technology and networking technology, SD-WAN. Are working together with security, that's ready the new trend and how to make sure they have all the availability, they have the flexibility software-defined networking there and also make sure to security also there to handle the customer data, that's all very important so that's what we work very closely with customer to response what they need. That's where I'm still very proud to be no longer kind of engineer anymore but will still try to build in an engineer technology company. Listen to the customer react quick because to handle security space, cyber security, internet security, you have to work to quickly react for the change, on internet, on application. So that's where follow the customer and give them the quick best solution it's very very important. >> On the customer side in Anaemia we talked about that was talked a little bit about this morning with GDPR are is around the corner, May 2018. Do you see your work coordinates work with customers in Anaemia as potentially being, kind of, leading-edge to help customers in the Americas and Asia-Pacific be more prepared for different types of compliance regulations? >> We see the GDPR as an additional opportunity, as a additional complement solution compared to all the new product technology would come up. They definitely gave us an additional business rate, additional opportunity, to really help customer protect the data, make the data stay in their own environment and the same time, internet is a very global thing, and how to make sure different country, different region, working together is also very important. I think it's a GDPR is a great opportunity to keeping expanding a security space and make it safer for the consumer for the end-user. >> So Ken as CEO Fortinet or a CEO was tough act, but as CEO you have to be worried about the security of your business and as a security company you're as much attacked, if not more attacked than a lot of other people because getting to your stuff would allow folks to get to a lot of other stuff. How do you regard the Fortinet capabilities inside Fortinet capability as providing you a source of differentiation in the technology industry? >> Yeah we keep security in mind as the highest priority within a company. That's where we develop a lot of product, we also internally use tests first. You can see from endpoint, the network side, the email, to the web, to the Wi-Fi access, to the cloud, to the IoT, it's all developing internally, it tests internally so the infrastructure security actually give you multiple layer protection. No longer just have one single firewall, you pass the fire were all open up. It's really multiple layer, like a rather the ransomware or something they had to pass multiple layer protection in order to really reach the data there. So that's where we see the infrastructure security with all different products and developed together, engineer working together is very important. And we also have were strong engineer and also we call the IT security team lead by Phil Cauld, I think you are being interview him later and he has a great team and a great experience in NSA for about 30 years, secure country. And that's where we leverage the best people, the best technology to provide the best security. Not only the portal side, also our own the internal security in this space. >> So, in the last minute or so that we have here, one of the things that Patrice Perce your global sales leader said during his keynote this morning was that security transformation, this is the year for it. So, in a minute or so, kind of what are some of the things besides fueling security transformation for your customers do you see as priorities and an exciting futures this year for Fortinet, including you talked about IoT, that's a $9 billion opportunity. You mentioned the securing the connected car to a very cool car in there, what are some of the things that are exciting to you as the leader of this company in 2018? >> We host some basic technology, not another company has. Like a built in security for a single chip. I also mentioned like some other bigger company, like a Google started building a TPU for the cloud computing and Nvidia the GPU. So we actually saw this vision 18 years ago when we start a company and the combine the best hardware and best technology with solve for all this service together. So, long term you will see the huge benefit and that's also like translate into today you can see all these technology enable us to really provide a better service to the customer to the partner and we all starting benefit for all this investment right now. >> Well Ken, thank you so much for joining us back on theCUBE. It's our pleasure to be here at the 16th year of the event, our second time here. Thanks for sharing your insight and we're looking forward to a great show. >> Thank you, great questions, it's the best platform to really promoting the technology, promoting the infrastructure security, thank you very much. >> Likewise, we like to hear that. For my co-host Peter Burris, I'm Lisa Martin, we are coming to you from Fortinet Accelerate 2018. Thanks for watching, stick around we have great content coming up.

Published Date : Mar 1 2018

SUMMARY :

Brought to you by Fortinet. My cohost for the day is Peter Burris; excited to be co-hosting with Peter again, and we're Happy to be here. It's great to be here for us as well, and the title of your Keynote was Leading the Yeah, I'm an engineer background, always liked the number, and not only we become much give our viewers a little bit of an extension of what you shared in your keynote about the they need to see what you carry, what's the what's the luggage has, right. What does that say about the nature of the relationships that Fortinet is going to have We formed the they call it the Cyber Threat Alliance, the CTA, and Fortinet is one of countering the bad actors by having the good actors work more closely together and that In order to have the best protection today you need to secure the whole infrastructure, amongst the security platform, so enough to do as little as possible, as few as possible Because even inside the company, there's so many different way you can access to the outside, how are they helping to influence the leading security technologies you deliver? They have the highest priority, they gave us the best feedback. On the customer side in Anaemia we talked about that was talked a little bit about this customer protect the data, make the data stay in their own environment and the same time, So Ken as CEO Fortinet or a CEO was tough act, but as CEO you have to be worried about You can see from endpoint, the network side, the email, to the web, to the Wi-Fi access, of the things that are exciting to you as the leader of this company in 2018? customer to the partner and we all starting benefit for all this investment right now. It's our pleasure to be here at the 16th year of the event, our second time here. promoting the infrastructure security, thank you very much. For my co-host Peter Burris, I'm Lisa Martin, we are coming to you from Fortinet Accelerate

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Peter BurrisPERSON

0.99+

IBMORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

PeterPERSON

0.99+

Lisa MartinPERSON

0.99+

CiscoORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

FortinetORGANIZATION

0.99+

2018DATE

0.99+

AppleORGANIZATION

0.99+

Ken XiePERSON

0.99+

$1.8QUANTITY

0.99+

McAfeeORGANIZATION

0.99+

KenPERSON

0.99+

OracleORGANIZATION

0.99+

20QUANTITY

0.99+

2017DATE

0.99+

Patrice PercePERSON

0.99+

25QUANTITY

0.99+

Net ScreenORGANIZATION

0.99+

Phil CauldPERSON

0.99+

May 2018DATE

0.99+

Coca ColaORGANIZATION

0.99+

90%QUANTITY

0.99+

$9 billionQUANTITY

0.99+

last yearDATE

0.99+

AmericasLOCATION

0.99+

Palo Alto NetworkORGANIZATION

0.99+

100 timesQUANTITY

0.99+

LisaPERSON

0.99+

Net ScreensORGANIZATION

0.99+

$4 billionQUANTITY

0.99+

19%QUANTITY

0.99+

CTAORGANIZATION

0.99+

2000DATE

0.99+

NvidiaORGANIZATION

0.99+

Check PointORGANIZATION

0.99+

second timeQUANTITY

0.99+

Las VegasLOCATION

0.99+

GDPRTITLE

0.99+

second companyQUANTITY

0.99+

ForinetORGANIZATION

0.99+

AnaemiaORGANIZATION

0.99+

about 30 yearsQUANTITY

0.99+

second yearQUANTITY

0.99+

18 years agoDATE

0.99+

first generationQUANTITY

0.99+

second generationQUANTITY

0.99+

todayDATE

0.98+

oneQUANTITY

0.98+

16th yearQUANTITY

0.98+

42 big partnersQUANTITY

0.98+

Stanford UniversityORGANIZATION

0.98+

30%QUANTITY

0.98+

each partQUANTITY

0.98+

early 30sDATE

0.98+

OlericaORGANIZATION

0.98+

this yearDATE

0.97+

30 different productsQUANTITY

0.97+

FortiOS 6.0COMMERCIAL_ITEM

0.96+

around 90%QUANTITY

0.96+

Cyber Threat AllianceORGANIZATION

0.96+

firstQUANTITY

0.95+

five other companyQUANTITY

0.95+

Daniel Bernard, SentinelOne & Bassil Habib, Tri City | Fortinet Accelerate 2018


 

(techno music) [Announcer] Live from Las Vegas, its the Cube! Covering Fortinet Accelerate 18. Brought to you buy Fortinet. >> Welcome back to the Cube's continuing coverage of Fortinet Accelerate 2018. I'm Lisa Martin joined by my cohost Peter Burris, and we have a very cozy set. Right now, I'd like to introduce you to our next guests, Daniel Bernard, the vice-president of business development for SentinelOne, and Basil Habib, you are the IT director at Tri City Foods. Gentleman, welcome to the Cube. >> Great to be here, thanks. >> We're excited to have you guys here. So first, Daniel first question to you. Tell us about SentinelOne, what's your role there, and how does SentinelOne partner with Fortinet? >> Sure, I run technologies integration and alliances. SentinelOne is a next generation endpoint protection platform company. Where we converge EPP and EDR into one agent that operates autonomously. So whether its connected to the internet or not, we don't rely on a cloud deliver solution. It works just as well online and offline. And we're there to disrupt the legacy AV players that have been in this market for 25 years with technology driven by artificial intelligence to map every part of the threat life cycle to specific AI capabilities, so we can stop attacks before they even occur. >> And your partnership with Fortinet, this is your first Accelerate, so talk to us about the duration of that partnership and what is differentiating-- >> Yeah. >> Lisa: For you. >> Its great to be here at Accelerate and also to work with Fortinet. We've been working with them for about a year and a half, and we're proud members of the Fortinet Security Fabric. What it means to us is that for enterprises, like Tri City Foods that we'll talk about, a defense and depth approach is really the way to go. Fortinet, leading edge, network security solutions. We have a very meaningful and exciting opportunity to work with Fortinet, given the breadth of our APIs. We have over 250 APIs, the most of any endpoint solution out there on the market. So the things we can enable within Fortinet's broad stack is really powerful. Fortinet has a lot of customers, a lot of endpoints in their environments to protect. So we're proud to partner with Fortinet to help go after those accounts together. To not only go into those accounts ourselves but also strengthen the security that Fortinet is able to offer their customers as well. >> If we can pivot on that for just a second. How do you-- how does SentinelOne help strengthen, for example, some of the announcements that came out from Fortinet this morning about the Security Fabric? How do you give an advantage to Fortinet? >> Sure. So where we come in, is we sit at the endpoint level and we're able to bring a lot of different pieces of intelligence to core and critical Fortinet assets. For example, with the Fortinet connector that we are going to be releasing tomorrow, so a little sneak peek on that right here on the Cube. The endpoint intelligence is actually through API to API connections able to go immediately into FortiSandbox and then be pushed to FortiGate. And that's in real time. So, whether an endpoint is inside of a network or running around somewhere in the world, whether its online or offline, a detection and a conviction we make through the SentinelOne client and the agent that actually sits on the endpoint, all the sudden is able to enrich and make every single endpoint inside of a Fortinet network much smarter and prone and also immune from attacks before they even occur. >> So as you think about that, how does it translate into a company like Tri City which has a large number of franchises, typically without a lot of expertise in those franchises, to do complex IT security but still very crucial data that has to be maintained and propagated. >> Well from Tri City's perspective, we look into security environment. And when you look into the Security Fabric between Fortinet and SentinelOne, that really helps us out a great deal. By looking into automating some of theses processes, mitigating some of these threats, that integration and the zero-day attack that can be prevented, that really helps us out day one. >> So tell us a little bit about Tri City. >> Well Tri City Foods is basically the second largest Franchisees for Burger King. We currently have approximately about 500 locations. Everybody thinks about Burger King as just the, you know, you go purchase Whopper. But nobody knows about all of the technology that goes in the back and in order to support that environment. You look into it, you got the Point of Sale, taking your credit card transaction, you got your digital menu board, you got all of the items in the back end, the drive-through. And we support all of those devices and we ensure that all of these are working properly, and operating efficiently. So if one of these devices is not functioning, that's all goes down. The other thing we do is basically we need to ensure that the security is up, most important for us. We're processing credit card transaction, we cannot afford to have any kind of issue to the environment. And this is, again, this is were SentinelOne comes into the picture where all of our devices down there are protected with the solution, as well as protecting the assets with Fortinet security. >> So I hear big environment complexity. Tell us about the evolution of security in your environment. You mention SentinelOne but how has that evolved as you have to, you said so many different endpoints that are vulnerable and there's personal information. Tell us about this evolution that you helped drive. >> The issue I put an end to when I first started on that is, we had the traditional antivirus. We had traditional antivirus, its just basically protecting what it knows about, it did not protect anything that is zero-day. We got in a head to a couple ransom wares. Which we are not willing to take any chances with the environment. That evolution came through as, no we cannot afford to have these type of system be taken down or be compromised. And we do like to assure the security of our clients. So this is, again, this is where we decided to go into the next gen and for protection. Ensuring the uptime and the security of the environment. >> But very importantly, you also don't have the opportunity to hire really, really expensive talent in the store to make sure that the store is digitally secure. Talk a little bit about what Daniel was talking about, relative to AI, automation, and some of the other features that you're looking for as you ensure security in those locations. >> The process to go down there is basically, we cannot expect everybody to understand security. So in order-- >> That's a good bet! (laughing) >> So in order to make-- >> While we're all here! >> That's right! >> So in order to make it easy for everybody to process the solutions, its best if we have to simplify as much as possible. We need to make sure its zero touch, we need to make sure that it works all the time, irrelevant to if you are on the network or off the network. We needed to make sure that its reliable and it works without any compromise. >> And very importantly, its multibonal right? It can be online, offline, you can have a variety of different operator characteristics, centralized, more regional. Is that all accurate? >> Multi-tenant, on-prem. >> Definitely. With every location, you got your local users, you have your managers, the district managers, they are mobile. These are mobile users that we have to protect. And in order to protect them we need to make sure that they are protected offline as well as online. And again, the SentinelOne client basically provided that security for us. It is always on, its available offline, and its preventing a lot of malware from coming in. >> Talk to us about, kind of the reduction in complexity and visibility. Cause I'm hearing that visibility is probably a key capability that you now have achieved across a pretty big environment. >> Correct. So, before with the traditional antivirus, you got on-prem solution. On-prem solution, in order to see that visibility, you have be logged in, you have to be able to access that solution, you have to be pushing application updates, signature updates, its very static. Moving into SentinelOne, its a successful solution. I don't have to touch anything, basically everything works in the background. We update the backend and just the clients get pushed, the updates get pushed, and its protected. I only have one engineer basically looking after the solution. Which is great in this environment. Because again, everywhere you go, up access is a big problem. So in order to reduce the cost, we need to make sure that we have that automation in place. We need to make sure that everything works with minimal intervention. That issues were mitigated dynamically without having any physical intervention to it. And this where the solution came in handy. >> So I'm hearing some really strong positive business outcomes. If we can kind of shift, Daniel, back to you. This is a great testimonial for how a business is continuing to evolve and grow at the speed and scale that consumers are demanding. Tell us a little bit on the SentinelOne side about some of the announcements that Fortinet has made today. For example, the Security Fabric, as well as what they announced with AI. How is that going to help your partnership and help companies like Tri City Foods and others achieve the visibility and the security that they need, at that scale and speed that they demand. >> Yeah I think Fortinet has very progressive approach when it comes to every part of their stack. What we see with the Fortinet Security Fabric is a real desire to work with best of breed vendors and bring in their capabilities so that customers can still utilize all the different pieces of what Fortinet offers, whether it be FortiGate, FortiSandbox, FortiMail, all these different fantastic products but compliment those products and enrich them with all these other great vendors here on the floor. And what we heard from Basil is what we hear from our other 2000 customers, these themes of we need something that's simple. With two people on the team, you can easily spend all your time just logging into every single console. Fortinet brings that light so seamlessly in their stack 20, 30 products that are able to be easily managed. But if you don't partner with a vendor like Fortinet or SentinelOne and your going into all these different products all day long, there's no time to actually do anything with that data. I think the problem in cyber security today is really one of data overload. What do you do with all this data? You need something that's going to be autonomous and work online and offline but also bring in this level of automation to connect all these different pieces of a security ecosystem together to make what Fortinet has very nicely labeled a Security Fabric. And that's what I believe is what's going inside Basil's environment, that's what we see in our 2000 customers and hopefully that's something that all of Fortinet's customers can benefit from. >> Basil, one of the many things that people think about is they associate digital transformation with larger businesses. Now, Tri City Food is not a small business, 500 Burger King franchises is a pretty sizable business, when you come right down to it. But how is SentinelOne, Fortinet facilitating changes in the in-store experience? Digital changes in the in-store experience? Are there things that you can now think about doing as a consequence of bringing this endpoint security into the store, in an automated, facile, simple way that you couldn't think about before? >> Actually yes, by using the Fortinet platform we deployed the FortiAPs. We have the FortiManager, we're looking into, basically, trying to manage and push all of the guest services, to provide guest services. Before we had to touch a lot of different devices, right now its just two click of a button and I'm able to provide that SSID to all of my stores. We're able to change the security settings with basically couple clicks. We don't have to go and manage 500 locations. I'm only managing a single platform and FortiManager, for instance, or FortiCloud. So this is very progressive for us. Again, when you're working with a small staff, the more automation and the more management you can do on the backend to simplify the environment, as well as providing the required security is a big plus for us. >> There's some key features that we've brought to market to help teams like Basil's. A couple ones that come to mind, our deep visibility capability where you can actually see into encrypted traffic directly from the endpoint, without any changes in network topography. That's something that's pretty groundbreaking. We're the only endpoint technology to actually do that, where you can actually threat hunt for IOCs and look around and see 70 percent of traffics encrypted today and that number is rising. You can actually see into all that traffic and look for specific data points. That's a really good example, where you can turn what you use to have to go to a very high level of SOC analyst and you can have anybody actually benefit from a tool like that. The other one that comes to mind is our rollback capability, where if something does get through or we're just operating in EDR mode, by customer choice, you can actually completely rollback a system to the previously noninfected, nonencrypted state directly from that central location. So whether that person is on an island or in Bermuda, or sitting in a store somewhere, if a system is compromise you don't need to re-image it anymore. You can just click rollback and within 90 seconds its back to where it was before. So, the time savings we can drive is really the key value proposition from a business outcome standpoint because you need all these different check boxes and more than check boxes, but frankly there's just not the people and the hours in the day to do it all. >> So, you said time savings affects maybe resource allocation. I'm wondering in terms of leveraging what you've established from a security standpoint as differentiation as Tri City is looking to grow and expand. Tell us a little bit about how this is a differentiator for your business, compared to your competition. >> I cannot speak to the competition. (all laughs) What I can speak to is, again, the differentiator for us as Daniel mentioned is basically, again, the automation pieces, the rollback features. The minimizing the threat analyses into the environment. All these features basically is going to make us more available for our customers, the environment is going to be secure and customers will be more than welcome to come into us and they know that their coming in their information is secure and their not going to be compromised. >> Well are you able to set up stores faster? Are you able to, as you've said, roll out changes faster? So you do get that common kind of view of things. >> We're at zero zero breach. >> We're at zero zero breach yes. So, basically, in order through a lot faster, we do it lock the source faster. We basically, with the zero touch deployment, that Fortinet is offering, basically send the device to the store, bring it online and its functional. We just push it out the door and its operational. With the SentinelOne platform, push the client to the store and set it and forget it. That is basically the best solution that we ever deployed. >> Set it and forget it. >> I like that. >> Set it and forget it. >> That's why you look so relaxed. (laughs) >> I can sleep at night. (all laugh) >> That's what we want to hear. >> Exactly. So Daniel, last question to you, this is your first Accelerate? >> It is our first Accelerate. >> Tell us about what excites you about being here? What are some of the things that you've heard and what are you excited about going forward in 2018 with this partnership? >> Yeah, well as we launch our Fortinet connector tomorrow, what really excites me about being here is the huge partner and customer base that Fortinet has built over the last 20 years. Customers and partners that have not only bought the first time, but they're in it to win it with Fortinet. And that's what we are too. I'm excited about the year ahead and enabling people like Basil to be able to sleep on the weekends because they can stitch they're security solutions together in a meaningful way with best of breed technologies and we're honored to be part of that Fortinet Security Fabric for that very reason. >> Well gentleman thank you both so much for taking the time to chat with us today and share your story at Accelerate 2018. >> Thanks a lot. >> Thank you. >> For this cozy panel up here, I'm Lisa Martin my cohost with the Cube is Peter Burris. You're watching us live at Fortinet Accelerate 2018. Stick around we will be right back. (techno music)

Published Date : Feb 28 2018

SUMMARY :

Brought to you buy Fortinet. Welcome back to the We're excited to have you guys here. to map every part of the threat life cycle So the things we can enable within for example, some of the all the sudden is able to data that has to be that integration and the in the back and in order to that you helped drive. We got in a head to a couple ransom wares. in the store to make sure that The process to go irrelevant to if you are on you can have a variety And in order to protect them a key capability that you now have So in order to reduce the cost, How is that going to help your partnership is a real desire to work in the in-store experience? on the backend to in the day to do it all. Tri City is looking to grow and expand. is going to make us more So you do get that common push the client to the store That's why you look I can sleep at night. So Daniel, last question to you, honored to be part of that time to chat with us today Stick around we will be right back.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
FortinetORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

Peter BurrisPERSON

0.99+

Burger KingORGANIZATION

0.99+

Tri CityORGANIZATION

0.99+

Daniel BernardPERSON

0.99+

Basil HabibPERSON

0.99+

LisaPERSON

0.99+

DanielPERSON

0.99+

25 yearsQUANTITY

0.99+

Tri City FoodsORGANIZATION

0.99+

Tri City FoodORGANIZATION

0.99+

BermudaLOCATION

0.99+

70 percentQUANTITY

0.99+

Las VegasLOCATION

0.99+

AccelerateORGANIZATION

0.99+

2018DATE

0.99+

SentinelOneORGANIZATION

0.99+

two peopleQUANTITY

0.99+

500 locationsQUANTITY

0.99+

firstQUANTITY

0.99+

first timeQUANTITY

0.99+

two clickQUANTITY

0.99+

todayDATE

0.98+

FortiManagerTITLE

0.98+

first questionQUANTITY

0.98+

over 250 APIsQUANTITY

0.98+

tomorrowDATE

0.98+

one engineerQUANTITY

0.98+

2000 customersQUANTITY

0.98+

zeroQUANTITY

0.98+

BasilORGANIZATION

0.97+

about a year and a halfQUANTITY

0.97+

bothQUANTITY

0.97+

first AccelerateQUANTITY

0.97+

one agentQUANTITY

0.97+

Bassil HabibPERSON

0.96+

90 secondsQUANTITY

0.96+

oneQUANTITY

0.96+

30 productsQUANTITY

0.95+

FortiCloudTITLE

0.95+

approximately about 500 locationsQUANTITY

0.95+

WhopperORGANIZATION

0.95+

stack 20QUANTITY

0.94+

DONOTPOSTKen Xie, Fortinet | Fortinet Accelerate 2018


 

>> (Narrator) Live from Las Vegas. It's theCUBE. Covering Fortinet Accelerate 18. Brought to you by Fortinet. >> Welcome to Fortinet Accelerate 2018. I'm Lisa Martin with theCUBE and we're excited to be here doing our second year of coverage of this longstanding event. My cohost for the day is Peter Burris; excited to be co-hosting with Peter again, and we're very excited to be joined by the CEO, Founder, and Chief Chairman of Fortinet, Ken Xie, Ken welcome back to theCUBE. >> Thank you, Lisa, thank you, Peter. Happy to be here. >> It's great to be here for us as well, and the title of your Keynote was Leading the Change in Security Transformation, but something as a marketer I geeked out on before that, was the tagline of the event, Strength in Numbers. You shared some fantastic numbers that I'm sure you're quite proud of. In 207, $1.8 in billing, huge growth in customer acquisitions 17.8 thousand new customers acquired in 2017 alone, and you also shared that Forinet protects around 90% of the Global S&P 100. Great brands and logos you shared Apple, Coca Cola, Oracle. Tell us a little bit more and kind of as an extension of your Keynote, this strength in numbers that you must be very proud of. >> Yeah, I'm an engineer background, always liked the number, and not only we become much bigger company, we actually has 25 to 30% global employment in a network security space. That give a huge customer base and last year sales grow 19% and we keeping leading the space with a new port out we just announced today. The FortiGate 6000 and also the FortiOS 6.0. So all this changing in the landscape and like I said last year we believe the space is in a transition now, they've got a new generation infrastructure security, so we want to lead again. We started the company 18 years ago to get into we called a UTM network firewall space. We feel infrastructure security is very important now. And that we want to lead in the transition and lead in the change. >> So growth was a big theme or is a big theme. Some of the things that we're also interesting is another theme of really this evolution, this landscape I think you and Peter will probably get into more the technology, but give our viewers a little bit of an extension of what you shared in your keynote about the evolution. These three generations of internet and network security. >> Yeah, when I first start my network security career the first company I was study at Stanford University, I was in the 20s. It was very exciting is that a space keeping changing and grow very fast, that makes me keeping have to learning everyday and that I like. And then we start a company call Net Screen when it was early 30s, that's my second company. We call the first generation network security which secured a connection into the trust company environment and the Net Screens a leader, later being sold for $4 billion. Then starting in 2000, we see the space changing. Basically you only secure the connection, no longer enough. Just like a today you only validate yourself go to travel with a ticket no longer enough, they need to see what you carry, what's the what's the luggage has, right. So that's where we call them in application and content security they call the UTM firewall, that's how Fortinet started. That's the second generation starting replacing the first generation. But compared to 18 years ago, since change it again and nowadays the data no longer stay inside company, they go to the mobile device, they go to the cloud, they call auditive application go to the IoT is everywhere. So that's where the security also need to be changed and follow the important data secure the whole infrastructure. That's why keeping talking from last year this year is really the infrastructure security that secure fabric the starting get very important and we want to lead in this space again like we did 18 years ago starting Fortinet. >> Ken, I'd like to tie that, what you just talked about, back to this notion of strength in numbers. Clearly the bad guys that would do a company harm are many and varied and sometimes they actually work together. There's danger in numbers Fortinet is trying to pull together utilizing advanced technologies, new ways of using data and AI and pattern recognition and a lot of other things to counter effect that. What does that say about the nature of the relationships that Fortinet is going to have to have with its customers going forward? How is that evolving, the idea of a deeper sharing? What do you think? >> Actually, the good guy also started working together now. We formed the they call it the Cyber Threat Alliance, the CTA, and Fortinet is one of the founding company with the five other company including Palo Alto Network, Check Point and McAfee and also feel a Cisco, there's a few other company all working together now. We also have, we call, the Fabric-Ready Program which has a 42 bigger partner including like IBM, Microsoft, Amazon, Google, all this bigger company because to defend the latest newest Fabric threat you have to be working together and that also protect the whole infrastructure. You also need a few company working together and it's a because on average every big enterprise they deploy 20 to 30 different products from different company. Management cost is number one, the highest cost in the big enterprise security space because you have to learn so many different products from so many different vendor, most of them competitor and now even working together, now communicate together. So that's where we want to change the landscape. We want to provide how infrastructure security can work better and not only partner together but also share the data, share the information, share the intelligence. >> So fundamentally there is the relationship is changing very dramatically as a way of countering the bad actors by having the good actors work more closely together and that drives a degree of collaboration coordination and a new sense of trust. But you also mentioned that the average enterprise is 20 to 30 fraud based security products. Every time you introduce a new product, you introduce some benefits you introduce some costs, potentially some new threat surfaces. How should enterprises think about what is too many, what is not enough when they start thinking about the partnerships that needed put together to sustain that secure profile? >> In order to have the best protection today you need to secure the whole infrastructure, the whole cyberspace. Network security still the biggest and also grow very fast and then there's the endpoint and there's a like a cloud security, there's a whole different application, email, web and all the other cloud all the other IoT. You really need to make sure all these different piece working together, communicate together and the best way is really, they have to have a single panel of our management service. They can look at them, they can make it integrate together they can automate together, because today's attack can happen within seconds when they get in the company network. It's very difficult for human to react on that. That's where how to integrate, how to automate, this different piece, that is so important. That's where the Fabric approach, the infrastructure approach get very important. Otherwise, you cannot react quick enough, in fact, to defend yourself in a current environment. On the other side for your question, how many vendor do you have, I feel the less the better. At least they have to work together. If they're not working together, will make it even more difficult to defend because each part they not communicate and not react and not automate will make the job very, very difficult and that's where all this working together and the less vendor they can all responsible for all your security it's better. So that's where we see some consolidation in the space. They do still have a lot of new company come up, like you mentioned, there's close to 2,000 separate security company. A lot of them try to address the point solution. I mentioned there's a four different level engineer after engineer work there because I see 90% company they do the detection. There's a certain application you can detect the intrusion and then the next level is where they after you attack what are going to do about it. Is it really the prevention setting kick in automatic pull out the bad actor. After that, then you need to go to the integration because there's so many different products, so many different piece you need to working together, that's the integration. Eventually the performance and cost. Because security on average still cost 100 times more expensive under same traffic and also much slower compared to the routing switch in networking device. That's what the performance cost. Also starting in the highest level, that's also very difficult to handle. >> So, we're just enough to start with the idea of data integration, secure data integration amongst the security platform, so enough to do as little as possible, as few as possible to do that, but enough to cover all the infrastructure. >> Yes, because the data is all a whole different structure. You no longer does have to trust environment. Because even inside the company, there's so many different way you can access to the outside, whether it by your mobile device so there's a multiple way you can connect on the internet and today in the enterprise 90% connection goes to Wi-Fi now it's not goes to a wired network, that's also difficult to manage. So that's where we will hide it together and make it all working together it's very important. >> So, in the spirit of collaboration, collaborating with vendors. When you're talking with enterprises that have this myriad security solutions in place now, how are they helping to guide and really impact Fortinet's technologies to help them succeed. What's that kind of customer collaboration like, I know you meet with a lot of customers, how are they helping to influence the leading security technologies you deliver? >> We always want to listen the customer. They have the highest priority, they gave us the best feedback. Like the presentation they talked about there's a case from Olerica which is where they have a lot of branch office and they want to use in the latest technology and networking technology. I see when I'm working together with security, that's ready the new trend and how to make sure they have all the availability, they have the flexibility software-defined networking there and also make sure to security also there to handle the customer data, that's all very important so that's what we work very closely with customer to response what they need. That's where I'm still very proud to be no longer kind of engineer anymore but will still try to build in an engineer technology company. Lesson to the customer react quick because to handle security space, cyber security, internet security, you have to be work quickly react for the change, on internet, on application. So that's where follow the customer and give them the quick best solution it's very very important. On the customer side in Anaemia we talked about that was talked a little bit about this morning with GDPR are is around the corner, May 2018. Do you see your work coordinates work with customers in Anaemia as potentially being, kind of, leading-edge to help customers in the Americas and Asia-Pacific be more prepared for different types of compliance regulations? >> We see the GDPR as an additional opportunity, as a additional complement solution compared to all the new product technology would come up. They definitely gave us an additional business rate, additional opportunity, to really help customer protect the data, make the data stay in their own environment and the same time, internet is a very global thing, and how to make sure different country, different region, working together is also very important. I think it's a GDPR is a great opportunity to keeping expanding a security space and make it safer for the consumer for the end-user. >> So Ken as CEO Fortinet or a CEO was tough act, but as CEO you have to be worried about the security of your business and as a security company you're as much attacked, if not more attacked than a lot of other people because getting to your stuff would allow folks to get to a lot of other stuff. How do you regard the Fortinet capabilities inside Fortinet capability as providing you a source of differentiation in the technology industry? >> Yeah we keep security in mind as the highest priority within a company. That's where we develop a lot of product, we also internally use tests first. You can see from endpoint, the network side, the email, to the web, to the Wi-Fi access, to the cloud, to the IoT, it's all developing internally, it tests internally so the infrastructure security actually give you multiple layer protection. No longer just have one single firewall, you pass the fire were all open up. It's really multiple layer, like a rather the ransomware or something they had to pass multiple layer protection in order to really reach the data there. So that's where we see the infrastructure security with all different products and developed together, engineer working together is very important. And we also have were strong engineer and also we call the IT security team lead by Phil Cauld, I think you are being interview him later and he has a great team and a great experience in NSA for about 30 years, secure country. And that's where we leverage the best people, the best technology to provide the best security. Not only the portal side, also our own the internal security in this space. >> So, in the last minute or so that we have here, one of the things that Patrice Perce your global sales leader said during his keynote this morning was that security transformation, this is the year for it. So, in a minute or so, kind of what are some of the things besides fueling security transformation for your customers do you see as priorities and an exciting futures this year for Fortinet, including you talked about IoT, that's a $9 billion opportunity. You mentioned the securing the connected car to a very cool car in there, what are some of the things that are exciting to you as the leader of this company in 2018? >> We host some basic technology, not another company has. Like a built in security for a single chip. I also mentioned like some other bigger company, like a Google started building a TPU for the cloud computing and Nvidia the GPU. So we actually saw this vision 18 years ago when we start a company and the combine the best hardware and best technology with solve for all this service together. So, long term you will see the huge benefit and that's also like translate into today you can see all these technology enable us to really provide a better service to the customer to the partner and we all starting benefit for all this investment right now. >> Well Ken, thank you so much for joining us back on theCUBE. It's our pleasure to be here at the 16th year of the event, our second time here. Thanks for sharing your insight and we're looking forward to a great show. >> Thank you, great questions, it's the best platform to really promoting the technology, promoting the infrastructure security, thank you very much. >> Likewise, we like to hear that. For my co-host Peter Burris, I'm Lisa Martin, we are coming to you from Fortinet Accelerate 2018. Thanks for watching, stick around we have great content coming up.

Published Date : Feb 27 2018

SUMMARY :

Brought to you by Fortinet. My cohost for the day is Peter Burris; Happy to be here. and the title of your Keynote was The FortiGate 6000 and also the FortiOS 6.0. Some of the things that we're also interesting they need to see what you carry, Ken, I'd like to tie that, what you just talked about, We formed the they call it the Cyber Threat Alliance, the bad actors by having the good actors and the best way is really, they have to have amongst the security platform, so enough to do Yes, because the data is all a whole different structure. the leading security technologies you deliver? They have the highest priority, they gave us and make it safer for the consumer for the end-user. a source of differentiation in the technology industry? the best technology to provide the best security. the things that are exciting to you as to the partner and we all starting benefit It's our pleasure to be here at the 16th year promoting the infrastructure security, thank you very much. we are coming to you from Fortinet Accelerate 2018.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
IBMORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

Peter BurrisPERSON

0.99+

Lisa MartinPERSON

0.99+

GoogleORGANIZATION

0.99+

PeterPERSON

0.99+

AppleORGANIZATION

0.99+

KenPERSON

0.99+

CiscoORGANIZATION

0.99+

Patrice PercePERSON

0.99+

OracleORGANIZATION

0.99+

McAfeeORGANIZATION

0.99+

20QUANTITY

0.99+

FortinetORGANIZATION

0.99+

2017DATE

0.99+

Net ScreenORGANIZATION

0.99+

Ken XiePERSON

0.99+

2018DATE

0.99+

May 2018DATE

0.99+

Phil CauldPERSON

0.99+

Coca ColaORGANIZATION

0.99+

90%QUANTITY

0.99+

Palo Alto NetworkORGANIZATION

0.99+

LisaPERSON

0.99+

25QUANTITY

0.99+

AmericasLOCATION

0.99+

$9 billionQUANTITY

0.99+

19%QUANTITY

0.99+

Check PointORGANIZATION

0.99+

NvidiaORGANIZATION

0.99+

100 timesQUANTITY

0.99+

last yearDATE

0.99+

Las VegasLOCATION

0.99+

$4 billionQUANTITY

0.99+

Net ScreensORGANIZATION

0.99+

second timeQUANTITY

0.99+

2000DATE

0.99+

CTAORGANIZATION

0.99+

GDPRTITLE

0.99+

second yearQUANTITY

0.99+

NSALOCATION

0.99+

todayDATE

0.99+

second companyQUANTITY

0.99+

18 years agoDATE

0.99+

AnaemiaORGANIZATION

0.99+

about 30 yearsQUANTITY

0.99+

first generationQUANTITY

0.99+

OlericaORGANIZATION

0.99+

ForinetORGANIZATION

0.99+

second generationQUANTITY

0.99+

each partQUANTITY

0.98+

$1.8QUANTITY

0.98+

207QUANTITY

0.98+

oneQUANTITY

0.98+

Cyber Threat AllianceORGANIZATION

0.98+

16th yearQUANTITY

0.98+

30%QUANTITY

0.97+

Stanford UniversityORGANIZATION

0.97+

FortiOS 6.0COMMERCIAL_ITEM

0.97+

30 different productsQUANTITY

0.97+

firstQUANTITY

0.97+

FortiGate 6000COMMERCIAL_ITEM

0.96+

around 90%QUANTITY

0.96+

early 30sDATE

0.96+

single chipQUANTITY

0.96+

this yearDATE

0.95+

Jim Raine, Carbon Black - Fortinet Accelerate 2017 - #Accelerate2017 - #theCUBE


 

>> Announcer: Live from Las Vegas, Nevada. It's the Cube covering Accelerate 2017, brought to you by Fortinet. Now here are your hosts Lisa Martin and Peter Burris. >> Hi welcome back to the Cube. I'm Lisa Martin joined by my co-host Peter Burris and we are with Fortinet in beautiful Las Vegas at their Fortinet Accelerate 2017 event. A great event that brings together over 700 partners from 93 countries. And right now we're very excited to be joined by one of their technology partners, Carbon Black. Jim Rein, welcome to the Cube. >> Thank you very much, I appreciate it. Great to be here. >> Absolutely. You are a key alliance partner, Carbon Black, as you're the director of technology alliances. I knew you've been at Carbon Black for three years but you're quite the veteran in terms of technology, engineering, sales, channel services expertise, quite the veteran, quite the sage. But some interesting things that I wanted to let our viewers know about Carbon Black, and we'll have you expand upon this is that you guys are the leading cloud based endpoint security company that stops cyber threats. And that your roots are actually in offensive security. You now protect more than seven million endpoints worldwide and 30 of the Fortune 100 are your customers. Tell our viewers a little more about Carbon Black. what are you doing? What are some of the things that you are seeing as security now as a boardroom level topic? >> We're seeing a lot of changes. It's the idea of taking an endpoint context, what's actually happening at the endpoints. The endpoints are always the real source of where the attacker was really targeting to get to the information. For such a long period of time we've used legacy technology to really to do that. So we're looking at what are some things that we need to do now to really change that entire game. And one of the key things about that is looking beyond just simple files. Malware's bad, we know that, and we have great ways of stopping that for years and our attackers are moving well beyond just malware today and they're moving really into leveraging different attacks by actual actors within the customers' environments. And so we're really positioning ourselves to stop those next threats, the new threats that we're seeing and do it in such a way that it's very easy for a customer to do. Still manage, still maintain it, and then integrate that with other things. >> And I think the key word is integrate it with other things. Because it's not just enough to know what the endpoint's doing, you have to know what the endpoint's doing in the context of what its supposed to be able to do with those other things. Talk a little bit about that and Fortinet come together for customers. >> So it was really important. We've had a really strong opinion that open APIs are very important. The idea that we're better together than we are apart. And that really is true in security. For too long we've had different vendors that have tried to installing everything under one roof and the problem is that most customers will make financial investments within a given product and then they need to capitalize on that, on every single new product they bring on board. With us at Endpoint Contacts we really wanted to make sure that our endpoint data, the actual vision of what we're seeing, could be shared with network entities, could be shared with a sock. And so the sock can have a holistic picture of the entire environment not just on premise but also off. >> Talking about endpoints, tablets, mobile, the proliferation of IOT devices, how does a company nowadays that, we we're talking off air, but the day of everyone getting issued a phone or a Black Berry is over. But when we're all providing our own devices as employees, how realistic is it for a company to actually secure the things that I as an employee are doing with my own devices? On a corporate network. >> It's really tough. It's really tough. We have to control the things we can control, right? Which are the endpoints that we issue. So the laptops, the desktops, the home systems. For a lot of engineers now with a remote context, they're working from home on an iMac. We need to be able to protect that as it was on a corporate network. And so part of that is taking that off network devices, but enabling the corporate assets, the actual on network devices, to leverage that. And that's what we've done with Fortinet. We leverage the FortiSandbox so that whenever we see a brand new binary on an endpoint, we can submit that to FortiSandbox and say, is it good or is it bad? Obviously we don't know that binary at that point, we're making a determination. And if FortiSandbox comes back and says that is malicious, we can not only stop it from executing again, but also terminating in motion. >> One of the things I'm curious about, during the general session this morning, there was a Cecil panel of Levis, AT&T, and Lizard was there. There were also some great customer videos. Pittsburgh Stealers. And some other telecommunications companies. When we're talking about what you're doing at Fortinet, expand upon that a little bit more in terms of the integration. Also are you focused on certain industries that might be at higher risk? Health care, financial services, for example? >> I mean I'd like to say yes, but honestly I think everybody's at a high risk. The hard part today is that attackers are going after wherever they can find the most valuable data to them. And it's not based upon my role or my job or my industry, it's based upon what that attacker actually needs. And so we see it in small mom and pop shops, we see it in health care, we see it in finance. Definitely see it in retail a lot recently and manufacturing. And so we really view it as the customer needs to take a proper assessment, understand where their assets are, and then deploy multiple different layers, which includes an endpoint solution, to actually stop that. So you take our next generation endpoint. You take Fortinet's advanced capabilities on the network. You take the visibility what they've done with the fabric, and now all of a sudden you have this really great solution that does protect the assets they can control. For IOT I mean honestly that'll be something that we'll have to challenged for with a while. But if these can segment that a little bit and protect what I can control, I don't throw my hands up and say I can't do anything. Now I have IOT segment in such a way that I can properly address that with an overall posture. >> Can we presume that your customers have this awareness as knowledge that we're already breached, we now have to be providing or limiting damage? Is that the feeling and the vibe that you're getting when you're talking to customers about endpoint security? >> We hope so. We came out about three years ago and said that there's an assumption of breach. Which is don't assume you won't be, assume it's already happened. And assume you just don't know about it. And that's really a reality I think for a lot of people nowadays. You know Ponamon does a really great yearly expose where it talks about how long a breach has occurred within environments, and it's 200 plus days or some number. The point is it's always a significant amount of time. So the ability to have more visibility within a network, not only on the network side but also on the endpoint side, and combine that into one view is so important. Because most customers honestly don't know they have that. And then what it is, it's a panic situation. And that's rough. >> But increasingly, in enterprise, it's providing service to a customer or partner, is really providing service to an endpoint somewhere. >> It is. >> And so we know for example that when the bad guys are trying to do something malicious, they're just not getting into your network, and working their way through your systems until they can find the most valuable data. They also know that if you are a trading partner, that even if your data is not that valuable, the trading partner's data may be very valuable. And so they are hopping corporate boundaries as well. And so trading partners absolutely have to be able to secure and validate that their relations are working the way that they're supposed to be working. So how does my ability to be a trading partner go up and down based on my ability to demonstrate that I've got great endpoint security in my business? >> You know it's a great question, because I don't know of too many customers that have a strict validation to say if I'm a partner of yours, not a technology partner but a business partner, that I expect you to maintain a certain level of security protection. There's just an automatic assumption that we partner with you know Sea-bil or somebody else and of course they have a protection enabled. I think you have to raise it up a level. So we have to have a policy mindset to not say that you know obviously we have different solutions deployed, but what have I enabled? From a very broad perspective, what kind of things do I allow my endpoints or do I allow my network to do? What kind of things do I disallow, do I block? Do I have control of domain admin? Something as simple as that. But that forms a policy, and then different companies can match policies together and say, yes you actually do comply with our policy or our security posture, therefore we're going to enable the partnership. Because you're right. If I come in through a partner, does that allow my insurance to cover me from a cyber protection perspective? That may be disallowed because it may be seen as an authorized entry within an environment, not a breach. And so there's all kinds of complexities that come out of that. But we have to have a better way of communicating between our companies. >> So as Ken Xie, the CEO of Fortinet, talked about this morning in his key note. He was talking about the evolution of security, going from the perimeter to web, and web 2.0, cloud, and now we're moving towards 2020 in this time of needing to have resilience and automation. And it's also an interesting time as we get towards 2020, and that's not that far away. You know this is 2017, if you can believe that. The proliferation of mobile and IOT and tablet, I mean there's suspected to be about 20 billion IOT devices connected in 2020, and only about a billion PCs. As you see that proliferation, and you look at the future from an endpoint perspective, how has the game changed today, and how do you expect the game for endpoint security to change in the next few years as we get to 2020? >> I mean it's interesting, because I remember the days when I was first installing the firewall, the only one in my enterprise, and working through that, that kind of perimeter and barrier concept. And now that barrier's disappeared. So we see a lot of things moving to cloud. And I think that really is the key enabler. What Fortinet is doing with the structure, they're really targeting for a cloud controller, cloud protection, we're seeing it from a lot of vendors. There's a lot of focus on that right now. Because if I have a mobile device, I may not be able to attach the mobile itself, because of the operating system or restrictions from the provider like IOS has in it. But I can control the application, I can tie into that. And if I tie that back to my corporate environment, so the same policies are being applied, and I can apply that down to my endpoint to make sure that at least from an application perspective, what's running on my laptop is the same control segment running on my application in the cloud. I now have a better control of the entire environment. And I think that's where our first step is. There's going to be a lot of advances I believe really in the next 10 years, five years or less for 2020, that really bring about some unique things concerning to mobile and IOT. >> Can you share with us a little bit more exactly how your technologies integrate with Fortinet's technologies, especially kind of looking at the announcements today? What they're doing with FortiGate, the announcements with the operating system? >> Absolutely. So today from an endpoint perspective, anytime we see a binary that comes on from our CB protection product, we'll send that to FortiSandbox. First we'll quarry it, find out whether or not they've seen it before. If they haven't, we'll send it to them, and they can do a detonation. Obviously we're taking the results of that back and we're making a block determination on that. Obviously those are things that we haven't already seen before. So different protection modes, different protection policies are in place. But if I haven't seen that particular binary, something brand new, it could be malicious, it could be a zero day. I can play that against the FortiSandbox and find out whether or not it actually does have that malicious nature to it and then act upon it. >> I've always though of endpoint security, and tell me if I'm right, as the first line of defense. >> It is. We've always thought of the firewall as the first line, because we think outward in. But really it is inward out, because you use your laptops at home, right? So it is the first place that everything always starts. >> So it's the first line of defense, to my perspective, and increasingly as businesses deliver, provide, or their services are in fact based on data, that that notion of the first line of defense creates new new responsibilities for both customers as well as vendors, as well as sellers. So over the next few years, how is that notion of the first line of defense going to change? Are we going to see customers start thinking about this, and whether or not I'm a good customer? How do we anticipate kind of some of the social changes that are going to be made possible by evolution of endpoint security and how it will make new demands on endpoint security? >> It's going to start with more visibility. I don't mean that in a very broad sense. But today we have antivirus solutions that we're really targeted about, just simply binary yes or no. Do I allow something to execute or not? And that worked very well 10 15 years ago. Increasingly over time we know that it really hasn't, because advanced attacks have come around. So now we're applying more visibility to that endpoint, saying what actually is occurring, and how are those processes working together? If I see something operate from an email file, I click on it, something else happens, now all of a sudden there's code executing. That sequence of events or that stream becomes very very important for the visibility standpoint. Our project CB defense takes that streaming prevention. We say what is the risk factor scoring that we've applied to this, and how does that sum together not only blocking good and bad, but now I'm getting to actions. So now that I'm paying more attention, that rolls into what are users doing? What are they actually doing on the endpoints, and how does that policy dictate? I think for so long we've said that we can't approach endpoints because we can't control them, and that's the CEO's device or whatever it is. We're really changing that methodology. I think mindset wise people are okay with I need more controls on the endpoint, I need more capabilities. That's going to start transitioning to having conversations about well how do you control your endpoints? And suddenly there's more of a focus, besides just saying do you have something installed to block stuff? That conversation got really short, because it just doesn't work today. So I'm not saying do I have Carbon Black installed or anything else installed, it's what am I doing, what policy am I applying there, and then how does that match up to my business partners? >> I've made commitments to this customer, this customer's made commitments to me. Are those commitments being fulfilled, and is someone trying to step beyond those commitments to do something bad? >> I never want to be the source of an attack to my partner. (laughing) That would be the worst. >> And well there are some very high profile cases where an HVAC company for example suddenly discovered that they were a security risk to some very very big companies. It wasn't supposed to happen that way. >> And to your point before, it was an HVAC company. Nobody thought about HVAC being a targeted industry. >> A critical infrastructure, right, right. >> Exactly, it doesn't matter. People are after the data. They're after what's on the endpoint, and that's why we need to protect the endpoints as the first step. But obviously combining that with a bigger motion, because it's not all endpoint. There has to be a network barrier. You have to have other things involved. There's cloud now and were transitioning to Quickway, and that's where partnerships are going to be formed. I really believe that you're going to see more and more partnerships over time with this collective nature of leveraging Fortinet calls it the intent-based networking, right? So intent-based, what is the intent behind it? What is the attacker really trying to do? And I love that and that concept, because it really does match up well with us. >> Well but as security practices and technologies improve in one area, security practices and technologies have to improve in all areas. Otherwise one part of that security infrastructure becomes the point that everybody's using for the attack. >> A vulnerability, right. >> Yeah, it's a vulnerability. My point is a lot of people are now starting to think, oh endpoint security, that's not that, this. No, that too has to evolve. And it's going to create value, and it has to, in context, it has to evolve in the context of the broader class of attacks and the things that people are trying to do with their data in digital business. >> Absolutely. I think that a lot of customers have realized that they're making that a part of their overall security planning. You know for three years our what am I going to do, and where do I stand at today? And obviously there's existing license cycles and things like that on the network side as well. But I think a lot of customers are starting to formulate a whole plan about how do I look at my entire infrastructure? Forget what I have. Let me say I want to have certain protections in place. First off, do I have them? And if not can I plug something in that actually still will seamlessly integrate? And that's a really important point for a lot of our customer base. >> And speaking on kind of giving you the last word Jim, you both talked about evolution here. As we look at where Carbon Black is today, you were just named by Forrester as the market leader for endpoint security, fantastic. Looking at that going into 2017 as we're in January 2017, the announcements from Fortinet today. What most excites you about this continued technology partnership? >> Continued with Fortinet? >> With Fortinet, yes. >> Okay, I thought you were talking over all, it's good. Honestly it's something as simple as their approach to the APIs. I mean it sounds silly, but at the end of the day, if their approach is really to leverage and to work with other partners, and that's what ours has been for a long time. So we're not saying it just has to be our product, it just has to be our solutions. They're saying whatever the customer is already invested in, we're going to make it better. And that's a strong message we've had for a long time as well. I don't care what you've put in for a firewall necessarily. But I do want to be able to integrate with that, because the customer needs that. It's not me being very selfish so to speak. Customers are demanding that they have a simpler solution to manage. And it's that simplistic way, that's where we're headed from and endpoint perspective, of having a solution that actually takes in everything from the environment and really makes it a common view, for the instant responder and the personnel. >> And it's all essential for digital business transformation which is as we've been talking about Peter is the crux of that is data and that. Well Jim Rein from Carbon Black, thank you so much for joining us on the Cube today. And on behalf of Peter Burris and myself Lisa Martin, we thank you so much for watching the Cube, and we're going to be right back.

Published Date : Jan 11 2017

SUMMARY :

brought to you by Fortinet. and we are with Fortinet Great to be here. and 30 of the Fortune And one of the key things about that is in the context of what its supposed and then they need to capitalize on that, but the day of everyone getting issued Which are the endpoints that we issue. One of the things I'm curious about, that does protect the So the ability to have more to a customer or partner, that they're supposed to be working. does that allow my insurance to I mean there's suspected to be about and I can apply that down to I can play that against the FortiSandbox the first line of defense. So it is the first place that how is that notion of the first and that's the CEO's those commitments to do something bad? of an attack to my partner. to some very very big companies. And to your point before, A critical And I love that and that concept, becomes the point that And it's going to create value, the network side as well. the announcements from Fortinet today. and the personnel. the crux of that is data and that.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Peter BurrisPERSON

0.99+

Lisa MartinPERSON

0.99+

Jim ReinPERSON

0.99+

Ken XiePERSON

0.99+

January 2017DATE

0.99+

FortinetORGANIZATION

0.99+

JimPERSON

0.99+

2020DATE

0.99+

AT&TORGANIZATION

0.99+

Carbon BlackORGANIZATION

0.99+

2017DATE

0.99+

ForresterORGANIZATION

0.99+

LevisORGANIZATION

0.99+

three yearsQUANTITY

0.99+

first lineQUANTITY

0.99+

Las VegasLOCATION

0.99+

iMacCOMMERCIAL_ITEM

0.99+

IOSTITLE

0.99+

todayDATE

0.99+

200 plus daysQUANTITY

0.99+

FortiSandboxORGANIZATION

0.99+

first stepQUANTITY

0.99+

Pittsburgh StealersORGANIZATION

0.99+

FirstQUANTITY

0.99+

Las Vegas, NevadaLOCATION

0.99+

Jim RainePERSON

0.99+

over 700 partnersQUANTITY

0.99+

more than seven million endpointsQUANTITY

0.98+

first lineQUANTITY

0.98+

30QUANTITY

0.98+

LizardORGANIZATION

0.98+

93 countriesQUANTITY

0.98+

Sea-bilORGANIZATION

0.97+

Fortinet Accelerate 2017EVENT

0.97+

firstQUANTITY

0.97+

zero dayQUANTITY

0.96+

five yearsQUANTITY

0.96+

PonamonORGANIZATION

0.96+

OneQUANTITY

0.95+

one viewQUANTITY

0.95+

oneQUANTITY

0.95+

10 15 years agoDATE

0.95+

about a billion PCsQUANTITY

0.94+

QuickwayORGANIZATION

0.94+

this morningDATE

0.92+

one partQUANTITY

0.92+

bothQUANTITY

0.91+

PeterPERSON

0.91+

CecilPERSON

0.89+

about 20 billion IOTQUANTITY

0.89+

both customersQUANTITY

0.88+

#Accelerate2017EVENT

0.87+