John Maddison, Fortinet | Fortinet Accelerate 2019
live from Orlando Florida it's the cube covering accelerate nineteen brought to you by important welcome back to the cubes continuing coverage of forty net accelerate 2019 live from Orlando Florida Lisa Martin with Peter verse and we're pleased to welcome back to the key one of our alumni John Madison the executive vice president of products and solutions from forty met John it's great to have you back on the cube it's great to be here again lots of momentum that forty minutes coming into 2019 with I can't believe we're in April already lots of growth in revenue product revenue was up you guys talked about the expansion of the partner network we've had some of your fabric ready partners on already today yeah you talked about this third generation and security how fourteen it is is uniquely delivering that for our viewers who were didn't have the opportunity to attend your keynote kind of talk to us about that in this hybrid world how is putting that delivering this third generation what makes you guys different yeah so we talk about the third generation now everyone has different generations that's fine we call it what we are the security driven networking and it's really the genesis of 14f for a long time in bringing together networking and security into one place I think these days or in the past people have built out the networks with a network layer then they try and connect users and applications I think oh wait a minute and this put some security over here and a bit over here and over there in our minds start with both start with a security driven networking concept make sure it works end to end and that will be the most sophisticated most secure application and network you can have and what enables porting that to deliver this uniquely because a number of times today and Ken's keynote I think patrice as well and i can't recall if yours competition came up where the audience was shown the strength in numbers that 14 that has so what makes you guys unique and what you're delivering what are key differentiators from the start has been making sure we can run routing stacks sometimes today referred to as st wayne stacks also security stacks in a very small footprint and to do you need to spend a lot of money what we call security processes which go inside our appliances to make sure that runs very fast but having said that I definitely think customers are gonna be in a high weight world forever for a long time at least anyway we're not only appliances but also personal machines an API security and we also talk about this fabric concept they're able to cover the complete digital attack surface so there's a very important point and we're finding a lot of customers now agree that they want to consolidate they want to make it simpler they need to move faster to this digital world and the only way you have to do that is through a consolidated approach so let's build on this they want to consolidate they want to make it simpler more common and how they in policies and management now along comes the edge what's the dynamic there what's happening is all people refer to the perimeter disappearing okay that's happening to a certain extent because data is moving into cloud you've got different one implementations but what's happening when you do that is you're creating new edges a really good example is sd1 which used to be very closed off the wound used to be something that connects branch offices back to the data center but nobody got involved in that well now you're opening up that when two different types of transport mechanism you're creating an edge I always refer to these edges as being created by different trust levels there is a may be a secure trust level here less trust here it creates an edge and you absolutely need to protect all those edges but give us an example of that so for example when you say differentiated trust levels my edge might be at a customer location is that kind of what versus my edge might be at a branch office is that what you mean by a different trust level push that concept force you know it's more for example if I got a branch office and I've got one connectivity going back to my data center that's encrypted and secure but I've also opened up connectivity to the internet the trust level between that encrypted link and my connection to the to the internet is very different the Internet's open anyone can see there so that trust level between those two is very different and that's what creates the edge and so therefore that becomes a key feature in how we design diff edge implementations it is it's also a key requirement on what type of deployment mode you use we have appliances we have virtual machines we have clouds containers API is going forward I'm finding that customers are still very reluctant to put software implementations of firewalls against the Internet appliances are harden they run faster having said that inside the cloud obviously inside software-defined data centers virtuals fine what are some of those customer concerns that you're hearing well I think what happens is you know if you putting a piece of software against the internet it's open to all sorts of attack it's the same as giving IP addresses to anything it's like a factory that creates an edge as well and you need to harm that edge against that phone how can st when helped why is this such a crucial component of digital transformation you know sometimes markets are overhyped I remember that the Cosby marketplace a few years ago it just was a feature to be honest I think sd1 is extremely important the reason it's important is the SD one controller that controller eventually tells users and devices how to get to the applications and so I tell customers that investment for you is extremely important you need to own it you need to make sure it's flexible you need to make sure it's secure and so I think the SD web marketplace or one edge is the kind of larger term for it is extremely important investment for customers do you anticipate that I mean you guys invested you guys put forward a lot of products we made a number of different announcements again going back to that notion of simplicity that notion of consolidation what is the breaking point for your typical IT group in terms of the complexity of that they can accommodate and absorb when we start adding additional function within the overall network especially from a security standpoint well I think it's a bit broken already they're really struggling to keep up from one perspective no today we announced our forty OS 6.2 is our major operating system and what we try and do is consolidate functionality as much as possible inside our fabric through a single console so there were single operations capability so it's easier for the operations people for the security people to implement things and we're also implementing automated mechanisms like security ratings which do a background run of best practices for example that make it gain easier for those cut those teams to run a full analysis of what's going on so was it about three hundred features roughly laughs I counted them individually okay good yeah well do a recount of a tremendous amount of feature addition to forty OS announced today what are some of the things business outcomes Peter and I we're talking about outcomes with several of our guests earlier business outcomes new revenue streams new products going to market faster the also being able to become less reactive maybe more proactive in terms of security cuts can you walk us through some of the outcomes that 14 that customers can expect to achieve from some of the OS announcements and enhancements yeah I already talked about one which was the consolidation which means they can do multiple things with the single platform that's an important one for them also some of those some of the cost savings around that some of the operational cost savings I think also for our partners for example they like the fact that we're keep that we keep adding services on top of that fabric they can take those services then apply them to their customers and make sure they can add value inside there as well so there's two angles to it the one is making sure our customers are better protected they can consolidate save money invest better training and then to our partners so that they can provide more value to their customers so one of the things we were talking to Ken about is the fact that you have invested in a six and security processing units and content processing units etc that are capable of accelerating the rate of which these crucial security algorithms run that opens up that creates additional capacity to add more function both for you as well as your partners are you starting to see some of your ecosystem grow faster as they better exploit that inherent power and performance that you have within your appliances and devices definitely I think we're seeing new partners come from new areas it also fragments a bit and that's why we announced this new partner initiative going forward which is a bit more customizable but I you know I do think that going forward both our customers and our partners are looking for more of an architecture approach you know again if you go back five years here's a box and off you go and there's install it and we're good and again when you saw those security threats yes we produce a point solution to fix it normal we keep moving on there now looking at architectures over the next five years a known only just cyber security architectures but networking architecture storage architectures and all coming together so we definitely need to train our partners I think here we had over fifty of our what we call networks a network security expert eight it's the highest level of architecture and half and the partners but going forward we see much more partner involvement in an architecture approach and our customers want that because they don't want to have a point solution that's out-of-date in a year's time or a new threat comes along and makes it redundant so how are you you mentioned you mentioned network security and storage what other things are starting to inform that architectural approach that you're taking it's everything now so we know the factories now are completely automated all the different utilities have IP addresses are running almost all the way down to the end point just everything has more flexibility and is more open and so definitely all of that informations bouncing around inside IOT devices inside the wires like data centers and all that data needs protecting that's the key of protecting the data and to do that again we keep saying you need to have an integrated approach to networking and security how does the customer work with 40 net and your partner ecosystem to achieve that integrated approach assuming that there's a you know an enterprise out there that's got a spectrum of hybrid multi cloud environment with a spectrum of security Point solutions pointed it you know different components of an infrastructure how do you help them on that journey of taking the many disparate security solutions and leveraging the power of cortina and your partners to get that integrated truly integrated consolidate consolidated view it's a couple of steps maybe maybe many steps the first one is customers don't want to throw everything else straight away and so what they want to do is be able to integrate and connect and so we have some of our partners here for example of fabric ready partners we have connectors we build into their platforms and orchestration systems and that's their first step once they get there they start looking across to see what they can consolidate so can they take a specific solution from this and I'm bringing inside and then eventually they start to look at the long-term architecture if they're moving apps to the cloud or they want to open up their where or they want to provide kind of SD functionality inside their branch but so it's definitely a phase approached I don't see many customers some customers would take an application and create from scratch inside the cloud they can't do that with their infrastructure they can't just completely wipe it clean start again it's definitely more of a phased approach so as you think about the phase approach and you talked we heard from we heard from the sales port side the notion that the SPS the service providers want greater customization the enterprise wants a different level of access to the core technologies so that they can do not customization not exactly I remember exactly what the term was but what degree will customers retain control over how that architecture gets implemented versus what degree is it going to get baked into the stack itself a bit of both I think you know for most customers they're running towards a digital platform and they need to own that digital platform if they give up complete control you know how do they control that their destiny going forward so they want to own the digital platform but they haven't got the resources to do everything so they'll outsource some to service providers and carriers some of the partners for example but again I keep coming back to this they want to get to a point in five years time where they've got a digital footprint it's very flexible but they also want to make sure it's very secure because as you open up that digital footprint you're opening up all these different edges inside the network and it's coherent which is the architected approach yes because if they don't have a coherent approach to doing it they don't know what the interfaces are or are not competent and that includes interfaces with partners yeah they have to look forward and say I'm gonna implement X amount in the cloud I'm now gonna have some edge compute going on here I want to shape make sure my branches have the best quality of service for these certain applications that go back to this so they look at all those parameters and then architect something from there so I know that security network security app security info security cloud security is in our imperatives for every industry but I didn't notice that the breakouts today feature I think there's a couple of vertical features healthcare financial services retail I'm just curious are those just great use cases that show the potential and the power of 14x technologies or are those industries that are either early adopters or maybe more leading-edge because they have such a tremendous amount of data that needs to be secured as their ecosystem does this yeah so the industry verticals I think I think for the very large ones they're very similar all of them have IOT that's expanding or don't want to have a flexible wand system all them I've got something some compute power and the cloud and the edge going forward so I know there's differences in industries for the very large enterprises it's the problem seems the same these huge organizations and they have all of these things going on in each trying corner I'd you come down to mid enterprise I think there's more reason to consolidate but then you see more differences in the way they approach things like a healthcare they're really focused on that healthcare kind of security of devices inside the hospitals etc education oh they need to connect in these big data banks and transfer the research information so big organizations I say pretty much the same problem midsize organizations become more relevant to a specific industry well John thank you so much for carving out some time speak with Peter and me today we appreciate that and it's exciting to see and feel the momentum that 49 is bringing into 2019 wealth I'm say inviting me our pleasure we want to thank you for your time as well for Peter Burris I am Lisa Martin you're watching the cube [Music]
SUMMARY :
the data and to do that again we keep
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
John | PERSON | 0.99+ |
John Madison | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
two angles | QUANTITY | 0.99+ |
first step | QUANTITY | 0.99+ |
John Maddison | PERSON | 0.99+ |
forty minutes | QUANTITY | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
April | DATE | 0.99+ |
Orlando Florida | LOCATION | 0.99+ |
Ken | PERSON | 0.99+ |
first one | QUANTITY | 0.98+ |
Peter verse | PERSON | 0.98+ |
five years | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
two | QUANTITY | 0.98+ |
six | QUANTITY | 0.98+ |
forty OS 6.2 | TITLE | 0.97+ |
both | QUANTITY | 0.97+ |
single platform | QUANTITY | 0.97+ |
third generation | QUANTITY | 0.96+ |
over fifty | QUANTITY | 0.96+ |
14 | QUANTITY | 0.96+ |
nineteen | QUANTITY | 0.92+ |
single console | QUANTITY | 0.92+ |
about three hundred features | QUANTITY | 0.92+ |
40 net | QUANTITY | 0.91+ |
third generation | QUANTITY | 0.91+ |
each | QUANTITY | 0.89+ |
half | QUANTITY | 0.89+ |
forty OS | TITLE | 0.87+ |
a year | QUANTITY | 0.86+ |
single | QUANTITY | 0.86+ |
49 | ORGANIZATION | 0.85+ |
one | QUANTITY | 0.84+ |
fourteen | QUANTITY | 0.83+ |
few years ago | DATE | 0.82+ |
eight | QUANTITY | 0.81+ |
couple of steps | QUANTITY | 0.81+ |
14x | QUANTITY | 0.79+ |
Cosby | ORGANIZATION | 0.78+ |
executive vice president | PERSON | 0.73+ |
forty | QUANTITY | 0.71+ |
one edge | QUANTITY | 0.69+ |
one perspective | QUANTITY | 0.68+ |
lot of customers | QUANTITY | 0.67+ |
lot | QUANTITY | 0.64+ |
money | QUANTITY | 0.61+ |
five years | DATE | 0.61+ |
couple | QUANTITY | 0.46+ |
patrice | PERSON | 0.46+ |
next | QUANTITY | 0.41+ |
theCUBE Insights | Fortinet Accelerate 2019
>> live from Orlando, Florida It's the que covering Accelerate nineteen. Brought to you by Fortunate >> Welcome back to the Cube. Lisa Martin with Peter Burgers. We are coming to you Live from Orlando, Florida We've been at forty nine. Accelerate twenty nineteen all day. Peter, What a day our third year co hosting the Cuba Forty and accelerate. We heard a lot about industry leadership, product, leadership in innovation, partner. Success fourteen and accelerate. What? Some of the things that really stuck with you from the keynote all the way to the end of our interviews. >> Well, I was going to say first put a fork in May. Um, uh, Here's one of the things that I've observed. I've been doing the analyst thing and been a practitioner I t for over thirty years now on DH. Uh, it's amazing the degree to its security. People are often some of the smartest people you meet and some of the most straightforward people you meet, and partly that's because they are paid to ferret out nonsense. It's very, very difficult to fake security on. Uh, it just is, if there's one thing that even more than the last couple of years just struck me today. Perhaps it's because we're coming more familiar. Affording it is how smart these guys are, how smart they are, how informed they are, how well spoken they are. I mean, the interviews have been a breeze. I learned something from every single one of these for Jeanette interviews. So that's probably the first thing I'd say. The second thing I'd say is, um, the Ford. It has taken a different tack. We talked about this in the open, they have acknowledged, or they believe that having a degree of control over the underlying hardware is going to be a source of benefit to the customer on a source of advantage to Ford in it. And they continue to push that, and it appears pretty clear that they made a good bet that regard. We heard a lot about how a lot of new products are being placed on top of that platform and top those appliances a lot of additional functionality. But it also is pretty obvious that the ecosystem is growing faster, even in many respects and fortunate is in terms of the number of the amount of invention and innovation it's happening, and that's in part made possible by having a platform that's just higher performance. Oh, and if there's one last thing that I'd say is the degree to which Fortunate has made talked about this a second ago but made good bets and it appears clear that they're going to continue to make good bets bringing full circle Smart people that get stuff done in a domain that's absolutely essential to business are in a position to really shape the way that all this digital business transformation of digital business evolves. And Ford Net is punching above their weight in terms of how they're influencing the directions of the industry. >> They are punching up that there way. I think you mentioned that during one of our interview segment. I think they're proud of that. I think their confidence in what they're delivering and their history of being able to be pretty good at predicting what's going to happen was evident from the keynote this morning, where they showed a number of times where they are from an industry leadership in a market share perspective, calling out the names of their competitors, showing how much how far they've come, how much their customers are benefiting how much their business is growing as a result. So that confidence on pride was evident from the first time CEO Kinsey stepped on stage this morning. And I think we heard that throughout every interview segment today that you and I did with their leaders and some of their partners as well that there's since there that they know what they're doing. To your point, I agree. There was a lot of clarity of message. It's a very it's Security's a very interesting topic of conversation because it's pervasive across every industry. >> There wasn't the interviews weren't interchangeable. Each of them bought their expertise to bear on DH had something really interesting and useful to say, But it's at the core. You could see that the culture is thriving, that obviously it's a great Tam's great total addressable market that's growing. There's a lot of excitement inside the fortunate employee base about the possibilities and the role that they're likely to play, and I are playing on, you know, they talked a lot about Canada, Dabo's and some of the new. Some of the new alliance isn't even able to put together and influence. I mean, it's just It's a very good story in a market that is increasingly important. That's a potent combination for the Cube and for customers overall. >> And they did a great job on the education piece. Education was you mentioned Davis. That was an interesting kind of nod back to what they talked about last year's Accelerate twenty eighteen Educate education Ecosystem technology knows of the three pillars that were discussed in Davos is being essential components for safe and secure digital transformation, which they even set of Davos. Hey, there's the potential here in the next ten years for digital transformation to unlock. Ten can't be million. Maybe it is a huge value for businesses for society, and they said, Hey, fortunate, we've talked about these three tenants last year. We talked to John both just a little bit ago about how they are actively educating the channel from their bars to help them become msp sto. MSS peas their distributors how they're really educating, helping to mitigate some of the ostensible cybersecurity skills gap that we've talked about a very long time. But that's a a dedicated business model for them that hey, they want to drive preference with their partners. Everybody has. His customers have toys. Partners have choice. They've put a very strategic and evolutionary focus on evolving that. So customers in any industry have the opportunity to leverage security as as a best practice it as a benefit to their business. >> And there's a degree of altruism for why they did it, because they recognize that there's three and a half million open cybersecurity positions in the world. But they also demonstrated how smart and practical it is. Try to take that leadership. They want to become more competency based. How? Okay, great. Now, what does that allow you to do? It allows you to have your partners, your partner, network, connect independent of you to create solutions independent of you still based in your technology and basing your capabilities and services, but to engage customers in faster ways that may not necessarily involve you. Okay, so competency leads to new partner arrangements. Well, that also leads to more complex kinds of customer relations that generate greater value, greater service, all with the certainty of trust behind it, because you've done a better job of articulating what constitutes competency in an extremely complex domain. So it's a It's a It's a really interesting story. They've. They've clearly taken some best practices that we've seen emerge in the industry over the last few years and applied them anew. In a company that's going quite fast and a market that's growing faster than any other in Tech, >> this is largely this event accelerated. Think Derek Banky. I mention this is his seven. So around the seventh or eighth forty nine accelerate event that started its history wise as a partner conference. Obviously, it's grown tremendously, but there's a lot of partners here I would love to hear next year from the voice of the customer, a customer who has faced these challenges. We were speaking with one of their partners. It'LL come to me with Siemens, who was talking about Hey together. Seaman's from an O. T. Challenge and Opportunity, Perspective and Fortunate can help a customer transform and converge, and ot and thirty days in a harsh type of environment that's huge would love to hear more stories like showed the impact that customers can make by addressing these challenges and leveraging these technologies to not just react to threats as they come all the time. But she eventually become proactive and predictive. >> Well, the the the world economic form Dabo's uh, sport that put up a couple charts that showed how the World Economic Forum is basically putting cyber security at the center of a lot of the new economic activity associated with digital business on way would tend to agree with that. That's a very, very important feature, if for no other reason than just this notion of trust becomes so very essential. And so you know, for Net is in a position to make some crucial to really have a strong influence on how this industry plays out to make some pretty decent money. This they're generating more patents, then eighty percent. I mean, I don't know what the number is, but three times as many patents in the segment that they're operating in as anybody else. Lot of innovation, lot of dedication to doing that kind of stuff. But I think it is important for them to take on Maura the customer. You and I were talking about this earlier. They did it, you know, this conference and the keynotes and the conversations spoke to network administrators, network pros, security prose partners. We would weigh. Both believe that digital business outcomes are going to be tied into a CZ moral economic form. Does that core cybersecurity capability of abyss that of his says? And so it would be nice to have them feature more customers, but also to do eh clear job of taking a pull on that thread from outcome all the way to technology because the market needs that. It's not clear to a lot of people what really is the relationship between investment in cyber security and how that translates into new classes of business value that are gonna have a long term implications on how markets operate. >> Yeah, and it's going to be We gotta hear more than scalability, flexibility and speed those air obvious. But how our industry's being and business is being transformed. I know they >> are >> so waken boy, a lot of that down to that, that simple word trust. I mean, we heard a lot here. If there has been an erosion of trust and a lot of the most important institutions that we operate under, and if that continues, that's going to create a whole bunch of problems looking forward and so having a brand have trust associated with it in a physical as well as the digital world is going to be a major determinant of whether or not a company is going to be able to transform and take advantage of some of the new technologies and approaches to doing business in the future. >> That's a great point. Well, Peter, I enjoyed co hosting the Cube with you at our third ported. Accelerate. Appreciate all your insights and your time. >> You too. >> Thank you so much. We want to thank you for watching the queue began. We've been live here. Fortinet Accelerate twenty nineteen from Florida, Orlando, Florida for Peter Bourjos. Lisa Martin, You're watching the Cube?
SUMMARY :
Brought to you by Fortunate Some of the things that really stuck with you from the keynote all the way to the end of our interviews. and some of the most straightforward people you meet, and partly that's because they are paid to ferret of being able to be pretty good at predicting what's going to happen was evident from Some of the new alliance isn't even able to put knows of the three pillars that were discussed in Davos is being essential components for Well, that also leads to more complex kinds of customer It'LL come to me with Siemens, who was talking about Hey together. But I think it is important for them to take on Maura the Yeah, and it's going to be We gotta hear more than scalability, flexibility and speed those air obvious. and take advantage of some of the new technologies and approaches to doing business in the future. Well, Peter, I enjoyed co hosting the Cube with you at our third ported. We want to thank you for watching the queue began.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Peter Bourjos | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
next year | DATE | 0.99+ |
last year | DATE | 0.99+ |
seven | QUANTITY | 0.99+ |
Siemens | ORGANIZATION | 0.99+ |
May | DATE | 0.99+ |
third year | QUANTITY | 0.99+ |
eighty percent | QUANTITY | 0.99+ |
thirty days | QUANTITY | 0.99+ |
World Economic Forum | ORGANIZATION | 0.99+ |
Each | QUANTITY | 0.99+ |
Kinsey | PERSON | 0.99+ |
Davis | PERSON | 0.99+ |
Both | QUANTITY | 0.99+ |
Seaman | PERSON | 0.98+ |
Ford Net | ORGANIZATION | 0.98+ |
one thing | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
Jeanette | PERSON | 0.98+ |
first | QUANTITY | 0.98+ |
three times | QUANTITY | 0.98+ |
Ten | QUANTITY | 0.98+ |
Derek Banky | PERSON | 0.98+ |
third | QUANTITY | 0.97+ |
Davos | ORGANIZATION | 0.97+ |
today | DATE | 0.97+ |
Maura | PERSON | 0.96+ |
over thirty years | QUANTITY | 0.95+ |
fourteen | QUANTITY | 0.95+ |
first thing | QUANTITY | 0.95+ |
both | QUANTITY | 0.95+ |
Fortunate | PERSON | 0.95+ |
2019 | DATE | 0.95+ |
one last thing | QUANTITY | 0.94+ |
Peter Burgers | PERSON | 0.94+ |
three pillars | QUANTITY | 0.94+ |
Accelerate | ORGANIZATION | 0.93+ |
three tenants | QUANTITY | 0.89+ |
forty nine | QUANTITY | 0.89+ |
this morning | DATE | 0.88+ |
seventh | QUANTITY | 0.87+ |
twenty nineteen | QUANTITY | 0.87+ |
second thing | QUANTITY | 0.87+ |
Florida | LOCATION | 0.86+ |
Dabo | PERSON | 0.86+ |
Canada | ORGANIZATION | 0.84+ |
first time | QUANTITY | 0.83+ |
Dabo | ORGANIZATION | 0.83+ |
three and a half million open cybersecurity positions | QUANTITY | 0.82+ |
MSS | ORGANIZATION | 0.82+ |
last couple of years | DATE | 0.79+ |
Orlando, | LOCATION | 0.77+ |
eighth forty nine accelerate | QUANTITY | 0.74+ |
years | DATE | 0.73+ |
years | QUANTITY | 0.73+ |
nineteen | QUANTITY | 0.73+ |
Florida, | LOCATION | 0.72+ |
couple | QUANTITY | 0.7+ |
last | DATE | 0.7+ |
million | QUANTITY | 0.69+ |
second ago | DATE | 0.69+ |
Accelerate | TITLE | 0.66+ |
Cube | COMMERCIAL_ITEM | 0.66+ |
CEO | PERSON | 0.64+ |
Fortinet | TITLE | 0.62+ |
theCUBE | ORGANIZATION | 0.61+ |
twenty eighteen | QUANTITY | 0.6+ |
every single one | QUANTITY | 0.56+ |
Net | ORGANIZATION | 0.56+ |
them | QUANTITY | 0.54+ |
next ten | DATE | 0.54+ |
Perspective and | TITLE | 0.52+ |
Cube | ORGANIZATION | 0.51+ |
DH | ORGANIZATION | 0.51+ |
Fortinet Accelerate | TITLE | 0.5+ |
Davos | LOCATION | 0.46+ |
Tam | ORGANIZATION | 0.45+ |
Forty | ORGANIZATION | 0.32+ |
Cuba | LOCATION | 0.29+ |
Jon Bove, Fortinet | Fortinet Accelerate 2019
>> Narrator: Live from Orlando, Florida. It's theCUBE... covering Accelerate '19. (electronic music) Brought to you by Fortinet. >> Welcome back to theCUBE. We are at Fortinet Accelerate 2019 in Orlando, Florida. I'm Lisa Martin with Peter Burris. We've been here all day talking with Fortinet executives, with partners, really understanding the evolution of cybersecurity and how they are helping customers to combat those challenges to be successful. We're pleased to welcome back to theCUBE alumni John Bove, the VP of North America's channel for Fortinet. John welcome back to the program. >> Thanks for having me, great to see you both again. >> Likewise, so, so much going on today, some news coming out. The keynote this morning started with a lot of electricity around Fortinet's industry leadership, product leadership, there was a lot of growth numbers shared >> John: Yup >> There's also a lot of people here about close to four thousand. >> John: Close to four thousand people, yup. >> And you saying that a good percentage of that is partners, forty countries represented. What are some of the things from your perspective, that you've observed today, in terms of the reaction from the channel to all of this news coming out. >> Yeah so first off, the heritage of this event really was a partner conference going back to its infancy and you know as Fortinet continues to grow and our customer profile continues to you know, move up market, we've now invited customers. So it's really great the synergy that we have. We've got a number of partners with their customers coming to meetings and meeting with executives, and so it's just really fantastic. You know relative to the announcements about the partner program, we've seen really positive feedback. I think the program was introduced about a decade ago and it really was time for a refresh, and so, what we've done is, we want to bring a program to our partner community that, allows them to engage with us in how they see fit, and then we want to build the go to market that's a little bit more in tune with the market that exists here, as we're moving into the year 2020 and beyond. So we're really assimilating a reseller, MMSP and Cloud as types of partner go to markets, and organizing that all underneath the Fortinet partner program umbrella. We'll also be introducing a consultancy track because we want to insure that the assets within the network security expert program are available to those consultants that are working with customers on their journey to the Cloud, for instance, or through this digital transformation. And then finally we're introducing what we're calling a competency focus. So as Fortinet continues to grow as a company there's a number of competencies that we feel if we enable partners appropriately they're going to be able to benefit from. They're going to build a stronger business around the Fortinet Security Fabric. So, we're going to focus on SD-WAN, we're going to focus on Fabric, we're going to focus on Data Center, operational technologies and then S.A.C., because we do think, you know, S.A.C. operations, is an area, that cybersecurity and the number of tool sets are introduced, it's an area that we need to grow into as a company as well. >> Lots going on. >> Lot's going on, yes. >> So as you consider some of the challenges that your partners face, we talked a little bit about this with Patrice, partners, throughout the industry are hurting as they try to transition from a more traditional hardware to whatever's going to be the steady state, >> John: That's right >> with the Cloud and the Edge having such an impact. Education is crucial. You not just get your customers educated about how cybersecurity works, but your partners need to be increasingly educated so they can find those opportunities, niches, stay in business, help you engage, how's that playing out? >> My number one initiative as the channel leader is to drive partner competency and preference. And so, going back to competency, if we can build partner competencies, they're going to build a healthier, more margin rich business around the Security Fabric, which then, selfishly, is going to lead them to delivering more preference around Fortinet. But there's no doubt, it's a changing dynamics. Business models are changing on the fly. We're seeing evolution of VAR to MSP, and MSP to MSSP, and we are laser focused on capitalizing that. Our FortiSIEM technology for instance is, I really view as a Beachhead technology for us to go capitalize that MSP market in the mid-market. I think that the evolution of consumption to more of a consumption model away from a transactional acquisition, also lends itself to new and innovative programs that need to be delivered. In fact with our North American distributors, in the past six months, we've introduced hardware as a service, to reduce, you know, to position things as an operational expense, which may be more in tune with how customers are purchasing today, and we've introduced FortiSIEM for MSSP. The evolution of VAR to a service provider can be very capital intensive, and so one of the things that we've done with our hardware as a service and FortiSIEM for MSSP, we've really tried to reduce the cost of the entry point, and drive more day one margin opportunity for those partners. >> Let me build on that if I may Lisa, so Ken and Mike have done a pretty phenomenal job of steering Fortinet into the future and anticipating some of the big changes that have occurred. You guys have therefore pretty decent visibility into how things are going to play out, and are now large enough that your actually participating in making the future that >> Right >> Everybody else is thinking about. When you introduce a product, I mean, it takes a period of time for your partners to get educated, to up-skill, to really set themselves up to succeed in this dynamic world. Are you introducing educational regimens, competency tests, providing advice and council about the new competencies they're going to need, in anticipation to some of these, some of the roadmap of the, to the future that you see? >> Yeah, so two things I'll touch on there is you know, the NSC program has been wildly successful program for ... >> Peter: No what does NSE stand for? >> Network Security Expert so it's a training course where for a partner and you've got new team members coming on board, the NSE113 really enables them of how to position, you know, Fortinet, and what the challenges are in a network in a cybersecurity environment today. With the elements four through eight being more technical. We've seen over 200,000 certifications being adopted globally, so, I think, part of the visionary capabilities that Michael and Ken have, is they've incorporated the education piece of it, and so carrying that along, and so as we do introduce new products, it's built into the NSE modules. I'll point to one of the most successful things we did in 2018 was called Fast Tracks, and so we've basically taken the NSE content and put it into consumable two hour, hands on, technical labs for our partners and customers. We had a goal in 2018 to hit about a thousand people going through the Fast Track program, we hit over eight thousand people. So, we know that there is a thirst for knowledge out there and the company's done a really good job, through the NSE program, the Network Security Expert Program, through out Network Security Academy Program, and through our Fast Tracks to drive that necessary enablement. >> Peter: That's very exciting. >> Yeah I know absolutely, I mean, it's a fantastic time to be at Fortinet, its a fantastic time to be a Fortinet partner, and I think with the announcements that we made today, we're really trying to set our partners up for success, and help them build a all encompassing business around the Security Fabric. It's a very noisy industry out there. There's a lot of point based solutions that, that lack the integration and really you need an integrated set of solutions in this, you know, expanding digital footprint that customers are faced with. >> So when we talk about education and I'm glad that you guys brought that up, that was a big topic, it was a pillar that Ken talked about, that Patrice talked about as well, it was one of the core pillars that was talked about at the World Economic Forum that was just a couple of months ago. So as we talk about education and educating your partners, I'd like to kind of flip that and ask how are your partners educating you on, these are the trends and concerns and the issues that we're seeing in the market today, to help influence the direction of Fortinet's technology? >> Yup, you know it's funny that you say that, I've been in partner meetings all day today, and it's great I get to spend, I don't think I've ever been this popular and definitely not in high school or college, but in spending time with partners and understanding their challenges it's good to see that our focus on the competency and preference and providing consumption modeling, fits to exactly the challenges that they're faced with, because VARS will tell you that the transition from being a reseller to an MSP can be very, very expensive. And so, with FortiSIEM for MSSP and the as of service offerings, we're reducing that. And so, there are , they're resonating to that. But the other thing is, for the mid-market customer, the Security Fabric alleviates the need for the Cyber skills gap, right? We can't hire fast enough, and so, by depending upon the broad integrated and automated posture that this Fortinet Security Fabric allows, it really allows partners and customers to overcome some of the challenges, just from a head count standpoint. And I think that the NSE program also does a very good job of filling that gap as well. >> So the partner used to mean, these are the, for that group of customers, who our direct sales organization can't make money on, we will give them to partners, or the very, very large, for a very, very large company that's owned by Accenture or owned by Dimension Data, or something like that, >> Yup >> We'll work with them and deliver it. And that kind of middle was kind of lost. But even today, that Loewen, that idea of segmenting purely on the basis of how big they are, is problematic because there's a lot of small companies happening because of this digital transformation they're going to very rapidly grow into some very, very big footprints. >> Absolutely >> So how is that line between what Fortinet does, what the partner does, what the customer does, to achieve these outcomes, starting to shift? >> We're going to be introducing an ecosystem based approach. It's called Partner to Partner Connect, and it is to actually do that very thing. For those partners that may be in the mid-market, that need those expertise, we're going to allow partners to create almost a marketplace of service offerings so they can fill their gaps and they can build meaningful practices, leveraging what Fortinet is doing, but also leveraging somewhat some of our other partners are doing. We're seeing this immediately done with our distribution partners, in North America, and we're going to be introducing the Partner to Partner Connect later this year, and accessible through our Partner Portal. >> And those competencies that are associated with the NSE and the education, then become part of those Partner to Partner brands >> John: Absolutely >> Which makes it easy for those partners to be more trustworthy of whatever accommodations they put together to serve customers. >> Yup, I'll give you an example. So, we're also going to be announcing tomorrow afternoon in our North America breakout session, a Cloud Channel Initiative, and so our goal with this Cloud Channel Initiative, is to allow partners to build meaningful security and networking businesses in the public Cloud. We're going to utilize blueprints for reference architectures, we're going to align with education and certification, and then we're going to guide them through enablement to go to market. That's one of the things also we released this week was the NSE7 for public and private Cloud. So again, as we introduce new technologies and we introduce new opportunities, we're also aligning that to education as well, so the partners can be self service, because the better job a partner does is developing that competency , then the more services rich they're going to be able to deliver to the end customer themselves. >> What are some of your expectations in terms of FY19, I know this is a 20% year on your growth that Fortinet as a company achieved last year, I imagine a good amount of that was driven and influenced by the channel, but as this momentum continues to grow, as we saw this morning, and we've heard throughout this show today, what are some of your expectations about growing the number of partners in the programs that you talked about, like by the end of this year? >> Yes, we recognize, you know, first of all we appreciate our partners so much, and we want to ensure that we are enabling their business we're absolute in active recruitment mode. You know, we're currently going through recruitment and reactivation campaigns with partners that we want or maybe have done business with us before. We see we're coming off of a quarter in which we set a record for the most deal registrations and so that's really the metric in which we look for partner impact. They bring us an opportunity, we give them additional margin and we protect them. So, Q1, fiscal Q1 for us, was our largest deal registration quarter we've ever had. And in 2018 we saw a 52% increase in closed opportunities through our deal registration program. So the impact of the North American Channel is absolutely being felt and we're really excited about the new partner program and what it's going to allow us to do as we expand more into the MSP market, more into the Cloud market, and then hopefully go enable that whole consultancy layer that's out there as well, to help customers on their journey. >> So in terms of your session tomorrow, 'Transforming Your Profitability with Fortinet's Tailor Made Programs,' you mentioned some of the new announcements, what are like the top three take aways that attendees from that session are going to walk away with? >> Well it's going to be, we want to drive partner initiated revenue, we want to do that through competency development, through Widespace account penetration, and through meaningful investments that allow our partners to scale their business. >> Lisa: Lot of momentum, John thank you so much for visiting with Peter and me on theCUBE this afternoon, we can't wait to hear what great news you have next year. >> I look forward to it, thank you both. >> Excellent, our pleasure. For Peter Burris, I'm Lisa Martin, you're watching theCUBE. (electronic music)
SUMMARY :
Brought to you by Fortinet. to combat those challenges to be successful. The keynote this morning started with a lot of electricity here about close to four thousand. reaction from the channel to all and our customer profile continues to and the Edge having such an impact. as a service, to reduce, you know, and anticipating some of the big changes that have occurred. some of the roadmap of the, to the future that you see? you know, the NSC program has been wildly successful of how to position, you know, Fortinet, that lack the integration and really you need and the issues that we're seeing in the market today, and it's great I get to spend, they're going to very rapidly grow and it is to actually do that very thing. for those partners to be more trustworthy then the more services rich they're going to be able and so that's really the metric in which Well it's going to be, we want to drive we can't wait to hear what great news you have next year. Excellent, our pleasure.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
John Bove | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Michael | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
John | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Ken | PERSON | 0.99+ |
Jon Bove | PERSON | 0.99+ |
Patrice | PERSON | 0.99+ |
Dimension Data | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
Accenture | ORGANIZATION | 0.99+ |
Mike | PERSON | 0.99+ |
52% | QUANTITY | 0.99+ |
forty countries | QUANTITY | 0.99+ |
two hour | QUANTITY | 0.99+ |
tomorrow afternoon | DATE | 0.99+ |
last year | DATE | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
North America | LOCATION | 0.99+ |
tomorrow | DATE | 0.99+ |
next year | DATE | 0.99+ |
Q1 | DATE | 0.99+ |
2019 | DATE | 0.99+ |
Loewen | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
eight | QUANTITY | 0.98+ |
North American Channel | ORGANIZATION | 0.98+ |
today | DATE | 0.98+ |
theCUBE | ORGANIZATION | 0.98+ |
fiscal Q1 | DATE | 0.98+ |
over 200,000 certifications | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
four thousand people | QUANTITY | 0.97+ |
over eight thousand people | QUANTITY | 0.97+ |
this week | DATE | 0.96+ |
later this year | DATE | 0.95+ |
NSE | ORGANIZATION | 0.94+ |
couple of months ago | DATE | 0.94+ |
four thousand | QUANTITY | 0.93+ |
end of this year | DATE | 0.93+ |
first | QUANTITY | 0.92+ |
2020 | DATE | 0.92+ |
this afternoon | DATE | 0.92+ |
this morning | DATE | 0.91+ |
Fortinet Accelerate | ORGANIZATION | 0.91+ |
past six months | DATE | 0.91+ |
FortiSIEM | TITLE | 0.89+ |
two things | QUANTITY | 0.89+ |
Transforming Your Profitability with Fortinet's Tailor Made Programs | TITLE | 0.87+ |
mpact | ORGANIZATION | 0.87+ |
a decade ago | DATE | 0.87+ |
World Economic Forum | EVENT | 0.87+ |
Peter Doggart, Symantec & John Maddison, Fortinet | Fortinet Accelerate 2019
>> live from Orlando, Florida It's the que covering Accelerate nineteen. Brought to you by Ford. >> Hey, welcome back to the Cube. We are live at forty nine. Accelerate twenty nineteen in noisy Orlando, Florida, and Lisa Martin welcoming to Guest to the program one you know and love Well, John Madison, the executive vice president of Products and Solutions at fourteen. That and gentle Mary, please toe also welcome Peter Jogger, the vice president of business development from Symantec. Welcome back. Welcome. >> Thank you. >> So, guys, Partnerships, symbiotic partnerships. We've been talking about partnerships all day. Now we want to talk about what's new? Fortinet and semantic. You guys just announced a couple months ago an expansive partnership. Peter, let's go ahead and start with you. You guys just like we're gonna partner to deliver the most robust and comprehensive cloud security service. Why did semantic decide to partner and collaborate with forty minutes and why now? >> Absolutely. So when we think about what our customers they're going through, they're going through a digital transformation to Billy to the cloud on DH. We wanted to make sure that we perform the best possible technology for our customers. We chose fortunate way were great partners. Actually, before this whole thing started, we looked the technology that they had to offer repaired it with what we had in our Web security service. There was a fantastic fit, and so far with the show today and accelerate, we made the right choice. >> That's always good, right to get some validation there talks to us about the from from Maybe from a customer's perspective, what were some of the drivers saying, Hey, guys, this partnership could be really beneficial for your doing part. Customers, partners and each company. Yeah, well, they think it's >> a very expensive relationship. Peter just talked about having our next year firewall inside their cloud, providing security there. There's also opportunity at the end point for sound. Full semantic is the largest endpoint hundred seventy five million or something. In points out, there were the largest network security vendor in terms of implementation. Some four million firewalls out there what customs they're saying they want their security solutions to work together there, one the end point to see the network. They want the networks to the end point one exchange information, so one of the other integration points is between the end point on our next generation firewalls providing policy exchange, providing the ability to exchange information. So if I'm a large customer and I've got a very all encompassing degree off implementation ofthe semantic endpoint separate think it's called on DH, they've got Fortinet taken. Simply connect those two together, provide a very comprehensive solution. So we get some great feedback from our customers around them. >> Talk to me a little bit more about that. Are you seeing this adoption on? You know, both semantic and forty eight have customers in every industry of many sizes, but in terms of some of the successes that you're seeing, I know this is still really early on. What are some of those that really excite you? That, like Peter, you said we've made the right choice. >> Yeah, I'll just follow on from a comment you made Whether you're a medium size customer, the largest financial customer, security is a very tough thing to solve on. What you don't do is add complexity to that problem. You also wanna make sure you don't cost as well. So the really cool thing we're doing here is through the collaboration through the integrations that John spoke about between the employment network and secure rst. One of the fabric we're actually solving those problems in very intuitive ways is seamless for the customer. It just clicks together. That's what it should be like. We don't have any complexity here, and that's you know, that's what we're doing this, right? >> Yeah, and I think, think for customers Every time they need toe, add a security solution, it makes more complex. It's more costs, more operational overhead. So if they've got existing vendors like Semantic at the end, point off a cloud security and they've got Fortinet in there for SD when our next fire war, if >> we could >> simply switch on the connectivity policy exchange threat, intelligent exchange between those two things is great for the customer because they instantly get a better solution is more secure. It's more cost effective, >> of course, customers. You mentioned you guys both mentioned a couple of words that every customer wants seamless wanted to click in kind of plug and play. Obviously, it's it's a cut ostensible undertaking to integrate your solutions talked to us since this was just announced a few months ago. Where are you in terms of integrating the technologies. I think we saw the next Gen firewall integrated into semantics. Web security service and semantics. Endpoint solutions integrated into the security fabric. Where are you guys on the faces of those integrations? >> Well, let people talk about the WSSC. >> Yes, eso I think one big yellow into this as I just mentioned Wass Web security service. We have data centers around the planet on what we're doing is we're taking the virtual Forget solutions were installing them. Now in all of our data pods Andi were in the We're starting the rollout phase this summer. Andi will be probably finished done with it as we get into the fall season around the planet and we'LL be switching that that that on and they really cool bit about This is it's going to be one single interface. The customer just simply switches on five walling i ps Next one firewall. It's completely seamless >> from a management perspective policy upside looking through one crystal ball, >> one cloud security says service. >> Yes, on the end points mourners to develop. So we have to develop this connector of our election and firewall into the end point. And we're looking probably toward the end of this port early Q three. To do that on we'LL start rolling that out across are different operating systems. >> Talk to me about part about the channel, so I know forty nine is very much dedicated to the channel we've had with a number of your partner's on. I know you've Got John both coming up next and Facebooking with him for several years. Saw a lot of statistics, a lot of revenue growth, front of growth, affording that driven by the channel. One of the main kind of pillars that was discussed in the keynotes this morning was education. Talked about technology, talked about equal system collaboration. Education. How are you guys working together to educate your joint partners? Teo. Understand that the impact potential that Fortinet and Cemented customers are about to have? >> Yeah, from a training perspective. Obviously we have our own individual training programs, and as I was saying earlier, I think one thing that's very important to customers is more of an architectural approach. I want to look at an architecture of a four or five years. I don't make sure all these pieces are integrated inside there, so one of things we do initially for something, something like this for our partners. This produced boats are fast track. A fast track is a small module. Off training was focused on hands on training off both components to make sure that all our partners understand how to integrate. How to make that work as soon as possible. Then, before I followed that up with some more detailed training on on both solutions. >> Excellent. And from a relative perspective, this is something that's going to be going global by the way it's >> gonna go fast. It's going to start next week. So and the nice thing is when we map out our channel party because semantic is a channel very channel friendly company as well. We've got some great overlap, but there's also a ton of white space there for a partner, too. So I think it's going to really help both, obviously, our fields, but also our channel partners engaged, group broader and grow deeper into opportunities, >> and we need that. Security is a pan industry challenge, as every organization now lives and successful lives in this hybrid multi cloud world, millions of connected devices every industry has to react otherwise every business in every industry. Otherwise they face going out of business. I noticed that, though, that there were a couple of tracks here. John. Some sessions focused on a couple of verticals healthcare financial services. Retail, for example. Are you expecting to see any leading edge industries joint customers that really are ripe for this integrated solution? >> Maybe. But I also think that smacked. It's got a huge footprint across all the verticals across all the segments, the same as us. And so I think initially, you'LL see some of the larger companies who have these huge footprints of M points and network security. Implement these connectors, implement the cloud security and, as you see that roll down into the segments as well. >> So we're at the event today in the last couple days. What is that? Some of the feedback been from partners, but from also and user customers. Since there's about about four thousand people here today, John, what are some of the things that you're hearing? >> Well, we've been talking to some of our customers before here, obviously on DH overwhelmingly positive feedback from the large customers I spoke to some partners to hear today as well. They really like the ability to bring together on M point leading edge endpoint solution on network solution with cloud attached to it as well. So it's not often, actually I've done a partner announcement and I've seen so much excitement, not only with some of our some of the customers, all the customers on all the partners, but also both organizations. We announced it to ourselves. Organizations were doing that with semantics later on. That's right this week and I see a lot of excitement. So I think that bodes well going forward. >> And I imagine, Peter, you're hearing similar feedback from semantics and Sol days. >> Yeah, I mean, it's just been tremendous. This show for me has cemented the fact this is gonna be a very special partnership. The feedback I've been hearing from potential customers, our own customers coming to us, who say, Hey, I've got these solutions. It's fantastic. You doing this now to our partners saying, You know, this is this is truly amazing what you're doing it is very rare. You find these two companies that could come together in a meaningful way that can actually really impact what we're all trying to do here is find the adversary. >> Yeah, I mean, you look at that. Both companies that are big companies Cyrus critic companies think semantics. Probably enterprise in the top two. Top Juan we're in the top five easy, huge companies on our footprints. From a part of perspective is a bit of overlap here and there, but not really. Which makes is exciting, I think, for our partners for both companies, I think, yes, we you know, I see these relationships where it's a local exchange or we'LL do a bit of this integration on this AP I hear this is a truly very integrate solution for both our channel partners on our customers. >> And let's talk about competition that came up a lot during the general session this morning where just a few times a few people mentioned it, you know, in past saying on giant slides with arrows pointing, No, I'm kidding, but really what? What was very clear, I think, from not only the general session this morning, but also somatic that we've heard on the Cube today is the industry leadership, the product leadership that forty nine is demonstrating, but also, you know, telephoto networks Cisco some of your other competitors where really proudly showing this is where we are in relation even so far as the number of Gardner Insight partner appearance I reviews that Fortinet has gotten vs your competitors. So let's start with you, Peter. Talk to us about the competitive advantage that Symantec sees this partnership being able to generate. >> So the the way the way we look at it, is we're going to come to market now. We're both way with love technology. I think we can agree that we're both very much technology forward, very research forward, bringing this pieces together. When you do that, you're goingto win. Andi. If you do that in a way that is highly integrated, you're going to be. The competition is going to have a clear advantage. We're going to do text a faster. We're going to respond to start faster. It's just going to show Ray very well on DH. I'm not going to appoint a particular competitors. Don't mention the name way. We're obviously very large player in industry, but way like this a lot again. We think that if you make a very big impact, so let's see where it goes >> and John any predictions on what those graphs might look like it accelerate twenty, twenty, >> twenty twenty. That's a long time away from now, but I You know what? We continue to grow as a company. We take marketshare. We're aligning with some of the big players, such a semantic in the marketplace. So those graphs definitely up until the right, is that the right direction? >> That's the right direction. And last question is, we talked a lot about data sharing on a number of our segments. Today is semantic and forty that sharing threat intelligence and if so, why? Is that a good thing? Why is that >> important? Where where she, both founders of the cyber threat, aligns the C t a way already share way did that for two years ago. At least I know we're expanding. That strong was staying with really time on the ground. Three intelligence sharing between our products between the fabrics that would happen just automatically. >> It's important that you got the global sharing through the T A, but also going for because of targeted attacks. You have the local sharing, so we'LL have global sharing with big amounts of threat intelligence and data, but at the local level between the end points on the network's puree will have threat sharing there as well. >> But this is important to do that fast Security changes by the second. If you don't react to something quickly, If you don't share the intelligence that's actionable on relevant, you may as well just give up. You're gonna be fast, responsive >> and lasting. Last question is you mentioned the word react and we talked about that a lot today, as well as how and I'll ask you both thiss Peter, we'LL start with you. How is this partnership going to enable your joint customers to eventually go from being reactive to proactive to predictive? >> They're for sure. Well, I thinks of these integrations we're working on is all about being proactive. So is an example. If we see something in our network we've seen in a corner case, we can automatically give it over Too fortunate they'LL be inoculated everywhere around the planet in every single device. Advice first. So, unfortunately, something in their network that we've never seen before we can inoculate all ofher own points. All of our customers, that's been truly proactive. That's how you get ahead. >> Yeah, it's all about showing that threat intelligence is fastest possible across much of the attack surface is possible, and that's where the relationship >> Well, guys, thanks so much for stopping by the Cuban sharing with us a little bit more about the partnership with semantic and Fortinet. We look forward to hearing what comes in this year ahead, and we'LL talk to you next year. You look, we want to thank you for watching the Cube. I'm Lisa Martin Live from Fortinet. Accelerate twenty nineteen. Thanks for watching.
SUMMARY :
Brought to you by Ford. you know and love Well, John Madison, the executive vice president of Products and Solutions at fourteen. Why did semantic decide to and so far with the show today and accelerate, we made the right choice. That's always good, right to get some validation there talks to us about the from from Maybe from a customer's one the end point to see the network. but in terms of some of the successes that you're seeing, I know this is still really early on. One of the fabric we're Yeah, and I think, think for customers Every time they need toe, add a security solution, simply switch on the connectivity policy exchange threat, intelligent exchange between Endpoint solutions integrated into the We have data centers around the planet Yes, on the end points mourners to develop. a lot of revenue growth, front of growth, affording that driven by the channel. How to make that work as soon as possible. And from a relative perspective, this is something that's going to be going global by So and the nice thing is when millions of connected devices every industry has to react otherwise It's got a huge footprint across all the Some of the feedback been from partners, positive feedback from the large customers I spoke to some partners to hear today as well. This show for me has cemented the fact this Probably enterprise in the top two. from not only the general session this morning, but also somatic that So the the way the way we look at it, is we're going to come to market now. We continue to grow as a company. That's the right direction. Three intelligence sharing between our products between the fabrics that would happen just automatically. You have the local sharing, so we'LL have global sharing with big amounts of threat But this is important to do that fast Security changes by the second. going to enable your joint customers to eventually go from being reactive to around the planet in every single device. Well, guys, thanks so much for stopping by the Cuban sharing with us a little bit more about the partnership with semantic
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Peter Jogger | PERSON | 0.99+ |
John Madison | PERSON | 0.99+ |
Symantec | ORGANIZATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
forty minutes | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
two companies | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
both companies | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
next week | DATE | 0.99+ |
five years | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Mary | PERSON | 0.99+ |
both | QUANTITY | 0.99+ |
four | QUANTITY | 0.99+ |
Both companies | QUANTITY | 0.99+ |
hundred seventy five million | QUANTITY | 0.99+ |
Accelerate | ORGANIZATION | 0.98+ |
both solutions | QUANTITY | 0.98+ |
forty | QUANTITY | 0.98+ |
Ford | ORGANIZATION | 0.98+ |
Semantic | ORGANIZATION | 0.98+ |
both components | QUANTITY | 0.98+ |
each company | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
Peter Doggart | PERSON | 0.98+ |
Andi | PERSON | 0.98+ |
this week | DATE | 0.97+ |
two years ago | DATE | 0.97+ |
both organizations | QUANTITY | 0.96+ |
this morning | DATE | 0.96+ |
second | QUANTITY | 0.96+ |
about four thousand people | QUANTITY | 0.96+ |
John Maddison | PERSON | 0.95+ |
Billy | PERSON | 0.95+ |
forty eight | QUANTITY | 0.95+ |
twenty | QUANTITY | 0.95+ |
Lisa Martin Live | TITLE | 0.95+ |
one | QUANTITY | 0.95+ |
this summer | DATE | 0.94+ |
Juan | PERSON | 0.93+ |
Teo | PERSON | 0.93+ |
this year | DATE | 0.93+ |
Gardner Insight | ORGANIZATION | 0.92+ |
forty nine | QUANTITY | 0.92+ |
twenty nineteen | QUANTITY | 0.91+ |
first | QUANTITY | 0.91+ |
millions of connected devices | QUANTITY | 0.91+ |
Cube | TITLE | 0.91+ |
one single interface | QUANTITY | 0.9+ |
one thing | QUANTITY | 0.9+ |
Ray | PERSON | 0.9+ |
executive vice president | PERSON | 0.89+ |
John Maddison, Fortinet | Fortinet Accelerate 2019
>> live from Orlando, Florida It's the que covering accelerate nineteen. By important, >> Welcome back to the cubes. Continuing coverage of Fortinet Accelerate twenty nineteen. Live from Orlando, Florida Lisa Martin with Peter Births and we're pleased to welcome back to the Cube. One of our alumni. John Madison, the executive vice president of Products and Solutions from Fortinet. John, It's great to have you back on The Cube >> is great to be here again. >> Lots of momentum. That fourteen that is coming into twenty nineteen with I can't believe we're in April. Already, lots of growth in revenue product revenue was up. You guys talked about the expansion of the partner network with some of your fabric ready partners on already today. You talked about this third generation and security. How fortunate is uniquely delivering that for our viewers who you weren't didn't have the opportunity to attend. Your keynote kind of talked to us about that in this hybrid world. How is supporting that delivering this third generation? What makes you guys difference? >> Yeah, so we talk about the third generation now. Everyone has different generations. That's fine. We call it the security driven networking, and it's really the Genesis ofthe forty nine for a long time in bringing together networking and security into one place. I think these days or in the past, people have built out the networks, the network layer. Then they try and connect users and applications. And they go, Wait a minute, this person security over here in a bit, over here and over there in our mind, start with both. Start with a security driven networking concept. Make sure it works end to end, and that will be the most sophisticated, most secure application and network you can have. >> And what enable supporting that to deliver this unique. Because a number of times today and Ken's key nodes, I think Patrice as well. I can't recall if yours competition came up where the audience was shown the strength in numbers that fourteen that has what makes us unique and what you're delivering. One of >> the key differentiators from the start is being making sure we can run a routing stacks. Sometimes today he referred to as ehs tea. When Stax or so security stacks in a very small footprint, and to do that, you need to spend a lot of money on what we call security processes which go inside our appliances, but to make sure that runs very fast. But having said that, I definitely think customer is going to be in a hybrid world forever for a very long time, at least anyway, where not only appliances but also virtual machines and FBI security. We also talk about this fabric concept that ables to cover the incomplete digital attack surface. So there's a very important point, and we find a lot of customers now agreed that they want to consolidate. They want to make it simpler. They need to move faster to this digital world, and anyway, you have to do that is through a consolidated >> approach. So let's build on this. They want to consolidate. They want to make it simpler, more common, and how the policies and management now along comes. Yet what's the dynamic there? >> But what's happening is that all the people referred to the perimeter disappearing. Okay, that's happening to a certain extent because data's moving into cloud. You've got different one implementations, but what's happening when you do that is to creating New Edge is a really good example, a zesty wherein which used to be very closed off. The one used to be something that connects branch offices back to the data center, but nobody got involved in that. Well, now you're opening up that when two different types of transport mechanism you're creating an edge I always refer to these edges is being created by different trust levels. There is a maybe a secure trust level here, less trust here. It creates an edge, and you absolutely need to protect all those edges. >> Would give us an example that So, for example, when you say differentiated trust levels, my edge might be at a customer location. Is that kind of what versus my edge might be in a branch office? Is that what you mean by different trust level? Push that concept for >> you know, It's more, for example, if I got a branch office and I've got one connective ity going back to my data center that's encrypted and secure. But I've also opened up connected to the Internet, the trust level between that encrypted link on my connection to the to the Internet's very different Internets open. Anyone can see they're so that trust level between those two is very different. and that's what creates the edge. >> And so, therefore, that becomes a key feature in how we design different edge implementations. It >> is. It's also a key requirement on what type of deployment Mody use have appliances have virtual machines. We have clouds, containers. AP eyes going forward. I'm finding that customers are still very reluctant to put software implementations of firewalls against the Internet. Appliances are hardened. They run faster. Having said that, inside the cloud, obviously, and inside software defined data centers virtual fine. >> Where some of those customer concerns that you're hearing >> well, I think what happens is, you know, if you putting a piece of software against the Internet, it's open to all sorts of attack. It's the same as giving I P addresses to anything. It's like a factory that creates an edge as well, and you need to harm that age against that. >> And how can Estevez When How Why is this such a crucial component of digital transformation? >> You know, sometimes markets are over hyped. I remember the Casby marketplace a few years ago. It just was a feature. To be honest, I think sd one extremely important. The reason is important is the SD one controller. That controller eventually tells users and devices how to get to the applications. And so I tell customers that investment for you is extremely important. You need to own it. You need to make sure it's flexible. Need to make sure it's secure. And so I think the SD, where marketplace or one edge is the kind of larger term for it is extremely important investment for customers. Do >> you anticipate that? I mean, you guys invested. You guys put forward a lot of products, made a number of different announcements again, going back to that notion of simplicity, that notion of consolidation. What is the breaking point for your typical group in terms of the complexity of that they can accommodate and absorbed? When we start adding additional function within the overall network, especially from a security standpoint, >> well, I think it's a bit broken already. They're really struggling to keep up from our perspective. No, today we announced our forty or sixty twos are major operating system, and what we try and do is consolidate functionality as much as possible. Inside our fabric through a single console, there was single operations capability, so it's easier for the operations people. For this critique people to implement things and find information. Ross implementing order made in mechanisms like security ratings. We should do a background run off best practices, for example, that make it again easier for those those teams to run a full analysis. What's going on? >> So was it about three hundred features roughly roughly >> accountable individually? >> Okay, good. We'LL do a recount of that, but a tremendous amount of feature addition to forty OS announced today. What are some of the things business outcomes? Peter and I were talking about outcomes with several of our guests earlier. Business outcomes, New revenue streams New product's going to market faster, the also being able to become less reactive, maybe more proactive in terms of security codes. Can you walk us through some of the outcomes that fourteen customers can expect to achieve from some of the O. S announcement in the handsome? It's already >> talked about one, which was the consolidation, which means they can do multiple things with single platform us, an important one for them. Also, some of the some of the cost savings around that's on the operational cost savings. I think also for our partners. For example, they like the fact that we're keeping that we keep adding services on top of that fabric. They can take those services, then apply them to their customers and make sure they can add value inside as well. So there's two angles to it. The one is making sure our customers are better protected. They can consolidate, save money, invest better training and then to our partners so that they can provide more value to their customers. >> So one of the things we're talking about is the fact that you have invested in a six it's and security processing units and content processing units, etcetera, that are capable of accelerating the rate at which these crucial security algorithms run. That opens up That creates additional capacity to add more function both for you as well as your partners. Are you starting to see some of your ecosystem grow faster as they better exploit that inherent power and performance that you have within your appliances and devices? >> Definitely. I think we're seeing new partners come from new areas. It also fragments of it, and that's why we announced this new partner initiative going forward, which is a bit more customizable, but but I, you know, I do think that going forward, both our customers and our partners are looking for more of an architecture approach again. If you go back five years, here's a box and off you go and install it, and we're good on again When you saw the security threats. Yes, we produce a point solution to fix the normal way. Keep moving on. They're now looking at architectures over the next five years, known only just cybersecurity architectures but Network Inc architectures, storage architectures and all coming together. So we definitely need to train our partners. I think here we had over fifty of are what we call Network's network security expert. Eight. It's the highest level of architecture and half of the partners, But going forward, we see much more partner involvement in architecture approach on. Our customers want that because they don't want to have a point solution that's out of date in a year's time or a new threat comes along and makes it redundant. >> So how are you? You mentioned you mentioned network security and storage. What other things are starting to inform that architectural approach that you're taking. >> It's everything now. So we know the factories now a completely automated all that. If utilities of I P addresses are running almost all the way down to the end point, just everything has more flexibility and more open eso. Definitely All that information's bouncing around inside I ot devices inside the wire inside data centers on all that data needs protecting. That's the key of protecting the data. And to do that again, we keep saying you need tohave. An integrated approach to networking and security >> Has the customer work with forty Net and your partner ecosystem to achieve that integrated approach. Assuming that there is a, you know, an enterprise out there that's got a spectrum of hybrid multiplied environment with the spectrum of Security point Solutions pointed it in a different components of an infrastructure. How do you help them on that journey of taking the many disparate security solutions and leveraging the power of fourteen and your partners to get that integrated, truly integrated, consolidate consolidated view? It's a couple >> of steps, maybe, maybe many steps. The first one is, oh, customers don't want to throw everything else straightaway. So what they want to do is build to integrating Connect. So we have some of our partners. Here, for example, are fabric ready partners way have connectors. We build into their platforms and orchestration systems, and that's their first step. Once they get there, they start looking across to see what they can to consolidate. So can they take a specific solution from this and I'm bringing inside? And then eventually they start to look at the long term architecture if they're moving APS to the cloud or they want to open up their wear or the one who provide kind of SD functionality inside their branch, So it's definitely a phase approached. I don't see many customers. Some customers would take an application and created from scratch inside the cloud. They can't do that with their infrastructure, the kind just completely wipe it clean. Start again. It's definitely more of a phase approach. >> So if you think about the face approach on you, talk way heard from, uh, we heard from the sales of sport side the notion that the S P s the service providers want greater customization. The enterprise wants a different level of access to the core technologies, so that they could do not customization. Not exactly remember Jack with the term was what What degree will customers retain control over how that architecture gets implemented versus what degree is going to get baked into the stack itself? A >> bit of >> both, I think, you know, for most customers, they're running towards a digital platform on. They need to own the digital powerful. If they give up complete control, how do they control that destiny going forward? So they want to own the digital platform, but they haven't got the resources to do everything. So that allows saw some to service providers and carriers. Some of the partners, for example. But I'm going to keep coming back to this. They want to get to a point in five years time, but they've got a digital footprint, is very flexible, but they also want to make sure it's very secure because as you open up that digital footprint, you opening up all these different edges. Inside the network, >> it's coherent, which is the are contested approach. Yes, because if they don't have a coherent approach to doing it, they don't know what interfaces are or are not competent, and that includes interfaces with partners. >> Yeah, they have to look forward and say I'm gonna implement X amount in the cloud. Arnot gonna have some edge compute going on here. I want to shake. Make sure my branches have the best quality of service for these certain applications that go back to this. So they would look at all those parameters and an architect, something from there. >> So we know that security network, security app, security info, security cloud security is our imperatives for every industry. But I didn't notice that the breakouts today feature. I think there's a couple of vertical features healthcare, financial services, retail. I was just curious. Are theirs just great use cases that show the potential power of forty nets technologies? Or are those industries that are either early adopters or maybe more leading edge? Because they have such a tremendous amount of data that needs to be secured as their ecosystem does this? >> Yeah. So the industry verticals, I think I think for the very large ones, they're very similar. All of them have I ot this expanding order and wanna have a flexible land system. Almost got something. Some computer power in the cloud and the edge going forward. So I know there's differences and industries. For the very large enterprises, it's the problem. Seems the same. This huge organizations, and they have all of these things going on in the right corner at you. Calm down, Toa mid enterprise. I think there's more reason to consolidate. But you seymour differences in the way the approach, things like health care that really, really focused on that healthcare kind of security of devices inside hospitals, et cetera. Education. Oh, they need to connect in these big data banks. Transfer the research information. So big organizations, I say pretty much the same problem. Midsize organizations become more relevant to the specific industry. >> Well, John, thank you so much for carving out some time to speak with Peter and need Today. We appreciate that. And it's exciting to see and feel the mo mentum the forty Niners bringing into twenty nineteen. >> Well, thanks for inviting me. >> Our pleasure. We want to thank you for your time is well for Peter. Boris. I'm Lisa Martin. You're watching the Cube
SUMMARY :
live from Orlando, Florida It's the que covering John, It's great to have you back on The Cube of the partner network with some of your fabric ready partners on already today. it the security driven networking, and it's really the Genesis ofthe forty nine the audience was shown the strength in numbers that fourteen that has what We also talk about this fabric concept that ables to cover the incomplete more common, and how the policies and management now along comes. to be very closed off. Is that what you mean by different trust level? the trust level between that encrypted link on my connection to the to the Internet's very different And so, therefore, that becomes a key feature in how we design different edge implementations. of firewalls against the Internet. It's the same as giving I P addresses to anything. And so I tell customers that investment for you is extremely made a number of different announcements again, going back to that notion of simplicity, for example, that make it again easier for those those teams to run a full New revenue streams New product's going to market faster, the also being able then apply them to their customers and make sure they can add value inside as well. So one of the things we're talking about is the fact that you have invested in a six it's and security It's the highest level of architecture and half of the partners, What other things are starting to inform that architectural And to do that again, we keep saying you need tohave. Assuming that there is a, you know, an enterprise out there that's got a spectrum of hybrid they start to look at the long term architecture if they're moving APS to the cloud or they want to open up their wear or level of access to the core technologies, so that they could do not So that allows saw some to service providers and carriers. Yes, because if they don't have a coherent approach to doing it, Yeah, they have to look forward and say I'm gonna implement X amount in the cloud. amount of data that needs to be secured as their ecosystem does this? I think there's more reason to consolidate. And it's exciting to see and feel the mo mentum the forty Niners bringing into twenty We want to thank you for your time is well for Peter.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Boris | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Peter Births | PERSON | 0.99+ |
John Madison | PERSON | 0.99+ |
John | PERSON | 0.99+ |
April | DATE | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
forty | QUANTITY | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
Network Inc | ORGANIZATION | 0.99+ |
two angles | QUANTITY | 0.99+ |
Eight | QUANTITY | 0.99+ |
Jack | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Ken | PERSON | 0.99+ |
today | DATE | 0.99+ |
fourteen customers | QUANTITY | 0.99+ |
first step | QUANTITY | 0.99+ |
five years | QUANTITY | 0.99+ |
fourteen | QUANTITY | 0.99+ |
forty OS | QUANTITY | 0.99+ |
sixty | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
third generation | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
One | QUANTITY | 0.99+ |
Patrice | PERSON | 0.99+ |
both | QUANTITY | 0.98+ |
six | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
first one | QUANTITY | 0.97+ |
Estevez | PERSON | 0.97+ |
FBI | ORGANIZATION | 0.96+ |
about three hundred features | QUANTITY | 0.96+ |
over fifty | QUANTITY | 0.96+ |
single console | QUANTITY | 0.95+ |
single platform | QUANTITY | 0.94+ |
one place | QUANTITY | 0.94+ |
half | QUANTITY | 0.93+ |
Casby | ORGANIZATION | 0.92+ |
forty nets technologies | QUANTITY | 0.9+ |
twenty nineteen | QUANTITY | 0.88+ |
few years ago | DATE | 0.85+ |
forty Niners | QUANTITY | 0.85+ |
Fortinet Accelerate | ORGANIZATION | 0.84+ |
forty Net | ORGANIZATION | 0.84+ |
Stax | TITLE | 0.81+ |
John Maddison | PERSON | 0.8+ |
minute | QUANTITY | 0.78+ |
two different types | QUANTITY | 0.78+ |
one edge | QUANTITY | 0.76+ |
single operations | QUANTITY | 0.75+ |
twenty | QUANTITY | 0.75+ |
twos | QUANTITY | 0.69+ |
one implementations | QUANTITY | 0.69+ |
a year | QUANTITY | 0.69+ |
executive vice president | PERSON | 0.66+ |
money | QUANTITY | 0.63+ |
nineteen | QUANTITY | 0.59+ |
Cube | ORGANIZATION | 0.59+ |
next five years | DATE | 0.57+ |
Ross | ORGANIZATION | 0.54+ |
lot | QUANTITY | 0.51+ |
nine | QUANTITY | 0.48+ |
nineteen | TITLE | 0.39+ |
Derek Manky, Fortinet | Fortinet Accelerate 2019
>> live from Orlando, Florida It's the que covering accelerate nineteen. Brought to you by important >> Hey, welcome back to the Cube. We are live at forty nine. Accelerate nineteen in Orlando, Florida I am Lisa Martin with Peter Births, and Peter and I are pleased to welcome one of our alumni back to the program during Mickey, the chief of security insights for forty nine. Derek. It's great to have you back on the program, >> so it's always a pleasure to be here. It's tze always good conversations. I really look forward to it and it's It's never a boring day in my office, so we're than happy to talk about this. >> Fantastic. Excellent. Well, we've been here for a few hours, talking with a lot of your leaders. Partners as well. The keynote this morning was energetic. Talked a lot about the evocation, talked a lot about the evolution of not just security and threat, but obviously of infrastructure, multi cloud hybrid environment in which we live. You have been with forty girl lives for a long time. Talk to us about the evolution that you've seen of the threat landscape and where we are today. >> Sure, Yeah, so you know? Yeah, I've been fifteen years now, forty guards. So I flashed back. Even a two thousand, for it was a vastly different landscape back there and Internet and even in terms of our security technology in terms of what the attack surface was like back then, you know, Ken Kennedy was talking about EJ computing, right? Because that's what you know. Seventy percent of data is not going to be making it to the cloud in the future. A lot of processing is happening on the edge on DH. Threats are migrating that way as well, right? But there's always this mirror image that we see with the threat landscape again. Threat landscape. Back in nineteen eighty nine, we started with the Morris Worm is very simple instructions. It took down about eighty percent of the Internet at the time, but he was It is very simple. It wasn't to quote unquote intelligence, right? Of course, if we look through the two thousands, we had a lot of these big worms that hit the scene like Conficker. I love you, Anna Kournikova. Blaster slammer. All these famous rooms I started Teo become peer to peer, right? So they were able to actually spread from network to network throughout organizations take down critical services and so forth. That was a big evolutionary piece at the time. Of course, we saw fake anti virus ransomware. Come on stage last. Whereas I called it, which was destructive Mauer That was a big shift that we saw, right? So actually physically wiping out data on systems these air typically in like star but warfare based attacks. And that takes us up to today, right? And what we're seeing today, of course, we're still seeing a lot of ransom attacks, but we're starting to see a big shift in technology because of this edge computing used case. So we're seeing now things like Swarm networks have talked about before us. So these are not only like we saw in the two thousand's threats that could shift very quickly from network to network talk to each other, right? In terms of worms and so forth. We're also seeing now in intelligence baked in. And that's a key difference in technology because these threats are actually able, just like machine to machine. Communication happens through a pea eye's protocols and so forth threats are able to do this a swell. So they ableto understand their own local environment and how to adapt to that local environment and capitalized on that effort on DH. That's a very, very big shift in terms of technology that we're seeing now the threat landscape. >> So a lot of those old threats were depending upon the action of a human being, right? So in many respects, the creativity was a combination of Can you spook somebody make it interesting so that they'll do something that was always creativity in the actual threat itself. What you're describing today is a world where it's almost like automated risk. We're just as we're trying to do automation to dramatically increase the speed of things, reduce the amount of manual intervention. The bad guy's doing the same thing with the swarms there, introducing technology that is almost an automated attack and reconfigures itself based on whatever environment, conditions of encounters. >> Yeah, and the interesting thing is, what's happening here is we're seeing a reduction in what I call a t t be a time to breach. So if you look at the attack lifecycle, everything does doesn't happen in the blink of an instant it's moving towards that right? But if you look at the good, this's what's to come. I mean, we're seeing a lot of indications of this already. So we work very closely with Miter, the minor attack framework. It describes different steps for the attack life cycle, right? You start with reconnaissance weaponization and how do you penetrator system moving the system? Collect data monetize out as a cyber criminal. So even things like reconnaissance and weaponization. So if you look at fishing campaigns, right, people trying to fish people using social engineering, understanding data points about them that's becoming automated, that you sought to be a human tryingto understand their target, try toe fish them so they could get access to their network. There's tool kits now that will actually do that on their own by learning about data points. So it's scary, yes, but we are seeing indications of that. And and look, the endgame to this is that the attacks were happening much, much quicker. So you've got to be on your game. You have to be that much quicker from the defensive point of view, of course, because otherwise, if successful breach happens, you know we're talking about some of these attacks. They could. They could be successful in matter of seconds or or minutes instead of days or hours like before. You know, we're talking about potentially millions dollars of revenue loss, you know, services. They're being taken out flying intellectual properties being reached. So far, >> though. And this is, you know, I think of health care alone and literally life and death situations. Absolutely. How is Fortinet, with your ecosystem of partners poised to help customers mitigate some of these impending risk changing risk >> coverage? Strengthen numbers. Right. So we have, ah, strong ecosystem, of course, through our public ready program. So that's a technology piece, right? And to end security, how we can integrate how we can use automation to, you know, push security policies instead of having an administrator having to do that. Humans are slow a lot of the time, so you need machine to machine speed. It's our fabric ready program. You know, we have over fifty seven partners there. It's very strong ecosystem. From my side of the House on Threat Intelligence. I had up our global threat alliances, right? So we are working with other security experts around the World Cyberthreat Alliance is a good example. We've created intelligence sharing platforms so that we can share what we call indicators of compromise. So basically, blueprints are fingerprints. You can call them of attacks as they're happening in real time. We can share that world wide on a platform so that we can actually get a heads up from other security vendors of something that we might not see on. We can integrate that into our security fabric in terms of adding new, new, you know, intelligence definitions, security packages and so forth. And that's a very powerful thing. Beyond that, I've also created other alliances with law enforcement. So we're working with Interpol that's attribution Base work right that's going after the source of the problem. Our end game is to make it more expensive for cyber criminals to operate. And so we're doing that through working with Interpol on law enforcement. As an example, we're also working with national computer emergency response, so ripping malicious infrastructure off line, that's all about partnership, right? So that's what I mean strengthen numbers collaboration. It's It's a very powerful thing, something close to my heart that I've been building up over over ten years. And, you know, we're seeing a lot of success and impact from it, I think. >> But some of the, uh if you go back and look at some of the old threats that were very invasive, very problematic moved relatively fast, but they were still somewhat slow. Now we're talking about a new class of threat that happens like that. It suggests that the arrangement of assets but a company like Ford and that requires to respond and provide valued customers has to change. Yes, talk a little about how not just the investment product, but also the investment in four guard labs is evolving. You talked about partnerships, for example, to ensure that you have the right set of resources able to be engaged in the right time and applied to the right place with the right automation. Talk about about that. >> Sure, sure. So because of the criticality of this nature way have to be on point every day. As you said, you mentioned health care. Operational technology is a big thing as well. You know, Phyllis talking about sci fi, a swell right. The cyber physical convergence so way have to be on our game and on point and how do we do that? A couple of things. One we need. People still way. Can't you know Ken was talking about his his speech in Davos at the World Economic Forum with three to four million people shortage in cyber security of professionals There's never going to be enough people. So what we've done strategically is actually repositioned our experts of forty guard labs. We have over two hundred thirty five people in forty guard lab. So as a network security vendor, it's the largest security operation center in the world. But two hundred thirty five people alone are going to be able to battle one hundred billion threat events that we process today. Forty guard lab. So so what we've done, of course, is take up over the last five years. Machine learning, artificial intelligence. We have real practical applications of a I and machine learning. We use a supervised learning set so we actually have our machines learning about threats, and we have our human experts. Instead of tackling the threat's one on one themselves on the front lines, they let them in. The machine learning models do that and their training the machine. Just it's It's like a parent and child relationship. It takes time to learn a CZ machines learn. Over time they started to become more and more accurate. The only way they become more accurate is by our human experts literally being embedded with these machines and training them >> apart for suspended training. But also, there's assortment ation side, right? Yeah, we're increasing. The machines are providing are recognizing something and then providing a range of options. Thie security, professional in particular, doesn't have to go through the process of discovery and forensics to figure out everything. Absolution is presenting that, but also presenting potential remedial remediation options. Are you starting to see that become a regular feature? Absolutely, and especially in concert with your two hundred thirty five experts? >> Yeah, absolutely. And that's that's a necessity. So in my world, that's what I refer to is actionable intelligence, right? There's a lot of data out there. There's a lot of intelligence that the world's becoming data centric right now, but sometimes we don't have too much data. Askew Mons, a CZ analysts administrators so absolutely remediation suggestions and actually enforcement of that is the next step is well, we've already out of some features in in forty six two in our fabric to be able to deal with this. So where I think we're innovating and pioneering in the space, sir, it's it's ah, matter of trust. If you have the machines O R. You know, security technology that's making decisions on its own. You really have to trust that trust doesn't happen overnight. That's why for us, we have been investing in this for over six years now for our machine learning models that we can very accurate. It's been a good success story for us. I think. The other thing going back to your original question. How do we stack up against this? Of course, that whole edge computing use case, right? So we're starting to take that machine learning from the cloud environment also into local environments, right? Because a lot of that data is unique, its local environments and stays there. It stays there, and it has to be processed that such too. So that's another shift in technology as we move towards edge computing machine learning an artificial intelligence is absolutely part of that story, too. >> You mentioned strengthen numbers and we were talking about. You know, the opportunity for Fortinet to help customers really beat successful here. I wanted to go back to forty guard labs for a second because it's a very large numbers. One hundred billion security events. Forty Guard labs ingests and analyzes daily. Really? Yes, that is a differentiator. >> Okay, that that's a huge huge differentiator. So, again, if I look back to when I started in two thousand four, that number would have been about five hundred thousand events today, compared to one hundred billion today. In fact, even just a year ago, we were sitting about seventy five to eighty billion, so that numbers increased twenty billion and say twenty percent right in in just a year. So that's that's going to continue to happen. But it's that absolutely huge number, and it's a huge number because we have very big visibility, right. We have our four hundred thousand customers worldwide. We have built a core intelligence network for almost twenty years now, since for Deena was founded, you know, we we worked together with with customers. So if customers wish to share data about attacks that are happening because attackers are always coming knocking on doors. Uh, we can digest that. We can learn about the attacks. We know you know what weapons that these cybercriminals they're trying to use where the cybercriminals are. We learned more about the cyber criminals, so we're doing a lot of big data processing. I have a date, a science team that's doing this, in fact, and what we do is processes data. We understand the threat, and then we take a multi pronged approach. So we're consuming that data from automation were pushing that out first and foremost to our customers. So that's that automated use case of pushing protection from new threats that we're learning about were contextualizing the threat. So we're creating playbooks, so that playbook is much like football, right? You have to know your your your offense, right? And you have to know how to best understand their tactics. And so we're doing that right. We're mapping these playbooks understanding, tactics, understanding where these guys are, how they operate. We take that to law enforcement. As I was saying earlier as an example, we take that to the Cyber Threat Alliance to tow our other partners. And the more that we learn about this attack surface, the more that we can do in terms of protection as well. But it's it's a huge number. We've had a scale and our data center massively to be able to support this over the years. But we are poised for scale, ability for the future to be able to consume this on our anti. So it's it's, um it's what I said You know the start. It's never a boring day in my office. >> How can it be? But it sounds like, you know, really the potential there to enable customers. Any industry too convert Transport sees for transform Since we talked about digital transformation transformed from being reactive, to being proactive, to eventually predictive and >> cost effective to write, this's another thing without cybersecurity skills gap. You know this. The solution shouldn't be for any given customer to try. Toe have two hundred and thirty people in their security center, right? This is our working relationship where we can do a lot of that proactive automation for them, you know, by the fabric by the all this stuff that we're doing through our investment in efforts on the back end. I think it's really important to and yeah, at the end of the day, the other thing that we're doing with that data is generating human readable reports. So we're actually helping our customers at a high level understand the threat, right? So that they can actually create policies on their end to be able to respond to this right hard in their own security. I deal with things like inside of threats for their, you know, networks. These air all suggestions that we give them based off of our experience. You know, we issue our quarterly threat landscape report as an example, >> come into cubes. Some of your people come in the Cuban >> talk about absolutely so That's one product of that hundred billion events that were processing every day. But like I said, it's a multi pronged approach. We're doing a lot with that data, which, which is a great story. I think >> it is. I wish we had more time. Derek, Thank you so much for coming by. And never a dull moment. Never a dull interview when you're here. We appreciate your time. I can't wait to see what that one hundred billion number is. Next year. A forty nine twenty twenty. >> It will be more. I can get you. >> I sound like a well, Derek. Thank you so much. We appreciate it for Peter Burress. I'm Lisa Martin. You're watching the Cube?
SUMMARY :
Brought to you by important It's great to have you back on the program, so it's always a pleasure to be here. of the threat landscape and where we are today. So these are not only like we saw in the two thousand's threats that could So a lot of those old threats were depending upon the action of a human being, right? And and look, the endgame to this is that the attacks were happening much, And this is, you know, I think of health care alone and literally life and death situations. We've created intelligence sharing platforms so that we can share what we call indicators of compromise. have the right set of resources able to be engaged in the So because of the criticality of this nature way have to be on the process of discovery and forensics to figure out everything. There's a lot of intelligence that the world's becoming data centric right now, You know, the opportunity for Fortinet to help customers So that's that's going to continue to happen. But it sounds like, you know, really the potential there to enable customers. So that they can actually create policies on their end to be able to respond to this right hard in their own Some of your people come in the Cuban talk about absolutely so That's one product of that hundred billion events that were processing Derek, Thank you so much for coming by. I can get you. Thank you so much.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Peter | PERSON | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Peter Births | PERSON | 0.99+ |
Anna Kournikova | PERSON | 0.99+ |
Ken Kennedy | PERSON | 0.99+ |
Derek | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
Peter Burress | PERSON | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
twenty percent | QUANTITY | 0.99+ |
Next year | DATE | 0.99+ |
fifteen years | QUANTITY | 0.99+ |
World Cyberthreat Alliance | ORGANIZATION | 0.99+ |
twenty billion | QUANTITY | 0.99+ |
Derek Manky | PERSON | 0.99+ |
Seventy percent | QUANTITY | 0.99+ |
millions dollars | QUANTITY | 0.99+ |
one hundred billion | QUANTITY | 0.99+ |
four hundred thousand customers | QUANTITY | 0.99+ |
House on Threat Intelligence | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
Phyllis | PERSON | 0.99+ |
Askew Mons | PERSON | 0.99+ |
two hundred thirty five experts | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
about five hundred thousand events | QUANTITY | 0.99+ |
two hundred thirty five people | QUANTITY | 0.99+ |
World Economic Forum | EVENT | 0.99+ |
over fifty seven partners | QUANTITY | 0.98+ |
forty girl | QUANTITY | 0.98+ |
two thousands | QUANTITY | 0.98+ |
one hundred billion | QUANTITY | 0.98+ |
Mickey | PERSON | 0.98+ |
a year ago | DATE | 0.98+ |
one | QUANTITY | 0.98+ |
four million people | QUANTITY | 0.98+ |
eighty billion | QUANTITY | 0.97+ |
two thousand | QUANTITY | 0.97+ |
2019 | DATE | 0.97+ |
about seventy five | QUANTITY | 0.97+ |
over two hundred thirty five people | QUANTITY | 0.97+ |
about eighty percent | QUANTITY | 0.97+ |
over six years | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
Cyber Threat Alliance | ORGANIZATION | 0.96+ |
hundred billion events | QUANTITY | 0.96+ |
One hundred billion security events | QUANTITY | 0.95+ |
forty | QUANTITY | 0.94+ |
a year | QUANTITY | 0.93+ |
one hundred billion threat events | QUANTITY | 0.93+ |
over ten years | QUANTITY | 0.91+ |
forty guards | QUANTITY | 0.91+ |
two hundred and thirty people | QUANTITY | 0.91+ |
Davos | LOCATION | 0.89+ |
over | QUANTITY | 0.89+ |
two thousand four | QUANTITY | 0.88+ |
almost twenty years | QUANTITY | 0.86+ |
forty six two | QUANTITY | 0.85+ |
this morning | DATE | 0.83+ |
guard labs | ORGANIZATION | 0.82+ |
nineteen | QUANTITY | 0.81+ |
guard lab | ORGANIZATION | 0.79+ |
last five years | DATE | 0.79+ |
one product | QUANTITY | 0.77+ |
Forty | QUANTITY | 0.76+ |
Teo | PERSON | 0.71+ |
lab | ORGANIZATION | 0.67+ |
Cube | ORGANIZATION | 0.66+ |
Forty guard | QUANTITY | 0.66+ |
nineteen eighty | DATE | 0.65+ |
forty nine | DATE | 0.64+ |
first | QUANTITY | 0.64+ |
Conficker | TITLE | 0.63+ |
Guard | ORGANIZATION | 0.63+ |
Mauer | PERSON | 0.62+ |
forty nine twenty twenty | DATE | 0.61+ |
Miter | ORGANIZATION | 0.61+ |
second | QUANTITY | 0.6+ |
Phil Quade, Fortinet | Fortinet Accelerate 2019
>> live from Orlando, Florida It's the que covering accelerate nineteen. Brought to you by important. >> Welcome back to the Cube. We air live in Orlando, Florida, for accelerate border, not accelerate twenty nineteen. Lisa Martin with Peter Burroughs And we're pleased to welcome back to the Cube. Chief information Security officer See, So from Fortinet fell quite Phil. Thank you so much for joining Peter and me on the Cube today. >> Thanks for much. >> So lots of news, Lots of buzz. You can hear a lot of the folks behind us in the Expo hall here. We've had probably, I think five or six or seven guests today. So far you are on the front lines as to see so afforded it talking with si sos. I'd love to get your your view on what are some of the things they're top of mind for si sos today. The challenge is that they're facing and how are they looking to for doughnut to mitigate this challenge is >> the good news is that the solution sets not as complicated a cz youthink So all the sea says and senior people I talked to are very much focused on How can they reduce complexity, And how can they better leverage automation? I know there's some overlap between those two things, but they care quite a bit about that. Why? Because with less complexity, there's less mistakes with less complexity. There's less optics, right costs, costs for people and then with automation. It also helps with the op ex problem. But automation also allows humans to do things that humans you're better doing things. That and let's machines do things that their better doing that. So, complexity management, Lebanese automation are really top of mind. Of course, you know the next level down, you really need to do segmentation. Well, you need to have good visibility, need to inspection something that But I'd say those couple things are definitely top of mind, no matter who you talked to. >> But one of the things that's especially important about this issue complexity is that the threat surface goes to value, right so that, as you think about I ot as you think about Mohr devices, Mohr elements, et cetera, the threat surface is going to go up the on ly way that you're going to be able to bring that in in a managed way that delivers consistent value without dramatically exploding amount of risk is to reduce the complexity of the rest of the threat >> surface. Thie. If you're trying to place the face the problem of of, of speed and scale, you have to adopt the solutions of automation in integration you need a strategy on. Of course, hope is never a strategy, and so you need to leverage these technologies to do that. Instead, it's all about automation integration, >> right on this notion of the threats surface going to values, gotta have some mean si SOS sort of. Some of the ones that I'm talking to are using terminology like that. Maybe not that concept directly, but they want to make sure that whatever task that they're performing, whatever, uh, whatever risked their engendering or dealing with has some corresponds back to value. Are you seeing that as well? >> Yeah, and since we're talking about value, the end point is becoming a whole lot more interesting in terms of value. So traditionally we think of the endpoint is being a place where there's desktops and then laptops and tablets, and now smartphones, and they've always been part of our cyber domain. But there's this new thing that's happening, I think just left of end point. And it's where there's going to be the heavy instrumentation of physical processes and things. So it's starting with OT operational technology. It's going to be magnified by I ot and, of course, building automation. And so all of a sudden, the definition of value, I think, is going to be places that can collect data about physical processes and things, protect that data and then commoditize it. So value is moving further, further and out into the endpoint defined as thie, a collection of information about physical processes, something so I call this environment cyber physical or, more specifically, more catchy. SciFi right. It's where cyber data, physical data will be intermingled to provide value and efficiencies to customers and things like that. It's a really important area that's the new in point >> in physics. We talk about transducers, right? The transducer is something that takes one form of energy and turns into another form of energy so they could perform a different kind of work. We're talking about what we call information transducers the idea, take one form of information and turn it into another form of information so that it can perform work that's seminal to this notion that you're describing with the side fi. >> That's a >> great analogy. I haven't heard it described that way before. It's kind of like, you know, back in the day where where people use fire to heat and people used sales to move things right. And one day >> it was a more >> wins, right? Wait, move sales. Sorry. Wings. Yeah. Okay. And, uh, someone saw the story. As the story goes, someone saw a pot on the fire, a kettle full of water boil and the lid of the pop move. So they realized I can use heat to move it. So they started integrating different ways of doing things to achieve new effects. And I think that's what you're talking about. He used the word trans transducer, but I think it's the same thing. And how can you use things previously kept separate to do things that you previously couldn't D'Oh. >> So let's talk about this SciFi era C y dash p H y. For those watching at home, what are some of the security challenges that this brings, but also the opportunities to be uncovered by that boiling point analogy. >> Yeah, if you don't mind, I'LL start with the start with positives right where the was a potential benefits to society. So we are all of us and everyone behind us. We're creatures, the physical domain and the opportunities that there will be new data connected about this physical domain that can affect his very personally. So in cyberspace, its ultimate a virtual world. So there could be compromises in cyberspace. That effect is in cyber ways, but when you have compromises in the physical domain, it could be a lot more personal. So let's say that you have a medical device or you have a something else that instruments the temperature, heat, humidity, vector, you name it. Failures in those areas can have a really profound effect on a negative way in this physical oriented domain. So now the flip side of that is because it has a very, very positive effect, Right? Thes healthcare devices could bring new conveniences or perhaps even help address some very important things where they'd be physical or mental disabilities weaken instrument very heavily how we create food products. And so maybe this heavy instrumentation of how you create food can help address world hunger. I know I'm getting kind of heavy about this, but heavy instrumentation of this physical domain has a lot of promise. Now back to the other side. It also has a lot of responsibility involved, right, because, as I mentioned earlier, we're creatures of the physical domain. So if you get it wrong, you could mess up something really important to our health. Care for our transportation, Andi. We also have a very strong feeling towards privacy. At some point, collecting too much about us physically is just too much. So you need to make sure that that any sense data's you have privacy protections built it. So like anything with great opportunity. There's great challenges involved. But by giving their name and starting described, this challenge is we are. We're one step down the path, I think. >> But if we take that and then turn it into a set of cyber security challenges, no secure network challenges, that one of the other things you describe is we're constantly learning about what are the characteristics of a good, competent, reasonable interface between the physical and digital worlds. That knowledge then has to be put back into how we handle network security. >> That's right. I like your use of the word knowledge. And earlier today I gave a talk about something I'm calling a digital big bang. It's an analogy of that. We had a digital big bang fifty years ago where an explosion of data is among us and there's some challenges will get back that in a second. The analogy is thie cosmic big bang of fourteen billion years ago. And it wasn't until we started certain had a quest for knowledge about the fundamental elements of the cosmic Big Bang and the hard sciences behind it. Physics, chemistry, biology, things like that that we actually started obtaining an accumulating knowledge. So I think to your point, there's a lot of knowledge accumulation that we need to start a quest for in this cyber physical domain. And that's that's all about treating cybersecurity more like a science rather than an art. And I think this cyber SciFi domain is a great place to start practicing that accumulating knowledge in a very, very scientific way, build on the build on the successes of our our forefathers. I could say >> Sorry if I can build on this for one second. Sorry, Lisa, that the entropy gets everything in the end. But isn't it interesting that the process of creating Mohr information creating more knowledge and then securing it is our main fight against entropy? Right. That's how we create increase optimization of our resources. How we get Maura out of less on DH. That seems to me to be an especially important thing here. A CZ we think about it is how we utilize that knowledge, share it and in so doing security so that we're sharing inappropriately. >> There's a there's a great saying. I'm sure you're familiar with each of you. It's called. I use it often. Data is the oil the twenty first century, right? So the last century, those who could find oil explored it put it good use and protected dominated that century. Let's fast forward to the twenty first century. I think the same words apply data right. Those who can find it generate wisdom from it, insight from it and protect it will dominate in a good way the twenty first century. So, on the way you were going to do that. This is the collective we is bias. You said Collect, Ate it. Make it better. Send it back out, bring it back in. Make it better. Send it back out. It's a somewhat circular, but I think it's a very, very healthy example of, ah, circular augmentation. >> So don't think I want to touch on a little bit with you. Feel before we let you go is we talked about knowledge a minute ago and sharing that knowledge forty nights Very dedicated to education. Educating your customers, educating your partners When you're talking with si SOS and we know that there's an ostensible skills got with cyber security. What are some of the solutions that you talked to those customers that like Hey, this is how fourteen that nurse ecosystem partners can help you here. Address this so you can leverage the power of that data to, As you said, you know, for the twenty first century, for example, data becomes the new oil. What's that education conversation like there's >> a There's a long game in a short game, you know, the short game is about leveraging like we talked about a few minutes ago. Speed, speed, automation, integration, too. Compliment the shortage of human beings right rely machines, moron for what machines we're good at on DH. Take the humans, the humans, the steel personnel and have them do the higher order thinking. So the near term game. It's foreign. It's really well. Pasha provide our customers is speed, automation and integration. So that's the short game. Long game is about creating, Ah, larger workforce or larger population of folks who could all be construed contribute to this great new world we've been talking about. And that's training. And that's education. And I think, you know important. It's also, you know, working the long game as well, with some near term training at multiple levels for folks in in the networking world, but were also part of something called the World Economic Form West's Center for Cyber Security. We're founding member, and there were trying to create a long game where we can help educate a whole lot of people on cybersecurity and create the future. Workforce is in the long game. So short term long game, both her important >> except well, Phil, thank you so much for joining Peter and me on the cute this afternoon. We appreciate your time. >> Thanks again. It was nice. Nice being back and >> excellent. Our pleasure for Peter. Boris. I'm Lisa Martin. You're watching the Cube
SUMMARY :
Brought to you by important. Peter and me on the Cube today. So far you are on the front lines as to see so afforded it talking with si So all the sea says and senior people I talked to are very much focused on How can they reduce of speed and scale, you have to adopt the solutions of automation in integration Some of the ones that I'm talking to are using terminology like that. It's a really important area that's the new in point so that it can perform work that's seminal to this notion that you're describing with the It's kind of like, you know, kept separate to do things that you previously couldn't D'Oh. that this brings, but also the opportunities to be uncovered by that boiling point analogy. else that instruments the temperature, heat, humidity, vector, you name it. no secure network challenges, that one of the other things you describe is we're constantly So I think to your point, there's a lot of knowledge accumulation that we need to start a quest But isn't it interesting that the process of creating So, on the way you were going to do that. that you talked to those customers that like Hey, this is how fourteen that nurse ecosystem partners So that's the short game. except well, Phil, thank you so much for joining Peter and me on the cute this afternoon. It was nice. I'm Lisa Martin.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Peter | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
Boris | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Peter Burroughs | PERSON | 0.99+ |
six | QUANTITY | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
Phil | PERSON | 0.99+ |
two things | QUANTITY | 0.99+ |
twenty first century | DATE | 0.99+ |
2019 | DATE | 0.99+ |
last century | DATE | 0.99+ |
forty nights | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
one second | QUANTITY | 0.99+ |
fourteen | QUANTITY | 0.99+ |
Andi | PERSON | 0.98+ |
fourteen billion years ago | DATE | 0.98+ |
World Economic Form West's Center for Cyber Security | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.98+ |
Fortinet | ORGANIZATION | 0.98+ |
today | DATE | 0.98+ |
fifty years ago | DATE | 0.97+ |
Maura | PERSON | 0.97+ |
seven guests | QUANTITY | 0.96+ |
Big Bang | EVENT | 0.96+ |
couple | QUANTITY | 0.95+ |
nineteen | QUANTITY | 0.94+ |
each | QUANTITY | 0.93+ |
Phil Quade | PERSON | 0.93+ |
one day | QUANTITY | 0.9+ |
Lebanese | OTHER | 0.9+ |
big bang | EVENT | 0.89+ |
earlier today | DATE | 0.89+ |
a minute ago | DATE | 0.87+ |
this afternoon | DATE | 0.87+ |
Mohr | ORGANIZATION | 0.86+ |
one form | QUANTITY | 0.86+ |
twenty nineteen | QUANTITY | 0.82+ |
few minutes ago | DATE | 0.8+ |
Cube | ORGANIZATION | 0.76+ |
Chief | PERSON | 0.75+ |
Mohr | PERSON | 0.73+ |
big | EVENT | 0.65+ |
hall | LOCATION | 0.62+ |
Fortinet | LOCATION | 0.62+ |
second | QUANTITY | 0.61+ |
Security officer | PERSON | 0.57+ |
Pasha | PERSON | 0.54+ |
sos | PERSON | 0.52+ |
century | DATE | 0.46+ |
Cube | COMMERCIAL_ITEM | 0.44+ |
si SOS | PERSON | 0.36+ |
Jeff Foley, Siemens | Fortinet Accelerate 2019
>> Live from Orlando, Florida It's the que covering Accelerate nineteen. Brought to you by important >> Welcome back to the Cubes Coverage of Fortinet. Accelerate twenty nineteen. Live from Orlando, Florida I'm Lisa Martin with Peter Burress, and we're welcoming to the keep for the first time. Jeff Fully senior business development manager from Siemens. Jeff. Thanks for joining Peter and me today. >> Thanks for having me appreciate >> it. So everybody knows Seaman's in some form or fashion or capacity. Ah, here we are in a cyber security event. Talk to us a little bit about what Seamen's and Fortinet are doing together as partners and a little bit about your role in business. >> Sure, so the organization the part of semen that I'm a part of, is more of a digital industries. So what we do is ah, lot of NT operational technology environment area. So it's it's more of the harsh environments oil and gas, waste water, rail transportation. So we do a lot of the communication and the cyber security around that. We're working with Fortinet in order to bring the best of the practices on cybersecurity into that OT environment. So we're doing a collaboration between the two because there's that communication that needs to happen. They still need that access point into at OT environment >> Now. Explain why? Because because, you know, guys have grown up presuming that everything was going to be connected and a lot of business leaders presume that everything's going to be connected. The okey guys have had to work in a very, very different world where they had to do real time work, sometimes for thirty years. So take us a little bit through that dynamic. And why is it that today we actually Khun, start having conversations about how these two things come together, work together and generate value together? >> Sure, so typically from operational technology environment when they put something together, is normally for a twenty or thirty year span. They want to put something in the network and the environment that's going to last. That's going to be out there. It's not. They don't change it. They don't upgrade it normally, as they do in the ninety environment, which typically has like a five year life cycle. So in OT environment, what's happening? Noah's know times are changing and all these cyber attacks are happening. They're being mandated to do this. A good example is, in two thousand five, President Obama signed into a legislative order that you, we must in the US secure critical infrastructure and part of that securing that, saying We're going to make sure that you know we're not going to be happy because in the utility market, if we take down four of the major interconnects between their power grid than that stated that us had become a third world country in eight days. So what we're doing is >> not do that. >> No, we're trying to help prevent that. So by doing so, we need to add security. And historically, from noti environment, it's always been about there's not been remote access. There's not been that connectivity. It's always been about electrical and mechanical devices. But now is these devices are getting smarter. They're getting Mohr intelligent. There's more information to get out of it. You get more efficiency and more information out of so you can know. Do your job better. You could do remote access. And like in Florida, here we have a bunch of hurricanes. There's the ability to say after a hurricane, I could get remote access or I could do that communication out to these devices where you wouldn't be able to do periodically in the past. So because of that, because connectivity we need to start securing our infrastructure to make sure that no, as we get access to that potential, that the bad guys get access to those devices, too. So we're working with our product portfolio and partners like Fortinet in order to make sure that we're applying the best of the security in the O t world. >> So when this convergence, we're talking probably with folks who are not used to change. Change is hard for everybody. However, as you said and back in two thousand five became a presidential mandate. But also it >> was two thousand fifteen >> two thousand five. Obama signed in tow the listen president till two thousand. And I'm sorry. >> Thank you for the mass >> housing one. >> Yeah, just years ago on the math expert. So just a few years ago, there was this mandate from President Obama which we clarified was only four years ago. So but historically, folks that are not used to having to change system so quickly. Yet here's this mandate. There's also this increasing abundance of separate tax. How do you have those, I presume, difficult conversations with Theo Teesside about the opportunity for OT convergence and the benefits and why they have to get on board with this. >> So historically, from the OT side, they've been very reluctant to do something like this. They want to own their own environment. They want to do that. It's always been the perception that if you bring that cyber security of the world into that OT environment, it's going to hinder their operations. But that's not really the case. The convergence of T and O. T has been happening for decades now. I started my job seem it's in two thousand in the telecom world, and we were doing that convergence of n ot back in two thousand when we're doing voiceover. I pay right because that was happening back then. So this convergence of Tino Tee is It's an ongoing thing. It's just in. Different markets are different industries, so now that we're doing that, we're bringing it in there. They're starting to have that conversation, but then it becomes a really who owns that The operation are who owns that security? No ot still wants to drive their own. They want to own their own. Where I saying, Look, I know we have the knowledge we have experience. Let's help you get there So there's generally a demarcation point that they've come to an agreement on where I Teo say we're going to help you to this point. And then you can own all the critical assets out on the far end. >> So let's talk about that demarcation point. What constitutes what characterizes that demarcation point? What are where are we today? Because we're moving from hardwired, uh, thirty year footprint to increasingly wireless, uh, faster. We're moving towards that, but we're how far our way when you talk to customers. What is what are the attributes of that demarcation point? It's >> interesting because we sew it. That goes everything we saw of customers that are on dialogue, communication, serial communication, Ethernet fiber, wireless. Lt s o. There's a broad range of that we call the pipe. So you know the pipe is the communication just between the side down to the OT side really helps to find that demarcation is when you get down to what are the critical assets, what's really the operation or what's making money for that company on those of the assets, which really the operational organization's own and then the side really provides that communication down to that to that ball. >> Got it. So it's really business specific. But are we starting to see Are we started to see? Well, it's got a little bit more processing power or it's got a little bit more. There's the's security attributes that are associated with it or ot guys picking up on T related security, starting elements of it faster than others >> they are on. But really, it's it's ah, it's region and as industry specific and it's really what's driving it So like in the U. S. Like I meant in the utility sector, three utility sector has requirements called no exit, and these narcs IP requirements said you must do these things and they get very specific to the point of. You must have something that will detect anti virus or malware. You must do this if you look into Canada. Canada just recently passed away. Be requirements for Ontario and those are based upon framework cyber security framework to do that. So it's really debate the industry that they're in and the region that they're in. That's what's really driving that our how deeper and far they're going to go. >> And it goes back to your original point that it's being driven by regulatory edict or a past exposure and trying to make sure it doesn't happen again. >> They don't want to make the news, and they don't want to be pushed by the government. But those were really the two things in the operational technology or environment that's really driving for that cyber. >> Thank you, Sierra, One of your favorite success stories that really highlights the opportunities that O. T. And I t Convergence have enabled for customers of forty nine Seaman's >> Oh yeah, there's, ah again because I'm global experience. No, I've got around the world, but actually one of the favorites is Actually, there's two of them that have happened just here in North America, Oneness in Texas and one is in Canada. And both of these requirements came to say that they had a specific date, that they needed to make requirements to meet the regulatory otherwise, that they were going to get fined and they came to us and it is both home were pretty last minute. So what we're able to do is to say, Look, we have this platform that's rated for harsh environment. That's no into your networking to provide that communication. So then what we could do is we can work with our partners, put that application on that OT environment and then install and get certified for your application. So there was two of you, Like I said, one in the U. S. And one in Canada. Which way made the deadline's where they came back and said, No, thank you very much, very appreciative. >> And how quickly were you able to get this up and running is that they didn't miss the deadline and we're able to certain gleanings value from this. >> I just did a write up on one. We got a phone call on a Friday that they needed to provide a solution. So we worked over the weekend, and on Monday we proposed a solution. So once you do that, no, obviously they need to go through their value chain to get to sign offs, and we have to go through our process. But it was within thirty days were able to install it make their deadline and make sure that they were compliant. >> That's a pretty good marketing message to deliver that you guys could enable Such It is such a big convergence and it's a month's period >> of thirty days. >> Pretty impressive. >> That was, That was That was one thing that I think we all worked out. There was a deadline. We all work toward that. It was a trusted partner thing, you know. The customer came to us, they were asking for some stuff. They trusted us to do that. So like I said, we worked over the weekend, help them do that. We felt we had the right solution to address their requirements and at the end of the day were ableto meet that thirty day deadline. >> But the trust is not just with you. It's not just a seaman's. It's with an expanding array of cos it Seaman's is working. That's correct. What is it like working with a company like Ford Net to try to ensure that these new domains that are characterized by enormous uncertainty, technological operational organisational are not undermined by challenges of crafting that sushi solution together in such ways, it can be implemented quickly and with a high degree facility. >> I think it's a great opportunity for saying it's important not to be working together only from the fact of Fortinet has got the history. They've got the technology. They've got the name in their market space on DH. They've got the capability to deliver that Siemens. And for if you look from our customer space in our environment, no, we're very well developed, well entrenched in our customer. So to be able to bring the technology and the experience and the know how and bring that those cyber security requirements which are now being pushed down into the OT environment in and no amount of time it's not. There's no development needed, there's no additional stuff fourteen and already has that knowledge from the space. So to bring that into the environment, it's very beneficial. I think both of us, in order to help drive their customer opportunities in our market. >> And they talked a lot this morning during the keynote about where they are from the competitive leadership perspective that was peppered, ah, lot throughout the first at least ninety minutes of the keynote. But presumably obviously everybody has choice. Everybody likes choice. Simons has choice there. I'm just curious to get your take on some of the announcements that came out today from Fortinet. Does that excite Seaman's? Were you involved in that? In terms of being able to take the next set of customers who have the same challenge that you describe with the Texas based on Canada based customers and show them we can help you together? Seaman's importing that transform in thirty days. >> I think it's very exciting with fourteen that's doing in the new capabilities and functional yet they're coming out with. I think that's really going to be able to enhance our offering because it's really a differentiator for us. If you look at us from the operational technology side, there's not a lot of people out there that can actually do with porting that's able to bring to the table. So all these additional features functionality that was coming out by Fortinet to be able to put it on to our platform and our environment and to be able to offer that in the operational technology side. So I think it's a big differentiator from our competitors for both forty and for seeming to be able to jointly provide this offering to our customers. >> Just one question about your competition. A lot of companies like Siemens, especially that especially strong in the OT space, not just your customers. But suppliers like yourselves have also struggled a bit as they try to find a Z trying navigate that way forward to convergence of tea. No tea on appropriate convergence of tea. No tea. What is it about Seamans that has allowed you to not stub your toe or cut off your leg? Like some of the competitors, >> I believe that's because we've had a long history in both the A I T o T space. If you look at the vertical, are the digital industry that we're in right now. It's been very much ot centric for the last twenty five thirty years, but we have seen minces No. Three hundred seventy nine thousand people worldwide strong. We're very embracing the newer technology and the newer capabilities myself coming. No, starting with Siemens twenty years ago with a nice background being able to bring that knowledge that ability and doing that convergence of the idea no t within Seaman's for so long. I think we understand our customers, and we've been listening to them. And then we're partnering up with companies like Fortinet. Health says, Bring that technology that capability to our customers >> said that expertise, that partnership, What's your recommendation has be wrapped things up here for customers who are at the precipice of being able to understand why I know Teenie to converge with your recommendation for them to tackle this challenge successfully. >> I think the best advice I could have is let's sit down and have that conversation. Let's see what the requirements are. Let's see what they're trying to accomplish because I believe with the solutions that Siemens has between communication, the network in the security and then they technology and the capability that forty nets bring to the table we can to help design a customized solution for their environment in order to make sure that they can address their cyber security needs >> and do so quickly. Well, Jeff, thank you so much for joining Peter and me on the cute this afternoon. We appreciate your time. >> Thank you for >> for Peter. Boris. I'm Lisa Martin. You're watching the Cube
SUMMARY :
Brought to you by important Welcome back to the Cubes Coverage of Fortinet. Talk to us a little bit about what Seamen's and Fortinet are doing together that needs to happen. going to be connected. saying We're going to make sure that you know we're not going to be happy because in the utility There's the ability to say after a hurricane, I could get remote access or I could do that communication So when this convergence, we're talking probably with folks who are not used to change. And I'm sorry. So but historically, folks that are not used to having It's always been the perception that if you bring So let's talk about that demarcation point. side really provides that communication down to that to that ball. But are we starting to see So it's really debate the And it goes back to your original point that it's being driven by regulatory edict or They don't want to make the news, and they don't want to be pushed by the government. opportunities that O. T. And I t Convergence have enabled for customers of forty came to say that they had a specific date, that they needed to make requirements to meet the regulatory otherwise, And how quickly were you able to get this up and running is that they didn't miss the deadline and we're able So once you do that, no, obviously they need to go through their value chain to get to sign offs, and we have to go through our process. So like I said, we worked over the weekend, help them do that. But the trust is not just with you. So to bring that into the environment, it's very beneficial. the next set of customers who have the same challenge that you describe with the I think that's really going to be able to enhance our offering because it's really a differentiator for us. What is it about Seamans that has allowed you to not Health says, Bring that technology that capability to our customers I know Teenie to converge with your recommendation for them to tackle this challenge successfully. that forty nets bring to the table we can to help design a customized solution for their environment in Well, Jeff, thank you so much for joining Peter and me on the cute this afternoon.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Obama | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Siemens | ORGANIZATION | 0.99+ |
Canada | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
Peter | PERSON | 0.99+ |
Florida | LOCATION | 0.99+ |
Peter Burress | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
thirty days | QUANTITY | 0.99+ |
Boris | PERSON | 0.99+ |
Jeff Fully | PERSON | 0.99+ |
North America | LOCATION | 0.99+ |
five year | QUANTITY | 0.99+ |
twenty | QUANTITY | 0.99+ |
thirty years | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Monday | DATE | 0.99+ |
U. S. | LOCATION | 0.99+ |
Theo Teesside | PERSON | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
eight days | QUANTITY | 0.99+ |
Ford Net | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
Texas | LOCATION | 0.99+ |
Sierra | PERSON | 0.99+ |
thirty year | QUANTITY | 0.99+ |
ninety | QUANTITY | 0.99+ |
thirty day | QUANTITY | 0.99+ |
two thousand | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
forty nets | QUANTITY | 0.99+ |
Noah | PERSON | 0.99+ |
one question | QUANTITY | 0.99+ |
Seamans | ORGANIZATION | 0.99+ |
first time | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
Friday | DATE | 0.98+ |
twenty years ago | DATE | 0.98+ |
Three hundred seventy nine thousand people | QUANTITY | 0.98+ |
four | QUANTITY | 0.98+ |
Tino Tee | ORGANIZATION | 0.98+ |
four years ago | DATE | 0.98+ |
first | QUANTITY | 0.98+ |
Jeff Foley | PERSON | 0.97+ |
Mohr | ORGANIZATION | 0.97+ |
US | LOCATION | 0.97+ |
One | QUANTITY | 0.96+ |
2019 | DATE | 0.96+ |
Simons | PERSON | 0.95+ |
fourteen | QUANTITY | 0.94+ |
President Obama | PERSON | 0.93+ |
this morning | DATE | 0.93+ |
forty nine | QUANTITY | 0.93+ |
Seaman | ORGANIZATION | 0.93+ |
few years ago | DATE | 0.92+ |
two thousand fifteen | QUANTITY | 0.91+ |
Ontario | LOCATION | 0.91+ |
Patrice Perche, Fortinet | Fortinet Accelerate 2019
>> Narrator: Live from Orlando, Florida. It's theCUBE. Covering Accelerate 19. Brought to you by Fortinet. >> Welcome back to theCUBE. We are live in Orlando, Florida for Fortinet Accelerate 2019. I'm Lisa Martin with my co-host for the day Peter Burroughs. Peter and I are pleased to welcome back to theCUBE Patrice Perche, the senior executive vice president of world wide sales and support from Fortinet. Patrice, it's a pleasure to have you, fresh from the Keynote Stage, here on theCUBE program. >> Yeah, well thank you for inviting me here. It's a great opportunity. >> So lots of people this morning and an energy infused keynote starting from all this loud music that I loved and helped wake me up, so thanks to your events team for that. About 4000 attendees, >> Patrice: Yeah. >> From 40 countries. You have a ton of partners here. You can hear a lot of the noise behind us. I'd like you to share with our audience the connection that you made in your keynote about what you guys shared last Accelerate 2018 and the connection to the world economic forum from just a few months ago. >> Okay well, the last year we definitely in fact exposed our strategy in term of the product, in term of the go to market and of course how we can increase in fact the value proposition to our customer, it was all about the fabric and the eco-system that we build around the fabric. So we have been of course since now 12 months working hard on expanding and growing what I call the Phase two of the fabric and when Cain went to Davos which the World Economic Forum is held early in January. And when we got all this, I would say a vision from Klaus Schwab which is the Chairman and Founder of the World Economic Forum. Explaining that the false revolution that we are all going through. The Cyber Security its a massive, I would say problem for them and it will be a key point for the future because they will enable, in fact, most of those take technology and use it that we will go for this revolution, so >> Peter: It's intrinsic. >> It's intrinsic, they call it guardian. So it really is something that if we can't, fix this problem, it's all about digital trust. So none of the user, you, myself we will not trust maybe voting system, or you cannot trust. We know that everything is going digital. And they expressed the need for of course the education, because you need to educate and you need to, increase the skilled people especially with cyber-security as we have a huge shortfall about 1.5million, some say even two million for next year. They need also need to work as an eco-system. So, for them the eco-system is really to see public, private collaboration but also Government, technologies, companies like us. And that's in fact the purpose of Davos. To bring all this different, in fact groups and be able to talk and share and define some line for the future. And for us of-course, the concept of the eco-system is all about building around in fact this major problem that we are facing, has all the traits. In fact, a collective approach where everybody can add value. We as a vendor we build technology, we build a lot of value but we can't be with each of the customers. So and we want to build a partnership not only with the partner but also with the customer because cyber security is a real time problem. So when something happen, you need to jump, and you need to make sure that all the line is set and then everybody can work together to fix the problem. So this eco-system really resonates value well for us after we was talking last year at the Accelerate. And the last I will say pillar for the Economic Forum is about of course Education and clearly I was mentioning one of the Engineers from the SERP which is nuclear agency in Europe Januity she said that 3D, of course the problem is that with these robots we will have a lot of jobs that will be omitted. So they talk about 800 million. So it's a massive number but it sees more than an opportunity to up-skill people. So the education is really helping of course especially the young generation to go and to up-skill it and especially on the cyber security. Because, as everything is going digital, we have to secure everything so it's really, these pieces will grow much beyond that what we think today. Those three pillars are the Education, the Eco-system and of course the Technology. And the good news is that Ken was representing in fact cyber security at the Davos, so it was also a great moment for us to see in fact pushing 14 at that stage of level of discussion so. Those three pillars: Education, Technology and Eco-system of course fit very well with our strategy that we build and that's why I decided to share a bit this morning. It's not everybody going to such a place. And what really resonate well in term of the strategy and the vision we are in fact pursuing so that's what we are doing. >> So I want to build on something that you said to do so I want to paraphrase. Peter who is much smarter than I am, Peter Drucker who observed many years ago there's a difference in strategies between what he called: value in exchange was his presumption that what I am selling is valuable. And value in utility which is a presumption that the value stems from how the something is used. And that notion of partnership that Fortinet has put in place with its customers so they can get value in utility is so crucially important. And you talked a bit this morning about you know the different levels of customization, and how you are going to allow customers to engage you and apply technology to suit their business. Could you take a bit about that especially based on your experience in the field? >> Yeah so as I mention I think we, it has been also our sales strategy from day one. So we always consider that in order to succeed, we need to work through the partners and through the people that are very close to our customer. And as technology evolves of course it's a real challenge to keep them at the level. Even for us, internally, we used to understand and be always at the top level about the new technology that we are putting in place. We imagine that, just for the employees, it's a challenge so we do a lot of training. But then for the partner it's another challenge. So, I think we have been always trying to help them to of course evolving on this expertise, but we don't see that the cloud of course there is a certain I will say a trend about Okay lets go Direct because we don't. The cloud can allow to sell direct to the customer so you don't need those channels. So there's no value for them. We don't see that in the cyber security because it's a much more complex environment and I think that is why we have been successful. We even see some of our competitor, they tempted to go on this direction. I think it's maybe one of the challenges we'll face in the future. So for us they key message I was trying to give this morning to the partner is really that we count on them, it's a partnership, it's very important and of course when we adapt our partner program we want to learn from them to make sure that the three pillars of this program will fit well with their, in fact, view because of course we are from a vendor in certain perspective, they have of course a different perspective on their side. What I was mentioning the goal to market because we see that some are very specialized on the cloud, some are specialized on the premise. We have to define what is the go to market here. What kind of expertise there are in fact having because as you can see we have very broad product of frame cover, you know from almost everything, so from OT, IT, even imbedded. So, we are working with partners that are, as an example, on the connected car. That's for maybe the next two years where we will secure those car. They are not the typical or traditional partner that you see on the networking business so, we try to adapt in fact our engagement with them and make sure that in fact we build a value proposition that can fit in fact for the customer requirement. So it's really about be very close and try to have a bit of a-la-carte kind of approach. And not try to enforce a very historical view that we had in fact, to be honest. But okay, you have like three tiers, depending of level of business and then you sign. So it's really moving away from that. >> I want to stay in this notion of partners because I think it's so crucially important. You talked about the skills that they have the capabilities that they have, but your partners in general are amongst the companies that have to learn the most about cyber security. Because they are the ones that are trying to match technology to the outcomes the customers have. That leads to a question about your education programs. I got to believe that there is, that even as you're trying to educate your enterprise customers, you're also really investing in your enterprise, in upgrading and up scaling your partnership. Talk a bit about the relationship of education and Eco-system from a very practical standpoint. >> Yeah so it's a very good point because of course we need to help them to evolve and as an example we have seen traditional IT partner, interested to evolve on this OT security but they didn't have too much skill so it was new for them. So we see the purpose of building this NSC training vocation course which we have eight level, which started in 2015 and we have about now almost 200 000 certified engineers. A very large portion of those Engineers come from partners. So, on this program, in fact the origin of the program, depending on where you want to play. If it's cloud, you will have to go for NSC4. If you want to go beyond a OT, it can be NSC5. We build in fact this expertise and we ask them also to of course follow those course so the engagement with us, the requirement will be also that they have the right certified Engineer. Depending on level of engagement they want to work with us. So we build this course which is a lot of work and we have a lot of, a big team to make this happen. We have to refresh constantly because it's evolving almost every day. But as for this, the great value, you may have seen it pass on the networking sites. Cisco made a bit similar approach, which was very successful. I think we went like three years ago on thinking about this and that's what we are achieving right now and we are in fact the most I will say advanced in such a report and I think it's all NSC certification is becoming a bit stand out in the market. Both from end-user but the partner. And even going as we was mentioning, we are also working with the Academics to build in fact and train in fact new Engineers that will come in the market in the next two to three years. So we help them on, it's not pure about product, it's really about cyber security expertise that we have and of course we help them on understanding a bit how the Fortinet value can deploy on the customer, so that aspect and we try to target of course young I will say people going for university but also veterans who we had program to bring those veterans because they're also looking we are talking about up skilling. That's a perfect example on bringing a change to them. And I think it's high level, maybe it's a bit, you know think that we have a high potential. But we want of course to help on resolving the overall challenge to be unemployed. I can tell you that if you invest time and you get a certification on cyber security you will never have any problems with a job. So that's a bit the overall idea we have behind this education and certification. And truly the partner, I will say, evolution in terms of their expertise, it's based about this NSC. >> Alright Patrice as we kind of get towards the end here, let's talk about outcomes. Peter mentioned that word, I know that when I was looking at my notes here that in Q4 of 2018, service providers, and managed security service providers represented 11 of the top 25 deals. You guys also closed a massive seven figure deal in Europe. Let's talk about outcomes that Fortinet and your partner eco-system are helping businesses achieve at the business level. Not just in terms of obviously improving security but are you helping businesses generate new revenue streams, skip to new products on market faster, identify attacks and become pro active? What is one of those really key outcomes that you are proud of? >> I think the, and I was part of the presentation last year. We all, I would say on this digital transformation journey. Whole company, even us. We're evolving with much more tools, much automation. So I think every sector, whether it's public or private company, has to go for this evolution. The biggest challenge is all about digital so again the blocking point is about security. So last year we explained about how we can help with positioning our platform in the security fabric to run to this obstacle and that was the purpose of the security transformation that we was talking last year. And I know it's some, even complete as relayed a message, it was interesting that it was part of all. So I think it was really trying to unlock this digital transformation that add business benefit because at the end this whole, those company will evolve in the future, generate more profit, be more efficient, leverage, I would say, the data that they are collecting from almost everywhere. From customer but also the sensor, and transform this to a more business intelligence and then I will say generate in fact future revenue and future dollars from that. That has been a bit the idea behind. So we definitely help on evolving and going through this digital transformation journey. I think we had few example of course as one of our customers, they deploying world wide on their gas-station. A better customer journey. Typically of course you calm, you try to make your gas and you want to be connected. And they try to increase of course by upselling a lot of things. So of course you have your go for the coffee machine, you can even buy many goods. We have been deploying you know, with secure access so they have secure access they go for the internet so that's where we play with segmentation. But our wireless which is fully connected also to the Fortigate and the analytic tools allow them to do business intelligence in term of where people are moving inside you know the shops. And then, you know, redesign and rethink about okay, how they move here. So that's, that allow them to accelerate even more business or decide that maybe this spot doesn't work well, so they push that to the side and they evolve. That's depicted the value of all this intelligence and we can grasp from the data that we collect to transform to a business value. >> So I want to make one comment before we close here and that is that I don't know the degree to which people really understand the relationship between secure networking and digital business. Data is an interesting asset. It could be shared, it could be copied, it could be easily corrupted. In many respects over the next five years we believe that people will recognize that network security is the basis for privatizing data. It is what you do to turn data into an asset. I don't think people have made that connection, to the degree that they need to. >> No I agree, I agree because maybe the mindset they think about network, they think about wired. In fact we are talking about 5G, we are talking about Wireless so the data is that what we want to protect because we don't want that people stole your personal information or even company. >> It's more than protect. You want to create the asset. >> Yes, we integrate the asset. And then of course when we talk about network it's no longer wires, of course it's much more virtual I would say networks. And that's the misinterpretation and why they feel okay the network is moving away. No, it's even more in the future. And as Cain mentioned early this morning: I think the edge will become much more important in future because the compute power that we are having now on every device and even. That will in fact allow to of course generate much more data. Yeah and you need to protect. You notice when you need to go and to consolidate this into the cloud. So it's really, the age will become a very important aspect. But this will be a hybrid and that's what we feel as Fortinet we've been building in fact the very comprehensive offer and to the partner and to our customer. We just want, in fact to give them the time to move at their pace. But they have everything ready for today. That's a bit the concept. >> Well if only we had more time Patrice, we could keep going and going. Thank you so much for sharing some time on the program today talking about your GTM, what you are doing to educate partners and customers and this tremendous potential that Fortinet is attacking. We appreciate your time. >> Thank you very much, I appreciate it too. >> We want to thank you for watching for Peter Burroughs, I'm Lisa Martin. You're watching theCUBE. (upbeat music)
SUMMARY :
Brought to you by Fortinet. Peter and I are pleased to welcome back to theCUBE Yeah, well thank you for inviting me here. so thanks to your events team for that. You can hear a lot of the noise behind us. in term of the go to market strategy and the vision we are in fact that the value stems from how the something is used. and make sure that in fact we build a value proposition You talked about the skills that they have So that's a bit the overall idea we have 11 of the top 25 deals. So of course you have your go for the coffee machine, I don't know the degree to which people about Wireless so the data is that what we want You want to create the asset. So it's really, the age will become a very important aspect. what you are doing to educate partners and customers We want to thank you for watching for
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Patrice Perche | PERSON | 0.99+ |
2015 | DATE | 0.99+ |
Europe | LOCATION | 0.99+ |
Patrice | PERSON | 0.99+ |
11 | QUANTITY | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Peter Drucker | PERSON | 0.99+ |
Peter Burroughs | PERSON | 0.99+ |
last year | DATE | 0.99+ |
Klaus Schwab | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
two million | QUANTITY | 0.99+ |
40 countries | QUANTITY | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
12 months | QUANTITY | 0.99+ |
World Economic Forum | ORGANIZATION | 0.99+ |
Cain | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
next year | DATE | 0.99+ |
14 | QUANTITY | 0.98+ |
Januity | PERSON | 0.98+ |
Both | QUANTITY | 0.98+ |
Accelerate | ORGANIZATION | 0.98+ |
Davos | LOCATION | 0.98+ |
one | QUANTITY | 0.97+ |
three tiers | QUANTITY | 0.97+ |
almost 200 000 certified engineers | QUANTITY | 0.97+ |
seven figure | QUANTITY | 0.97+ |
today | DATE | 0.97+ |
About 4000 attendees | QUANTITY | 0.97+ |
three years ago | DATE | 0.97+ |
three pillars | QUANTITY | 0.97+ |
eight level | QUANTITY | 0.97+ |
about 800 million | QUANTITY | 0.96+ |
one comment | QUANTITY | 0.96+ |
theCUBE | ORGANIZATION | 0.94+ |
each | QUANTITY | 0.93+ |
three years | QUANTITY | 0.93+ |
about 1.5million | QUANTITY | 0.93+ |
few months ago | DATE | 0.92+ |
Davos | ORGANIZATION | 0.91+ |
Q4 of 2018 | DATE | 0.91+ |
early this morning | DATE | 0.91+ |
day one | QUANTITY | 0.89+ |
this morning | DATE | 0.89+ |
Keynote Stage | EVENT | 0.86+ |
many years ago | DATE | 0.85+ |
Accelerate | EVENT | 0.84+ |
two | QUANTITY | 0.83+ |
World Economic Forum | EVENT | 0.8+ |
partners | QUANTITY | 0.76+ |
25 deals | QUANTITY | 0.73+ |
NSC5 | TITLE | 0.73+ |
Fortinet Accelerate | ORGANIZATION | 0.71+ |
top | QUANTITY | 0.71+ |
Fortigate | ORGANIZATION | 0.68+ |
Accelerate 19 | TITLE | 0.68+ |
NSC4 | TITLE | 0.66+ |
next two years | DATE | 0.66+ |
next five years | DATE | 0.66+ |
early in January | DATE | 0.64+ |
Ken Xie, Fortinet | Fortinet Accelerate 2019
>> live from Orlando, Florida It's the que covering Accelerate nineteen. Brought to you by Ford. >> Welcome back to the Q. We air live in Orlando, Florida At Fortinet Accelerate twenty nineteen Lisa Martin with Peter Burst. Pleased to welcome back one of our alumni on ly the CEO and founder of Fortinet. Kensi. Ken, thank you so much for joining Peter and me on the Cuban. Thanks for having the Cube back at accelerate. >> Yeah, I love to be here again. Yeah, Thank you. >> So, so quick by the numbers Can Kino. This morning was awesome. Loved the music and all the lights to start four thousand attendees from forty countries. You guys now have about three hundred eighty five thousand customers globally. Your revenue and F eighteen was up twenty percent year on year. I could go on and on. Lots of partners, lots of academies, tremendous growth. Talk to us about in the evolution of security. Where are we today and why is supporting that so well positioned to help customers dramatically transform security >> First world happy to see all the partner of the cosmos were come here. And also we keep him like every year we in this program also is a great program on another side. Like I say, securities of wherever dynamic space you need to keep in landing on We see more and more people come here s o that's we'LL be happy to discuss in the new technology the new market opportunity and also the new trend on DH Also What we see is a the space is so old and I'm making Also we see a lot of people keeping come here for the training for other sins And also I love the music make make us feel young again So But I >> think one of the reasons why security is so dynamic it is you don't for example, in the server world you don't have, you know you know gangs of bad guys running around with baseball bats trying to eat your servers. In the security world, you have people trying to enable the business to be able to do more, but also people constantly trying to tear the business down. And that tension drives a lot of invention and requires a lot of innovation. How is that changing? We're driving some of the key trends and networks and network security >> Yeah, that's where like I presented this morning. Wait, You see, with more device connected, Actually motive, I Some people being connect today and eventually in few years we'LL be calm. Motive eyes on people. There also is all the five G or icy went technology you can make is connected faster, more broadly reached. And then there's a more application More data also come to the Internet. So that's all you quist tax servants. There's all additional risk We'LL have all this connection. We have all these data transfer to all these different diversity on people. So that's all security business, right? Because secure to have the address where they now walking cannot really are dresses above the connection above the speed. So we have our dressing a content layered application layer the device user layer all regionally or country lier s O. That's making the security always keeping foreign faster than the night walk in the night. He spending on the study become the biggest sector United ninety idea spending environment. That's also one time we just feel security also need a study merger convert together is not working because no longer oh now will get only kind of the speed I can activities secure, canniness and bob. They had to be working together to smart rain route. In a data, put a low risk area tow without a polluted like transfer. All this conscience on that way, see, is the two industries that emerged together. That's where Koda security driven that walk are the arson about how this kind of we see today the mobile on cloud started replacing the traditional PC, right? So about going forward, the wearable divine's all the glass and we award study replaced the mobile. You don't have the whole mobile phone the season, while they're probably in your eyes on the same piled. A smart car that's my home, the wise every single connecting way Are you walking? Like if I walking here our sins related my information on power for me so I don't have to carry innocents, so that's going for you. A few years we'LL be happy. First, security will be part of this space. How this will be going forward contrato today The mobile the cloud way also have some discussion about that one. So we need to prepare for all this because that's how fortunate being founded. That's how our culture about generation, about long career advancement. So that's where we want to make sure the technology the part already for this chance. That's what gave the use of the past benefit of leverage of connection. Same time, lower the risk >> organ has taken an approach in the marketplace of Let Me Step Back. Put it this way. We all talk about software to find everything in virtual ization, and that's clearly an important technology and important trend. Ford has taken advantage of that as well, but the stuff doesn't run. All that's offered stuff doesn't run on hamsters. It runs in hardware. Unfortunate has made taking a strategic position, and it's been a feature of your nearly twenty year history to continuously invest in hardware and open up the performance aperture. Increase the size of the bucket of that hardware. How is that? Both altered your ability to add additional functionality, get ahead of the curve relative to competition, but also enabled your ecosystem to do a lot of new and interesting things that we're not seeing on other another network security companies? >> Yeah, that's why I totally agree with you. Israeli howto unable the past ecosystem for everybody playing a space for the partners of his provider, carrier enterprise, on the photo leverage technology benefit. More broadly, Cosmo base is very important. That's where we feel like a sulfur cloud. They do study in kind of a change, a lot of sense. But you also need a balance among clothes. Suffers were important, but also the hardwork also very important. All right, so that's the hybrid. More post the power on the sulfur. Both the cloud at age both have equal equal weight. Equally important, going forward How to leverage all this post is also also kind of very important for the future growth of future trend Another So you also can see like a mission. Uh, will you have the immersive device? We'LL have some, like security applied in tow Storage in that work in small Sadie, you also need a bad lie. Security be part of it. No, just security. I don't cop as a cost of additional Whatever process are all since, But you know, once you make it secure to be part ofthe like we mentioned a security for even that Working security driven like a future like a wearable device or the other since without it will be huge ecosystem going forward. That's where is the chip technology you can. Bad. We just saw Fervor is also additional servants. We can all walk in together. So that's where we want to look at the whole spectrum. There, make sure different part all can walk in together on also different technology. No, just limiting some part of it. I make sure the faux technologists face hole. Attack service can be a poor tag. And also we can leverage for the security of the high table addition. Opinions? You know, this conducted a war. >> This is what you're calling the third generation of Security? >> Yes, there's more. You for structure security. That's the whole security compared tto first dinners and second generation is our security just secured himself right. So you don't involve with other night walking star recharge the infrastructure? No, because Because they view everything you inside the companies secure You only need a guard at the door This Hey, who has come here? Anything inside I'll find But with today all the mobile pouring on Devise all the data everywhere Go outside the company you need to make sure security for all of the data. So that's the new trend. So now the border disappeared. So it doesn't matter. You said the company or not, is no longer secure anymore because you can use the mobile, the access rights o outside. All people can also come here with data also go out. So that's where the infrastructure security neither give or imposing their work inside on points. I under the cloud of the age and all this a different device on the diversity. Why? So you're even your mobile phone? Hi! Still working together. So it's a much bigger before structure. Much bigger are traceable space. Now that's making secure, more exciting. >> Well, we have gotten used over the past twenty years of building applications that operate on somebody else's device, typically a PC or mobile phone. And we've learned how to deal with that. You're suggesting that we're actually going to be integrating our systems with somebody else's systems at their edge or our edge on a deeply intimate level and life and death level. Sometimes on that, obviously, place is a real premium on security and networking whatnot. So how does the edge and the cloud together informed changes and how we think about security, how we think about networking, >> That's where, like I think age and a cloud they each complaint. Different role, because architecture. So the cloud has a good C all the bigger picture. They're very good on the provisioning. There could archiving cloud, also relatively slow, and also you can see most of data generated and age. That's where, whether you're immersive device, all your mobile, whatever ages were we called a digital made physical, and that's all the people in Device Connect. So that's where, like a seven eighty percent data, Carrion a probably never traveled to the club. They need a processed locally. They also need have the privacy and autonomy locally and also even interactive with other eighty vice locally there. So that's what we see is very important. Both the cloud on age security can be addressed together and also celebrity of architecture, that I say the cloud is good for detection so you can see a something wrong. You can cry the information, but the age new market on the provisions, because prevention need to be really time needed back, moreover, quickly because a lot of application they cannot afford a late Nancy like where do the V I. R. Even you slow down in a microsecond. Pickle feet is the famous signals. You also see the also drive a car. If you react too slow, you may hear something right the same scene for a lot of harder. Even you. Commerce, whatever. If you not response picking out within a half second, people may drop the connection. The memos are married, so that's what the late and see the speed on DH that's making the club play there at all into all this management on their age, playing hero in a really kind on Barlow. Ladies, you're really kind reaction there. So what? That's where we see the both side need to play their role on important transposed market. You said that just a one cloud, which I feel a little bit too hard right now. Try to cool down a little bit of our same age. Also, we see a very important even going forward what I been a bad security in age >> with this massive evolution that you've witnessed for a very long time. As the head of forty nine last nearly twenty years EJ cloud. How how dramatically technology changes in such a short period of time. I'm curious. Can How has your customer conversations evolved in terms of, you know, ten years ago were you talk ng more to security professionals? And now are you talking more to the C suite? As security is fundamental? Teo Digital transformation and unlocking tremendous value in both dollars in society impact has that conversation elevated as security has changed in the threat landscape has changed. >> Yeah, they do go to the board level, the CEO level now compared to like a ten, twenty years ago. Probably gaiety people maybe see so level, because security become probably the most important part of it. Now they keep you got a high high percentage that ikey spending there because when we connect everything together, we can make all the people all this business together to be on the connection. That's where security handled up, right? So that's where we see security studying kind of more. You hope me more important now. But another side, also the space also changing over quick. So that's where we always have to learn it. Woman engaged with Cosmo partner here. That's where this event is about way keeping less into what's the issue they have, how we can help the dress. All these security really the usual. Some even be honest security. Go to like a connection you for structure, some other, like architectural design, whatever their penis model there. So that's all we're very important on. Like I said, security space we need to keep in Lenny every day. Even I spent a few hours a day to Lenny. I You don't feel ready? Can K child? Oh, they >> said, It's a very dynamic world security world. >> You have our dynamic, the knowledge base, the technology refreshed quickly. Way always had to be Len have training. That's where he also see Try to position forty Niners lending company. So that's where we all for the because training program and all the train is afraid for partner for customers. All this kind is really it's a big investment. That's where a lot of people say, Oh, how can you? You've asked more in the training. You said of all come better. You must move your marketing. I say journeys of over a long term benefit. When people get trained, they also see Hey, what's the pants technology? So that's where a lot of organization, a lot of investment, really looking for. How five years here come benefit of space can benefit. The car's my partner, so that's all we see. Training's far long time measurement see modern technology. >> So can you've talked in the keynote? You've talked in the Cube about how networking security come together on how, as they move forward, they're going in form. Or they'LL have an impact on business and have an impact and other technologies. There's a lot of technology change when you talk to network in professional or even your own employees. What technologies out there do you think are going to start impacting how security works? Micro services containers? Are there any technologies that Ford that's looking at and saying, We gotta watch that really closely and that networking professionals have to pay more attention to. I >> have to say pretty much all of them, right? So all these Michael, all this contender technology, micro segmentation, according computing, the immersion lending all this is all very important because security has deal with all this different new technology application on like it was all this a huge, competent power raised on the cost lower ball corner computer. And maybe some of the old technology may not really work any more for some additional risks. Like where the equipment can be break by cute from the computing or some moderate eventually can also kind of take over. All this country is always we tryto tryto learn, tryto tried. Okay, chop every day. Hey, that that's what I say is that's so exciting. Keep you wake up, Keep your Lenny everyday, which I enjoy. But at the same time, there's a lot of young people they probably even even better than us to catch the new technology. >> Oh, no. Oh, no, no, no. >> Yeah. Somehow, my kids can play the fool much greater than mere. That's always the way >> we want to thank you so much for joining Peter and me on the kid this afternoon for having the Cube back at forty nine. Accelerate and really kind of talking about how you guys are leading in the space and we're gonna be having more guests on from Fortinet. And your partner's talking about educate ecosystems and technology that you talked about in your keynote. So we thank you again for your time. And we look forward to a very successful day here. >> Oh, thank you. Thank you very much. You enjoy all this programme for many years. Thank you. >> Excellent. We love to hear that. We want to thank you for watching the Cube for Peter Burress. I'm Lisa Martin. You're watching the Cube. >> Thank you.
SUMMARY :
live from Orlando, Florida It's the que covering and me on the Cuban. Yeah, I love to be here again. Loved the music and all the lights to start four thousand attendees from forty a lot of people keeping come here for the training for other sins And also I love the music in the server world you don't have, you know you is all the five G or icy went technology you can make is connected faster, functionality, get ahead of the curve relative to competition, but also enabled your ecosystem All right, so that's the hybrid. You said the company or not, is no longer secure anymore because you can use So how does the edge and the cloud together DH that's making the club play there at all into all this management on their age, security has changed in the threat landscape has changed. be on the connection. You have our dynamic, the knowledge base, the technology refreshed quickly. There's a lot of technology change when you talk to network in professional or even your own And maybe some of the old technology may not really work any more for some additional That's always the way So we thank you again for your time. Thank you very much. We want to thank you for watching the Cube for Peter Burress.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Ken Xie | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
Peter Burst | PERSON | 0.99+ |
five years | QUANTITY | 0.99+ |
forty countries | QUANTITY | 0.99+ |
second generation | QUANTITY | 0.99+ |
Peter Burress | PERSON | 0.99+ |
First | QUANTITY | 0.99+ |
Ken | PERSON | 0.99+ |
Kensi | PERSON | 0.99+ |
Nancy | PERSON | 0.99+ |
today | DATE | 0.99+ |
Michael | PERSON | 0.99+ |
both side | QUANTITY | 0.98+ |
one time | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
both dollars | QUANTITY | 0.98+ |
third generation | QUANTITY | 0.98+ |
Lenny | PERSON | 0.98+ |
2019 | DATE | 0.98+ |
four thousand attendees | QUANTITY | 0.98+ |
Both | QUANTITY | 0.98+ |
two industries | QUANTITY | 0.97+ |
about three hundred eighty five thousand customers | QUANTITY | 0.97+ |
forty nine | DATE | 0.97+ |
Can Kino | ORGANIZATION | 0.96+ |
both | QUANTITY | 0.96+ |
ten years ago | DATE | 0.96+ |
seven eighty percent | QUANTITY | 0.96+ |
one cloud | QUANTITY | 0.95+ |
Fervor | ORGANIZATION | 0.95+ |
Len | PERSON | 0.95+ |
first dinners | QUANTITY | 0.94+ |
Accelerate nineteen | ORGANIZATION | 0.93+ |
ten, twenty years ago | DATE | 0.92+ |
twenty percent | QUANTITY | 0.92+ |
forty nine | QUANTITY | 0.91+ |
ninety idea | QUANTITY | 0.91+ |
this morning | DATE | 0.91+ |
eighty vice | QUANTITY | 0.89+ |
this afternoon | DATE | 0.86+ |
nearly twenty year | QUANTITY | 0.85+ |
a half second | QUANTITY | 0.84+ |
eighteen | QUANTITY | 0.81+ |
tryto | PERSON | 0.8+ |
each complaint | QUANTITY | 0.8+ |
Koda | ORGANIZATION | 0.79+ |
forty Niners | QUANTITY | 0.79+ |
This morning | DATE | 0.78+ |
Carrion | ORGANIZATION | 0.78+ |
Cosmo | ORGANIZATION | 0.78+ |
Cube | COMMERCIAL_ITEM | 0.78+ |
United | ORGANIZATION | 0.77+ |
partners | QUANTITY | 0.74+ |
Cuban | OTHER | 0.73+ |
a microsecond | QUANTITY | 0.69+ |
nineteen | ORGANIZATION | 0.67+ |
twenty years | QUANTITY | 0.66+ |
few hours a day | QUANTITY | 0.65+ |
Teo | PERSON | 0.64+ |
Sadie | ORGANIZATION | 0.63+ |
Israeli | OTHER | 0.6+ |
G | OTHER | 0.54+ |
twenty | QUANTITY | 0.54+ |
cosmos | LOCATION | 0.51+ |
Barlow | ORGANIZATION | 0.51+ |
EJ cloud | ORGANIZATION | 0.51+ |
Accelerate | ORGANIZATION | 0.5+ |
single | QUANTITY | 0.49+ |
Cube | TITLE | 0.48+ |
past | DATE | 0.44+ |
Warren Small, Dimension Data | Fortinet Accelerate 2019
>> Narrator: Live from Orlando, Florida it's theCUBE. Covering Accelerate 19. Brought to you by Fortinet. >> Welcome back to theCUBE live from Fortinet Accelerate 2019. I'm Lisa Martin with Peter Burris. You can hear all the folks behind us on the show floor. There's about 4000 people here in Orlando from 40 different countries. We're pleased to welcome to theCUBE for the first time, Warren Small, the Senior Vice President of Transformation and Security at Dimension Data. Warren, thank you so much for joining Peter and me on theCUBE. >> Thank you for having me guys, it's a great pleasure. >> Lots of energy behind us, let's go ahead and start out so our viewers get a view of Dimension Data, who you guys are, what you do, where you're headquartered. >> Absolutely, so first and foremost, thank you again, for having me. Dimension Data, we're a part of NTT, headquartered out of London. Today we're a global organization with presence in every major country. As an organization, we have have eight billion dollars in revenue, and employ about 30,000 people. I'm from group security, I'm responsible for transforming our business to be more solutions and outcome focused. To help our clients with their digital aspirations. >> You're a general partner in the operational technology space with Fortinet. Tell us a little bit about the history of your partnership. >> Yeah, fantastic, that's a new focus area for us, absolutely, but Dimension Data has been a longtime partner with Fortinet across the entire security portfolio. We've made a significant investment today in being very intentional around partnering with Fortinet for operational technology because we believe fabric approach has a good ecosystem, as articulated by Ken and Patrice this morning, around the partners they've sought to help clients address this operational technology risk. >> One of the things, I think it was Ken talked about this morning, is this notion of how the edge is going to be distinguished by different levels of trust. A little bit of background, at Wikibon, we talk about how digital transformation is the process by which a business institutionalizes and operational it's the role in data as an asset plays in it's business. So we talk about data zones having a zone of data proximate to whatever event is going to take place. Ken talked about almost a zone of trust proximate to where an event's going to take place in OT. You're talking to an enormous number of customers about outcomes and in trying to match technology to those outcomes. How does that notion of trust being one of the primary determinants design elements for thinking about OT? >> I think incredible question, thank you so much. I think there two ways to answer the question. We have a philosophy around being secure by design, and by nature, being secure by design, there's inherent trust, because we understand the clients' business outcome. Today, we're faced with an incredible amount of innovation. I think we all want innovation, everything that we do. One of the things I keep talking to my family about is how easy my job has become through innovation. Whether that's booking an airline ticket and downloading a ticket but now we talk about the credibility of the airline. We talk about the credibility of the airline industry. We talk about the credibility of the transportation industry. It's not just the tickets. So when we're talking about the service, we're talking about the integrity of the airline. It's all those pixels that are integrated. You know, nobody talks to you today about an OT outage when your bags are delayed. Nobody's talking to you today about an airline delay because there's been some water leak. An IOT sensor has detected the water leak and now they're trying to get emergency services to come in, investigate the problem. I think that's the challenge you're faced with. Inherent in the secure by design being a philosophy with all business stakeholders, business now have an appreciation that security is no longer that fear factor. It's now an enabler of the business outcome that we want to deliver to our clients who are crying out for services. >> I might even say it's part of the brand, right? >> Small: Absolutely. >> You go back to systems theory and you talk about a competent interface And a competent interface is performance, it's trustworthy, it behaves as designed, it's monitorable, it's all those other things and in many respects as we move to a digital business, the fundamental tenant of competency is tied into how well the network retains a security profile so that the business can take on new options but serve customers the way it's expected to. >> Small: Absolutely. I like telling my colleagues is when we see some of our clients that are either in the oil and gas industry or critical infrastructure, when you go a plant, they always talk about fatalities. They always talk about how many incidents they have, it's that real. In cyber-security today, in this digital attacks, you don't see it but once you automate a system or you automate part of a plant, there could be some fatalities. I read an article recently about how you can manipulate data that says to a patient that they aren't really sick. I'm a bit torn, because if I go to a doctor, I want to be told if something wrong with me. Maybe I don't want to know, but in reality, I do want to know so I can take action. That's the challenge we're faced with today is that it's uncertainty of manipulation. This is uncertainty today because as we connect these two worlds to create better efficiencies or to provide a better service to the patient all of a sudden is it creating more risks. There are many stories I could share with you that told to me or either our clients share with us of the real life problems if an IOT device is not protected and at most times there's a device that's connected that nobody knows about. >> How do you lead that conversation about security away from fear and more to this is how we could help you stop being reactive and actually be proactive? >> Today, as a team, we talk about innovation. Today we talk about what if. We talk about the value of the way I do my job today. I'm collaborating, the other day I did a count of just a number of apps that I use to make a phone call to have a meeting with somebody. I probably have about seven and you could count the same. Whether it's vendor X or OEM Y but I have an innate level of trust that that vendor, that OEM, that's provided the application to me is trustworthy. I download it and I get on with my meeting. It's very much the same the way I communicate and collaborate with my peers, whether it's internally or externally. I no longer live with the fear that someone may steal my data because I know there's a process in place and we put mechanisms in place to make sure that critical data cannot be shared. Much the same with other aspects of technology. If we have the conversation of the value that can be derived if there is integrity. I look around me and it was interesting. I got into the elevator here and it's a pretty old elevator, right? But there's a level of trust that it was certified and that it is certified, and it's validated, that it works. That's the only trust I have, because for those that know me, I'm pretty scared of elevators. Claustrophobic, right? >> Using you as a proxy for a lot of users because Dimension Data is deep into a number of global 500 companies, global 2000 companies. Do you think executives really understand that crucial relationship between their digital business, their brand, and the role that security networking, specifically security, and secure networking will impact their brand and their business? >> I think they're starting to appreciate the impact. I think it's much in the face now. The numerous attacks that are out there. In fact, I was saying to some of my colleagues and some of my peers, on Friday morning, I was in a conference call and it was the first time I was meeting an individual and about three months before that I had spoken to his CIO, the employee's CIO, and I'd spoken to him about his challenges and I was articulating the value of his brand because they make critical components of motor vehicles. And we were talking about what if there's a malfunction. So, it then got down to this individual, and we had a conversation, and I said to him it's interesting what you shared with me, because it almost sounded like I was having a conversation with you, but you were talking to me, so that your CIO asked you to take this action. It wasn't, it's just become a business problem that's been discussed at the boardroom level. I think if you live in the US, like myself, I've now become a user of this thing called Amazon. My wife's a more frequent user myself, but we rely that a parcel is delivered at a certain time. And we rely on the fact that if Amazon tells us it's going to be shipped and you will receive it, my nine year old, he wants to have his Pokemon cards arrive on Friday, not on Saturday. So, we have to rely that there's integrity in what they are sharing with us, and that they have to rely that their partners have integrity in their systems, and they have to start demonstrating that these are secure systems. These are secure manufacturing plants. These are secure supply chain plants. >> What does that C-suite, and I'm glad you brought that question up, Peter, because I'm always curious, this can't be a conversation anymore at the network security level. >> Or just at the network security level. >> Exactly, it's so pervasive, right? From a C-suite's perspective, what are the outcomes that that CIO has to deliver back to the business. You mentioned healthcare a minute ago, and obviously that's an industry that affects every single person, whether the data is true or not, it affects all of us, but that CIO has to deliver outcomes, whether it's a hospital, or an E-commerce spender like an Amazon, has to deliver to me what their customers need. How is Dimension Data and Fortinet helping that CIO meet her or his business level objectives so the business is competitive, successful, et cetera? >> Absolutely. So a little bit about Dimension Data. We go to market with practices, so we have a digital business solutions practice, and we partner very heavily with our digital business solution's practice. We work with clients around ideation. We work with clients around how they're going to transform their business, so when we talk about smart healthcare, what does that really mean to a user? From a pharmaceutical perspective, from a hospital perspective, how does that really help? We put a number of use cases where we demonstrate to clients what's the value of providing better service to someone when they are first impacted or first injured? If we can diagnose, we can detect, and we can communicate back to be it the hospital or healthcare provider, that's the service that has high integrity. I'm going to subscribe to a healthcare provider or a healthcare practitioner that subscribes to a smart healthcare philosophy. I'm a traveling father, I'm a traveling husband, but the value for me is knowing that I'm always connected, and the services I subscribe to by providers have integrity, and that my wife doesn't have to provide the details on a continuous basis to multiple providers. I had a very emotional conversation once to an individual who shared the impact of sharing data on multiple instances with multiple providers. It wasn't that they had to share, but it was the delayed cause by having to share the information on multiple instances, and then the associated risk. I always talk about I gave you the example about sharing. We talk about, I tell my 13 year old, I say to him, what don't you want me to know about you so be cautious what you share. >> One quick question for you. We're talking increasingly about critical infrastructure, essential infrastructure. We're having more conversations in theCUBE, but it's not broadly diffusing into the general population. A lot of that, one of the reasons for that, is that people believe it's going to be unbelievably expensive. But it seems to me, and this is what I'm testing, that an investment in updating critical infrastructure so that you got better security, you got more network ability, you're using technology more appropriately, will also have the benefit that you can increase the optimization of the resources that are associated with that infrastructure. When you work with clients, do you see that kind of ameliorating trade off where yes we have to invest in these things, but there is a derivative benefit that we're going to increase the optimization of them? >> Absolutely. I'll answer that in a number of different ways. But the first one is efficiency and that's what everybody is driving towards. Can we get greater efficiency by integrating these two worlds? But as you said, what they don't realize is you can't just connect these two worlds without making sure that they are capable of being integrated and that's the first stance we take with a number of clients irrespective of the industry that they're in is what do you know and what do you think you know? Because if you have an understanding and you have a design of what needs to be enabled, what needs to be remediated, and what needs to be changed, you can move a lot faster, and you know who to engage in terms of partnerships. You know, I was talking about that example earlier. It was absolutely a case where the client knew immediately, if we connect these two worlds the devices that facilitate the connection need to be replaced. Another example was a client was implementing a software defined network for all their plants. What they didn't realize was the technology would not enable that software defined networking. So without a plan which we've been extremely intentional in building what we call a cyber-security advisory for operational technology networks is to help our clients with their design and that plan and methodology to go and execute. >> Last question in about 30 seconds, no pressure. Lot of growth, lot of potential in the market that Ken Xie, Patrice Perche talked about this morning during the keynote. What excites you about this momentum that their business growth is carrying into 2019? >> I think a number of ways to answer but 30 seconds, what I'm grateful for is how Ken Xie and Patrice articulated it. It's all about education. If we have the right people, we can move faster. Second is that there's immense value in the integration of their fabric network. We see a lot of value in the client conversations that we have today is what do we have that we can leverage? How can we make it better as opposed to replace? That'll give us the ability. Patrice mentioned a stat of 50% of organizations have unfilled roles and I think sometimes it may be greater because it depends on who we're measuring, right? And in what roles in these organizations. But the potential for us is incredible as a manage security service provider and a platform organization that we have the teamwork in Fortinet that allows us to co-invest in the platform that we are building to deliver better outcomes to our clients. >> Warren, it's been a pleasure to have you on theCUBE with me this afternoon. We're looking forward to hearing more great news from Dimension Data and Fortinet over the next year and years to come! >> Thank you so much, lovely to be here. >> Our pleasure. For Peter Burris, I'm Lisa Martin. You're watching theCUBE. (tech music)
SUMMARY :
Brought to you by Fortinet. You can hear all the folks behind us on the show floor. who you guys are, what you do, where you're headquartered. thank you again, for having me. You're a general partner in the to help clients address this operational technology risk. One of the things, I think it was Ken talked about One of the things I keep talking to my family about is so that the business can take on new options some of our clients that are either in the to make a phone call to have a meeting with somebody. and the role that security networking, and that they have to rely that their partners and I'm glad you brought that question up, Peter, but that CIO has to deliver outcomes, and the services I subscribe to by providers have integrity, so that you got better security, and that plan and methodology to go and execute. Lot of growth, lot of potential in the market that we have today is what do we have that we can leverage? Warren, it's been a pleasure to have you You're watching theCUBE.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Patrice | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Dimension Data | ORGANIZATION | 0.99+ |
Patrice Perche | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Warren | PERSON | 0.99+ |
Warren Small | PERSON | 0.99+ |
London | LOCATION | 0.99+ |
2019 | DATE | 0.99+ |
Ken Xie | PERSON | 0.99+ |
Today | DATE | 0.99+ |
US | LOCATION | 0.99+ |
Orlando | LOCATION | 0.99+ |
Saturday | DATE | 0.99+ |
Friday | DATE | 0.99+ |
Friday morning | DATE | 0.99+ |
Second | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
eight billion dollars | QUANTITY | 0.99+ |
50% | QUANTITY | 0.99+ |
nine year | QUANTITY | 0.99+ |
30 seconds | QUANTITY | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
two ways | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
40 different countries | QUANTITY | 0.99+ |
about 30,000 people | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
500 companies | QUANTITY | 0.98+ |
first time | QUANTITY | 0.98+ |
Wikibon | ORGANIZATION | 0.97+ |
One quick question | QUANTITY | 0.97+ |
two worlds | QUANTITY | 0.97+ |
first one | QUANTITY | 0.96+ |
about 4000 people | QUANTITY | 0.96+ |
about 30 seconds | QUANTITY | 0.96+ |
about seven | QUANTITY | 0.95+ |
13 year old | QUANTITY | 0.94+ |
this afternoon | DATE | 0.94+ |
first stance | QUANTITY | 0.94+ |
2000 companies | QUANTITY | 0.93+ |
first injured | QUANTITY | 0.93+ |
a minute ago | DATE | 0.93+ |
theCUBE | ORGANIZATION | 0.92+ |
this morning | DATE | 0.91+ |
NTT | ORGANIZATION | 0.9+ |
Pokemon | COMMERCIAL_ITEM | 0.9+ |
next year | DATE | 0.82+ |
Senior Vice President | PERSON | 0.8+ |
Keynote Analysis | Fortinet Accelerate 2019
>> Announcer: Live from Orlando, Florida it's theCUBE covering Accelerate19. Brought to you by Fortinet. >> Welcome to theCUBE's coverage of Fortinet Accelerate 2019 live from Orlando, Florida. I'm Lisa Martin with Peter Burris. Peter, it's great to be with you our third year co-hosting Accelerate together. >> Indeed, Lisa. >> So we moved from, they've moved from Vegas to Orlando, hence we did so we had a little bit of a longer flight to get here. Just came from the Keynote session. We were talkin' about the loud music kind of getting the energy going. I appreciated that as part of my caffeination (laughs) energy this morning but a lot of numbers shared from Fortinet Accelerate. 4,000 or so attendees here today from 40 different countries. They gave a lot of information about how strong their revenue has been, $1.8 billion, up 20% year on year. Lots of customers added. What were some of the takeaways from you from this morning's keynote session? >> I think it's, I got three things, I think, Lisa. Number one is that you've heard the expression, skating to where the puck's going to go. Fortinet is one of those companies that has succeeded in skating to where the puck is going to go. Clearly cloud is not a architectural or strategy for centralizing computing. It's a strategy for, in a controlled coherent way, greater distribution of computing including all the way out to the edge. There's going to be a magnificent number of new kinds of architectures created but the central feature of all of them is going to be high performance, highly flexible software-defined networking that has to have security built into it and Fortinet's at the vanguard of that. The second thing I'd say is that we talk a lot about software defined wide-area networking and software-defined networking and software-defined infrastructure and that's great but it ultimately has to run on some type of hardware if it's going to work. And one of the advantages of introducing advanced ACICS is that you can boost up the amount of performance that your stuff can run in and I find it interesting that there's a clear relationship between Fortinet's ability to bring out more powerful hardware and its ability to add additional functionality within its own stack but also grow the size of its ecosystem. And I think it's going to be very interesting over the next few years to discover where that tension is going to go between having access to more hardware because you've designed it and the whole concept of scale. My guess is that Fortinet's growth and Fortinet's footprint is going to be more than big enough to sustain its hardware so that it can continue to drive that kind of advantage. And the last thing that I'd say is that the prevalence and centrality of networking within cloud computing ultimately means that there's going to be a broad class of audiences going to be paying close attention to it. And in the Keynotes this morning we heard a lot of great talk that was really hitting the network professional and the people that serve that network professional and the security professional. But Fortinet's going to have to expand its conversation to business people and explain why digital business is inherently a deeply networked structure and also to application developers. Fortinet is talking about how the network and security are going to come together which has a lot of institutional and other implications but ultimately that combination of resources is going to be very attractive to developers in the long run who don't necessarily like security and therefore security's always been a bull time. So if Fortinet can start attracting developers into that vision and into that fold so the network, the combined network security platform, becomes more developer-friendly we may see some fascinating new classes of applications emerge as a consequence of Fortinet's hardware, market and innovation leadership. >> One of the things that they talked about this morning was some of the tenets that were discussed at Davos 2019 just 10 weeks ago. They talked about education, ecosystem and technology, and then showed a slide. Patrice Perche, the executive senior vice president of sales said, hey we were talking about this last year. They talked about education and what they're doing to not only address the major skills gap in cybersecurity, what they're doing even to help veterans, but from an education perspective, rather from an ecosystem perspective, this open ecosystem. They talked about this massive expansion of fabric-ready partners and technology connector partners as well as of course the technology in which Ken Xie, CEO and founder of Fortinet, was the speaker at Davos. So they really talked about sort of, hey, last year here we were talking about these three pillars of cybersecurity at the heart of the fourth industrial revolution and look where we are now. So they sort of set themselves up as being, I wouldn't say predictors of what's happening, but certainly at the leading edge, and then as you were talking about a minute ago, from a competitive perspective, talked a lot this morning about where they are positioned in the market against their competitors, even down from the number of patents that they have to the number of say Gartner Magic Quadrants that they've participated in so they clearly are positioning themselves as a leader and from the vibe that I got was a lot of confidence in that competitive positioning. >> Yeah and I think it's well deserved. So you mentioned the skills gap. They mentioned, Fortinet mentioned that there's three and a half million more open positions for cybersecurity experts than there are people to fulfill it and they're talking about how they're training NSEs at the rate of about, or they're going to, you know, have trained 300,000 by the end of the year. So they're clearly taking, putting their money where their mouth is on that front. It's interesting that people, all of us, tend to talk about AI as a foregone conclusion, without recognizing the deep interrelationship between people and technology and how people ultimately will gate the adoption of technology, and that's really what's innovation's about is how fast you embed it in a business, in a community, so that they change their behaviors. And so the need for greater cybersecurity, numbers of cybersecurity people, is a going to be a major barrier, it's going to be a major constraint on how fast a lot of new technologies get introduced. And you know, Fortinet clearly has recognized that, as have other network players, who are seeing that their total addressable market is going to be shaped strongly in the future by how fast security becomes embedded within the core infrastructure so that more applications, more complex processes, more institutions of businesses, can be built in that network. You know there is one thing I think that we're going to, that I think we need to listen to today because well Fortinet has been at the vanguard of a lot of these trends, you know, having that hardware that opens up additional footprint that they can put more software and software function into, there still is a lot of new technology coming in the cloud. When you start talking about containers and Kubernetes, those are not just going to be technologies that operate at the cluster level. They're also going to be embedded down into system software as well so to bring that kind of cloud operating model so that you have, you can just install the software that you need, and it's going to be interesting to see how Fortinet over the next few years, I don't want to say skinnies up, but targets some of its core software functionality so that it becomes more cloud-like in how it's managed, its implementations, how it's updated, how fast patches and fixes are handled. That's going to be a major source of pressure and a major source of tension in the entire software-defined marketplace but especially in the software-defined networking marketplace. >> One of the things Ken Xie talked about cloud versus edge and actually said, kind of, edge will eat the cloud. We have, we live, every business lives in this hybrid multi-cloud world with millions of IoT devices and mobile and operational technology that's taking advantage of being connected over IP. From your perspective, kind of dig into what Ken Xie was talking about with edge eating cloud and companies having to push security out, not just, I shouldn't say push it out to the edge, but as you were saying earlier and they say, it needs to be embedded everywhere. What are your thoughts on that? >> Well I think I would say I had some disagreements with him on some of that but I also think he extended the conversation greatly. And the disagreements are mainly kind of nit-picky things. So let me explain what I mean by that. There's some analyst somewhere, some venture capitalist somewhere that coined the term that the edge is going to eat the cloud, and, you know, that's one of those false dichotomies. I mean, it's a ridiculous statement. There's no reason to say that kind of stuff. The edge is going to reshape the cloud. The cloud is going to move to the edge. The notion of fog computing is ridiculous because you need clarity, incredible clarity at the edge. And I think that's what Ken was trying to get to, the idea that the edge has to be more clear, that the same concepts of security, the same notions of security, discovery, visibility, has to be absolutely clear at the edge. There can be no fog, it must be clear. And the cloud is going to move there, the cloud operating model's going to move there and networking is absolutely going to be a central feature of how that happens. Now one of the things that I'm not sure if it was Ken or if was the Head of Products who said it, but the notion of the edge becoming defined in part by different zones of trust is, I think, very, very interesting. We think at Wikibon, we think that there will be this notion of what we call a data zone where we will have edge computing defined by what data needs to be proximate to whatever action is being supported at the edge and it is an action that is the central feature of that but related to that is what trust is required for that action to be competent? And by that I mean, you know, not only worrying about what resources have access to it but can we actually say that is a competent action, that is a trustworthy action, that agency, that sense of agency is acceptable to the business? So this notion of trust as being one of the defining characteristics that differentiates different classes of edge I think is very interesting and very smart and is going to become one of the key issues that businesses have to think about when they think about their overall edge architectures. But to come back to your core point, we can call it, we can say that the edge is going to eat the cloud if we want to. I mean, who cares? I'd rather say that if software's going to eat the world it's going to eat it at the edge and where we put software we need to put trust and we need to put networking that can handle that level of trust and with high performance security in place. And I think that's very consistent with what we heard this morning. >> So you brought up AI a minute ago and one of the things that, now the Keynote is still going on. I think there's a panel that's happening right now with their CISO. AI is something that we talk about at every event. There are many angles to look at AI, the good, the bad, the ugly, the in between. I wanted to get your perspective on, and we talked about the skills gap a minute ago, how do you think that companies like Fortinet and that their customers in every industry can leverage AI to help mitigate some of the concerns with, you mentioned, the 3.5 million open positions. >> Well there's an enormous number of use cases of AI obviously. There is AI machine learning being used to identify patterns of behavior that then can feed a system that has a very, very simple monitor, action, response kind of an interaction, kind of a feedback loop. So that's definitely going to be an important element of how the edge evolves in the future, having greater, the ability to model more complex environmental issues, more complex, you know, intrinsic issues so that you get the right action from some of these devices, from some of these censors, from some of these actuators. So that's going to be important and even there we still need to make sure that we are, appropriately, as we talked about, defining that trust zone and recognizing that we can't have disconnected security capabilities if we have connected resources and devices. The second thing is the whole notion of augmented AI which is the AI being used to limit the number of options that a human being faces as they make a decision. So that instead of thinking about AI taking action we instead think of AI, taking action and that's it, we think of AI as taking an action on limiting the number of options that a person or a group of people face to try to streamline the rate at which the decision and subsequent action can get taken. And there, too, the ability to understand access controls, who has visibility into it, how we sustain that, how we sustain the data, how we are able to audit things over time, is going to be crucially important. Now will that find itself into how networking works? Absolutely because in many network operating centers, at least, say, five, six years ago, you'd have a room full of people sitting at computer terminals looking at these enormous screens and watching these events go by and the effort to correlate when there was a problem often took hours. And now we can start to see AI being increasingly embedded with the machine learning and other types of algorithms level to try to limit the complexity that a person faces so you can the better response, more accurate response and more auditable response to potential problems. And Fortinet is clearly taking advantage of that. Now, the whole Fortiguard Labs and their ability to have, you know, they've put a lot of devices out there. Those devices run very fast, they have a little bit of additional performance, so they can monitor things a little bit more richly, send it back and then do phenomenal analysis on how their customer base is being engaged by good and bad traffic. And that leads to Fortinet becoming an active participant, not just at an AI level but also at a human being level to help their customers, to help shape their customer responses to challenges that are network-based. >> And that's the key there, the human interaction, 'cause as we know, humans are the biggest security breach, starting from basic passwords being 1, 2, 3, 4, 5, 6, 7, 8, 9. Well, Peter-- >> Oh, we shouldn't do that? >> (laughs) You know, put an exclamation point at the end, you'll be fine. Peter and I have a great day coming ahead. We've got guests from Fortinet. We've got their CEO Ken Xie, their CISO Phil Quade is going to be on, Derek Manky with Fortiguard Labs talking about the 100 billion events that they're analyzing and helping their customers to use that data. We've got customers from Siemens and some of their partners including one of their newest alliance partners, Symantec. So stick around. Peter and I will be covering Fortinet Accelerate19 all day here from Orlando, Florida. For Peter Burris, I'm Lisa Martin. Thanks for watching theCUBE. (techno music)
SUMMARY :
Brought to you by Fortinet. Peter, it's great to be with you our third year kind of getting the energy going. And I think it's going to be very interesting One of the things that they talked about this morning and it's going to be interesting to see how Fortinet it needs to be embedded everywhere. that the edge is going to eat the cloud, and one of the things that, and their ability to have, you know, And that's the key there, the human interaction, and helping their customers to use that data.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Patrice Perche | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Ken Xie | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Symantec | ORGANIZATION | 0.99+ |
Siemens | ORGANIZATION | 0.99+ |
Vegas | LOCATION | 0.99+ |
$1.8 billion | QUANTITY | 0.99+ |
Derek Manky | PERSON | 0.99+ |
Orlando | LOCATION | 0.99+ |
Lisa | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
Fortiguard Labs | ORGANIZATION | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
300,000 | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
4,000 | QUANTITY | 0.99+ |
Phil Quade | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
40 different countries | QUANTITY | 0.99+ |
third year | QUANTITY | 0.99+ |
Wikibon | ORGANIZATION | 0.99+ |
10 weeks ago | DATE | 0.99+ |
three and a half million | QUANTITY | 0.99+ |
Gartner | ORGANIZATION | 0.98+ |
second thing | QUANTITY | 0.98+ |
Fortinet Accelerate | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
millions | QUANTITY | 0.98+ |
three things | QUANTITY | 0.97+ |
100 billion events | QUANTITY | 0.97+ |
one thing | QUANTITY | 0.96+ |
a minute ago | DATE | 0.95+ |
six years ago | DATE | 0.94+ |
five | DATE | 0.94+ |
20% | QUANTITY | 0.94+ |
three pillars | QUANTITY | 0.94+ |
this morning | DATE | 0.93+ |
fourth industrial revolution | EVENT | 0.92+ |
Davos 2019 | EVENT | 0.91+ |
3.5 million open | QUANTITY | 0.87+ |
Keynote | EVENT | 0.83+ |
theCUBE | ORGANIZATION | 0.83+ |
Accelerate | ORGANIZATION | 0.78+ |
next few years | DATE | 0.77+ |
Number one | QUANTITY | 0.75+ |
CEO | PERSON | 0.7+ |
Dominique Jodoin, NoviFlow | Fortinet Accelerate 2019
>> Live from Orlando, Florida It's the que covering accelerate nineteen. Brought to you by important >> Welcome back to the Cube. Live from Orlando, Florida at Fortinet Accelerate twenty ninety nine. Lisa Martin Joining and welcoming to the queue for the first time, the CEO and president of Novy Flow. Dominique Jordan. Dominic. Great to have you joining on the Cube at accelerate. So here we are in Orlando, talking about all things cyber security. I just came from the keynote session where Fortinet was talking about how much they're innovating. What? How they're leading from a competitive perspective. What customers air saying why their security fabric is so differentiated? No, the flow is one of their security fabric ready partners. But before we talk about that, why don't you take a minute or two to describe to our audience who know the flow is and what you guys are doing in cybersecurity? >> Yeah, way We came in a little bit by accident. The cyber security. We we've been founded seven years ago, and the idea was to create the very programmable networks. It's very much in line with what we heard today on the keynote, and we became a technology leader in that field as the and software defined networking. And three, four years ago, customers started to use our product, obviously for cybersecurity application. We didn't even know about that. They don't necessarily tell us, and we spend a bit more focus into it. And over time we started to work with fortunate, for example. And now we have a developing. Is Greg relationship great solutions? Also for the for the customers. >> So one of the things that we understand from Fortinet and from all of the conversations that the Cube has globally is is that digital transformation is fundamental to every business to compete right. But as is secure transformation and security transformation, very challenging to do as businesses. And you think of any industry, financial services, retail, consumer packaged goods. As they expand digitally, so does the attack surface. So one of the things that fourteen it talks about is it's not enough anymore to have these point solutions pointed at different, you know, on Prem Cloud edge that the entire infrastructure as it's changing and they attacked services expanding has got to be protected more from an integrated perspective. This notion of the of the security fabric. Talk to us about a fabric ready partnership. What that means to know that though I know that's only in the last six months or so. So walk us through what you did to become a fabric ready partner and what it is that you in forging that are seeing in the market as challenges that you're helping to results. >> Yeah, what we see. Actually, I like to decide the defined that as a battlefield, the attacks are being waged, really, and and the band we feel is the networks of those carriers. There was a government agencies, large enterprise, etcetera, and those those companies are not really taking advantage of their position because, in fact, with the right network fabric the right tools to be able to react, they could actually be very much more powerful. So this is where we are working with forty nine to equip those customers with solutions that are much more agile, more programmable because the network is also evolving. It's not only that the attacks are broader, they also changing the nature of it is changing, and the fact that we came from a background of working at the edge of the networks mostly. Well, I wouldn't mention that before we deployed. Typically at the large tier one carriers all around the world are mentioned. A few tell Strike group, wait deployed at the Hutchison Group Young law, etcetera. And also a two of these five eyes. So government agencies that are engage in fighting these attacks. So So we come with a background of working in a decentralized approach anyway, So it was a very natural evolution. Work was done with Fortinet so far. So what we built so far together we built some integrated solutions s So far, we have two solutions that we are demonstrating two customers. The first one is to allow the large. It tends to be the larger customer fortunate that are making the transition from a in existing appliance to virtual eyes solutions. That's an area where we are very effective at helping them to scale. And those would be for customers that would have say, hundred gig of traffic or more. So we're fortunate we built a and undermanned solution. It's an integrated solution that enables those carriers to are. Those customers could be other kind of customers to gradually grow the number of the EMS that are used in real time for doing whatever Sabbath security job they have to do. And if they the demand comes down, these v EMS were released in the customer data centers. To do some other jobs like this is one of the products that we built together, and we are demonstrating. The second one is a. A feature of that is that we can process about the way this is Ah is able to scale all the way up to six point five terra bits per second. I'Ll repeat that six point five terror bits per second. This is a unheard of and this is, I think one of the interests of Fortinet is working with no visible. We already have developed not really the metal ring system, but all the O. N m features that you demand as a customer to be deployed in the real world. So so that's that. That's the base on. The second option is that we developed is a carry Great Nat again. Same idea. We can scale the Terra great net analysis up to one point six terabit per second. Former, very powerful. They're powerful solutions to meet this this raising the man which you talked about? They say this literally a wave of attacks coming more and more. >> So you mentioned some customers by name. Telstra, for example. CEO to CEO conversations tells, has been around for a long time as the organization expands digitally. And we talked about a minute ago as this the attack surface. What are some of the conversations that you're having with the scene? The C suite about security? It's not just talking to, you know, network security admits. Right? What are those conversations that you're having with the CEO in the C suite that are where they're saying these are my business problems? Dominic, help us solve these problems. >> Well, it comes to two words, basically its scale and are slow flexibility. It comes to that simple. Is this so they are struggling to see how they can cope with the especially the ones that are virtual izing because you end up. Imagine the model is that you go from a very powerful appliance and once you virtual eyes this appliance, you might end up with thirty different servers, you know, running in parallel, you have to have low balancers in front of it. That makes for a very complex and very expensive solution. So that's that's are they searching for? How can we reduce the complexity, for example, one of the advantages of our product working side by side with fortunate. Since we worked at six point five terabytes per second, we do some of the pre processing of the traffic before it hits the virtualized solution forty gate, for example. We have built some blacklist white list we can do also the load balancing. No need to install some additional law balancing can have. That is a kind of a black box I get that does all the required feature to increase the scaling off those those combined solution and the second, the second party flexibility. You got to be able to evolves your solution in time as these attacks are revolving now or product is built from bottom up, and it's built on and infrastructure typically white boxes that are running chips that are programmable by us. So the software, the NASA's it's Gone, is complemented by some very easy to use porting layers if you like. So the Fortinet solution could be easily adapted to this platform and And that's how we can achieve this kind of throughput. And in fact, I will tell to your viewers that we already have built live demos of those solutions in the Sofia anti police lab in France. The labs of Fortinet, Where were you? We're doing demos for the for customers of those solutions. >> So I'MA tell Stir, though, and you said speed and flexibility scale rather the other sailor disability scale. Inflexibility. What are some? How does my business? What am I looking to achieve? A. My looking to scale to x number of users X number of regions. How does how is that measured from, say, a Telstra's perspective as a big business impact that Novy Flow and Fortinet are helping to them to achieve? >> Yeah, the It's really all dimensions way have some challenge just by handling the raw volume of traffics. Sometimes some customers are pumping terra bits of traffic between one country and the other, so that's one. And but it's also geography because your attack and come and any anywhere in your network that the periphery or inside your network so you have to be able to in a centralized away once you detect there's an attack you have to be able to respondent and in some time, and that's how we can do with our programmable infrastructure can actually reprogrammed those air routing tables. You can take some mitigation action, for example, some of some of the bad traffic on the blacklist. If you've looked at it, perhaps you could put it on a white list for serpent of time. Don't don't look at it over and over. Just wait, maybe a little bit those kind of off measures to alleviate the load. So, in fact, it's work more intelligently with the raw volume of traffic that comes to you. So this is one of the real advantage of is the end. So after defined networking applied to a cyber security problem, >> what are some of the other industries that you are seeing that have potential to dramatically benefit from suffer to find networking in cyber security? Knowing that he d threat landscape, it is exponentially growing. Yes, we've got tools like a I and Machine Learning, which we'LL talk about later on the program today with respective forty Gar labs, for example. But of course, so do the attackers have access to utilize artificial intelligence to create even smarter attacks. But from your perspective, what are some of the other industries that are really right to take advantage of SGN and cyber security practices? >> You know, I think all industries are moving to data. There's no exception. I was talking to some guy, an interpreter in Montreuil yesterday's doing farming, but it's high tech farming with several earlier. It's all based on a I. It's all based on data, even those industry that the forming industry thing that may be so every industry will rely on data, and that means it will rely on a network, and it all comes down to the network. You gotta be able to build a cyber security network ready fabric from the bottom up so that your network is one of the key features is actually stop the attacks, and that doesn't matter in which industry you are. I think they you can think about the industry where you have vast volumes of data. They will be most likely the first one to take benefit of these. You know, we talk about countries before, and this is one such an industry, but it certainly where you process the vast amount of traffic. So they taking advantage of our technology, for example. And but I think it will be probably most of the industry will be affected by that shorter later >> and hopefully sooner rather than later, considering how fast all of these opportunities, good and bad, are growing. One of the things sporting that talked a lot about this morning during this section and some of the press releases is this growth that they've experienced growing twenty percent year on year from last year one point eight billion in revenue over three hundred eighty five thousand customers. You're one of the fabric ready partners, of which there are fifty seven. So a lot of growth, a lot of potential. What excites you as the head of no be Flo and your recent and developing partnership with Fortinet for twenty nineteen and beyond were gonna latch onto that growth trajectory. >> Absolute well, you know, when you mentioned high volume of traffic that plays to our cards. So the market is actually coming where we are way have our product runs at six for five terabytes per second, and that's today because we have a *** plans to move to twelve Tara bits and so forth. So for us, it's exciting because we feel we have the right scaling platform and the right program ability. So our customers, fortunate customers together with us can start with the existing. They're powerful platform. But should that evolved, they'LL be able to move to a new level of software new capacity gradually over time. So that's very exciting for us. >> But what about some of the announcements that came out this morning? Over three hundred new features added, for example, that's a tremendous amount of innovation since last year's accelerate. >> Yeah, well, the's features needs also have the right, I would say filtered level of data to be able to do it more efficiently. And that's where we commend we're not inside the subway Security company. We are really complimenting the product of forty nine by playing upstream and doing a pre filtering controlled by the policy management of the Fortunate, the equipment but nevertheless taking up some of the load of it so that the equipment could be more efficient. But just as an example, I read in a magazine a couple days ago that Google is building a A two hundred fifty terabyte cable between North America and Europe. Think about that. It's it's mindboggling is three time Library of Congress per second. And those are the kind of volume of data did you see coming so suddenly? Six point five terabytes per second doesn't sound so big, does it? But in fact, that's the world win today, and we're lucky it may be flow. We invested early on in the software layer that runs on top of these extremely powerful white boxes and were taking advantage of it with Fortinet. >> Gotta deliver that scale, that flexibility and his son's more and more like Speed. Dominic, thank you so much for stopping by the Cuban joining me on the program today, talking about Novy float what you're doing with Fortinet and what excites you about the year ahead >> was a pleasure, Liza. Thank you for >> mine as well. I want to thank you for watching the Cube Lisa Martin live on the Cube from Fortinet Accelerate twenty nineteen in Orlando. Thanks for watching
SUMMARY :
Brought to you by important Great to have you joining on the Cube leader in that field as the and software defined networking. So one of the things that fourteen it talks about is it's not enough anymore to have really the metal ring system, but all the O. N m features that you demand What are some of the conversations That is a kind of a black box I get that does all the required impact that Novy Flow and Fortinet are helping to them to achieve? for example, some of some of the bad traffic on the blacklist. But of course, so do the attackers have access to utilize artificial intelligence to create one of the key features is actually stop the attacks, and that doesn't matter in which industry you are. One of the things sporting that talked a lot about this morning during this section and some So the market is actually coming where we are way have our product But what about some of the announcements that came out this morning? But in fact, that's the world win today, and we're lucky it may be flow. with Fortinet and what excites you about the year ahead I want to thank you for watching the Cube Lisa Martin live on the Cube from Fortinet
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Fortinet | ORGANIZATION | 0.99+ |
Dominique Jordan | PERSON | 0.99+ |
Orlando | LOCATION | 0.99+ |
Dominique Jodoin | PERSON | 0.99+ |
Dominic | PERSON | 0.99+ |
France | LOCATION | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
twenty percent | QUANTITY | 0.99+ |
NASA | ORGANIZATION | 0.99+ |
Liza | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
Library of Congress | ORGANIZATION | 0.99+ |
first time | QUANTITY | 0.99+ |
second option | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
Greg | PERSON | 0.99+ |
fifty seven | QUANTITY | 0.99+ |
North America | LOCATION | 0.99+ |
last year | DATE | 0.99+ |
two customers | QUANTITY | 0.99+ |
two solutions | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
two words | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Fortinet Accelerate | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
Hutchison Group | ORGANIZATION | 0.99+ |
Montreuil | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
Sofia | LOCATION | 0.99+ |
a minute | QUANTITY | 0.99+ |
seven years ago | DATE | 0.99+ |
five eyes | QUANTITY | 0.98+ |
Novy Flow | ORGANIZATION | 0.98+ |
second | QUANTITY | 0.98+ |
over three hundred eighty five thousand customers | QUANTITY | 0.98+ |
Telstra | ORGANIZATION | 0.98+ |
thirty different servers | QUANTITY | 0.98+ |
one country | QUANTITY | 0.98+ |
Over three hundred new features | QUANTITY | 0.97+ |
2019 | DATE | 0.97+ |
three time | QUANTITY | 0.97+ |
four years ago | DATE | 0.97+ |
One | QUANTITY | 0.97+ |
first one | QUANTITY | 0.96+ |
forty nine | QUANTITY | 0.96+ |
hundred gig | QUANTITY | 0.96+ |
fourteen | QUANTITY | 0.94+ |
two hundred fifty terabyte | QUANTITY | 0.94+ |
Six point | QUANTITY | 0.94+ |
twenty nineteen | QUANTITY | 0.94+ |
a minute ago | DATE | 0.93+ |
six point | QUANTITY | 0.92+ |
Flow | PERSON | 0.92+ |
five terabytes per second | QUANTITY | 0.92+ |
twelve Tara bits | QUANTITY | 0.92+ |
this morning | DATE | 0.92+ |
one point | QUANTITY | 0.91+ |
Fortinet Accelerate | ORGANIZATION | 0.91+ |
three | DATE | 0.9+ |
eight billion | QUANTITY | 0.89+ |
nineteen | QUANTITY | 0.89+ |
last six months | DATE | 0.88+ |
six terabit per second | QUANTITY | 0.86+ |
Ken Xie, Fortinet | Fortinet Accelerate 2018
>>Live from Las Vegas. It's theCUBE. Covering Fortinet Accelerate 18. Brought to you by Fortinet. >> Welcome to Fortinet Accelerate 2018. I'm Lisa Martin with theCUBE and we're excited to be here doing our second year of coverage of this longstanding event. My cohost for the day is Peter Burris; excited to be co-hosting with Peter again, and we're very excited to be joined by the CEO, Founder, and Chief Chairman of Fortinet, Ken Xie, Ken welcome back to theCUBE. >> Thank you, Lisa, thank you, Peter. Happy to be here. >> It's great to be here for us as well, and the title of your Keynote was Leading the Change in Security Transformation, but something as a marketer I geeked out on before that, was the tagline of the event, Strength in Numbers. You shared some fantastic numbers that I'm sure you're quite proud of. In 2017, $1.8 in billing, huge growth in customer acquisitions 17.8 thousand new customers acquired in 2017 alone, and you also shared that Forinet protects around 90% of the Global S&P 100. Great brands and logos you shared Apple, Coca Cola, Oracle. Tell us a little bit more and kind of as an extension of your Keynote, this strength in numbers that you must be very proud of. >> Yeah, I'm an engineer background, always liked the number, and not only we become much bigger company, we actually has 25 to 30% global employment in a network security space. That give a huge customer base and last year sales grow 19% and we keeping leading the space with a new product we just announced today. The FortiGate 6000 and also the FortiOS 6.0. So all this changing the landscape and like I said last year we believe the space is in a transition now, they've got a new generation infrastructure security, so we want to lead again. We started the company 18 years ago to get into we called a UTM network firewall space. We feel infrastructure security is very important now. And that we want to lead in the transition and lead in the change. >> So growth was a big theme or is a big theme. Some of the things that we're also interesting is another theme of really this evolution, this landscape I think you and Peter will probably get into more the technology, but give our viewers a little bit of an extension of what you shared in your keynote about the evolution. These three generations of internet and network security. >> Yeah, when I first start my network security career the first company I was study at Stanford University, I was in the 20s. It was very exciting is that a space keeping changing and grow very fast, that makes me keeping have to learning everyday and that I like. And then we start a company call Net Screen when it was early 30s, that's my second company. We call the first generation network security which secured a connection into the trust company environment and the Net Screens a leader, later being sold for $4 billion. Then starting in 2000, we see the space changing. Basically you only secure the connection, no longer enough. Just like a today you only validate yourself go to travel with a ticket no longer enough, they need to see what you carry, what's the what's the luggage has, right. So that's where we call them in application and content security they call the UTM firewall, that's how Fortinet started. That's the second generation starting replacing the first generation. But compared to 18 years ago, since change it again and nowadays the data no longer stay inside company, they go to the mobile device, they go to the cloud, they call auditive application go to the IoT is everywhere. So that's where the security also need to be changed and follow the important data secure the whole infrastructure. That's why keeping talking from last year this year is really the infrastructure security that secure fabric the starting get very important and we want to lead in this space again like we did 18 years ago starting Fortinet. >> Ken, I'd like to tie that, what you just talked about, back to this notion of strength in numbers. Clearly the bad guys that would do a company harm are many and varied and sometimes they actually work together. There's danger in numbers Fortinet is trying to pull together utilizing advanced technologies, new ways of using data and AI and pattern recognition and a lot of other things to counter effect that. What does that say about the nature of the relationships that Fortinet is going to have to have with its customers going forward? How is that evolving, the idea of a deeper sharing? What do you think? >> Actually, the good guy also started working together now. We formed the they call it the Cyber Threat Alliance, the CTA, and Fortinet is one of the founding company with the five other company including Palo Alto Network, Check Point and McAfee and also feel a Cisco, there's a few other company all working together now. We also have, we call, the Fabric-Ready Program which has 42 big partners including like IBM, Microsoft, Amazon, Google, all this bigger company because to defend the latest newest Fabric threat you have to be working together and that also protect the whole infrastructure. You also need a few company working together and it's a because on average every big enterprise they deploy 20 to 30 different products from different company. Management cost is number one, the highest cost in the big enterprise security space because you have to learn so many different products from so many different vendor, most of them competitor and now even working together, now communicate together. So that's where we want to change the landscape. We want to provide how infrastructure security can work better and not only partner together but also share the data, share the information, share the intelligence. >> So fundamentally there is the relationship is changing very dramatically as a way of countering the bad actors by having the good actors work more closely together and that drives a degree of collaboration coordination and a new sense of trust. But you also mentioned that the average enterprise is 20 to 30 fraud based security products. Every time you introduce a new product, you introduce some benefits you introduce some costs, potentially some new threat surfaces. How should enterprises think about what is too many, what is not enough when they start thinking about the partnerships that needed put together to sustain that secure profile? >> In order to have the best protection today you need to secure the whole infrastructure, the whole cyberspace. Network security still the biggest and also grow very fast and then there's the endpoint and there's a like a cloud security, there's a whole different application, email, web and all the other cloud all the other IoT. You really need to make sure all these different piece working together, communicate together and the best way is really, they have to have a single panel of our management service. They can look at them, they can make it integrate together they can automate together, because today's attack can happen within seconds when they get in the company network. It's very difficult for human to react on that. That's where how to integrate, how to automate, this different piece, that is so important. That's where the Fabric approach, the infrastructure approach get very important. Otherwise, you cannot react quick enough, in fact, to defend yourself in a current environment. On the other side for your question, how many vendor do you have, I feel the less the better. At least they have to work together. If they're not working together, will make it even more difficult to defend because each part they not communicate and not react and not automate will make the job very, very difficult and that's where all this working together and the less vendor they can all responsible for all your security it's better. So that's where we see some consolidation in the space. They do still have a lot of new company come up, like you mentioned, there's close to 2,000 separate security company. A lot of them try to address the point solution. I mentioned there's a four different level engineer after engineer work there because I see 90% company they do the detection. There's a certain application you can detect the intrusion and then the next level is where they after you attack what are going to do about it. Is it really the prevention setting kick in automatic pull out the bad actor. After that, then you need to go to the integration because there's so many different products, so many different piece you need to working together, that's the integration. Eventually the performance and cost. Because security on average still cost 100 times more expensive under same traffic and also much slower compared to the routing switch in networking device. That's what the performance cost. Also starting in the highest level, that's also very difficult to handle. >> So, we're just enough to start with the idea of data integration, secure data integration amongst the security platform, so enough to do as little as possible, as few as possible to do that, but enough to cover all the infrastructure. >> Yes, because the data is all a whole different structure. You no longer does have to trust environment. Because even inside the company, there's so many different way you can access to the outside, whether it by your mobile device so there's a multiple way you can connect on the internet and today in the enterprise 90% connection goes to Wi-Fi now it's not goes to a wired network, that's also difficult to manage. So that's where we will hide it together and make it all working together it's very important. >> So, in the spirit of collaboration, collaborating with vendors. When you're talking with enterprises that have this myriad security solutions in place now, how are they helping to guide and really impact Fortinet's technologies to help them succeed. What's that kind of customer collaboration like, I know you meet with a lot of customers, how are they helping to influence the leading security technologies you deliver? >> We always want to listen the customer. They have the highest priority, they gave us the best feedback. Like the presentation they talked about there's a case from Olerica which is where they have a lot of branch office and they want to use in the latest technology and networking technology, SD-WAN. Are working together with security, that's ready the new trend and how to make sure they have all the availability, they have the flexibility software-defined networking there and also make sure to security also there to handle the customer data, that's all very important so that's what we work very closely with customer to response what they need. That's where I'm still very proud to be no longer kind of engineer anymore but will still try to build in an engineer technology company. Listen to the customer react quick because to handle security space, cyber security, internet security, you have to work to quickly react for the change, on internet, on application. So that's where follow the customer and give them the quick best solution it's very very important. >> On the customer side in Anaemia we talked about that was talked a little bit about this morning with GDPR are is around the corner, May 2018. Do you see your work coordinates work with customers in Anaemia as potentially being, kind of, leading-edge to help customers in the Americas and Asia-Pacific be more prepared for different types of compliance regulations? >> We see the GDPR as an additional opportunity, as a additional complement solution compared to all the new product technology would come up. They definitely gave us an additional business rate, additional opportunity, to really help customer protect the data, make the data stay in their own environment and the same time, internet is a very global thing, and how to make sure different country, different region, working together is also very important. I think it's a GDPR is a great opportunity to keeping expanding a security space and make it safer for the consumer for the end-user. >> So Ken as CEO Fortinet or a CEO was tough act, but as CEO you have to be worried about the security of your business and as a security company you're as much attacked, if not more attacked than a lot of other people because getting to your stuff would allow folks to get to a lot of other stuff. How do you regard the Fortinet capabilities inside Fortinet capability as providing you a source of differentiation in the technology industry? >> Yeah we keep security in mind as the highest priority within a company. That's where we develop a lot of product, we also internally use tests first. You can see from endpoint, the network side, the email, to the web, to the Wi-Fi access, to the cloud, to the IoT, it's all developing internally, it tests internally so the infrastructure security actually give you multiple layer protection. No longer just have one single firewall, you pass the fire were all open up. It's really multiple layer, like a rather the ransomware or something they had to pass multiple layer protection in order to really reach the data there. So that's where we see the infrastructure security with all different products and developed together, engineer working together is very important. And we also have were strong engineer and also we call the IT security team lead by Phil Cauld, I think you are being interview him later and he has a great team and a great experience in NSA for about 30 years, secure country. And that's where we leverage the best people, the best technology to provide the best security. Not only the portal side, also our own the internal security in this space. >> So, in the last minute or so that we have here, one of the things that Patrice Perce your global sales leader said during his keynote this morning was that security transformation, this is the year for it. So, in a minute or so, kind of what are some of the things besides fueling security transformation for your customers do you see as priorities and an exciting futures this year for Fortinet, including you talked about IoT, that's a $9 billion opportunity. You mentioned the securing the connected car to a very cool car in there, what are some of the things that are exciting to you as the leader of this company in 2018? >> We host some basic technology, not another company has. Like a built in security for a single chip. I also mentioned like some other bigger company, like a Google started building a TPU for the cloud computing and Nvidia the GPU. So we actually saw this vision 18 years ago when we start a company and the combine the best hardware and best technology with solve for all this service together. So, long term you will see the huge benefit and that's also like translate into today you can see all these technology enable us to really provide a better service to the customer to the partner and we all starting benefit for all this investment right now. >> Well Ken, thank you so much for joining us back on theCUBE. It's our pleasure to be here at the 16th year of the event, our second time here. Thanks for sharing your insight and we're looking forward to a great show. >> Thank you, great questions, it's the best platform to really promoting the technology, promoting the infrastructure security, thank you very much. >> Likewise, we like to hear that. For my co-host Peter Burris, I'm Lisa Martin, we are coming to you from Fortinet Accelerate 2018. Thanks for watching, stick around we have great content coming up.
SUMMARY :
Brought to you by Fortinet. My cohost for the day is Peter Burris; excited to be co-hosting with Peter again, and we're Happy to be here. It's great to be here for us as well, and the title of your Keynote was Leading the Yeah, I'm an engineer background, always liked the number, and not only we become much give our viewers a little bit of an extension of what you shared in your keynote about the they need to see what you carry, what's the what's the luggage has, right. What does that say about the nature of the relationships that Fortinet is going to have We formed the they call it the Cyber Threat Alliance, the CTA, and Fortinet is one of countering the bad actors by having the good actors work more closely together and that In order to have the best protection today you need to secure the whole infrastructure, amongst the security platform, so enough to do as little as possible, as few as possible Because even inside the company, there's so many different way you can access to the outside, how are they helping to influence the leading security technologies you deliver? They have the highest priority, they gave us the best feedback. On the customer side in Anaemia we talked about that was talked a little bit about this customer protect the data, make the data stay in their own environment and the same time, So Ken as CEO Fortinet or a CEO was tough act, but as CEO you have to be worried about You can see from endpoint, the network side, the email, to the web, to the Wi-Fi access, of the things that are exciting to you as the leader of this company in 2018? customer to the partner and we all starting benefit for all this investment right now. It's our pleasure to be here at the 16th year of the event, our second time here. promoting the infrastructure security, thank you very much. For my co-host Peter Burris, I'm Lisa Martin, we are coming to you from Fortinet Accelerate
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Peter Burris | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Peter | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Fortinet | ORGANIZATION | 0.99+ |
2018 | DATE | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
Ken Xie | PERSON | 0.99+ |
$1.8 | QUANTITY | 0.99+ |
McAfee | ORGANIZATION | 0.99+ |
Ken | PERSON | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
20 | QUANTITY | 0.99+ |
2017 | DATE | 0.99+ |
Patrice Perce | PERSON | 0.99+ |
25 | QUANTITY | 0.99+ |
Net Screen | ORGANIZATION | 0.99+ |
Phil Cauld | PERSON | 0.99+ |
May 2018 | DATE | 0.99+ |
Coca Cola | ORGANIZATION | 0.99+ |
90% | QUANTITY | 0.99+ |
$9 billion | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Americas | LOCATION | 0.99+ |
Palo Alto Network | ORGANIZATION | 0.99+ |
100 times | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
Net Screens | ORGANIZATION | 0.99+ |
$4 billion | QUANTITY | 0.99+ |
19% | QUANTITY | 0.99+ |
CTA | ORGANIZATION | 0.99+ |
2000 | DATE | 0.99+ |
Nvidia | ORGANIZATION | 0.99+ |
Check Point | ORGANIZATION | 0.99+ |
second time | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
GDPR | TITLE | 0.99+ |
second company | QUANTITY | 0.99+ |
Forinet | ORGANIZATION | 0.99+ |
Anaemia | ORGANIZATION | 0.99+ |
about 30 years | QUANTITY | 0.99+ |
second year | QUANTITY | 0.99+ |
18 years ago | DATE | 0.99+ |
first generation | QUANTITY | 0.99+ |
second generation | QUANTITY | 0.99+ |
today | DATE | 0.98+ |
one | QUANTITY | 0.98+ |
16th year | QUANTITY | 0.98+ |
42 big partners | QUANTITY | 0.98+ |
Stanford University | ORGANIZATION | 0.98+ |
30% | QUANTITY | 0.98+ |
each part | QUANTITY | 0.98+ |
early 30s | DATE | 0.98+ |
Olerica | ORGANIZATION | 0.98+ |
this year | DATE | 0.97+ |
30 different products | QUANTITY | 0.97+ |
FortiOS 6.0 | COMMERCIAL_ITEM | 0.96+ |
around 90% | QUANTITY | 0.96+ |
Cyber Threat Alliance | ORGANIZATION | 0.96+ |
first | QUANTITY | 0.95+ |
five other company | QUANTITY | 0.95+ |
Derek Manky, Fortinet | Fortinet Accelerate 2018
(upbeat techno music) >> Narrator: Live from Las Vegas, it's The Cube, covering Fortinet Accelerate '18, brought to you by Fortinet. >> Welcome back to The Cube's continuing coverage live from Fortinet Accelerate 2018. I'm Lisa Martin with The Cube, along with my co-host Peter Burris, and we're very excited to welcome a Cube alumni back to The Cube, Derek Manky, the global security strategist from Fortinet - welcome back! >> Derek: Thank you, it's always good to be here. We have great conversations. >> Lisa: We do. We're happy that you think that. So, lots of news coming out today. But, I want to kind of start with, maybe a top-down approach, the theme of the event: strength in numbers. >> Derek: Yes. >> Lisa: As a marketer I'm like, "What are they going to share?" And of course, Ken and a lot of your peers shared a lot of interesting statistics. From your standpoint - what you're doing with FortiGuard Labs, strength in numbers, help us understand that from the technology standpoint. What does that mean to you? >> Derek: Sure, sure. So, there's a couple aspects to that. First of all, I've always been a firm advocate that we can never win the war on cybercrime alone. We have to be able to collaborate; collaboration is a key aspect. The attack surface today now, just from if you look at the complexity of attacks, the attack surface is massive today. And it's going to continue to expand. I mean, 15 years ago, we're just dealing with you know, threats that would operate on IRC channels or something, you know, some websites, and just some spam attacks. Now, we have to deal with that in addition to this growing attack surface, right? Specifically, with IOMT - the Internet of Medical Things, OT, as well. You have within that OT umbrella, obviously, things like the connected vehicles and all of these different things, which I know you've seen here, also, at Accelerate. So, when we look at that attack surface, you need security in all aspects - end-to-end, right? And so, from a security architecture perspective, strength in numbers is important to have that whole coverage of the attack surface, right? That's not complex and easy to manage. At the same time, being able to inter-operate: that's another strength. You know, the more a structure is bonded or glued together, the more resilient it's going to become. That's the exact concept of the fabric, right? The more that we can inter-weave the fabric and connect the different nodes together and share intelligence, that becomes a much, much stronger structure. So, to me, the strength in numbers means collaboration, information flow, and also end-to-end coverage between the security solutions. >> Peter: But it also means, you know, the growing ecosystem; the need for additional expertise, greater specialization in people. Talk a little bit about how, from a strategy standpoint, Fortinet is helping prepare people for different types of inclusion, different types of participation; what it means to be great, in a security way. >> Derek: Yeah, absolutely. I think there's very (mumbles) We're taking a multi-pronged approach to that. If you look at things like our NSC training program - it's the largest in the industry - so, training other experts through our partners. Growing, doing that knowledge transfer in expertise onto new features, like we're doing here at Accelerate, is critically important. So, that's one aspect when you look at the ecosystem. When you look at something for FortiGuard, as an example, what we're doing. We have, traditionally, you know, we've trained up a very large team; we have 215 security experts at FortiGuard, which is, for a network security organization one of the largest in the world, if not the largest. >> Peter: And FortiGuard is a practical and active think tank, right? >> Derek: Absolutely, yeah. It's many things, it's reactive protection, it's proactive protection, it's - now we've just launched the FortiGuard AI, as well; artificial intelligence, machine learning, that's all the threat intelligence aspect. So, it's threat detection and response. Again, if you look at technology, when we started just with antivirus and intrusion prevention and things like this, it was very signature-based and reactive. We went from signature-based detections to anomaly-based detections. Now, the third generation of this is machine learning and deep learning And going back to your question: we don't ever want to replace humans - because humans are very important in this ecosystem - rather, repurpose them, right? So, what we're doing, as an example, is when we, you know, train our analysts. Instead of having them do day to day tasks like some signature creation or something like this, we can actually have AI systems replace that to identify a threat, respond to it, and then repurpose those humans for something more strategic, you know, looking at the context, "How bad is this threat?" "Why is it a threat?" "How do we respond to it?" "How do we work with partners and customers?" We've launched our threat intelligence service, as well. This is a good example of something we've used internally within FortiGuard to protect customers. Now, we're offering this as a service to customers for security operation centers. We also have our Forti analyzer product and incident response framework. These are all key components that we're empowering organizations to be able to respond those threats. But, again, strength in numbers, it's this ecosystem working together. So, fabric-ready partners is another good example of that strength in numbers, I think, too. >> Peter: Well, I remember the first time I walked into a knock and found the security person and their eyes were literally bleeding. (Derek chuckles) And it's nice to have AI be able to take that kind of a load off, to be looking at some of these challenges, some of these anomalies, things previously we expected people to be able to uncover. >> Derek: Yeah, and (mumbles) when we talk about AI, to me, it's a trust exercise, as well. When you talk about machine learning, it's an accuracy problem, right? "How accurate can the machines really be?" When we pass the torch, as I say, to the machines to be able to take on those day to day jobs, we have to be able to trust it, saying, "You're doing a good job and you're accurate." So, we're using supervised learning, right, where we have our human experts actually training the machines - that's a good use for them, instead of just doing the same cycles day to day, you know, as an example. That's another way that we're scaling out that way. I think it's absolutely required in today's day and age. If you look at the numbers, it's an exponential curve right now. Last year, one year ago today, on average we're seeing about a million hacking attempts in just a minute across the entire globe, right? Now, we're seeing that number up over four million. So, it's increased four-fold in just a year, and that's just going to continue to rise. So, having that automated defense and AI machine learning; machine learning's just a learning aspect; the AI is the actionable part - how we can take that intelligence and put that into the fabric so that the customer doesn't have to do that themselves. I mean, the customer doesn't always have to be involved in the security aspect of that, and that's how we start reducing on the complexity, too. >> Lisa: You mentioned a couple terms that I wanted to pivot on: proactive/reactive. One of the biggest challenges that we hear from the C-suite in this perspective is visibility, complexity, but also high TCO reactivity. Where is Fortinet enabling, when you talk to customers, that shift, that successful shift from reactive to proactive? >> Derek: Right, yeah. Good question, very good question. I think - just parallels - I mean, they're both always going to have to exist, that's just their nature. I mean, if you keep walking across, you know, it's like Frogger - if you keep walking across a busy highway, you're going to get hit eventually, 'cause there's that much traffic, that much attacks coming, right? So, again, the incident response angle - using detection systems and, you know, threat reporting, and this intelligence service to be able to, you know, alert on what sort of attacks are happening and how to prioritize that is one way on the reactive end. On the proactive end: consulting. We have a team of consulting engineers and specifically, ones on FortiGuard, so threat experts that are able to actually analyze. So, we have programs, like CTAP, as a cyberthreat assessment program that is able to able to go into these new networks as a free service and do assessments. So, audits and assessments on the state of security on that network - end-to-end, right? So, we're talking even up to the distributed enterprise level. It's very, very important because we're in a day and age of information overload, especially if you talk to, you know, most CSOs (chief security officer) I talk to, they say "Derek, I got so much traffic being thrown at me; I have all these security logs that are letting up - how do I prioritize and respond to that?" So, if you can understand who your enemy is - what they're up to, then you can start building an appropriate security strategy around that, as opposed to just building checkboxes and, you know, building a fort and thinking you're protected against everything. That's a very important part. And, of course, there's proactive security technologies: anomaly-based, you know, things like sandbox detection that we've already integrated into the fabric ecosystem. But, visibility is key first; know your enemy, understand it, then build up a stack around that. >> Peter: So you're a strategist? >> Derek: Yes. >> Peter: What's the difference between a security strategist and a strategist - a business strategist? And, specifically, how is security strategy starting to find its way into business strategy? >> Derek: Really good question. So, it's becoming blended, right, because security is a vital part of business today. So, if you look at some attacks that even happened last year, there's targeted attacks that are starting to go after big businesses; critical revenue streams and services, because these are high payouts, right? And so, you know, if you look at building a business, you have to identify what are your digital assets: that can include services, intellectual property, and what would happen if that service was, you know, if there was a denial-of-service attack on that? How much lead or revenue loss are you going to have versus the cost of implementing, you know, an adequate security structure around that? So, you know, security's a board-level discussion right now, right? And so, when I think you look at building up these businesses, security should be, by design, from the top down - let's start it there. >> Peter: But, is it finding its way, and we've asked this question a couple times - at least I have - is it finding its way into "Hey, my balance sheet is a source of competitive advantage; my sales force is a source of competitive advantage." Is your security capabilities a source of competitive advantage in a digital business? >> Derek: I would say absolutely, yeah. It's starting to find its way in there. If you look at regions like Australia, you know, they just implemented a mandatory breach disclosure, right, so then, any business that is earning, I think it's like over two million dollars in revenue, needs to, you know, have a certain security posture in place and be able to respond to that. And that's trust and brand recognition. So, because, having, you know, cases like this, building trust with your provider, especially if we talk about, you know, cloud services; I'm putting my data into your hands and trust. How well do you trust that? Of course, if there's good reputation and a powerful security solution, you know customers are going to feel safer doing that. It's like, are you going to, you know, put your gold in Fort Knox or are you going to put it, you know, bury it in your backyard? There's a definite relationship happening there. >> Lisa: I read (hesitates) I didn't read this report, but I saw it the other day that in 2017, a kind of cybercrime report that said by 2021, which isn't that far away, that the global impact will be six trillion dollars in cybercrime. >> Derek: Yeah. >> How do you see the public sector, the private sector working together to help mitigate that, where that cybercrime is concerned and the costs that are so varied and large. >> Derek: Yeah, it's not just cybercrime, either. It's cyberterrorism, these other aspects, especially if you're talking about public sector, if you're talking about critical infrastructure and also with, you know, energy sector and operational technology and all of these things, too. So, you know, it becomes very important for doing a collaboration in alliances - that's something that's actually close to my heart. You know, at FortiNet and FortiGuard, we've formed several strategic partnerships in alliance with public sector, mostly, you know, national computer emergency response, because we feel that we have a lot of intelligence. We're very good at what we do, you know, we can protect customers; detecting threats. But, if there's an attack happening on a national level, you know, we should be able to empower - to be able to work together to combat the threat. It's the same thing even with cybercrime, right? So, as an example, we work with law enforcement, as well with cybercrime, trying to find threat actors in the adversary; cybercriminals are running their own business, and the more expensive you can make it for them to operate, it slows down their operations. >> Peter: A COGS approach to competition. >> Derek: Yeah. (chuckles) Yeah, yeah. And, you know, they're always going to find the path of least resistance, right? That's the whole idea of security, strategy too, is, we call it the "attack chain," right, this layered security - that's the strength in numbers theme again, right; end-to-end security that makes the whole security chain stronger 'cause of that bond and that makes it more expensive for the cybercriminals to operate, too. So, as an example, like I said, national CERT, law enforcement; we're even teaming up in the private sector - a cyberthreat alliance, as well, that's been a very successful project; Fortinet's a founding member, I'm on the steering committee of the cyberthreat alliance. >> Peter: It was Ken's brainchild, wasn't it? >> Derek: Yeah, yep, yeah. And so, you know, we're competitors in the industry but we're actually - it's a friendly environment when we meet and it's actionable intelligence that's being shared. Again, it comes down to how well you can implement that technology, or that (hesitates) information in your technology - that's an important part. >> Lisa: So, here we are at Accelerate 2018 the - I think Ken was saying the 16th year of this event. What are you looking forward to in 2018 for Fortinet, looking at the strength of the partners - those behind us. What's exciting you about the opportunities that Fortinet has in 2018? >> Derek: It's never a boring day. (laughs) There's a lot of interesting opportunities to work with. I think it's - what's exciting to me is the vibe. People are very keen on this, right? If you look at our fabric-ready program, it's growing quite significantly and I think it's fantastic, there's a lot of people, you know, that are energized and willing to work in these programs. There's a lot of programs we can build at, specifically, FortiGuard, as well. Like I said, these threat intelligence services that we're offering to our partners now, which include, you know, proactive alerts, early warning systems. That empowerment and, you know, working together definitely excites me - there's a lot of opportunities there. And there's going to be a lot of, you know, challenges to overcome. If we look at the threat landscape right now, you know, one thing I'm talking about is swarm bots. It's this swarm intelligence - there's parallels here again; we talk about strength in numbers and what we're doing on our side. The bad guys are also teaming up and doing strength in numbers on their side, too. So, we're looking at on the horizon threats like this that are using, leveraging, their own learning mechanisms, being able to self-adapt to be much quicker to attack systems, right, because that's on the horizon - we're already seeing indications of that; we have to get this right. I think for the first time in the industry, you know, we're doing this right. You know, if you look at years past, cybercriminals, they can do a million things wrong and they don't care, right? So, we need to be able to overcome more hurdles. If we work together, which we're doing right now; I think for the first time, we have the opportunity to have an advantage over the cybercriminals, too. So, that's also exciting. >> Lisa: Definitely. We've heard a lot of, I think, conversation today along the spirit of collaboration, compatibility. So, that sentiment, I think, was well represented from your peers that we've spoken with today. >> Derek: Yeah. Everybody has a part to play, I think, right? And that's the thing - you mentioned the word "ecosystem" and that's exactly what it is, right? And that's another brilliant thing we're finding is that everybody brings some strength to the table, so that's another aspect, and I think people, you know, are realizing that organizations are realizing that they can actually play in these collaborations. >> Peter: It's not a zero sum game. >> Derek: No. >> Peter: It's not. I mean, there's so much diversity and so much opportunity and this digital transformation going to have touched so many different corners in so many different ways. >> Derek: Yeah. >> At this point in time, it's "How fast can we all work together to take advantage of the opportunities?" and not "Eh, I want that piece and I want that piece." because then the whole thing won't grow as fast. >> Derek: Yeah, and, you know, the other challenges - the technology challenge, and that's something we are addressing as well. Like, we're actually creating a solution to this - a framework, as we did with the cyberthreat alliance, but also with the fabric program, as well, so having those tools is very important, I think, as well, to help grow that ecosystem, right? >> Lisa: Exciting stuff, Derek. Thanks so much for joining us on The Cube and sharing some of the things that you're working on, and, it sounds, like you said earlier, never a dull moment; every day is a busy day. >> Derek: Absolutely not. Yeah, there's a long road ahead and I think there always will be. But, like I said, it's a lot of exciting times and it's good to see progress in the industry. >> Lisa: Absolutely. Well, thanks for your time. We look forward to our chat next year and to see what happens then. >> Derek: Okay, thank you so much! >> Lisa: Absolutely. We want to thank you for watching The Cube's continuing coverage of Fortinet Accelerate 2018. For Peter Burris, I'm Lisa Martin, and we'll be right back after a short break. (subtle electronic song)
SUMMARY :
Fortinet Accelerate '18, brought to you by Fortinet. to welcome a Cube alumni back to Derek: Thank you, it's always good to be here. We're happy that you think that. What does that mean to you? At the same time, being able to Peter: But it also means, you know, the So, that's one aspect when you look at the ecosystem. when we, you know, train our analysts. that kind of a load off, to be looking at day to day, you know, as an example. One of the biggest challenges that we hear and this intelligence service to be able to, you know, So, you know, security's a board-level discussion I have - is it finding its way into if we talk about, you know, cloud services; I'm a kind of cybercrime report that said by 2021, that cybercrime is concerned and the So, you know, it becomes very important for for the cybercriminals to operate, too. Again, it comes down to how well you can implement What are you looking forward to in 2018 for Fortinet, And there's going to be a lot of, you know, So, that sentiment, I think, was well represented And that's the thing - you mentioned the word a zero sum game. and so much opportunity and this of the opportunities?" Derek: Yeah, and, you know, the other and sharing some of the things that you're and it's good to see progress in the industry. and to see what happens then. We want to thank you for watching The Cube's
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Derek | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Lisa | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
FortiNet | ORGANIZATION | 0.99+ |
FortiGuard | ORGANIZATION | 0.99+ |
Derek Manky | PERSON | 0.99+ |
Last year | DATE | 0.99+ |
2021 | DATE | 0.99+ |
2017 | DATE | 0.99+ |
FortiGuard Labs | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
next year | DATE | 0.99+ |
Accelerate | ORGANIZATION | 0.99+ |
six trillion dollars | QUANTITY | 0.99+ |
Cube | ORGANIZATION | 0.99+ |
third generation | QUANTITY | 0.99+ |
Australia | LOCATION | 0.99+ |
Fort Knox | LOCATION | 0.99+ |
16th year | QUANTITY | 0.99+ |
first time | QUANTITY | 0.98+ |
15 years ago | DATE | 0.98+ |
215 security experts | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
over two million dollars | QUANTITY | 0.98+ |
The Cube | ORGANIZATION | 0.97+ |
one aspect | QUANTITY | 0.97+ |
today | DATE | 0.97+ |
Las Vegas | LOCATION | 0.96+ |
Fortinet Accelerate 2018 | TITLE | 0.96+ |
over four million | QUANTITY | 0.95+ |
First | QUANTITY | 0.94+ |
Eric Kohl, Ingram Micro | Fortinet Accelerate 2018
(upbeat music) >> Live from Las Vegas, it's theCUBE. Covering Fortinet Accelerate 18. Brought to you by Fortinet. >> Welcome back to theCUBEs continuing coverage of Fortinet Accelerate 2018. I'm Lisa Martin here in Las Vegas with my co-host Peter Burris and we're excited to welcome a Cuba alumni back to theCUBE, please welcome Eric Kohl, the VP of Advanced Solutions from Ingram Micro. Welcome back! >> Thank you, thanks for having me back. Excited to be here. >> Yes, we're very excited. So tell us, what's new? We talked to you last year at this event, what's new and Ingram? Tell us about your role there and the things that are all exciting Ingram Micro. >> Yeah, brand-new for me. I'm in my 20th year at Ingram Micro. I lead our security practice for Ingram Micro U.S. and I have responsibility for sales, vendor management, strategy and execution on behalf of our manufacturer partners. It's a ever evolving space. It's such a great space to be in, I love watching the news every day. You know there's going to be some big logo but just as much fun as I have watching those, that's some of these small breaches that you don't hear about and it's just fascinating. So much more exciting than virtualization. (laughs) >> Some might argue with that. So tell us about the partnership that you guys have with Fortinet. How has that evolved over your time there? >> Yeah so been at Ingram for 10 and I've been working with Fortinet for, I'm sorry I've been at Ingram for 20 and been with Fortinet for over 10, back to when we signed the contract together. Just a very great partnership. They're our security partner of the year, last year. Good friends, excited to see John Bove back leading channels back to Fortinet and you know, we both invest in each other's success and so I think that's pretty unique. Huge investment for them here, having an event like this. Not every company does it but to bring everybody together where you can have security conversations get on the same page, it's extremely valuable, huge investment, and we're proud to be a sponsor. >> I'd love to chat about a little bit of the evolution that you've seen at Fortinet in the last 10 years as we look at, you mentioned breaches. I mean, there were some very notable things that happened in 2017. How have you seen the evolution from them on a security transformation standpoint as it relates to your customers and digital transformation. >> Yeah, so I mean it's something that we see every day from you know, as you know we sell to and through partners but you know, one thing obviously is their breath of solutions has expanded. But you know, also things that partners are asking us today is how is this technology being consumed? And in the face of digital transformation, that's a huge value point because ultimately we want to help our partners to architect, recommend the right technology to solve that business problem and then how do you want to consume it? How does your want to your client want to consume that? So I think that's one of the biggest kind of trends that we're seeing right now. >> So as you think about where you've come from to where you are and we'll talk a little bit about where you think might go, what were the stories you told about security 10 years ago? And how are they different from the stories you're telling about security today? >> I would say it's changed from my perspective because at Ingram, we have never ever been a services company like we are today. And so what I mean by that is, we wrap our services, partner services around the Fortinet solution to make it stronger. 10 years ago I would say we are living more in the traditional distribution role of hey, how do we get a box from here to there? Certainly channel enablement, we've been doing that for a long time but our offering of services to help drive demand is incredibly strong. You know, we work with Fortinet for example, on their threat assessment program and we have an engineer that can go and help. Our partners understand to do that, it's a huge partner ecosystem and so we've got to help them with all those channel enablement efforts. >> What are some of the biggest security challenges that you're hearing, say in the last year or so through the channel, that your partnership with Fortinet can help address? >> You know, it's all around complexity and that as you have likely heard that the shortage of folks that can get out and do some of these services have limitations. There's incredibly high demand for services, you know we're serving a channel ecosystem of roughly 12,000 companies that are buying security technology from us, all with varying degrees of capability and so we've really got to help them understand, hey, how can we help you deploy these services, etc. >> So as you imagine then the steps associated with helping the customer, the roles and relationships between Fortinet, Ingram, and your partners also must be evolving. So how is, as a person responsible for ensuring that that stays bound together in a coherent way for customers, how are you seeing that changing? >> Well you know, look it's a three-legged stool. (laughs) It's us, it's Fortinet and that's our partner community and we're reliant on each other to go and be successful in the market. Look, we couldn't be as great as we are working with our Fortinet channel ecosystem if we didn't have the support of Fortinet, the investments they make, the team that they have wrapped around our business, the team we've put in place wrapped around their business so that's kind of what I'm seeing there. >> They shared a lot of momentum not only in the keynotes this morning but also a number of the guests that we've had on the show today in terms of what Fortinet achieved last year. 1.8 billion in billing, nearly 18 thousand new customers acquired, a lot of momentum, a lot of numbers, I love that theme of the event today. So if we look at some of the things that were shared by Kenzie this morning for example, like I mentioned that the customer numbers and even talking about what they're doing to protect 90% of customers in the global S&P 100 and showed some some big brands there. Tell us a little bit about the partnership and how you're leveraging the momentum of what Fortinet is able to do in terms of capturing customers. How does that momentum translate and really kind of maybe fuel Ingram and what you're able to do? >> Well look, I mean there's incredible demand in security today. There was a slide that they showed this morning and I think it was the perfect storm. I like to call the security space a beautiful disaster. It's a mess, it's complicated, it's scary, the threat attacks are you know new and different and they're never going to stop but it again comes back to hey, how do we work together to kind of harness this? How do we go and there's a great partner community here, lots of our friends are here but they can't all be here. So we want to be able to help take that message out to our channel partners that were not here. Things like that. >> What are some of, oh sorry, go ahead Peter. >> I was going to say so Ingram, Ingram itself has changed. You said you've now, are now introducing security or you're introducing more services. So how is that.. How is security leading that charge to move from a more of a product and a distributor to now services? Is security one of the reasons why Ingram is going in that direction? >> It's one of them. I joked on virtualization but there's a lot of services that we can wrap around and I think, obviously there's a high demand of services and we will lead with Fortinet services and solutions where we can. We want our partners to lead with theirs but really we've hired people to go out do assessments. We have a partner ecosystem where, hey I can't get down to New Mexico to do an install. We have a partner network where they can tap into that and make sure that everything is installed correctly, all the features are turned on. You think about all these breaches that happen in the news, it's not that they didn't have the technology, they missed an alert or they didn't have it all deployed. We want to be able to help our partners solve for that. >> Along the partnership front, what are some of the things that excite you about the Fabric-Ready Partner Program and the announcements they've made today? >> Yeah, love it. Look Fortinet has built comprehensive end-to-end solutions within their Fortinet, I'm sorry, for their Fabric ecosystem but they've also recognized that they can't do it all alone and so they've introduced a lot of partners into that. And so what's exciting for me, leading our security category is, hey how do we bring new partners into our ecosystem too? Because it is a differentiator for Ingram to be able to provide multi-vendor solutions. To have somebody you can go to to say, how does SentinelOne work with for Fortinet Fabric? Those types of things, those conversations are happening all the time. >> Another thing that was announced today was what they're doing with with AI. Tell us a little bit about that and how are you seeing what they're going to be able to do with AI as an advantage for your partners and customers. >> Again the artificial intelligence, machine learning, it all goes back to making the technology easier to use. I still think, you think intelligence and I think back to the human factor. Some of these big breaches, look the threat actors are going to get in but how you recover from a breach, I think if we could inject some artificial intelligence into some of these companies that haven't figured out how to successfully pivot. You know paying your hacker a hundred thousand dollars to keep quiet is not the answer but I think that some of these machine learning things are going to make it easier. It's going to be easier to manage the alerts that are happening every day. So anything that helps eliminate, as they said today, the enemy of security is complexity. Things that help to discover these threats and remediate against them, all good stuff for our partners. >> On the enablement side, when we were talking with the channel chief, John Bove, earlier today and talking about sort of this long history of partner focused culture at Fortinet. Tell us about that in terms of the enablement that you're able to glean from them and then pass on to your channels in terms of selling strategies, marketing to, marketing through. What are some of the things that-- >> Look, we have an amazing team. John Bove, Curt Stratton, the folks that really spent so much time working with Ingram and then we've built an amazing team. I think we have 12 people from our company here at this event to make sure we're making the most out of it but you know. If you heard, we're at The Cosmo. They have Secret Pizza, have you been there? Have you heard about it? >> Lisa: No, Secret Pizza? >> Yeah, it's amazing, it's pretty good, okay. (laughs) >> You didn't bring any, I noticed that but continue. >> I didn't but it's secret not-so-secret pizza but we have some secret not so secret weapons. Jenna Tombolesi an NSE 7. She's one of the highest certified engineers on the planet and she works for Ingram Micro helping to technically enable some of our partners. We've got a guy by the name of Will The Thrill Sharland and The Thrill is out talking to partners every single day, helping them to be more profitable, trusted security advisors helping them through anything you can imagine from a channel enablement perspective. And then just huge teams of people that we go to serve this big market together. >> Are you seeing any vertical specificities? When Ken was sharing some slides this morning, they were talking about, they showed some verticals from a kind of market share perspective but I'm curious some of the verticals that kind of come to mind where security is concerned that maybe are a little bit more elevated than some of the others in terms of risk or health care education and financial services. Maybe Fed, SLED, are you seeing any verticals in particular, maybe those that are really going to be kind of having to be leading-edge, where security transformation is concerned? >> They have to be. Think about health care and when they're big ransomware attack hit last year. There's guys on CNN saying, they had to postpone my surgery because ransomware head. I mean that's life-and-death stuff there but I don't think there's any vertical that's immune to what's going on today. So I think you know regardless of your vertical, you have to be prepared, you have to choose the right technology, and choose the right partner to help you implement it. >> If you imagine where Ingram's going to go with this relationship, what kinds of things are you looking to be able to do as a consequence of great strong partnership with Fortinet. >> Look, the way that companies want to consume technology is changing in the space of digital transformation. Once we work with Fortinet and the partner to recommend the right technology and I mentioned this, like how do you want to consume it? Is it public cloud, is it AWS, or Azure? We have an answer for that today is that hey, it's on premise but I need some creative financing to help close this deal to solve a budget constraint. We have an answer for that. There's several variations of that but however that technology wants to be consumed, we have an answer together. So I think that's a testament to the strength of our relationship. >> And I think one of the words that I saw in, at least one of the press releases, was adaptability. Adaptability of some of the technologies and even John Madison was kind of talking about how customers can go, I've got 20-plus security products, how do I start this Fabric? And that word adaptability kind of jumped out at me as how do you enable adaptability when your customers, through the channel, have so many technologies in place and how does Fortinet help that adaptation? >> I would say they're placing bets like we are on top partners that are going to lead with that technology. They've got to go be the experts in that field and really start driving that. Events like this help get everybody on the same page, understand the new offerings. I mentioned Jenna, she was locked in a room all day yesterday all excited about all these things. She's been running around all day but look we've just got to help the channel understand what the new technologies are, what are the new offerings, and hey, how do we go solve that customer problem together. >> So are there any particular new approaches or tactics or techniques that you're using to get the channels to understand better? >> I don't think that there's anything necessarily new. We're all driving towards the same common goal. Having a security conversation today is easier than ever before so you know, I think we're we're going to continue doing what we've been doing. It's been very successful for us but that's, you know. >> What are some of the things, kind of wrapping up here, that you're looking forward to throughout the rest of 2018? We're kind of still in the first quarter calendar, some big announcements from your partner here today. What are some of the things that excite you at Ingram about the year of 2018? >> Look, it's a market that's that's really ripe right now and I think that when you talk about their new technologies, when you talk about the machine learning, there's a lot of these things happening out there. It's just look, we've got a huge market. The potential is unlimited and I think one area where we're really going to drill down this year is down market, down SMB in mid market because they need enterprise grade technology and Fortinet delivers that and has a history of delivering that. So I think we're going to double click down there together this year and John and his team have been great around putting some programs together for us to go and tackle that together. >> Excellent, well we thank you so much Eric for stopping by theCUBE again. >> Yes and I'll bring pizza next time. >> Please do. >> All right. >> Yes and maybe some beverages so we don't have dry throats. >> Of course, yes. >> So we wish you and Ingram the best of luck in this next year and we look forward to talking to you next year, if not sooner. >> Sounds good. Great, thank you. >> We want to thank you for watching theCUBE's continuing coverage of Fortinet Accelerate 2018. For Peter Burris, I'm Lisa Martin, after the short break we'll be right back. (upbeat music)
SUMMARY :
Brought to you by Fortinet. a Cuba alumni back to theCUBE, Excited to be here. We talked to you last year at this event, that you don't hear about that you guys have with Fortinet. and you know, we both invest in each other's success as we look at, you mentioned breaches. to and through partners but you know, around the Fortinet solution to make it stronger. and that as you have likely heard So as you imagine then the steps associated and be successful in the market. like I mentioned that the customer numbers and they're never going to stop How is security leading that charge to move and we will lead with Fortinet services To have somebody you can go to to say, Tell us a little bit about that and how are you and I think back to the human factor. and then pass on to your channels I think we have 12 people from our company here Yeah, it's amazing, it's pretty good, okay. and The Thrill is out talking to partners every single day, that kind of come to mind where security is concerned and choose the right partner to help you implement it. are you looking to be able to do and I mentioned this, like how do you want to consume it? and how does Fortinet help that adaptation? and hey, how do we go solve that customer problem together. It's been very successful for us but that's, you know. What are some of the things that excite you at Ingram and I think that when you talk about their new technologies, Excellent, well we thank you so much Eric to talking to you next year, if not sooner. We want to thank you for watching theCUBE's
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
Jenna Tombolesi | PERSON | 0.99+ |
Eric Kohl | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
2017 | DATE | 0.99+ |
New Mexico | LOCATION | 0.99+ |
Ingram Micro | ORGANIZATION | 0.99+ |
Eric | PERSON | 0.99+ |
John Bove | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
Curt Stratton | PERSON | 0.99+ |
Jenna | PERSON | 0.99+ |
Ingram | ORGANIZATION | 0.99+ |
next year | DATE | 0.99+ |
1.8 billion | QUANTITY | 0.99+ |
John Madison | PERSON | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
CNN | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
20th year | QUANTITY | 0.99+ |
12 people | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Peter | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Ingram | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
10 years ago | DATE | 0.99+ |
20 | QUANTITY | 0.98+ |
Kenzie | PERSON | 0.98+ |
10 | QUANTITY | 0.98+ |
first quarter | DATE | 0.98+ |
The Thrill | ORGANIZATION | 0.97+ |
Fed | ORGANIZATION | 0.97+ |
Cuba | LOCATION | 0.97+ |
this year | DATE | 0.97+ |
20-plus | QUANTITY | 0.97+ |
yesterday | DATE | 0.97+ |
Will The Thrill Sharland | ORGANIZATION | 0.97+ |
SentinelOne | ORGANIZATION | 0.96+ |
Fortinet Fabric | ORGANIZATION | 0.96+ |
three-legged | QUANTITY | 0.95+ |
this morning | DATE | 0.95+ |
Kevin Kealy, Ingram Micro | Fortinet Accelerate 2018
>> Announcer: Live, from Las Vegas, it's theCUBE, covering Fortinet Accelerate18. Brought to you buy Fortinet. (upbeat digital music) >> Welcome back to theCUBE's continuing coverage of Fortinet Accelerate 2018. I'm Lisa Martin, with my co-host Peter Burris, and we are now joined by the CISO of Ingram Micro Kevin Kealy. Welcome to theCUBE. >> Thank you both very much. It's nice to be here. >> I love your title, the Prince of Security Weirdness, your other title. >> Yeah, right. >> Tell us about where you got that and why you like it. >> I was at a customer engagement years ago, when I was working for AT&T, in of all places, Moline, Illinois, and I was working with a lady whose business card actually said Protocol Princess. And the customers, based on what we were actually there to do, the customer decided that if she was the Protocol Princess, then I had to be the Prince of Security Weirdness, because the problem ended up being a combination of something very odd that was happening with their security appliances plus the network itself. And so, of course she spread that when we got back to the office and it just kind of stuck from thereon. I kind of like it. If a company found something weird that was going on with security, they'd just go, "Send him, he'll sort it out." And I did. >> So you've seen probably a really interesting evolution of security. >> Kevin: Oh yeah. >> You've been the CISO for almost a couple years. >> Kevin: Yep, almost two years, yeah. Longest tenured one in a while, I think. >> And you have an interesting kind of strategic perspective. Tell us a little bit about that and what makes that unique. >> Sure, so from a CISO perspective it used to be the CISO was the C-E NO. You know, the place where business goes to die. My feeling is, if I'm not adding lift to the business, then I'm adding drag. And if you're adding drag then you're not being a responsible custodian of the company's money or it's direction. So my feeling is, and my strategic objective is, always partner with business to help them achieve what they need to achieve, but to do it safely and in a way that doesn't add risk to the company. So, I like to say you look through your lens at something, it looks ridiculous. Somebody's doing something truly stupid. But if you pivot your perspective and you look at what they're doing it for, they have a perfectly reasonable and rational expectation of their results and what they're trying to achieve. What you need to do is to adjust your thinking to understand what you currently don't understand in order to pivot them to get to a safe perspective, and therefore business. >> So one of the key differences between business and digital business, is the role that data plays. But we could also take a security perspective. Business was about securing and limiting access. Digital business is about sharing and making possible access. >> Kevin: Right. >> So is that kind of what you mean when you say that you're not the C-NO? You're not the C-YES necessarily, but you're really focused on how to appropriately share? >> Completely agree. My approach is always, let's consult with each other, tell me what you're trying to achieve and let's not look at what's caused me to be in your business today, let's look at what you're trying to achieve. What's your end goal? Right, now let's work together to achieve that in a way that adds limited... 'cuz you can't ever have a solution that exposes stuff without adding any risk,. But there's always an acceptable risk appetite that you have to maintain in order to do business, right? With risk comes opportunity and reward, right? So you can never eliminate all risk. So my approach is, understand what they're trying to do. Look at how much risk there is in any different way of doing it, and then choose the way that offers you the most risk reduction for the least capital expenditure and operational expenditure. And gets them to market the quickest. At that point now, I know I've done my responsible part of keeping risk under control. I maintain a risk register, tells me as a whole the company has accepted this much risk. If we do this extra thing, this might put you over what you, the board of directors and management have accepted before. Let's see what we can do to reign that back in here. I have a solution here that's nearly what you want, will that do? You know, another mantra I cite is, don't let perfect be the enemy of good enough. Too many of my peers in the CISO realm keep chasing perfection. You know they see NIST 800 as an achievable goal. They see, you know, total PCI compliance as an achievable goal. My feeling is, as soon as you get to the point where you are PCI compliant, and you still have things to do, then you need to start concentrating on other more risky things that are going on in your business. You can never achieve NIST 800 unless you have a government's funding. I don't know too many CISOs who have a government's funding, right? So my feeling is never let good enough fail to be good enough. Achieve good enough then go and solve other riskier things, and then come back, maybe in a year, couple of years, when it's time to refresh that solution, and see if now that's not good enough anymore. Maybe you need to do something different. But in all cases I'm partnering with business to make sure that whatever I'm doing is adding lift for them, not drag. >> So, Ingram Micro, we just had Eric Kohl on a little bit ago. So Ingram's been a partner with Fortinet for 10 years or so, but you, on your side and your CISO role, are a customer of Fortinet. >> Kevin: Absolutely. >> So in the last couple of years when you came on board, some of the things I'm hearing that you're talking about, sounds like potentially a cultural shift. Talk to us about maybe some of the weirdness that you found in from a security perspective, and how Fortinet is helping you guys on the Ingram, achieve security transformations so that you can evolve. >> Sure, so, Fortinet's been a great partner for me. They have a truly wonderful suite of products. I mean, everything from the edge protection for the dissolving perimeter, all the way out to small and SOHO type firewalls. And then we have wireless access points that are strong and well fortified with the ability to separate between multiple networks, all the way down to FortiDB, which I use to protect our databases. So we do our database monitoring for our critical databases. As a suite of things that I can manage with one console, it helps me minimize the number of operational staff and the operational training they have to do. And then, from my perspective as a customer, Fortinet's always there for me. I know that I can just call them, and within five minutes somebody's calling me back and we can get the right resources right on the phone. That kind of partnership, you can't put a price on that. You know, everybody's at some point in their lives, bought a product that's failed, and then you can't get any customer support on it, and eventually you have to toss it out. Fortinet's always there for me. They're always checking to make sure that we're doing the right thing. And to give you an example of how Fortinet is part of our company fabric, and I use the word in both it's terms, we chose Fortinet gear to protect our CEO's house. Alright? Our CEO, of course, has a lot of, you know, he's a high net worth individual. He has a lot of high value assets that he takes home to work from home. You know he's clearly a target. So for protecting his home and infrastructure there, we deployed Fortinet gear. >> That's a very interesting use case. >> Yeah, and all my staff, including myself, we have Fortinet gear at home as well. So this is the stuff we trust to protect ourselves, when we're in our most vulnerable environment. A lot of people don't think about that. You take these well secured devices and you take them outside the company perimeter. Now they're on their own. You know, if you can take them to a safe environment though, it makes them a lot safer. From an engagement perspective, as the buyer of things for a company like Ingram, one of the first partnerships I made when I first joined the company was with Eric. Because I want to make sure that I'm supporting our sales side as well. So if anybody comes to me and says, "Hey, I have the perfect solution for you." The very first question I ask them is, "Are you a re-seller with us?" And if the answer is no, it's like, call this guy. This Eric Kohl chap, he'll be able to have a very interesting conversation with you. So, Fortinet being such a long-term partner with Ingram, it's an easy purchasing decision for me. Number one on the technology side. Number on on the partner side. You know what that old story is, nobody got fired for buying IBM? At Ingram, nobody got fired for buying Fortinet gear. And it helps that it's the best on the books, for me anyway, for the stuff that I use it for. I'm very excited about the new Fabric. >> Tell us about that, from a visibility perspective internally, complexity, mitigation standpoint, TCO. How is that going to help you at Ingram? >> So, you said the word, visibility. One of the first things I did when I got to Ingram, was I realized I couldn't see all the way to the edges and to the bottom of my network. So I started to increase the visibility with a combination of the Fortinet product suite, I think I'll be able to get the edge-to-edge, top-to-bottom visibility. And I'm really excited about the web-based CASD solution. 'Cuz what I really don't want to do, and one of the talks this morning, the keynote was talking about it, is the vendor, just the vendor pile of different things that have to be managed. All the different people we have to get training from. All of the currency that you have to maintain. If I can manage it all through one console, And I only have to train my staff in one suite of products, that makes the overall work that they do that much simpler to execute. And I love the concept of being able to make those contextual rules. You know, if this device is in this class then don't let it go over to this data that's in this class. That's so simple to describe. And I love the fact that you can then orchestrate that deployment. So when as we go to a virtualized environment, and we roll into cloud and so on, being able to push a policy like that and being able to push that context is going to be so exciting for me. >> One of the challenges of integration is that you get dependencies. >> Yes. >> So as a CISO, and you start looking at a fabric, and as you said, it's a very rich fabric, it does a lot of work. How do you ensure that you don't find, 'cuz if there's a vulnerability inside the fabric, then the whole fabric gets affected. So what is that trade-off between integration and dependency for you? >> So, that's a great question. Back in 1998,'99, I was at AT&T during what was, it became known as the Great Frame Relay Outage, that AT&T had. Many people will remember that. >> Not to laugh at you. >> Do you remember it, though? >> I do remember it. >> Right? >> Kevin: And the cause of that was, the company was entirely CISCO on the back burner. I was one of the engineers that was there trying to fix it all. CISCO had a self-deploying patch protocol where you drop a patch onto a device and it would automatically push the patch to all its neighboring devices and so on. Well you dropped the patch on this device, it would push the patch towards its neighbors, then it would crash and reboot. But it had already had time to push the patch to all its neighbors. So one by one, every single router and switch in the entire network, received a patch and then crashed and rebooted. And that became a three-week problem known as The Great Frame Relay Outage of 1998. So at that point, our then CISO, Edward Amoroso, he decided that we wanted vendor diversity in our network. And at AT&T at the time, then, we went to CISCO on the edge, Juniper in the core. And the reason was, we wanted the network to be able to stay up and routing, even if we has a problem on the edge. And of course, automatic patch push protocol was disabled. (laughing) From my perspective, I think, there's a fine line to be managed here. Southwest Airlines has made a very concrete and a very risky, but certainly it's worked out for them right now, decision. All their aircraft are Boeing 737s. So they only have to train their maintenance staff to maintain one airplane. All their pilots can fly all their airplanes. >> Lisa: My brother's a pilot for them, yes. >> Right? >> Yeah. >> Kevin: All of them are 737s, but if the FAA grounds 737s, all of Southwest is out of business, for the duration of the flying ban, right? So Southwest has decided they don't need vendor diversity across their fleet. I know they bought Allegiant, and that's got a number of Boeing aircraft, however, from the perspective of their original business plan, all 737s because they now have a very, very well defined TCO. From my perspective I think, there's a line to be drawn here, but Fortinet has me covered. They have their APIs. They work with the other vendors. So if I have a SIM or a log manager or something like Splunk deployed, they already have that partnership in place. It means they can manage the data within the device as though it's my own data, as though it's within the Fortinet Fabric. And that then keeps me happy. Because I then get the benefits of the additional features perhaps that I would get from a Splunk rather than a Fortinet tool, but I also get the vendor diversity that's there. See Splunk for me is not just a security tool, it's a VI tool and there are many other groups that are leveraging the capabilities that it has. So for me, if I went to something like the Fortinet SIM, that would be a very selfish solution. It would be just a security thing. That's not really partnering with business. My investment in Splunk, I've got six other groups within the company leveraging it, and I just invited the seventh one in today. Now those people are all using Splunk for their own things. I'm footing the bill for them so they get all this VI for free. That's been a real big win for me, because I'm now known as the guy that's providing stuff that the company can actually use. That's a very powerful position to be in as the CISO because when I come asking for something that normally they would've said no to, all I have to do is remind them, "Hey, you know you're using my Splunk solution? "Well now, would you mind helping me out? "I need you to do this thing "with your laptops in your organization." And they're much more receptive because they know of me as a partner. >> So would you say, one of the things we were talking about a number of times today, Peter, with guests, is getting, how, does a CISO get this, well maybe it's enable the balance, at the speed at which a business needs to transform digitally to be profitable and grow and compete and manage that with risk? Where do you think that your are on getting that balance? Sounds like there's a lot of collaboration within what you've been able to achieve. >> So, there's a couple of rules that I go with. The first is I go meet the business leaders and introduce myself. And I say, I know you may have heard this before, but this time I mean it, I'm here to help. Tell me what your pain points are. How can I help you, right? And that's a very powerful question. I always try to end every meeting with "How can I help you?" Alright. If you end the meeting with that question, that last memory they have of you will be, you were offering to help last time I saw you. I'm willing to give you another audience. And then, it's by action. Like my Splunk investment. I invested in it, and now other people are using it. I'm showing by my actions that I'm actually not just all talk. And other people have noticed. They would come to one of my predecessors and say, "Hey, I want to do X." and they would be told straight out, "No." My answer is always, okay. How are you planning to do it? Something brought you here today. Let's talk about it. And then when they show me how they are planning to do it, it's like, you know what, I see opportunity here. You guys can do it in three fewer steps and at significantly less risk if you just let me help you in this area, and then we do it this way, and we use this tool that I've already bought and you don't have to pay for. Now all of a sudden they've got a yes. It's already through. It's through architecture review. They've got the solution in place, but I get the logs and I get to put my own encryption solution in or whatever else it is, and I get to absorb the risk for the company. And again, it's all by actions too. You know, if you make sure that you never say the word no. People say, "No, because." Try to change it to, "Yes, and." And by pivoting the conversation that way all of a sudden people aren't arguing with you. They're trying to sell you something. And when somebody's trying to sell you something and you're buying it now you've got the upper hand, right? So now I'm the buyer. Right, it's like, "Let's buy it, but let's do it like this." >> So I have another question for you. Something that's related to one of the conversations that we've had many times today. I'm going to paint a scenario for you. A CEO is sitting in front of a group of investors. And talking about strategic flexibility and the things that their assets allows her to do. My balance sheet will allow us to do this. My sales force will allow us to do this. When are we going to see the first CEO say, "My security, my digital security, "will allow us to do this, "things that our competitors can't do." >> That's an excellent question, I hope it's soon. I'd like to be right in the vanguard of that. Ingram Micro already uses us as an enabler. >> I'm sorry, what was that? >> Ingram Micro already uses me and my group as an enabler. This year we've been able to negotiate a reduction in our corporate insurance rates, for cyber risk, simply because I was able to show the value in what we've achieved over the last two years. And show how materially we've affected the company's risk envelope and our acceptance of risk. So by doing that, I've already added value to the bottom line because insurance costs money and it's a dead sunk cost, right? So I've already reduced the cost of that. So now all of a sudden I'm enabling the business. And I'm also meaning that we can actually uplift our coverage too, so now we're reducing risk even more. We can displace more risk to the outside of the business. This conversation with Eric, you know, I'm about to award an RFP. Before I award an RFP, I'll go and see Eric. Is there a strategic reason for me to award it to this vendor or this other vendor? Now of course we're negotiating on the sale side and the buy side together. That's a very powerful story. So certainly at Ingram, I think I'm already partnering with the business in such a way that we can make that a compelling message. In terms of the overall industry, I really hope that it'll be soon. I think the CISO and the CIO roles are merging together. I think as the CIO is rolling less hardware and is rolling more into virtual and policy and direction and technology choices, I think people are going to have to realize that security has to be built into that. Because if you try to bake it on later, or bolt it on, it's never as effective. It's always more expensive. You look at something like the Fortinet Fabric, you roll that as part of your orchestrated virtual environment, you've turned the whole attack chain on it's head, now. Now it's going to cost so much to try and compromise any part of that infrastructure, you're going to see it so quickly, you've turned it all around. Now it's way too expensive to try and attack companies with that kind of fabric. Now the boot is on the foot. Okay, so invent something I can't see. You know, we've got contextual threat intelligence here, that's able to spot patterns. We've got polyform on the outside here. Everything's working in concert, okay. >> So you're not worried about being put out of a job any time soon. >> I think sadly this job is around for a while. I used to joke that it was Bill Gates and his company that provided us with permanent job security. Now it's the cyber criminals. I tell you what though, today the simplest attacks are still the ones that work. It's phishing, phishing, phishing, phishing, phishing. People clicking on links. >> Human beings. >> Human beings are always easier to hack than computers. >> So you've given us, last question as we have a minute or so left, you've given us a great perspective of the impact that you've been able to make using Fortinet on the customer side. You talk to a lot of partners in Ingram's ecosystem. How do you impart your wisdom and your expertise on the partners from that enablement, such so that they can go and talk to customers and really share best practices from the CISO suite? >> So again, I partner with Eric's cybersecurity advisory committee, where he has a number of our key security partners who come along. And for two years running now, I've participated. I've spoken. I spent two days with those folks. I'll answer any question they have. I'll spend the evenings with them. We'll have a beer together. And I'll do a panel and I'll have discussions just like this with them. And share with them some of the things that I've done with the company that have worked, and some of the things that haven't worked out quite so well. No holds barred. I'm a big believer in herd immunity. You know, it's an old joke, you don't want to be the fastest antelope, but you sure as hell don't want to be the slowest one either. So from my perspective, the more of us that share that kind of intel, the easier things will be as we go forward. Because together as a herd we'll be more immune. So from my perspective, even if it's a competitor's CISO, I'll still sit down, have a coffee with them and chat with them. And it will be very much open kimono. Because I feel like we can never share enough of this intelligence with each other. We're not seeking to gain a competitive advantage individually. We're seeking to make the field and the companies, and if you like, the white hats, less vulnerable. And I think that's a compelling value message. >> I noticed your clothes. I guess you're an All Blacks fan? >> Well, you know, being South African I have to be a Springboks, but, uh, you know, it was such a sad day when Jonha Lumo died. That was such a sad day. I got to meet him once and he was a mountain of a man, but such a gentleman. Yep, that was good. But yes, rugby is definitely my sport, so thank you. >> Well, Kevin, thank you so much for stopping by theCUBE and sharing your insights, what you've been able to achieve on the consumer side, or consuming Fortinet's technology and what you're able to impart on your partners. We wish you great success in 2018 and look forward to having you back on the show. >> That sounds great, thank you very much. Thanks for having me, it's been a great pleasure, thanks. >> Excellent. And we want to thank you for watching theCUBE from Fortinet Accelerate 2018. I'm Lisa Martin with my cohost Peter Burris, after this short break we will be right back. (upbeat digital music)
SUMMARY :
Brought to you buy Fortinet. the CISO of Ingram Micro It's nice to be here. I love your title, the and why you like it. And the customers, based on what we were So you've seen probably You've been the CISO Kevin: Yep, almost two years, yeah. And you have an interesting to understand what you So one of the key the way that offers you So Ingram's been a partner with So in the last couple of And to give you an example "Hey, I have the perfect How is that going to help you at Ingram? And I love the fact that you can One of the challenges of integration and as you said, it's a very rich fabric, it became known as the And the reason was, we wanted the network a pilot for them, yes. and I just invited the one of the things we were talking about to sell you something and the things that their I'd like to be right in like the Fortinet Fabric, you roll that So you're not worried Now it's the cyber criminals. easier to hack than computers. on the partners from that enablement, and some of the things I noticed your clothes. I have to be a Springboks, to having you back on the show. That sounds great, thank you very much. you for watching theCUBE
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Peter Burris | PERSON | 0.99+ |
Jonha Lumo | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Kevin | PERSON | 0.99+ |
Southwest | ORGANIZATION | 0.99+ |
Kevin Kealy | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Edward Amoroso | PERSON | 0.99+ |
AT&T | ORGANIZATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
two days | QUANTITY | 0.99+ |
Eric Kohl | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Southwest Airlines | ORGANIZATION | 0.99+ |
2018 | DATE | 0.99+ |
two years | QUANTITY | 0.99+ |
10 years | QUANTITY | 0.99+ |
Eric | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Ingram | ORGANIZATION | 0.99+ |
three-week | QUANTITY | 0.99+ |
Boeing | ORGANIZATION | 0.99+ |
Bill Gates | PERSON | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
six other groups | QUANTITY | 0.99+ |
CISCO | ORGANIZATION | 0.99+ |
Ingram Micro | ORGANIZATION | 0.99+ |
CISO | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
one console | QUANTITY | 0.99+ |
FAA | ORGANIZATION | 0.99+ |
first question | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
737s | COMMERCIAL_ITEM | 0.98+ |
Juniper | ORGANIZATION | 0.98+ |
one | QUANTITY | 0.98+ |
This year | DATE | 0.98+ |
first | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
Splunk | ORGANIZATION | 0.97+ |
a year | QUANTITY | 0.97+ |
theCUBE | ORGANIZATION | 0.97+ |
five minutes | QUANTITY | 0.96+ |
Fortinet Accelerate 2018 | TITLE | 0.96+ |
South African | OTHER | 0.95+ |
first partnerships | QUANTITY | 0.95+ |
Daniel Bernard, SentinelOne & Bassil Habib, Tri City | Fortinet Accelerate 2018
(techno music) [Announcer] Live from Las Vegas, its the Cube! Covering Fortinet Accelerate 18. Brought to you buy Fortinet. >> Welcome back to the Cube's continuing coverage of Fortinet Accelerate 2018. I'm Lisa Martin joined by my cohost Peter Burris, and we have a very cozy set. Right now, I'd like to introduce you to our next guests, Daniel Bernard, the vice-president of business development for SentinelOne, and Basil Habib, you are the IT director at Tri City Foods. Gentleman, welcome to the Cube. >> Great to be here, thanks. >> We're excited to have you guys here. So first, Daniel first question to you. Tell us about SentinelOne, what's your role there, and how does SentinelOne partner with Fortinet? >> Sure, I run technologies integration and alliances. SentinelOne is a next generation endpoint protection platform company. Where we converge EPP and EDR into one agent that operates autonomously. So whether its connected to the internet or not, we don't rely on a cloud deliver solution. It works just as well online and offline. And we're there to disrupt the legacy AV players that have been in this market for 25 years with technology driven by artificial intelligence to map every part of the threat life cycle to specific AI capabilities, so we can stop attacks before they even occur. >> And your partnership with Fortinet, this is your first Accelerate, so talk to us about the duration of that partnership and what is differentiating-- >> Yeah. >> Lisa: For you. >> Its great to be here at Accelerate and also to work with Fortinet. We've been working with them for about a year and a half, and we're proud members of the Fortinet Security Fabric. What it means to us is that for enterprises, like Tri City Foods that we'll talk about, a defense and depth approach is really the way to go. Fortinet, leading edge, network security solutions. We have a very meaningful and exciting opportunity to work with Fortinet, given the breadth of our APIs. We have over 250 APIs, the most of any endpoint solution out there on the market. So the things we can enable within Fortinet's broad stack is really powerful. Fortinet has a lot of customers, a lot of endpoints in their environments to protect. So we're proud to partner with Fortinet to help go after those accounts together. To not only go into those accounts ourselves but also strengthen the security that Fortinet is able to offer their customers as well. >> If we can pivot on that for just a second. How do you-- how does SentinelOne help strengthen, for example, some of the announcements that came out from Fortinet this morning about the Security Fabric? How do you give an advantage to Fortinet? >> Sure. So where we come in, is we sit at the endpoint level and we're able to bring a lot of different pieces of intelligence to core and critical Fortinet assets. For example, with the Fortinet connector that we are going to be releasing tomorrow, so a little sneak peek on that right here on the Cube. The endpoint intelligence is actually through API to API connections able to go immediately into FortiSandbox and then be pushed to FortiGate. And that's in real time. So, whether an endpoint is inside of a network or running around somewhere in the world, whether its online or offline, a detection and a conviction we make through the SentinelOne client and the agent that actually sits on the endpoint, all the sudden is able to enrich and make every single endpoint inside of a Fortinet network much smarter and prone and also immune from attacks before they even occur. >> So as you think about that, how does it translate into a company like Tri City which has a large number of franchises, typically without a lot of expertise in those franchises, to do complex IT security but still very crucial data that has to be maintained and propagated. >> Well from Tri City's perspective, we look into security environment. And when you look into the Security Fabric between Fortinet and SentinelOne, that really helps us out a great deal. By looking into automating some of theses processes, mitigating some of these threats, that integration and the zero-day attack that can be prevented, that really helps us out day one. >> So tell us a little bit about Tri City. >> Well Tri City Foods is basically the second largest Franchisees for Burger King. We currently have approximately about 500 locations. Everybody thinks about Burger King as just the, you know, you go purchase Whopper. But nobody knows about all of the technology that goes in the back and in order to support that environment. You look into it, you got the Point of Sale, taking your credit card transaction, you got your digital menu board, you got all of the items in the back end, the drive-through. And we support all of those devices and we ensure that all of these are working properly, and operating efficiently. So if one of these devices is not functioning, that's all goes down. The other thing we do is basically we need to ensure that the security is up, most important for us. We're processing credit card transaction, we cannot afford to have any kind of issue to the environment. And this is, again, this is were SentinelOne comes into the picture where all of our devices down there are protected with the solution, as well as protecting the assets with Fortinet security. >> So I hear big environment complexity. Tell us about the evolution of security in your environment. You mention SentinelOne but how has that evolved as you have to, you said so many different endpoints that are vulnerable and there's personal information. Tell us about this evolution that you helped drive. >> The issue I put an end to when I first started on that is, we had the traditional antivirus. We had traditional antivirus, its just basically protecting what it knows about, it did not protect anything that is zero-day. We got in a head to a couple ransom wares. Which we are not willing to take any chances with the environment. That evolution came through as, no we cannot afford to have these type of system be taken down or be compromised. And we do like to assure the security of our clients. So this is, again, this is where we decided to go into the next gen and for protection. Ensuring the uptime and the security of the environment. >> But very importantly, you also don't have the opportunity to hire really, really expensive talent in the store to make sure that the store is digitally secure. Talk a little bit about what Daniel was talking about, relative to AI, automation, and some of the other features that you're looking for as you ensure security in those locations. >> The process to go down there is basically, we cannot expect everybody to understand security. So in order-- >> That's a good bet! (laughing) >> So in order to make-- >> While we're all here! >> That's right! >> So in order to make it easy for everybody to process the solutions, its best if we have to simplify as much as possible. We need to make sure its zero touch, we need to make sure that it works all the time, irrelevant to if you are on the network or off the network. We needed to make sure that its reliable and it works without any compromise. >> And very importantly, its multibonal right? It can be online, offline, you can have a variety of different operator characteristics, centralized, more regional. Is that all accurate? >> Multi-tenant, on-prem. >> Definitely. With every location, you got your local users, you have your managers, the district managers, they are mobile. These are mobile users that we have to protect. And in order to protect them we need to make sure that they are protected offline as well as online. And again, the SentinelOne client basically provided that security for us. It is always on, its available offline, and its preventing a lot of malware from coming in. >> Talk to us about, kind of the reduction in complexity and visibility. Cause I'm hearing that visibility is probably a key capability that you now have achieved across a pretty big environment. >> Correct. So, before with the traditional antivirus, you got on-prem solution. On-prem solution, in order to see that visibility, you have be logged in, you have to be able to access that solution, you have to be pushing application updates, signature updates, its very static. Moving into SentinelOne, its a successful solution. I don't have to touch anything, basically everything works in the background. We update the backend and just the clients get pushed, the updates get pushed, and its protected. I only have one engineer basically looking after the solution. Which is great in this environment. Because again, everywhere you go, up access is a big problem. So in order to reduce the cost, we need to make sure that we have that automation in place. We need to make sure that everything works with minimal intervention. That issues were mitigated dynamically without having any physical intervention to it. And this where the solution came in handy. >> So I'm hearing some really strong positive business outcomes. If we can kind of shift, Daniel, back to you. This is a great testimonial for how a business is continuing to evolve and grow at the speed and scale that consumers are demanding. Tell us a little bit on the SentinelOne side about some of the announcements that Fortinet has made today. For example, the Security Fabric, as well as what they announced with AI. How is that going to help your partnership and help companies like Tri City Foods and others achieve the visibility and the security that they need, at that scale and speed that they demand. >> Yeah I think Fortinet has very progressive approach when it comes to every part of their stack. What we see with the Fortinet Security Fabric is a real desire to work with best of breed vendors and bring in their capabilities so that customers can still utilize all the different pieces of what Fortinet offers, whether it be FortiGate, FortiSandbox, FortiMail, all these different fantastic products but compliment those products and enrich them with all these other great vendors here on the floor. And what we heard from Basil is what we hear from our other 2000 customers, these themes of we need something that's simple. With two people on the team, you can easily spend all your time just logging into every single console. Fortinet brings that light so seamlessly in their stack 20, 30 products that are able to be easily managed. But if you don't partner with a vendor like Fortinet or SentinelOne and your going into all these different products all day long, there's no time to actually do anything with that data. I think the problem in cyber security today is really one of data overload. What do you do with all this data? You need something that's going to be autonomous and work online and offline but also bring in this level of automation to connect all these different pieces of a security ecosystem together to make what Fortinet has very nicely labeled a Security Fabric. And that's what I believe is what's going inside Basil's environment, that's what we see in our 2000 customers and hopefully that's something that all of Fortinet's customers can benefit from. >> Basil, one of the many things that people think about is they associate digital transformation with larger businesses. Now, Tri City Food is not a small business, 500 Burger King franchises is a pretty sizable business, when you come right down to it. But how is SentinelOne, Fortinet facilitating changes in the in-store experience? Digital changes in the in-store experience? Are there things that you can now think about doing as a consequence of bringing this endpoint security into the store, in an automated, facile, simple way that you couldn't think about before? >> Actually yes, by using the Fortinet platform we deployed the FortiAPs. We have the FortiManager, we're looking into, basically, trying to manage and push all of the guest services, to provide guest services. Before we had to touch a lot of different devices, right now its just two click of a button and I'm able to provide that SSID to all of my stores. We're able to change the security settings with basically couple clicks. We don't have to go and manage 500 locations. I'm only managing a single platform and FortiManager, for instance, or FortiCloud. So this is very progressive for us. Again, when you're working with a small staff, the more automation and the more management you can do on the backend to simplify the environment, as well as providing the required security is a big plus for us. >> There's some key features that we've brought to market to help teams like Basil's. A couple ones that come to mind, our deep visibility capability where you can actually see into encrypted traffic directly from the endpoint, without any changes in network topography. That's something that's pretty groundbreaking. We're the only endpoint technology to actually do that, where you can actually threat hunt for IOCs and look around and see 70 percent of traffics encrypted today and that number is rising. You can actually see into all that traffic and look for specific data points. That's a really good example, where you can turn what you use to have to go to a very high level of SOC analyst and you can have anybody actually benefit from a tool like that. The other one that comes to mind is our rollback capability, where if something does get through or we're just operating in EDR mode, by customer choice, you can actually completely rollback a system to the previously noninfected, nonencrypted state directly from that central location. So whether that person is on an island or in Bermuda, or sitting in a store somewhere, if a system is compromise you don't need to re-image it anymore. You can just click rollback and within 90 seconds its back to where it was before. So, the time savings we can drive is really the key value proposition from a business outcome standpoint because you need all these different check boxes and more than check boxes, but frankly there's just not the people and the hours in the day to do it all. >> So, you said time savings affects maybe resource allocation. I'm wondering in terms of leveraging what you've established from a security standpoint as differentiation as Tri City is looking to grow and expand. Tell us a little bit about how this is a differentiator for your business, compared to your competition. >> I cannot speak to the competition. (all laughs) What I can speak to is, again, the differentiator for us as Daniel mentioned is basically, again, the automation pieces, the rollback features. The minimizing the threat analyses into the environment. All these features basically is going to make us more available for our customers, the environment is going to be secure and customers will be more than welcome to come into us and they know that their coming in their information is secure and their not going to be compromised. >> Well are you able to set up stores faster? Are you able to, as you've said, roll out changes faster? So you do get that common kind of view of things. >> We're at zero zero breach. >> We're at zero zero breach yes. So, basically, in order through a lot faster, we do it lock the source faster. We basically, with the zero touch deployment, that Fortinet is offering, basically send the device to the store, bring it online and its functional. We just push it out the door and its operational. With the SentinelOne platform, push the client to the store and set it and forget it. That is basically the best solution that we ever deployed. >> Set it and forget it. >> I like that. >> Set it and forget it. >> That's why you look so relaxed. (laughs) >> I can sleep at night. (all laugh) >> That's what we want to hear. >> Exactly. So Daniel, last question to you, this is your first Accelerate? >> It is our first Accelerate. >> Tell us about what excites you about being here? What are some of the things that you've heard and what are you excited about going forward in 2018 with this partnership? >> Yeah, well as we launch our Fortinet connector tomorrow, what really excites me about being here is the huge partner and customer base that Fortinet has built over the last 20 years. Customers and partners that have not only bought the first time, but they're in it to win it with Fortinet. And that's what we are too. I'm excited about the year ahead and enabling people like Basil to be able to sleep on the weekends because they can stitch they're security solutions together in a meaningful way with best of breed technologies and we're honored to be part of that Fortinet Security Fabric for that very reason. >> Well gentleman thank you both so much for taking the time to chat with us today and share your story at Accelerate 2018. >> Thanks a lot. >> Thank you. >> For this cozy panel up here, I'm Lisa Martin my cohost with the Cube is Peter Burris. You're watching us live at Fortinet Accelerate 2018. Stick around we will be right back. (techno music)
SUMMARY :
Brought to you buy Fortinet. Welcome back to the We're excited to have you guys here. to map every part of the threat life cycle So the things we can enable within for example, some of the all the sudden is able to data that has to be that integration and the in the back and in order to that you helped drive. We got in a head to a couple ransom wares. in the store to make sure that The process to go irrelevant to if you are on you can have a variety And in order to protect them a key capability that you now have So in order to reduce the cost, How is that going to help your partnership is a real desire to work in the in-store experience? on the backend to in the day to do it all. Tri City is looking to grow and expand. is going to make us more So you do get that common push the client to the store That's why you look I can sleep at night. So Daniel, last question to you, honored to be part of that time to chat with us today Stick around we will be right back.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Fortinet | ORGANIZATION | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Burger King | ORGANIZATION | 0.99+ |
Tri City | ORGANIZATION | 0.99+ |
Daniel Bernard | PERSON | 0.99+ |
Basil Habib | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Daniel | PERSON | 0.99+ |
25 years | QUANTITY | 0.99+ |
Tri City Foods | ORGANIZATION | 0.99+ |
Tri City Food | ORGANIZATION | 0.99+ |
Bermuda | LOCATION | 0.99+ |
70 percent | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Accelerate | ORGANIZATION | 0.99+ |
2018 | DATE | 0.99+ |
SentinelOne | ORGANIZATION | 0.99+ |
two people | QUANTITY | 0.99+ |
500 locations | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
two click | QUANTITY | 0.99+ |
today | DATE | 0.98+ |
FortiManager | TITLE | 0.98+ |
first question | QUANTITY | 0.98+ |
over 250 APIs | QUANTITY | 0.98+ |
tomorrow | DATE | 0.98+ |
one engineer | QUANTITY | 0.98+ |
2000 customers | QUANTITY | 0.98+ |
zero | QUANTITY | 0.98+ |
Basil | ORGANIZATION | 0.97+ |
about a year and a half | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
first Accelerate | QUANTITY | 0.97+ |
one agent | QUANTITY | 0.97+ |
Bassil Habib | PERSON | 0.96+ |
90 seconds | QUANTITY | 0.96+ |
one | QUANTITY | 0.96+ |
30 products | QUANTITY | 0.95+ |
FortiCloud | TITLE | 0.95+ |
approximately about 500 locations | QUANTITY | 0.95+ |
Whopper | ORGANIZATION | 0.95+ |
stack 20 | QUANTITY | 0.94+ |
Troy Miller, Clark County School District | Fortinet Accelerate 2018
>> Live from Las Vegas it's theCUBE covering Fortinet Acclerate 18. Brought to you by Fortinet. (upbeat techno music) >> Welcome back to theCUBE's continuing coverage of Fortinet's Accelerate 2018. I'm Lisa Martin joined by my cohost, Peter Burris. And we're excited to be joined by a Fortinet customer, Troy Miller the Director of Technical Resources from Clark County School District. Troy welcome to theCUBE. >> Thank you. >> Lisa: So, you're local. You're in the Vegas area. Tell us a little bit about Clark County, I noticed some impressive numbers of size, and about your role. >> Clark County School District we service about 320,000 students a day, 41,000 employees. It's the entire county which, last I heard, was about the size of Rhode Island. So, basically, that's geographically large as well. My role in the district as Director of Technical Resources. We bring in 80 gigs of internet each day for all those people to consume. And we're responsible for the Edge security. So, we don't get down to the desktop yet but we just make sure they have a successful and reliable internet. >> So, 320,000 students and 41,000 employees. How many devices is that connecting to the network? Or do you have any idea? >> Even ones that were just district-owned might be closer to 420,000 probably, if you count all the labs. And then another everyone brings in their own one or two or three devices with them. Their phone, their iPad, their laptop. So, there's not an exact count but I'm guessing well over 450,000 probably. >> And you've been with Clark Country for awhile and you've been in education for awhile. Talk to us about the technology evolution that you've seen take place. The opportunities that that gives educators and students we well as the opportunities that it provides on the security side that you have to combat. >> Yeah, a long time ago, I've taught for four years from, I think it was '93 to '97, and I got into the department I'm in now. But back then it was one computer that a teacher didn't know how to use and rarely turned on to now they're using, whether it be smart boards, giving out iPads, Chromebooks, and so on. Every kid's connected and it's important. We're now a Google school district. So, Google Classroom using Google sites and so on. And so, it's important. And the evolution of that is just that when you have a reliable internet, and so Fortinet has definitely increased our stature in that. Day to day instruction can take place, not interrupt them. Cause if they lose their internet for two minutes we've deprived these students for all kinds of education. It's important and now everything is reliant upon it. Even our student management system, our ERP. All that stuff is now, some hosted internationally some hosted externally. So, security is a very important part of that. >> And when you think about the role that you play, you have a specific role within the school district. How does the ability to use a Fortinet-like product inside your role impact your ability to collaborate and coordinate with others in the school district to make sure that everything is running seamlessly? >> Yeah, that's important is that for us using the Fortinets that we have, it was important to be able to get better insight. I'm excited about the stuff in the conference this year to really improve upon that. But to be able to properly secure those say VPN connections going out to outside services or to better serve the students in the schools or other business transactions that take place. So, it's important on that. And then we can see if something's starting to break down somewhat where to go. And again, our district's pretty separated. It's siloed a bit. And so, it's important we know which department to go to if we're seeing issues with certain things. >> Now, local government's are notoriously difficult to work with for some technology vendors. How has it been for Clark County working with members of the Fortinet ecosystem. Because security is obviously an increasingly important feature of, well, virtually everything, but including local municipalities. >> Right. And Fortinet's been awesome. We worked with them through our managed service proprietor, Mosaic451. So, when we moved towards Fortinet just a year and a half ago, that made it a very seamless move because they had the expertise that we didn't at the time. We were brand new to the Fortinet platform. They brought in people from all over to help out with that to either install it, to set up the policies and so on. So, yeah, working with municipalities is difficult. Working for one's even more difficult. But Fortinet has made that very easy. >> What was the catalyst for bringing on Fortinet in terms of some of the challenges that you guys have with your firewalls? Was their any sort of one event or type of events that really catalyzed, hey, we're got to transform here? >> Yeah, there was a series of events actually. About a year and a half ago, we were undergoing about daily one hour, two hour DDoS attacks, fragmented UDP attacks. And our previous firewall vendors they couldn't, one they couldn't diagnose it. And two even once they did, it couldn't handle it. We were basically firewalling our firewall with our EdgeRouter. And so, that was when I said something has got to change. And that's when I contacted Mosaic451 and said, I need help. I can't be doing this every day cause the staff, obviously, were upset. And so was I. And so, Fortinet actually back then, our first involvement with Fortinet, they sent out two chassis and said, "Here. Try them out. See if this will stop the attack. We think it will." And we got them going within a few days and sure enough, it did. And so that told me I needed to make a move. It took, obviously, some budget trapeze acts to get that done. But within six months we were then on Fortinet. And again, once we got the equipment back everyone was able to help out and get us set up. We're unique in what we had and moving our policies and so on. So, they've been integral in that. >> So, impact perspective. It sounds like you went from these daily DDoS attacks to zero? >> Troy: Yeah. >> In how short of a time period? >> They stopped on their own beginning of January of that year. But we haven't had one at all since then. Or we've had small ones but the Fortinets handled them without a problem. They barely bumped them, you know. >> So, pretty big impact there that you've been able to make? >> Yeah, we went from-- >> Lisa: Pretty quickly. >> Yeah, yeah it was six months before we finally made the Fortinet decision. And we were fortunate we didn't have to go through an RFP process on that. Because that would have taken forever, and I didn't want to do that. And so, I already said we did our RFP. This one doesn't work. We know this other one doesn't work. So, guess what's left? So, that's the way we ended up with Fortinet. And I said we're very happy with them so far. >> In terms of some of the announcements that they have made today, around utilizing AI technology. They've also talked about their Fabric-Ready Partner Program. You've talked about a partner there. What are some of the things that excite you about what you've heard from them today? Does that give you reassurance that not only did we make the right decision but this is something that's going to help us as we evolve and as security threats naturally evolve and grow as well that you feel like you have a good foundation on the security side. >> Yeah, precisely. I'm very excited from what I saw. And you know, there's things, education, especially in this state, is extremely underfunded. So, I'd love to go out and just say, "Oh, I'd like to buy this. I'd like to buy that." We're up and running with the security fabric. And I'm excited about it. But what I'm really excited is the opportunity to grow. We can really assume some progress with that. And so, while I can't take full advantage of it or even go to the FortiOS 6 probably anytime soon. But we will be able to start laying the groundwork, and I can plan out to start filling off those check boxes in that security fabric, and start providing a better more secure internet for what I'm responsible for, what I can consume. >> So, education like everything else is changing. What are the set of options that become more available to you to Clark County School District as a consequence of bringing in a new security fabric that's capable of accommodating a little more complexity, a little bit more automation? >> Well, yes, a little bit of all that. For us, what I'm excited about with the Fortinet is that one, we've got something robust that's going to last us for five to seven years. Those will last even beyond our 80 gigs we're using now if we need to go beyond that before I retire. But the exciting part of that is, like I said, by adding in those different security fabric pieces I think we'll be able to improve bit by bit. And I know while they're going to improve them even more by the time we finally get there. So, that's exciting. >> You talked about ... I'd like you to elaborate a little bit more on your organization. It sounds, I don't want to say fragmented, but there's different centers. How has, I should say, what you guys have been able to achieve by bringing Fortinet in in terms of we talked about this dramatic reduction or elimination of DDoS. Are you able to leverage that as sort of a best practice within the school district. Do you see opportunities that this Fortinet partnership can have for you in that respect? >> It gives us some validity. It shows that it did make a difference. We didn't just spend some money on it no reason. Yeah, because of its being siloed, what the Fortinets will give us now is we can know exactly which department to send certain tickets to. What we see whether it's to be malware or something pinging out that shouldn't. We can better address where it's coming from and what to do with it. And again, Mosaic is our sock. So, working with them, working with Fortinet we've been able to improve our response to minor incidents as they happen. >> Are there other natural issues that the County of Las Vegas deals with that makes Fortinet especially relevant? I mean, obviously, great distances. But you know, you've got large mountains surrounding here. It's a very dry environment. Are you finding that there's just things about the location that makes Fortinet that much better choice? >> I don't really think environmental ... Pretty much what makes this the best choice is not really where we are but just what we do. Like I said, the internet comes to us, and then we kind of spray it out from there. And so, that availability and reliability is what's important. Sort of where we are doesn't quite matter. But it is the ability to be able to service the customers. >> So, we kind of look at the security transformation that you're on. You've talked to us about some of the achievements that you've made so far in the first year. What are some of things throughout the rest of 2018 that your looking forward to enabling your environment with your Fortinet partnership? >> Some of the things I'm excited about there is, like you had mentioned before the AI part of that. That I'm really excited to hopefully implement. That just takes some ... I can use the eyes I have. I only have four security people basically for that organization. Two of them from Mosaic, two of my own people. And so, if I can have those people addressing bigger concerns than malware or stuff like that. And VAI can better handle that, so instead of digging through logs, we can just, there it is, block it or it's already blocked. That would save us. And I could use that talent for more serious items. We already completed our Edge redesign the networks. Now, we're not redundant on that. We're working on our internal network. So, if we can spend more time making those things more robust to then take advantage of the security fabric as we're able to take advantage of it then that's all the better. >> In most enterprises, there's a partnership that has to be established between security architecture, security operations, the business, and especially the employees. Employees have to take an active roll to successfully do security. Kids and schools are not necessarily well known for having consistent behaviors. How has that affected your environment? And what can enterprises learn as they think about having to serve increasingly unruly customers in their markets? >> Yeah, that's one of the things I'm just starting to dip my toe in to plan for next year is more of an education for it but then holding them accountable for that education. Yeah, I don't know which is worse, the teachers or the students. (Peter laughs) I'm guessing the teachers. (Lisa laughs) They'll click on anything they see. So, it's important to educate them first before I start rolling out some efficient testing on them and so on. But we have to start doing that because otherwise it doesn't matter if something comes in or they get it off their tablet. Now, they've infected the internal and it didn't even get to us, right? And so, it's important that education is important. We're going to start trying to hold them accountable for it. But that's a huge challenge where I'm at. That's like climbing Everest there. >> So, is Fortinet going to help? I think it will. Fortinet's going to be able to help for us to be able to have that insight on what's still working, what's not. We're still seeing these things. >> And also recognizing patterns and seeing what people tend to do wrong will probably help you pinpoint what you need to, that partnership. What the user needs to take more responsibility for. >> Right and that's the thing. It better identifies those issues. You see where they've improved or what still needs to be worked on. >> Peter: Great. >> Well, congratulation on what you've achieved so far. >> Oh, thank you. >> And thank you so much for sharing your success story with us. You're on a journey, and we wish you continuing success with that. >> Thank you. >> For my cohost, Peter Burris, I'm Lisa Martin. You've been watching theCUBE's coverage of Fortinet Accelerate 2018. We'll be right back after a short break. (upbeat techno music)
SUMMARY :
Brought to you by Fortinet. Welcome back to theCUBE's You're in the Vegas area. for all those people to consume. connecting to the network? might be closer to 420,000 probably, that you have to combat. And the evolution of that is just that How does the ability to But to be able to members of the Fortinet ecosystem. all over to help out with that And so, that was when I said to zero? beginning of January of that year. So, that's the way we that's going to help us is the opportunity to grow. to you to Clark County School District by the time we finally get there. what you guys have been able to achieve improve our response to minor that the County of Las Vegas deals with But it is the ability to be You've talked to us about Some of the things I'm that has to be established between And so, it's important that So, is Fortinet going to help? What the user needs to take Right and that's the thing. what you've achieved so far. and we wish you continuing of Fortinet Accelerate 2018.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Peter Burris | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Troy Miller | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
80 gigs | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Two | QUANTITY | 0.99+ |
five | QUANTITY | 0.99+ |
Rhode Island | LOCATION | 0.99+ |
two hour | QUANTITY | 0.99+ |
two minutes | QUANTITY | 0.99+ |
Vegas | LOCATION | 0.99+ |
iPad | COMMERCIAL_ITEM | 0.99+ |
Troy | PERSON | 0.99+ |
Clark County | LOCATION | 0.99+ |
Fortinets | ORGANIZATION | 0.99+ |
iPads | COMMERCIAL_ITEM | 0.99+ |
41,000 employees | QUANTITY | 0.99+ |
'93 | DATE | 0.99+ |
next year | DATE | 0.99+ |
four years | QUANTITY | 0.99+ |
320,000 students | QUANTITY | 0.99+ |
seven years | QUANTITY | 0.99+ |
theCUBE | ORGANIZATION | 0.99+ |
'97 | DATE | 0.99+ |
one computer | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
today | DATE | 0.98+ |
three devices | QUANTITY | 0.98+ |
ORGANIZATION | 0.98+ | |
Clark County School District | ORGANIZATION | 0.98+ |
Mosaic | ORGANIZATION | 0.98+ |
each day | QUANTITY | 0.98+ |
About a year and a half ago | DATE | 0.98+ |
Chromebooks | COMMERCIAL_ITEM | 0.98+ |
Clark Country | ORGANIZATION | 0.98+ |
a year and a half ago | DATE | 0.97+ |
Everest | LOCATION | 0.96+ |
six months | QUANTITY | 0.96+ |
zero | QUANTITY | 0.96+ |
about 320,000 students a day | QUANTITY | 0.95+ |
2018 | DATE | 0.95+ |
one event | QUANTITY | 0.95+ |
over 450,000 | QUANTITY | 0.95+ |
two chassis | QUANTITY | 0.95+ |
Google Classroom | TITLE | 0.94+ |
first | QUANTITY | 0.94+ |
first year | QUANTITY | 0.94+ |
four security people | QUANTITY | 0.91+ |
Clark County School District | ORGANIZATION | 0.91+ |
420,000 | QUANTITY | 0.89+ |
this year | DATE | 0.89+ |
first involvement | QUANTITY | 0.87+ |
Mykola Konrad, Ribbon Communications | Fortinet Accelerate 2018
>> (announcer) Live from Las Vegas, it's the Cube. Covering Fortinet Accelerate '18. Brought to you by Fortinet. (upbeat music) >> Welcome back to the Cube. We are live at Fortinet Accelerate 2018. I'm Lisa Martin, with my co-host, Peter Burris. And we're excited to be joined by Myk Conrad, the VP of Product Management at Ribbon Communications. Myk, welcome to the Cube. >> Well, thank you very much, and it's great to be here. >> So tell us about Ribbon, your Technology Alliance's partner. Tell us about Ribbon Communications, and what you guys do with Fortinet. >> Okay, so a few things. Ribbon Communications, we basically are a security and cloud company, in the voice and video space. So what does that practically mean? That means we sell something called a session border controller, which is a voice and video firewall, into both service providers and into enterprises. So an example would be, when you make a mobile call, with AT&T, or Verizon, or Deutsche Tel, or British Talk, I mean, whoever your particular service provider is, that voice session becomes an IP packet, wends its way through the network, and as it's wending its way through the network, it has to be potentially encrypted, it has to be protected, denial service attacks, all of that stuff, that's what we do. Now how does that work into what Fortinet does? We are a part of their cloud security fabric, and we have the ability, with a new product that we're launching, or have launched this week, or announced this week. It will be actually GA and available in the summer. It will be included in passing information into the security fabric. So we protect voice and video, Fortinet protects data, web, email, you know, everything that they do very well. What we are, what this new product that we call Ribbon Protect is, is going to be a bridge between the voice and video world of IP communications, and the data world that Fortinet works with. And we're going to be passing information and talking between those two worlds, and therefore adding an extra layer of security to that. So that's how we work with them. >> (Peter) So voice and video have some certain special communications requirements, and basically, you're bringing the capacity to do voice video security, and the special requirements associated therein into the Fortinet ecosystem. >> (Mykola) Yeah, so a great example is, so let's use an enterprise as an example, alright? So let's say you're a big bank, somebody along the lines of a Bank of America, and I'm not saying it's Bank of America, or Wells Fargo. I'm not naming anyone, but just along those lines. Big bank. You probably have a SIP trunk, which is an IP trunk, and IP packets for communications coming into a data center, or multiple data centers around the world, and into individual branches of all your retail locations. And those are voice and video packets. And your tellers, or your contact center agents, are picking up the phone, and that's all IP audio and video. Or they might be using a handset, and again, that's all IP to the laptop, or to the handset. And they're having these conversations. You may want to encrypt those conversations. You definitely want to make sure, if a contact center is up, and it's doing mortgage calls, it's taking individual requests for checking account balances, that that contact center stays up. In the world of IP, especially in SIP communications, it's very easy to send a denial service attack against, for example, a contact center, and bring that down. So nothing keeps somebody from generating, from a single laptop, 20 gigabytes, 30 gigabytes, or petabytes worth of calls into a contact center. And that will bring down the infrastructure, unless you're protecting that infrastructure with a download service type of device. Similar, very analogous to what you would see is in a DDoS device that, for example, Fortinet sells, on the data side, to protect your web servers and your email servers, and all the other things, except on the voice side. So that's what we do. And now, with Ribbon Protect, we're going to be taking all the information that we're gleaning, as these ports are being opened and closed, and as we are getting attacked on the voice and video side. so an IP address comes in. We've decided that there's a lot of bad calls coming in from that side of the fence. We blacklist that. We will then pass that information over to the data side of the house. Through the security fabric, we will pass through, and then Fortinet can, on their side, say, "Hey, this is now blacklisted also." So any packets coming from that IP address that are doing something else, that have nothing to do with voice and video, because it's two separate networks, typically, will now be protected. So now the bank has an added level of security. >> (Peter) And Fortinet propagates that, cascades it throughout. >> Cascades it throughout their entire partner ecosystem. >> Right. >> So that's what we do. And we have deep visibility into SIP. So one of the things, as an example, firewalls are very good at opening and closing ports. And the default for most firewalls is port closed. The problem is with SIP it's a phone call. Ports are typically closed. A call comes in, and it's ringing. You answer, and when you answer the UDP port has to be open, so that a media stream can come through and cut through the call, so you can actually have a conversation. Otherwise, the packets will get blocked, and there will be no conversation. You'll get one-way audio, or no audio. We have very good visibility into which ports are being assigned the duration of that call, so when somebody says, "Okay, bye." Hang up, click, and you kill that packet stream, that port will get closed automatically. A lot of firewalls don't do that. They keep the ports open, because they don't know at that SIP level that a call's coming through right this very second for Myk, open the port for three minutes because he's talking to his mom, conversation's over, close the port, because they don't go to that depth of information on the SIP application level. We do, because that's our job. And we then pass that information, say, "Listen, you should be closing this port, or opening this port." We have a lot of visibility that firewalls just don't have. And now, as part of the security fabric, we're going to be passing that information onwards. So now we're going to have a stronger security perimeter for enterprises as well as service providers that are using the combination of our session border controllers, Ribbon Protect, the new product that's coming out, and the Fortinet panoply of products. >> So if I'm a CSO at a bank, and we were speaking with Fortinet's CSO earlier today, and kind of talking about the evolution of that. We talked as well, I think with John Madison, about the security architect. If I'm the CSO at a bank, or a service provider, what is my material value that this technology alliance is going to give to my organization? >> (Mykola) That's a good question. So there's a couple different aspects of this. So let me talk about Ribbon Protect. We frame Ribbon Protect in three different value propositions: one is for telephony fraud, or communications fraud, another one is in cybersecurity threats, and a third one is network visibility. So I'm going to start with network visibility and work my way back up that chain. So there's a value proposition, not necessarily for the CSO, but for the CIO and the people running the communications network, in having really good visibility into the communications network, an end-to end view across multiple different disparate items. So let me give you an example. Typical bank will have Cisco, they might have Juniper, they might also have an Avia system, when it comes to communications, they might have an old Nortel system, they might have some cloud communications from a Vonage, or a Fuse, or Verizon. All these disparate systems, all under this one CIO, and a call comes in, and nothing works. For some reason it's not routing correctly, the contact center agent isn't getting the call. You know, have you ever called, and you get transferred, and you get dropped? That's the problem. And then when they try to troubleshoot that, it's very hard, because there's so many disparate elements. So the first thing you need is visibility. So from a CIO perspective this product, Ribbon Protect, will give you visibility into the network, and that will allow you to troubleshoot and bring the network up. Then you go into the next level. So once you have visibility. So you can't provide security until you have visibility into a network, so now that you've got this N10 visibility, now let's talk about security. Two different types of security threats that our customers are seeing when it comes to communications. One is sort of robo dialing, toll fraud. And I would even put denial service attacks sort of in there. Denial service attacks also go to the next level, which is cybersecurity. But robo dialing: how many of you are getting calls all the time now? I'm getting them on my mobile, literally, I get like three or four a day on my mobile phone from a different random number, because they know my area code and they think if they mask it, it's a friend of mine, and I'll answer the call. That's becoming more and more prevalent. Now think about if you're an enterprise, and if you're a CSO, and now you're tasked with keeping these employees productive, but they're starting to get all these random calls, your contact center agent. And we've actually had this happen to customers of ours, where they picked up the phone and they were getting random garbled noise on the other end. And you're a contact center agent, your job is to sit there, and you hear these weird noises in your earphone, you hang up, next one comes in, it's weird noises. Third one comes in, it's actually a person that is asking about their mortgage. Great. That's your job. But then the next one is some weird ... It brings productivity way down. So there's that one area. And then there's toll fraud, which is in the billions of dollars, now, of cost to both enterprises and service providers, where people are doing things like calling Zambia, or weird little countries, and routing through enterprise networks. So that's another aspect that a CSO would be worried about. And lastly, and the most important one, is the cybersecurity issue. Packet-based denial service attacks across your entire system, that can not only take down your web server and your email server, but also your communications, your real-time communications, but also exfiltration of data. So what we've seen is the following: a hacker comes in through the data side and understands the network typology, puts in some malware, but because they're using something from Fortinet or somebody else, they can't do anything with that information. There's no way out. But here's the SIP network, this UC network, sitting in the system, and it's sort of unguarded, not that there's no guards there in place, but the data side, if you look at everything that Fortinet and others have been putting out, that side of the fence is getting a lot of attention. And over the last few years even more attention, as hacks have taken place, and PII has been stolen. But on the SIP side of the fence, that hasn't really happened as much. And so we believe that's the weakest chain right now, or will soon be the weakest chain. And hackers will use the open ports, because if your just using a firewall, those ports are open. The range of UDP ports to put media through is wide open. It has to be, otherwise it won't work. And so they can exfiltrate data through that. So they use some other means to find the typology of the network, get in, and then they can pass data out through that. And it might look like a good media stream, like a video call, and we've actually seen examples where people have sent video and embedded, underneath that, data inside the video. >> They piggyback. >> And they piggyback it. So you're going to see, the value to the CSO is, listen, if you're concerned about people finding a different way into your network, you're protected against, or you think you're protected against malware, you're protected against email, you're protected against web server attacks. Well have you really thought about the UC side? So if I'm a CSO, I should be really worried about securing that side of my fence, because I haven't been worried about it for the last three or four years, and there's been an increase in attacks, or increasing amount of attacks on that side of the fence. And then there's these other values of Ribbon Protect that hit other aspects of the IT chain. So we believe that there's a, sort of three core value propositions, two that really affect the CSO, and one that's more of a CIO issue. >> Well, look, once a port's open it's open. >> Correct, yeah. >> And video and voice do have characteristics that if a device is set up to introspect it and understand it, then it can recognize it. But as you said, your general-purpose firewall typically is not looking at that. And you don't want to introduce an entirely distinct and separate management platform, and paying, if you don't have to. So the CSO gets to see the same paying, while the CIO gets to ensure that voice and video happens without being hit? >> (Myk) And works. Yes. >> And at the same time, that the CSO is getting the paying that they need, so they have some visibility into what's going on with the network. >> (Myk) Exactly, and that's the entire purpose of this product. We believe it meshes nicely with what Fortinet's talking about, in that they have their Fortiguard Artificial Intelligence product that they've been talking about, and how it's detecting what's going on in the network, and millions of nodes, and features, and really actually quite sophisticated stuff. I just sat through an entire presentation on it. We are doing the same thing with Ribbon Protect, where we have an artificial intelligence layer that would sit inside the company, but it's specifically looking at the communications pathways, what's normal communications, what's abnormal communications. what's normal packet flows on the communications side, and abnormal communication flows. And putting two and two together, and doing machine learning, similar analogous things to what they're doing on the data side, and on the virus malware detection side, is what we're doing on the communications side, and putting together our own database, again, similar to what they have, where they have a database, and they apply that database of known bad, known good, to their ... And we're doing the same thing, and then we're going to share that information into the Fortinet fabric. >> So you're really collaborating and, it sounds like complimentary technologies. >> (Peter) Yeah, you're complimenting. >> That the customer benefits from. We've got about a minute left, but I'd love for you to share, maybe at a super high level, an example of a joint Fortinet/Ribbon customer, where the CIO and the CSO are being very happy with the technologies that you are delivering in this collaboration. >> I can't name any names, unfortunately, but we are talking with a large service provider right now, that is very enamored of Fortinet, and uses them extensively on the data side, to provide services to their customers, meaning: as a service provider, you're providing data and managed services to your enterprise customers. And they also use us today to provide voice services - >> (Peter) To secure voice. >> To secure voice services to the same set of customers. And so now what we're talking about is marrying the two, not sending data to Fortinet, and what is getting this service provider very excited is to be able to offer a differentiated service to their enterprise customer base, something that the other service providers can't, because they either aren't using Fortinet, or aren't using us. They need somebody that is using both, and this particular one happens to be using both of us, so we can put Ribbon Protect into their environment, into their network, and it'll start sharing their information, and what that will allow them to do is market to their customers at a higher level of security, and even to the point where they might be able to go out and say things like, "The most secure voice video system in the world today." >> (Peter) Yeah. They're expanding the scope of a common security footprint, and thereby allowing a new class of services to be provided to, whether CSO or CIO. >> And they view it as a differentiator for themselves. >> (Lisa) That's exactly what I was thinking - >> Which is why, when they're talking to the CSO or the CIO, why should you use us versus the other three guys you're probably talking to right now, well here's one reason. There's probably a few others, but here's at least one reason. >> Differentiation, a key fundamental for digital transformation. Well Myk, Mykola, thank you so much for joining us on the Cube. You're now a Cube alumni. >> Thank you very much, happy to be an alumni. >> (Lisa) Excellent. We want to thank you for watching the Cube's continuing coverage of Accelerate 2018. I'm Lisa Martin. For my co-host, Peter Burris, stick around. We've got great interviews coming up next. (upbeat music)
SUMMARY :
(announcer) Live from Las Vegas, it's the Cube. the VP of Product Management at Ribbon Communications. and what you guys do with Fortinet. and the data world that Fortinet works with. and the special requirements associated therein on the data side, to protect your web servers (Peter) And Fortinet propagates that, and the Fortinet panoply of products. and kind of talking about the evolution of that. So the first thing you need is visibility. or increasing amount of attacks on that side of the fence. So the CSO gets to see the same paying, (Myk) And works. And at the same time, that the CSO is getting the paying and on the virus malware detection side, So you're really collaborating and, That the customer benefits from. and managed services to your enterprise customers. and this particular one happens to be using both of us, and thereby allowing a new class of services why should you use us versus the other three guys Well Myk, Mykola, thank you so much We want to thank you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Peter Burris | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Mykola | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Verizon | ORGANIZATION | 0.99+ |
Ribbon | ORGANIZATION | 0.99+ |
John Madison | PERSON | 0.99+ |
Myk Conrad | PERSON | 0.99+ |
Myk | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Deutsche Tel | ORGANIZATION | 0.99+ |
Ribbon Communications | ORGANIZATION | 0.99+ |
three minutes | QUANTITY | 0.99+ |
Wells Fargo | ORGANIZATION | 0.99+ |
AT&T | ORGANIZATION | 0.99+ |
Peter | PERSON | 0.99+ |
Cube | ORGANIZATION | 0.99+ |
20 gigabytes | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
30 gigabytes | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
Bank of America | ORGANIZATION | 0.99+ |
this week | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
Mykola Konrad | PERSON | 0.99+ |
British Talk | ORGANIZATION | 0.99+ |
one reason | QUANTITY | 0.99+ |
Zambia | LOCATION | 0.99+ |
One | QUANTITY | 0.99+ |
three guys | QUANTITY | 0.98+ |
two worlds | QUANTITY | 0.98+ |
Two different types | QUANTITY | 0.98+ |
two separate networks | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
billions of dollars | QUANTITY | 0.97+ |
Juniper | ORGANIZATION | 0.97+ |
Fortiguard | ORGANIZATION | 0.96+ |
Third one | QUANTITY | 0.96+ |
one-way | QUANTITY | 0.96+ |
one | QUANTITY | 0.95+ |
one area | QUANTITY | 0.94+ |
third one | QUANTITY | 0.94+ |
Ribbon Protect | ORGANIZATION | 0.93+ |
Fuse | ORGANIZATION | 0.91+ |
first thing | QUANTITY | 0.91+ |
four a day | QUANTITY | 0.85+ |
millions of nodes | QUANTITY | 0.84+ |
single laptop | QUANTITY | 0.84+ |
three core | QUANTITY | 0.83+ |
both enterprises | QUANTITY | 0.81+ |
GA | LOCATION | 0.8+ |
John Maddison, Fortinet | Fortinet Accelerate 2018
>> Announcer: Live from Las Vegas. It's theCUBE. Covering Fortinet Accelerate 18. Brought to you by Fortinet. (upbeat music) >> Welcome back to theCUBE. Our continuing coverage of Fortinet Accelerate 2018. We're excited to be here. I'm Lisa Martin with Peter Burris, and we're excited to talk to one of the Keynotes the big cheese from the main stage session this morning, John Maddison. >> I say, small cheese I would say. >> SVP of Products and Solutions at Fortinet. Welcome back to theCUBE. >> It's great to be here again. >> So two things I learned about you when you started off your Keynote. One you're a Man City Fan, Manchester City. >> Manchester City Blue. >> Okay. >> Through and through, for many years. >> Premier League all the way. And you have the best job at Fortinet. >> I do indeed. >> Wow. >> That is to announce the new products of course. >> So let's talk about that. So you talked about some exciting announcements today. Tell us about, start with a Security Fabric. What's new there, what's going on, what's exciting? >> Well the core of the Security Fabric is FortiOS 6.0, that's our network operating system. That's the core of he Fabric and when we do a big release like this, many different features, new functionalities. Also we have tighter integration now between all our products in the Fabric. Bus, as I said, new features as well. Things like SD-WAN has been improved, we now have probably estimate of breed SD-WAN security. The Fabric integration itself is going on. We built out some new connectors with cloud. Now we have connectors for all the public clouds. All the public clouds. We have a new CASB connector, acronym city, of course, as usual, CASB is cloud access security broker, API access the SaaS clouds. And so we've got that not only in it's standalone form but also very much integrated inside the Fabric. We've also introducing some new FortiGuard service as part of FortiOS 6.0, a new security rating which is based on a bunch of new practices or best practices that all our customers have said this is great best practices, can you put this together and apply these to our network overall. That's just skimming the surface as I say, I think I said there's 200 plus new services I could have stood up there for like six hours or whatever. But great new services are 6.0 big announcement for us. >> We just chatted with your America's Channel Chief Jon Bove, talk to us about. >> Who's an Arsenal fan by the way. >> What. >> And we beat him Sunday three nil in the Cup final. >> Excellent. >> Just to make sure you get this. >> I'm sure. >> Write that down. >> Jot that down. >> So what excitement are you hearing in, from your perspective, in the channel with respect to all of the new announcements that you made today? >> Great feedback, so this obviously is a big channel partner event here. You know what a lot of channel partners are saying is that I need to make sure I provide more of a solution to the customers. In the past, you know maybe they sell a point product, it's hard to kind of keep that relationship going with that customer. But if they sell a solution with one or two products that's part of that solution or managed and some services as part of that, it's much stickier for the partners and gives them a bit more of an architectural approach to their customers network. They really like the Fabric as I said. The Fabric doesn't have to be everything inside the Fabric, they can be components. It's what we've seen far from a Fabric components. Our partners really latched on to the network plus the advanced threat protection, plus the management or plus the access points. But they definitely prefer to sell a complete solution. It's hard for them to manage 40 different security vendors, the skill sets, the training and everything else. Now they're not saying there needs to be one security vendor, much as we would like it to be Fortinet, but they need to be reduced to maybe a set of 10 or 12 and really, our Fabric allows them to do that. >> That's a key differentiator. >> Absolutely key differentiator and as I said, you know it's very hard to build a Fabric. It's a mesh network, all these products talk to each other. You can only really do that if you build those products organically, step-by-step, alongside the network operating system. It's no good acquiring lots of bits and pieces and trying to bolt it together, it's not going to work. We spent a long time, 10 years, building out this Fabric organically to make sure it integrates but also putting the best of breed features and things like SD-WAN and CASB. >> What is the product? In this digital world what is a product? >> A security product? >> Any kind of product. As a guy who runs product management, what's a product, can we talk about what is a security product? >> I think in the past you know product management used to be very focused on I've got a box that comes out, or I've got a piece of software that comes out, these days it could be virtual machine or cloud, but it's doing a single instance, there's a single thing that it's doing inside, inside the network from a security perspective. What we believe in is that multifunction, now consolidation, multiple threat vectors I refer to this that like the digital attack surface. The digital transformation, security transformation. The biggest issue though, is that digital attack surface. That's just expanded enormously, it's very dynamic. Things are coming on on off the network was spinning up virtual machines and applications here and there. A point product these days just can't cope, can't cope. You need solutions against specific threat vectors that are applied in a dynamic way using the Fabric. >> But arguably it's even beyond solutions. You need to be able to demonstrate to the customer that there is an outcome that's consistent and that you will help achieve that outcome, You'll take some responsibility for it. In many respects, we move from a product to a solution, to an outcome orientation. Does that resonate with you and if so, how does that influence the way you think and the way that you're guiding Fortinet and partners? >> Yes, definitely. You know one of the first things they're very worried about is you know can they see that digital attack surface. It's very large now and it's moving around. Their outcome, first outcomes to say, do I know my risk on my attack surface? That's the very first out. Is it visible, can I see it, or can I protect it or can I apply the right threat protection against that. That outcome to them is they can see everything, protect everything, but as I said also, now they're moving into this more detection environment. Where you've got machine learning, artificial intelligence because you need to apply that. The bad guys these days are very smart in that they know they can morph things very quickly and provide you know targeted attacks, zero-day attacks, we probably haven't seen it before. I hate this analogy where we say somebody else got to get infected before everyone else gets protected. It shouldn't be that way. With, you know, with technologies like artificial intelligence, machine learning, we should be able to protect everybody from day one. >> Kind of pivoting on, you brought up the word outcome, and I want to go off that for a second. When you're talking with customers and you mentioned, I think, before we went live that you visited, talked to over 300 customers last year. Who is at the table, at a customer, in terms of determining the outcome we need to have? Are we talking about the CSO's team, what about folks in other organizations, operational technology departments. Who are you now seeing is in this conversation of determining this outcome. >> A new job role which I think been coming for a while, it's the security architect. Two years ago, I'll go into a room and there would be the networking team on one side of the table, this InfoSec team security side, on this side of the table, the CIO over here and the CSO over here and they be debating. I would be almost invisible in the room. They'll be debating what's going to happen because you know the CIO wants to build out more agile business applications, wants to move faster. The security team has got to answer to the Board these days, and they got to make sure everything's secure. What's their risk factor? And what I see is a new job function called the security architect, that kind of straddles a bit the networking team, understands what they're building out from an SDN, architecture, cloud perspective, but also understands the risks when you open up the network. The security architect provides more holistic, long-term architecture view for the customer, versus, I've got to fix this problem right now I've got a hold of a bucket, I've got to fix it, then we move on to the next. They're building a system on architecture long term. We have something called a Network Security Expert, it's our training education capability. We have an NSC eight, we have around 100 thousand people certified in the last two years on NSC between one and eight. And about 100 people on eight, because eight's a very high level architect level across all the security technologies. But we definitely see a lot of partners who want to get their people trained to NCE level eight because they would like to provide that security architect that's in the customer now, that advice on what should be that holistic security architecture. The big change to me is that the networking team and the security team have realized they can't just keep fixing things day to day, they need a more holistic long-term architecture. >> Let's talk about that holistic approach. At Wikibon we talk a lot about SiliconANGLE Wikibon, we talk a lot about how the difference between business and digital business is the role that data assets play in the digital business. I think it's a relatively interesting, powerful concept, but there's not a lot of expertise out there about thinking how is a data asset formed. I think security has a major role to play in defining how a data assets structured because security in many respects is the process of privatizing data so that it can be appropriated only as you want it to. What does the security architect do? Because I could take what you just said and say the security architect is in part responsible for defining and sustaining the data asset portfolio. >> Yes and you know, if you go back a few years, there's data leakage prevention was a big area, big marketplace, DLP is the best thing. Their biggest problem that they did was they couldn't tag the assets. They didn't know what assets were so then when it came to providing data protection they go well, what is it, I don't know where it's from, I don't know what it is. And so that a whole marketplace kind of just went away. We're still there a bit, but everyone's really struggling with it still. The 6.0 introduced something called tagging technology. It's inherent already inside routing systems and switching systems, SDN systems. The tagging technology allows you to look at data or devices or interfaces or firewalls from a higher level and say this is the business relationship between that device, that data and what my business objectives are. We talked about intent based network security and the ability long term is to say, hey, if I've got a user and I want to add that user to this network at security level six to that application, I say that, then it gets translated into bits and bytes and network comport and then gets translated end-to-end across the network. The tagging technology from my mind is the first step in a to be able to kind of tag interfaces and data and everything else. Once you've got that tagging done then you can apply policies as a much higher level which are data centric and business aware centric. >> I'm going to ask you a question related to that. Historically, networks in the IT world were device was the primary citizen right. Then when we went to the web the page became a primary citizen. Are we now talking about a world in which data becomes the primary citizen we're really talking about networks of data? >> I think to some extent. If you look at the users today, they have like maybe three or four devices. Because students, universities, there's something on with those lectures, they've got an iPad, their iPhone, three devices attaching there. I think the definition of one user and one device has gone away and it's multiple devices these days. And you know a lot of devices attaching that no one has any clue about. I don't think it's going to be completely data centric because I still think it's very very hard to tag and classify that data completely accurately as it's moving around. I think tends to be a part of it, I think devices going to be part of it, I think the network itself, the applications, are all going to be part of this visibility. In our 6.0 we provide this topology map where you can see devices users. You can see applications spin up, you can see the relationship between those things and the policies, the visibility is going to be extremely important going forward and then the tagging goes along with that and then you can apply the policy. >> With respect to visibility, I wanted to chat about that a little bit in the context of customers. One of the things that Ken talked about in his keynote was. >> Ken? >> Ken. >> Ken Xie. >> Yes. (laughing) >> Ken who? >> That guy? The guy that steals slides from you in keynotes. >> He did as usual. >> I know, I saw that. >> Tells me like two minutes before tells me John, I need that slide. (Peter laughing) >> That's why you have the best job. Everybody wants to copy you. In terms of what what the CEO said, that guy, that Fortinet protects 90% of the global S&P 100. There were logos of Apple, Coca-cola, Oracle, for example. In terms of visibility, as we look at either, a giant enterprise like that or maybe a smaller enterprise where they are, you mentioned this digital tax surface is expanding because they are enabling this digital business transformation, they've got cloud, multi-cloud, mobile, IoT, and they also have 20, north of 20, different security products in their environments. How did they get visibility across these disparate solutions that don't play together. How does Fortinet help them achieve that visibility, so they can continue to scale at the speed they need to? >> Well I think they use systems like SIM systems we have a Forti SIM as well where you can use standard base sys logs and SNMP to get information up there so they can see it that way. They're using orchestration systems to see parts of it, but I think long term, I think I speak to most customers they say, although there's specific, new vendors maybe for specific detection capabilities, they really want to reduce the number of vendors inside their network. You say 20, I sometimes I hear 30 and 40. It's a big investment for them. But they also realize they can't maintain it long term. Our recommendation to customers is to, if you've got some Fortinet footprint in there, look at what's the most obvious to build out from a Fortinet perspective. Sometimes we're in the data centers or sometimes we expand into the WAN and sometimes we expand into the cloud. Sometimes we'll add some advanced threat protection. We're not saying replace everything obviously with Fortinet, we're saying build what's most obvious to you and then make sure that you've got some vendors in that which are part of our Fabric alliance. We have 42 vendors now, security vendors, from end point to cloud to management that can connect in through those different APIs. And when we click them through those APIs they don't get you know the full Fabric functionality in terms of telemetry and visibility but they apply a specific functionality. A good example would be an endpoint vendor connecting through our sandbox not quite sure about files, entered our sandbox we'll give them a recommendation back. As soon as we know about that, all the Fabric knows about it instantly across the whole network because time is of the essence these days. When something gets hacked, it's inside a network. It's less than 60 seconds for something for the whole network. That's why segmentation, interim segmentation, is still a very important project for our customers to stop this lateral movement of infections once they get inside the network. >> But, very quickly, it does sound as though that notion of the security architect, this increasing complexity inside the network and I asked the question about whether data is going to be the primary decision, you get a very reasonable answer to that. But it sounds like increasingly, a security expert is going to have to ask the question how does this data integrate? How am I securing this data? And that, in many respects, becomes a central feature of how you think about security architecture and security interactions. >> Yeah but I think people used to build a network and bolt on security as an afterthought. I think what they're saying now is we need for the networking people and security people to work together to build a holistic security architecture totally integrated day one, not some afterthought that goes on there. That's why we know, we've been building the Fabric all these years to make sure it's a totally integrated Fabric end-to-end segmentation architecture where you can also then connect in different parts of the network. It has to be built day one that way. >> Last question, is sort of, I think we asked your CSO this, the balance between enabling a business to transform digitally at speed and scale. I think it was one of you this morning, that said that this is going to be the year of security transformation. Could've been that guy, that other guy, that you know, steals your slides. But how do how does a company when you're talking with customers, how do they get that balance, between we are on this digital transformation journey. We've got a ton of security products. How do they balance that? It's not chicken and egg to be able to continue transforming to grow profit, you know be profitable, with underpinning this digital business with a very secure infrastructure. >> As I said, I think most of them got that now. They kind of go, they've got this five-year plan versus a one-year plan or a six-month plan on the security side. It's integrated into the network architecture plan long term and that's the way they're building it out and that's the way they've got a plan to get, you know, you look at financial organizations who want to provide internet access or branch offices. They've got a plan to roll it out, that's safe going forward, or they want to add broadband access to their internet, like 5G or broadband interconnection, they've got a plan for it. I think people are much more aware now that when I build something out whether it be on the data side on the network side, it has to be secure from day one. It can't be something I'll do afterwards. I think that's the biggest change I've seen in my customer interactions is that they absolutely, essential is absolutely essential that they build out a secure network from day one, not an afterthought going forward. >> Well, we'll end it there, secure network from day one. John, thanks so much for stopping by theCUBE, congratulations on the announcements and we hope you have a great show. >> Great thanks. >> Thank you for watching, we are theCUBE, live from Fortinet Accelerate 2018. I'm Lisa Martin with my co-host Peter Burris. Stick around, we'll be right back.
SUMMARY :
Brought to you by Fortinet. We're excited to be here. Welcome back to theCUBE. when you started off your Keynote. Premier League all the way. So you talked about some exciting announcements today. and apply these to our network overall. Chief Jon Bove, talk to us about. And we beat him Sunday In the past, you know maybe they sell a point product, You can only really do that if you build can we talk about what is a security product? I think in the past you know product management how does that influence the way you think You know one of the first things they're very worried about in terms of determining the outcome we need to have? and they got to make sure everything's secure. I think security has a major role to play and the ability long term is to say, I'm going to ask you a question related to that. I think tends to be a part of it, about that a little bit in the context of customers. The guy that steals slides from you in keynotes. I need that slide. that Fortinet protects 90% of the global S&P 100. we have a Forti SIM as well where you can that notion of the security architect, It has to be built day one that way. that said that this is going to be the year and that's the way they're building it out and we hope you have a great show. Thank you for watching, we are theCUBE,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
Peter Burris | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
John Maddison | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
10 years | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
six hours | QUANTITY | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Coca-cola | ORGANIZATION | 0.99+ |
one-year | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
Jon Bove | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
90% | QUANTITY | 0.99+ |
six-month | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Wikibon | ORGANIZATION | 0.99+ |
five-year | QUANTITY | 0.99+ |
iPhone | COMMERCIAL_ITEM | 0.99+ |
less than 60 seconds | QUANTITY | 0.99+ |
Sunday | DATE | 0.99+ |
one device | QUANTITY | 0.99+ |
42 vendors | QUANTITY | 0.99+ |
iPad | COMMERCIAL_ITEM | 0.99+ |
12 | QUANTITY | 0.99+ |
40 different security vendors | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
Ken Xie | PERSON | 0.99+ |
Arsenal | ORGANIZATION | 0.99+ |
around 100 thousand people | QUANTITY | 0.99+ |
three devices | QUANTITY | 0.99+ |
Two years ago | DATE | 0.99+ |
Las Vegas | LOCATION | 0.98+ |
over 300 customers | QUANTITY | 0.98+ |
20 | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
One | QUANTITY | 0.98+ |
InfoSec | ORGANIZATION | 0.98+ |
about 100 people | QUANTITY | 0.98+ |
10 | QUANTITY | 0.98+ |
four devices | QUANTITY | 0.98+ |
eight | QUANTITY | 0.98+ |
first step | QUANTITY | 0.98+ |
Manchester City Blue | ORGANIZATION | 0.98+ |
one user | QUANTITY | 0.98+ |
two products | QUANTITY | 0.97+ |
Manchester City | ORGANIZATION | 0.97+ |
Man City | ORGANIZATION | 0.97+ |
SiliconANGLE | ORGANIZATION | 0.97+ |
two minutes | QUANTITY | 0.97+ |
200 plus new services | QUANTITY | 0.96+ |
two things | QUANTITY | 0.96+ |
Premier League | EVENT | 0.94+ |
Accelerate 2018 | TITLE | 0.91+ |
this morning | DATE | 0.9+ |
one security vendor | QUANTITY | 0.9+ |
first outcomes | QUANTITY | 0.89+ |
2018 | DATE | 0.88+ |
day one | QUANTITY | 0.88+ |
first things | QUANTITY | 0.88+ |
level eight | OTHER | 0.88+ |
NSC | ORGANIZATION | 0.84+ |
level six | QUANTITY | 0.84+ |
theCUBE | ORGANIZATION | 0.84+ |
one side | QUANTITY | 0.82+ |
NCE | ORGANIZATION | 0.81+ |
America | ORGANIZATION | 0.81+ |
Jon Bove, Fortinet | Fortinet Accelerate 2018
>> Announcer: Live from Las Vegas, it's the Cube, covering Fortinet Accelerate 2018. Brought to you by Fortinet. >> Hi. Welcome back to Fortinet Accelerate 2018. I am Lisa Martin with the Cube. We're excited to be here for our second year. I'm joined by Peter Burris from the Cube as well. And we're very excited to be joined by our next guest, John Bove, the Vice President of America's channels at Fortinet. Welcome to the Cube. >> Thank you. Thank you for having us. >> So, it's exciting for us to be here. I, as a marketer, geek out on tag lines. >> Yup. >> So, I'd love for you to kind of tell our viewers, strength and numbers. >> Yup. >> As the title of event. What does that mean? >> Well, it's really about the depth and breadth of what Fortinet's doing in the marketplace. You know, bringing the security fabric, not only to our customers, but to enable our partner community, right. So, Accelerate is a collection and we have about, almost 3,000 attendees here, about 2,300 of those are our carrier partners, resell partners, manage security service providers, and also our fabric ready alliance partners, right. So, the security fabric has allowed us to incorporate, you know, some additional third party technologies, right. And it's really, we're creating a really strong culture around, you know, integration and openness. >> Before we get into the technology, let's talk about pivot on that culture for a second. >> Sure. >> 'Cause one of the things that, that was evident from the keynotes this morning that Kenzie talked about, which really, this long standing partner driven culture that Fortinet has. You've recently come back to Fortinet. >> I have. >> Tell us about being a boomerang. What excites you about coming back? But also, how has that culture of really being partner-focus and maybe partner-first evolve? >> Well, the channel first culture at Fortinet makes my job really easy, right. And the reason that I came back was here with the company for six years, we experienced a tremendous, you know, run of revenue. And to have the opportunity to lead the America's Channel Organization is a great privilege. But, it really comes from the culture within the company of being a channel leverage and a channel first company. I think, you know, in Patrice's keynote this morning, and in Ken's keynote as well, they really talked about the channel program, and the channel partners. You know, the partners are the fabric of what we do as an organization. You know, and we're doing the security fabric. Something that they can build a business around. >> Joe, as you think about what the type or the nature of the changes that are taking place in all business. Security business, and as we've heard today, the repitity with which changes happening in security world. That, I got to believe is putting a fair amount of stress on your partners because they have to come up to speed very, very rapidly on new things, even as they demonstrate that they can sustain operational excellence for all things. What is the role that education's playing? Culturating your partner's to a new network. Or a new approach doing these, how is that leading to a better set of capabilities for your customers? >> Sure. Well, I think the one change in this digital transformation era is change, right. We're seeing customers consume technologies much differently than they ever have before. And so our partners have to be in a situation to be able to deliver those technologies. We're seeing the threat landscape continue to widen and be very broad in nature. And so, existing postures and existing deployments are not necessarily going to be able to protect those customers and quite frankly, from a partner standpoint, the way that they look at their business, and build their business needs to be different today than it was due to the change that digital transformation is driving. >> So in terms of your, sort of, symbiosis with the channel, we talked with Phil Quade just a minute ago, we talked about, you know, how our seat is looking to him, to say how are you guys doing this at Fortinet in terms of security? Tell me about the symbiotic relationship with your partners. What information are they bringing to you from the front lines from the customers? Whether it's education, fedsled, healthcare, that is helping to evolve Fortinet's technologies >> I mean, at the end of the day, security is a very noisy space right now, right. And we depend upon our partners, not only to ensure our programs and how we go deliver, you know, value to them, but also, I mean what the customers are telling them, and what they're seeing in the marketplace today. We're really focused on service enablement and the service delivery because the transactional type of business that we've seen in the past is no longer the route to market for success for, you know, the broad base, you know channel organizations, right. So, you know, we have a responsibility as a company to ensure that our partners have the capabilities to deliver services in ways that customers want it, you know, consume. You know, IOT is a marketplace that's been created, right. OT is opportunistic for the bad actors, right. The move to, of workloads, to public clouds and data based applications, and the fabric is really resonating with those partners in terms of being able to meet those customers changing needs. >> And you guys have had a, do a partner advisory council. >> We do. >> How long has that been going on? And what are some of the things that excite you about it? >> Yeah, so. Over 10 years we've had a partner advisory council. And it's, you know, it's industry leaders that are business owners and business drivers that, you know, really kind of keep us honest about what we're doing internally. They have access to our executive staff. They have access to, you know, product roadmaps as well. And you know, with the creation of the fabric, and what we're doing with our alliance partnerships, you know, they're kind of helping fill some of those holes as to, you know, what we're seeing in the marketplace today. You know, I think today we announced 11 additional fabric alliance partners. You know, today, organizations like Fanta for orchestration and automation, right. Integration is truly the new best breed. But the ability to react when things occur, and to orchestrate and to automate those controls are really important. And the company's done a great job, and we attribute a lot of that guidance to our partner advisory council. >> As Fortinet grows and expands its footprint, which in place new types of arrangements, like the CTA and other types of things, it's ecosystem continues to expand, in a way that Fortinet is moving towards the center. More of a focus, at least a low side >> Right. >> within the ecosystem. What does that mean from your ability to get partners, to influence partner behavior and customers, and get more pull through out of the entire ecosystem? How is that going to shape the way Fortinet competes in a way Fortinet serves its customers over the next few years? >> I think, simply put, you know, the tailwinds we have behind us. You know, we're on the precipice of two billion dollars in revenue. You know, we've got now line of sight to three and four here pretty quickly. We definitely think that the fabric is going to allow us to continue to scale and grow. You know, through that partner community. But quite frankly, I am amazed just in my time here, you know, how partners have embraced and really wrapped a business practice, in a service is first business practice, you know around that fabric. So, we're really excited about the opportunity that we have at hand. I think the fabric is going to continue to, you know, change the game, right. It's not about, you know, products. It's about delivering an integrated solution. >> Speaking of the fabric. I was kind of thinking of pivoting on what you were saying Peter, about differentiation. When partners have choices of companies to work with, you guys have been in this place for a really long time. >> We have, yup. >> But, besides the fabric, what are some of, maybe the other top two differentiators where a partner may be coming into the program that's, I get it, for with this partnership with Fortinet, we can go and really revolutionize customers in any industry >> You know, we're really unique in the market because we serve from the S&B to the mid-market, to the enterprise and some of the largest service provider brands. And that affords our partner community to be extremely diverse, and we want to be very easy to work with. So I think more than anything, my goal is to be simple and predictable in nature, and ensure that we're driving a very margin rich solution. You know, a lot of companies in the market will be enterprise focused or mid-market focused, and so, you know, we're really keen on establishing clear routes to market with our partner community. Aligning and investing where they fit. And then taking advantage of some of, even the vertical opportunities that the partners present based on those capabilities. >> I was, we were chatting a little bit earlier about education and that was one of the things I was reading, that, in some articles, that some of your guys did. And it's been awhile since I've been in college, and it just, it's so remarkable how, you know, smart classrooms, and it's BYOD, and how vulnerable school districts are for, obvious reasons we won't go into, for political reasons. But, even from a security perspective, I'm curious if there's any kind of, maybe, favorite example that you have of a partner, customer, through the channel in education that has really been able to facilitate a digital business transformation with the under pending of security, security transformation. >> I actually was just in a partner meeting, and we were talking about that very topic. And they had established with a, one of the top five largest school districts in the United States. A, you know, a fully deployed wireless mesh network. That they, once that was deployed, then they really were able to underpin it with, you know, the fortigate, fortios, and really be able to deliver the security posture back through that wireless infrastructure. You know, you make a really good point. We're seeing more and more internet connected devices. A lot of those internet connected devices are very low end in terms of their overall price point. And so these organizations, they're not necessarily pushing out vulnerabilities to it. And in patches in remediation. And that's why IOT security is so important in that kind of K through 12 example, right. Leveraging fortios, connecting to both land and wireless land capabilities, and it really, that's a great use case of how the fabric can impact a customer. >> So as you imagine the world of partnership in a play in the future, will they be more purveyors of hardware, purveyors of software, purveyors of services? How do you think the ecosystem's going to evolve as Fortinet expands it's footprint? >> Sure. That's a really good question. And quite frankly, I spend a lot of my time thinking about that. I feel, I truly feel like we have an obligation and a responsibility to help our partners through this digital transformation into where we think things are going to go. Things are moving towards security as a service. Things are moving towards, you know, on demand, you know, pay as you go, consumption modeling, right. And we have to put our partners in a situation to be able to deliver some goods and services to our customer based the way they want to buy, and make sure that they're driving value after the transaction. Because, you know, selling to the transaction is probably going to be a dying, you know, breed. It's really important that partners have the capabilities to install, deploy and support on the ongoing basis, in which is really becoming a best practice in the security space. >> And one of the other things about digital business is that historically businesses have been aligned by the arrangement of their assets so you can look at a transportation company and say, oh, that company is transportation assets, or financial services company and say, oh, that company is financial services assets. But digital business starts changing that. Because when you bring programmability and digital orientation to a lot of these assets, you reduce the specificity of those assets which increases mobility across businesses. >> That's right. >> How do you think the opportunity of helping partners transform in this business way is going to increase the noise or complexity or the interconnectedness and the potential conflicts within partners, as they go after? As their expertise, and their relationships becomes more fungible. >> That's a, I mean, that's really good point. We deal and we want to ensure that we've got a programmatic way to handle, you know, channel conflicts. Right, I mean at the end of the day. Partner brings us >> But also channel opportunity >> And channel opportunity, that's right. You know, so it's really about being consistent in how you treat, you know, the partner community and having really set rules. But, you know, digital transformation, if anything else, the thing that makes Fortinet so unique, is we are an engineering company. Security is very complicated. And the good news is that the heart of what we do is technology. The feedback we continue to get from our partners is that our technology is second to none. So we win on the technology side. And now with the momentum that we're seeing with the, you know, the fabric or the alliance programs, the momentum that we're seeing in the marketplace, and really kind of being prepared for this shift of technology by introducing the fabric concept. You know, we're really excited about the opportunity for our partners and the role they're going to play in the coming years. >> So as we kind of, you know, wrap things up here. I'll go back to where we started off with John and talking about the strength and numbers. And some things that I wrote down that I think Patrice shared this morning. Nearly 18,000 new customers acquired in 2017. >> That's right. >> What are your, as the channel chief. What are your hopes and dreams for what that number will look like at the end, by the end of 2018? >> You know, at the end of the day, I want to be able to drive and enable to channel organization to go take advantage of the tailwinds in the market, right. We want to go, continue to drive market share in the S&B, that's going to be partner-led. We want to go expand in the fabric, you know, within the mid-market. And we want to be very opportunistic in the enterprise, to go knock down some of the largest logos. You know, I'm mostly, the opportunity we have in the U.S. alone is really quite significant. And we're really excited to see, you know, as, you know, we just exceed the half a billion dollar mark in Q4 for the first time as a company, and so as we start, you know, planning in future quarters. It's really exciting to be a part of the momentum we have here at Fortinet. >> And I think the momentum is tangible. You can feel it here. You can hear it behind us in the expo. So >> It's quite exciting. >> We thank you so much John for stopping by to keep sharing >> Thank you. Thanks for having us. >> Absolutely. Sharing your insights and how the, I'm feeling another tagline with the fabric of our lives, but I think somebody else beat you guys to it. Cotton maybe? Anyway, thanks so much John for sharing what's going on in the channel and we wish you a great show. >> Thank you. Thank you very much. >> And for my co-host, Peter Burris, I'm Lisa Martin. You've been watching the Cube live from Fortinet Accelerate 2018. Stick around, we'll be right back. (light techno music)
SUMMARY :
Brought to you by Fortinet. from the Cube as well. Thank you for having us. So, it's exciting for us to be here. So, I'd love for you to As the title of event. You know, bringing the security fabric, let's talk about pivot on that culture for 'Cause one of the things What excites you about coming back? And the reason that I came back was of the changes that are and build their business needs to What information are they bringing to you the route to market for success And you guys have had But the ability to like the CTA and other types of things, How is that going to shape the fabric is going to allow Speaking of the fabric. You know, a lot of companies in the market of the things I was reading, and really be able to deliver in the security space. And one of the other and the potential Right, I mean at the end of the day. And the good news is that and talking about the end, by the end of 2018? and so as we start, you know, And I think the momentum is tangible. Thanks for having us. and we wish you a great show. Thank you very much. And for my co-host, Peter Burris,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
John Bove | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Jon Bove | PERSON | 0.99+ |
Patrice | PERSON | 0.99+ |
2017 | DATE | 0.99+ |
six years | QUANTITY | 0.99+ |
Phil Quade | PERSON | 0.99+ |
Fanta | ORGANIZATION | 0.99+ |
Kenzie | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
today | DATE | 0.99+ |
two billion dollars | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
second year | QUANTITY | 0.99+ |
Joe | PERSON | 0.99+ |
United States | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
U.S. | LOCATION | 0.99+ |
second | QUANTITY | 0.98+ |
four | QUANTITY | 0.98+ |
three | QUANTITY | 0.98+ |
end of 2018 | DATE | 0.98+ |
Peter | PERSON | 0.98+ |
America | ORGANIZATION | 0.98+ |
first time | QUANTITY | 0.97+ |
S&B | ORGANIZATION | 0.97+ |
about 2,300 | QUANTITY | 0.97+ |
Accelerate | ORGANIZATION | 0.96+ |
both | QUANTITY | 0.95+ |
almost 3,000 attendees | QUANTITY | 0.95+ |
a minute ago | DATE | 0.95+ |
Over 10 years | QUANTITY | 0.95+ |
Nearly 18,000 new customers | QUANTITY | 0.94+ |
half a billion dollar | QUANTITY | 0.93+ |
first company | QUANTITY | 0.92+ |
this morning | DATE | 0.92+ |
Q4 | DATE | 0.91+ |
11 additional fabric alliance partners | QUANTITY | 0.9+ |
Channel Organization | ORGANIZATION | 0.89+ |
Cube | ORGANIZATION | 0.88+ |
first business practice | QUANTITY | 0.88+ |
first | QUANTITY | 0.88+ |
2018 | DATE | 0.87+ |
five largest school districts | QUANTITY | 0.87+ |
first culture | QUANTITY | 0.85+ |
12 example | QUANTITY | 0.82+ |
two differentiators | QUANTITY | 0.79+ |
morning | DATE | 0.77+ |
about | QUANTITY | 0.76+ |
years | DATE | 0.68+ |
Accelerate 2018 | COMMERCIAL_ITEM | 0.62+ |
Fortinet Accelerate | ORGANIZATION | 0.61+ |
America | LOCATION | 0.55+ |
Fortinet Accelerate 2018 | TITLE | 0.45+ |
Accelerate 2018 | EVENT | 0.39+ |
Cube | COMMERCIAL_ITEM | 0.28+ |
Phil Quade, Fortinet | Fortinet Accelerate 2018
(computerized music) >> Announcer: Live from Las Vegas, it's theCUBE. Covering Fortinet Accelerate 18. Brought to you by Fortinet. (computerized music) >> Hi, welcome back to Fortinet Accelerate 2018. I'm Lisa Martin with theCUBE. Excited to be back here for our second year. I'm joined by my esteemed cohost Peter Burris. Peter and I are excited to be joined by the chief information security officer of Fortinet, Phil Quade. Phil, welcome back to theCUBE >> Thanks of having me today. >> Great to have you here. So you had this interesting keynote this morning talking about cyber security fundamentals in the age of digital transformation. So we'll kind of peel apart that. But, something that I'm really curious about is, as a CISO, you are probably looked at as a trusted advisor to your peers, at Fortinet customers, at perspective customers. Tell us about, as we're in this evolution of security that Kenzie talked about, what are some of the things that you're hearing? What are they looking to you to help them understand and help from strategic perspective to enable in their environments? >> I often hear people say, "I recognize that my security's inadequate, what can I do about it?" Or, "I think my security's good enough, but I'm not evolving commensurably with the risk." And they say, "What do I do about that? How do I get to a better spot?" And I typically talk about them modernizing their strategy, and then based on their modernized strategy, that leads to specific technical solutions. And I'll have to talk to you more about what some of those might be. >> Yeah, on the strategy side of things, I find that very interesting. Peter and I were talking with Kenzie earlier, and with the 20 to 30 different security solutions that an organization has in place today that are disparate, not connected, where does the strategy discussion start? >> Well it starts to me with, I say, the adversary's comin at you at speed and scale, so how do you address the problems of speed and scale? It's through automation and integration. And fortunately, I believe in that strategy, but it plays directly into Fortinet's strengths, right? We have speed baked into our solution set. We have speed at the edge for our custom ASICs. And we're fundamentally are an integrated company where our products are designed to work together as a team because what you want to do strategy wise, is you want to, I think, you want to defend at your place of strength. And at a time and place of strength as opposed if your adversaries, where he's probing at your weak point. So, that's this integration thing's not only strategic, but it's essential to address the problems with speed and scale. >> So, Phil, technology's being applied to a lot of IT and other business disciplines. So, for example, when I was seeing machine learning, and related types of technologies actually being applied to improve programmer productivity through what we call augmented programming. And that may open the aperture on the number of people that actually can participate in the process of creating digital value. But it still requires a developer mindset. You still have to approach your problem from a developer perspective. What is the security mindset? That as security technology becomes more automated, that more people can participate, more people can be cognizant of the challenges. What is that constant security mindset that has to be sustained in an enterprise to continue to drive better and superior security. >> Got it. I think that some companies get too hyped about artificial intelligence, and I think it's important to remember that you need to use computer science to get to science fiction. So, a very disciplined way you need to say, well in order to achieve high degrees of automation, or perhaps machine learning, or artificial intelligence, what are the building blocks of that? Well, the building blocks are speed, because if you have a decision that's too late, who cares. Integration. If you have a decision that can't be communicated effectively, who cares. And then, of course, access to all the right types of data. In order to get smart to do machine learning, you need access to lots of different data sources, so you need to have lots of disparate centers sending in data for you to analyze. Back in my old job, we used to do some centralized processing, say back in the data center. We would precompute a result, we'd push that precomputed result back to the edge, and then you would do that last bit of analysis right at the point of need. And I think, again, the Fortinet architecture supports that in that we have a back end called Fortiguard Labs, if you know what that is. It does deep analysis and research, pushes their results forward, then we use speed at the edge inside customer premises to sort of compute, I'm mixing metaphors, but do the last mile of computing. So I think it's, back to your question, what's the mentality? It's about leveraging technology to our advantage, rather than people being the slaves of machines, we need to have machines serving more man. And we need computer science to do that, rather than, like I say, creating busy work for humans. >> Peter: Got it. >> You talked about speed and scale a minute ago. And as we look at, I'm curious of your perspective as the CISO, how do you get that balance between enabling digital business transformation, which is essential for growth, profitability, competition, and managing, or really balancing that with security risk management. So, if a business can't evolve digitally at speed and scale, and apply security protocols at every point they need to, is digital transformation meaningless? How do they get that-- >> Great question. Cause you don't want to feel like it's going to be a haves and have nots. The good news is that, for example, for those who seek to move to the cloud for whatever reason, convenience or agility or business efficiencies, you don't have to go all cloud or no cloud, right. And the security solutions of Fortinet allows you to do each. You can have some cloud, some non-cloud, and get them both to work together simultaneously under what we call a single pane of glass. So, as a user, you don't care if your firewall is a physical appliance or a virtual one, you want to establish a security policy and have that pushed out no matter what your firewall looks like. So to answer your question, I think that hybrid solutions are the way to go, and we need to let people know that it's not an all or nothing solution. >> That visibility that you kind of mentioned seems to have been kind of a bane of security folk's existence before. How do we get that broad visibility? >> Yeah, I think right, it's visibility and complexity I'd say are the bane of cyber security, right? Visibility, what you can't see, you can't defend against, and complexity is the enemy of security, right? So we need to address the problems. You asked me what CISOs say. We have to reduce complexity, and we have to improve visibility. And again, I think Fortinet's well postured to offer those types of solutions. >> So as you increase, we talk about the edge, you mentioned the edge. As more processing power goes to the edge, and more data's being collected, and more data's being acted upon at the edge, often independent of any essential resource, the threat of exposure goes up. Cause you're putting more processing power, or more data out there. How is securing the edge going to be different than securing other resources within the enterprise? >> Well encryptions will remain a part, right. Encryption to create confidentiality between the two computing entities is always a part. And then of course encryption can be used to authenticate local processes at the edge. So even though encryption might not be perceived as the silver bullet that it used to be, in the age of pending quantum computing, I can talk more about that in a second. In fact encryption is a fantastic tool for creating trust among entities and within an entity. So I think the applications of smart, strong encryption among and within the entities can create that web of trust we're talking to. If I could just briefly go back to quantum computing, right. So most commercial entities today, or most think tanks think that a quantum computer, a usable one, will be invented within 15ish or so years or so. Fortinet is actually already implementing quantum resistant cryptography in our products. >> Peter: Quantum what? >> It's called quantum resistant cryptography. And a quantum computer-- >> I understand. >> Will be able to break asymmetric encryption, so we're making sure we're implementing the algorithms today to future-proof our products against a future quantum computer. >> That's a major statement. Cause as you said, we're probably not looking at a more broad base utilization of quantum computing for many many many many years. And we'll know when they're being used by bad guys. We'll know who has one. How fast is that going to become a real issue. I mean as people think about it. >> The problem is that private sector doesn't know what the bad guy countries, when they will indeed have a computer, so Fortinet is being forward leaning, making sure we're starting to get familiar with the technology now. And also encryption's the type of thing that sometimes it requires special hardware requirements, special power-- >> Peter: Quantum computing does. >> No. Any encryption technology. The more computation you have to do, sometimes it might require more memory, or a faster processor. Well that takes months, if not years, if you're putting that into a custom chip. So we're planning and doing these things now, so we can make sure that we're ready, and aren't surprised by the actual compute power that's required of quantum resistant cryptography, or, and of course, aren't surprised when an adversary does in fact have one. >> Peter: Interesting. >> Good stuff. >> One of the things that you're doing later today is a panel, right? Between IT and OT folks. And I wanted to explore with you some of the evolution in the risks on the operational technology side. Tell us a little bit about what that panel today is going to discuss and maybe and example of, Triton for example, and how these types of attacks are now very prevalent from a physical stand point. >> Favorite topic of mine. Thanks for bringing it up. So one of the first things I'll do is I'll make the distinction between OT, operational technology, and IOT. So what I'll say is operational technology's designed primarily to work to protect the safety and reliability of physical processes and things. Things that move electricity, move oil and gas inside industrial automation plants. So operational technology. And then I'll talk a little bit more about IOT, the internet of things, which are primarily, and I'm cartooning a little bit, more about enabling consumer friendly things to happen. To increase the friendliness, the convenience, of our everyday lives. And so, once I make that distinction, I'll talk about the security solutions that are different between those. So, the OT community has done just fine for years, thank you very much, without the IT folks coming in saying I'll save your day. But that's because they've had the luxury of relying on the air gap. But unfortunately-- Meaning to attack an OT system you had to physically touch it. But unfortunately the air gap is dead or dying in the OT space as well. So we need to bring in new strategies and technologies to help secure OT. The IT side, that's a different story, because IOT is fundamentally lightweight, inexpensive devices without security built in. So we're not as a community going to automatically be able to secure IOT. What we're going to need to do is implement a strategy we call earned trust. So a two part strategy. Number one, rather than pretend we're going to be able to secure the IOT devices at the device level, that are currently unsecurable, we're going to move security to a different part of the architecture. Cause remember I talked about that's what you can do with security fabric, if you do defense as a team, you want to defend at the time and place you're choosing. So with IOT, we'll move the defense to a different part of the architecture. And what we'll implement is a strategy we call earned trust. We'll assign a level of trust to the IOT appliances, and then evaluate how they actually behave. And if they do in fact behave over time according to their advertised type of trust, we'll allow more, or in some cases, less access. So that's our IOT solution. And both of them are really important to the community, but they're very different IOT and OT. But unfortunately they share two letters and people are mixing them up to much. >> But at the same time, as you said, the air gap's going away, but also we're seeing an increasing number of the protocols and the technologies and other types of things start to populate into the OT world. So is there going to be a-- There's likely to be some type of convergence, some type of flattening of some of those devices, but it would be nice to see some of those as you said, hardened, disciplined, deep understanding of what it means to do OT security also start to influence the way IT thinks about security as well. >> Love it. Great point. Not only can the OT folks perhaps borrow some strategies and technologies from the IT folks, but the opposite's true as well. Because on the OT side, I know you're making this point, they've been securing their industrial internet of things for decades, and doing just fine. And so there's plenty that each community can learn from each other. You brought up a recent type of malware effecting OT systems Triton or Trisis. And the memory brings me back to about nine years ago, you might be familiar there was just a catastrophic incident in Russia at their-- It was a failure of operational technology. Specifically it was the largest electricity generation, hydroelectric plant, ninth biggest in the whole world, they took it offline to do some maintenance, loaded some parameters that were out of range, cause vibration in the machinery, and next thing you know, a major cover flew off, a 900 ton motor came off its bearings, water flooded the engine compartment, and it caused a catastrophic explosion. With I think, I'll just say, well over 50 people dying and billions of dollars of economic loss. So, what I'm trying to say is not, you know, get excited over a catastrophe, but to say that the intersection between physical and cyber is happening. There's not just the stuff of spy novels anymore. Countries have demonstrated the will and the ability to attack physical infrastructures with cyber capabilities. But back to Triton and Trisis. This is just a couple months ago. That sort of rocked the operational community because it was a very sophisticated piece of malware. And not only could it affect what are called control systems, but the safety systems themselves. And that is considered the untouchable part of operational technologies. You never want to affect the safety system. So the time is here. The opportunity and need is here for us to do a better job as a community to protecting the OT systems. >> So the speed, the scale, all the other things that you mentioned, suggests that we're moving beyond, and Kenzie has talked about this as well, the third generation of security. That we're moving beyond just securing a perimeter and securing a piece of hardware. We're now thinking about a boundary that has to be porous, where sharing is fundamentally the good that is being provided. How is a CISO thinking differently about the arrangement of hardware, virtuals, services, virtual capabilities, and, in fact, intellectual property services, to help businesses sustain their profile? >> I think you're spot on. The boundary as we know it is dead. You know, dying, if not dead. Right so, the new strategy is doing agile segmentation, both at the macro level and the micro level. And because you might want to form a coalition today that might break apart tomorrow, and that's why you need this agile segmentation. Back you your point about having some stuff in the cloud and some stuff perhaps in your own data center. Again, we don't want to make people choose between those two things. We need to create a virtual security perimeter around the data, whether part of it's existing in the data center or part of it exists in the cloud. And that again gets back to that strategy of agile segmentation at both macro and micro levels. And of course we need to do that with great simplicity so we don't overwhelm the managers of these systems with complexity that causes the human brain to fail on us. I'll often times say it's not the hardware or the software that fails us, it's the wetware. It's the brain that we have that we get overwhelmed by complexity and it causes us to do silly or sloppy things. >> So let me build on that thought one second, and come back to the role that you play within Fortinet, but also the CISO is starting to evolve into. As a guy who used to run not a big business, but a publicly traded company, I learned that when you wanted to go into a partnership with another firm, you got a whole bunch of lawyers involved, you spent a long time negotiating it, you set the parameters in place, and then you had a set of operating models with people that made sure that the partnership worked together. When we're talking about digital, we're talking about that partnership happening at much faster speeds, potentially much greater scale, and the issue of securing that partnership is not just making sure that the people are doing the right things, but the actual systems are doing the right things. Talk about the evolving role of the CISO as a manager of digital partnerships. >> I think you're right, it used to be the case where if you're entering a partnership, you're partner might say tell me a little bit more about how you secure your systems. And that company might say that's none of your business, thank you very much. But today, for the reasons you so well said, your risk is my risk. As soon as we start operating collaboratively, that risk becomes a shared situation. So, in fact, it becomes a responsibility of the CISOs to make sure the risks are appropriately understood and co-managed. Don't get me wrong, each company still needs to manage their own risk. But once you start richly collaborating, you have to make sure that your interfacing doesn't create new risks. So it used to be the day that only a couple of people in a company could say no. Of course the CEO, maybe the general council, maybe the CFO. But increasingly the CISO can say no too, because the exposure to a company is just too broad to take risks that you can't understand. >> And it's not a financial problem. It's not a legal problem. It's an operational problem >> That's right. That's right. And so the good news that CISOs I think are stepping up to the plate for that. The CISOs of today are not the CISOs of five, seven years ago. They're not insecure folks fighting for their posture C suite. They are valued members to the C suite. >> I wish we had more time guys, cause I would love to dig into that shared responsibility conversation. We've got to wrap up. Phil, thank you so much for stopping by theCUBE again, and sharing your insights on the strategic side, not only the evolution of Fortinet and security, but also the evolution that you guys are leading in at 2018 with your partners. We wish you a great time at the event, and we think you're having us back. >> Thanks for having me very much. I enjoyed talking to you both. >> And for my cohost Peter Burris, I'm Lisa Martin. We are live on theCUBE at Fortinet Accelerate 2018. Stick around and we'll be right back. (computerized music)
SUMMARY :
Brought to you by Fortinet. Peter and I are excited to be joined Great to have you here. And I'll have to talk to you more about Yeah, on the strategy side of things, We have speed at the edge And that may open the aperture to remember that you need as the CISO, how do you And the security solutions of Fortinet seems to have been kind of a bane and complexity is the How is securing the edge in the age of pending quantum computing, And a quantum computer-- the algorithms today to Cause as you said, we're the type of thing that the actual compute power One of the things that So one of the first things I'll do is But at the same time, as you said, And the memory brings me all the other things that you mentioned, the human brain to fail on us. just making sure that the people because the exposure to a And it's not a financial problem. And so the good news but also the evolution that you guys I enjoyed talking to you both. And for my cohost Peter
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
20 | QUANTITY | 0.99+ |
Phil Quade | PERSON | 0.99+ |
Phil | PERSON | 0.99+ |
Russia | LOCATION | 0.99+ |
2018 | DATE | 0.99+ |
one second | QUANTITY | 0.99+ |
two letters | QUANTITY | 0.99+ |
Kenzie | PERSON | 0.99+ |
900 ton | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
two part | QUANTITY | 0.99+ |
second year | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Fortiguard Labs | ORGANIZATION | 0.99+ |
tomorrow | DATE | 0.99+ |
two things | QUANTITY | 0.99+ |
each company | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
third generation | QUANTITY | 0.98+ |
Triton | PERSON | 0.97+ |
one | QUANTITY | 0.97+ |
each | QUANTITY | 0.97+ |
two computing entities | QUANTITY | 0.96+ |
each community | QUANTITY | 0.96+ |
seven years ago | DATE | 0.95+ |
billions of dollars | QUANTITY | 0.94+ |
couple months ago | DATE | 0.94+ |
decades | QUANTITY | 0.94+ |
this morning | DATE | 0.94+ |
over 50 people | QUANTITY | 0.92+ |
single pane | QUANTITY | 0.91+ |
theCUBE | ORGANIZATION | 0.9+ |
15ish | QUANTITY | 0.88+ |
Fortinet Accelerate 2018 | EVENT | 0.83+ |
Fortinet Accelerate | ORGANIZATION | 0.83+ |
later today | DATE | 0.82+ |
One | QUANTITY | 0.81+ |
30 different security solutions | QUANTITY | 0.8+ |
about nine years ago | DATE | 0.78+ |
ninth biggest | QUANTITY | 0.77+ |
a minute | DATE | 0.76+ |
first things | QUANTITY | 0.76+ |
second | QUANTITY | 0.72+ |
well | QUANTITY | 0.7+ |
agile | TITLE | 0.61+ |
years | QUANTITY | 0.61+ |
five | DATE | 0.58+ |
couple | QUANTITY | 0.5+ |
Triton | TITLE | 0.46+ |
Trisis | ORGANIZATION | 0.46+ |
Triton | LOCATION | 0.46+ |
18 | TITLE | 0.37+ |
Kickoff | Fortinet Accelerate 2018
>> Announcer: Live from Las Vegas, it's theCUBE, covering Fortinet Accelerate 18, brought to you by Fortinet. (upbeat techno music) >> Welcome to Fortinet 20... Welcome to Fortinet Accelerate 2018. I haven't had enough caffeine today. I'm Lisa Martin. I'm joined by my co-host, Peter Burris. Peter, it's theCUBE's second time here at Fortinet Accelerate. We were here last year. Great to be back with you. Some exciting stuff we have heard in the keynote this morning. Cyber security is one of those topics that I find so interesting, 'cause it's so transformative. It permeates every industry, everybody, and we heard some interesting things about what Fortinet is doing to continue their leadership in next generation security. Some of the themes that popped up really speak to the theme of this year's event, which is Strength in Numbers. Ken Xie, their CEO, shared some great, very strong numbers for them. 2017, they reached 1.8 billion in billing, which is a huge growth over the previous year. They acquired nearly 18,000 new customers in 2017, and another thing that I thought was very intriguing was that they protect 90% of the global S&P 100. They have over 330,000 customers, and they share great logos: Apple, Oracle, Coca Cola, et cetera. So, great trajectory that they're on. From a security perspective, digital transformation, security transformation, they have to play hand in hand. What are some of the things that you are seeing and that you're looking forward to hearing on today's show? >> Well, I always liked this show. This is the second year, as you said, that we've done this. One of the reasons I like it is because security is very complex, very hard, highly specialized, and Fortinet does a pretty darn good job of bringing it down to Earth and simplifying it so that people could actually imagine themselves becoming more secure, as a consequence of taking actions along the lines of what Fortinet's doing. So, there's clearly a strong relationship between the notion of digital business and the notion of digital security. The way we describe the difference between a business and digital business is that a digital business uses its data assets differently, and in many respects, it is through security concepts and constructs that you go about privatizing, or making unique, your data, so that it doesn't leave your network when you don't want it to, so it can't be subject to ransomware, so that it isn't compromised in some way by a bad actor. So there's a very, very strong relationship between how we think about digital assets and how we think about security, and what Fortinet's overall approach is is to say, "Look, let's not focus just on the device. "Let's look at the entire infrastructure "and what needs to happen to collect data, "to collect information, across the whole thing," what we call a broad approach as opposed to a deep approach. A broad approach to looking at the problem, with partnerships and working with customers in a differentiated way, so that we can help our clients very quickly recognize, attend, and make problems go away. >> One of the things, too, that is interesting is, you know, we hear so much talk at many other shows about digital transformation, DX, everyone's doing it. They're on some journey. There's now such amorphous environments with Multi-Cloud, IoT, opens the-- It spreads the attack surface. I thought they did a great job this morning of really articulating that very well. I'd love to hear your perspective, and we have some of their customers that are going to be talking to us today, but what is the mix of security transformation as a facilitator or an enabler of true digital business transformation? How do companies do that when, as we were talking earlier, companies, and even Ken said, Ken Xie, the CEO, that lot of companies have 20 to 30 different disparate security products in place that are pointed at different things that aren't integrated. How does a company kind of reconcile security transformation to-- as an enabler of digital business transformation? >> Yeah, and I think that's going to be one of the major themes we hear today, is the process that customers are, in 2018, going to have to accelerate. Does that ring a bell? (laughs) Accelerate... >> Lisa: That's genius. Somebody should use that. >> This journey (laughs)... Accelerate this journey... >> Yeah. >> To employing security and security-related technologies and services, much more effectively within their business. There's so many ways of answering that question, Lisa, but one of the-- Let's start with a simple one. That, increasingly, a company is providing its value proposition to its customer bases, whether they're small, residential, whether they're a consumer, or whether they're other businesses, through a digital mechanism, and that could be e-commerce, as pedestrian as e-commerce, or perhaps recommendation engines, or it could be increasingly digital services that are providing, effectively, a digital twin in the home, and, so, your security, your ability to provide those services and those capabilities that consumers want, if those fundamental, or those services are fundamentally insecure, then your brand, no matter how good the service is, your brand's going to take a hit. So, when you think about what Google's trying to do with Nest, if you think about, you know, in the home, a lot of the things that are going into the home, Amazon Alexa, there is an enormous amount of attention being paid to, is our platform, is our fabric a source of differentiation-- security fabric a source of differentiation in our business? Are we going to be able to look a consumer in the eye, or a B2B company in the eye, and say, "You'll be able to do things with us "that you can't do with others, "because of our security profile." And, increasingly, that's got to be the way that boards of directors and CEOs, and IT professionals need to think, "What can we do differently and better "than our competitors because of our security profile "and the security assets that we've invested in?" That's not the way a lot of people are thinking today. >> Why do you think that is? Because, I think you're spot on with providing security capabilities as a differentiator. There's a lot of competition, especially in the detection phase. Ken Xie talked about that this morning, and there's a lot of of coopetition that needs to happen to help companies with myriad disparate products, but why do you think that is that this security capability as a differentiator hasn't yet, kind of, boiled up to the surface? >> I think it's a number of reasons. Some good, some, obviously, not so good, but the main one is, is that, historically, when a CFO or anybody looked at the assets, they looked at tangible assets of the company, and data was, kind of, yeah, was out there, and it was, yeah, secure that data, but we were still more worried about securing the devices, because the devices were hard assets. We were worried about securing the server, securing the routers, securing, you know, whatever else, the repeaters, whatever else is in your organization, or securing your perimeters. Well, now, as data moves, because of mobile, and Ken told us, that 90% of the traffic now inside of a typical enterprise is through mobile, or through wireless types of mechanisms as opposed to wired, well, it means, ultimately, that the first step that every business has to take is to recognize data as an asset, and understanding what what we're really trying to secure is the role the data's playing in the business. How we're using it to engage customers, how we're using it to engage other businesses, how employees are using it, and very importantly, whether the security products themselves are sharing data in a way that makes all that better, and in a secure way, themselves, because the last thing you want is a vulnerability inside your security platform. >> Yes. >> So, the main reason is is that the industry, in most businesses, they talk a great game about digital business, but they haven't gotten down to that fundamental. It's about your data, and how you treat data as an asset, and how you institutionalize work around that data asset, and how you invest to improve the value, accrete value to that data asset over an extended period of time. >> Something that I'm interested in understanding, and we've got Phil Quade, their CSO, on, later today. >> Peter: Smart guy. >> How the role of the CSO has had to evolve, and I'd love to hear... And you asked a little bit about this earlier, the Fortinet on the Fortinet story. What are you doing, internally, to secure and provide security that all elements of your business need? Because I imagine a customer would want to understand, "Well, tell us how you're doing it. "If you're the leader in this, "in providing the products and the technologies, "are you doing this internally?" >> Well, I think, look, I think going back to what I was just talking about, and we had a great... We had a great conversation with Ken Xie that's going to show up in the broadcast today, it is... I think every technology executive increasingly needs to look at their potential customers, their peers, and their customers, and say, "Here's what I can do, as a consequence of using my stuff, "that you can't do, because you're not using my stuff." And Phil, Phil Quade, needs to look at other CSOs and say, "Here's what I can do "as a CSO, because I use Fortinet, "that you cannot do as a CSO, because you don't." Now, the role of the CSO is changing pretty dramatically, and there's a lot of reasons for that, but if we think about the number of individuals that, again, we go back to this notion of data as an asset and how we organize our work around that data. We're hearing about how the CIO's role is changing and how the chief digital officer's changing, or the chief data officer or the CSO. We've got a lot of folks that are kind of circling each other about what really and truly is the fundamental thing that we're trying to generate a return on. >> Lisa: Right. >> When I think about the job of a chief, the job of a chief is to take capital from the board, capital from the ownership, and create net new value, and whether it's a CIO doing that, or anybody. And, so, what Phil's job, or what the CSO's job is is to also find ways to show how investments in the business's security is going to create a differentiating advantage over time. Working with the chief digital officer, the chief data officers and others, but there's a lot of complexity in who does what, but at the end of the day, the CSO's job is to make sure that the data and access to the data is secure, and that the data and the ability to share the data supports the business. >> You mentioned the word "complexity" in the context of the CSO and some of the senior roles, where data is concerned. One of the things I'm interested to hear from some of our guests today, those at Fortinet, and we've got the CSO on we mentioned, and we've also got John Madison, their Senior Vice President of Products and Solutions. We've got their global strategist on security, Derek Manky, but we also have some customers. One from Tri-City, and another from Clark County School District, which is here in Vegas, and I'm curious to understand how they're dealing with complexity in their infrastructure. You know, we talked so much about, and they... have already started today, about Cloud, IoT, multi-cloud, mobile, as you talked about. As the infrastructure complexity increases, how does that change the role of the C-Suite to facilitate the right changes and the right evolution to manage that complexity in a secure way. So I'm very interested to hear how that internal complexity on the infrastructure side is being dealt with by the guys and the gals at the top who need to ensure that, to your point, their data and information assets are protected. We've got some great examples, I think, we're going to hear today, in three verticals in particular: education, healthcare, and financial services. And education really intrigued me because it's been a long time since I've been in college, but there's this massive evolution of smart classrooms, it's BYOD, right? And, there's so many vulnerabilities that are being brought into a school district, so I'd love to understand how do you protect data in that sense when you have so many devices that are connecting to an environment that just drives up complexity, and maybe opens... Perforates their perimeter even more. >> Well, I mean, you know, one of the... We're as a nation, we are living through a recent experience of some of the new tensions that a lot of the school districts are facing, and it could very well be, that voice or facial recognition or other types of things become more important, so I, look. Large or small, well-funded, not well-funded, young or old, consumer or business, all companies are going to have to understand and envision what their digital footprint's going to look like. And as they envision what that digital footprint, companies or institutions, as they envision what that digital footprint's going to look like and what they want to achieve with that digital footprint, they're going to have to make commensurate investments in security, because security used to be, as Ken said when he talked about the three stages, security used to be about perimeter. So, it was analogous to your building. You're either in your building or you're not in your building. You're in your network, or you're not in your network. But, today, your value proposition is how do you move data to somebody else? Today, your security profile is who is inside your building right now? Are they doing things that are good or bad? It's not a "I know everybody, I know where they are, "and I know what they're doing." We are entering into the world where digital business allows us to envision or to execute a multitude of more complex behaviors, and the security platform has to correspondingly evolve and adjust, and that is a hard problem. So, listening to how different classes of companies and different classes of institutions are dealing with this given different industries, different budgets, different levels of expertise, is one of the most important things happening in the technology industry right now. >> Yeah, it's that, how do you get balance between enabling what the business needs to be profitable and grow and compete, and managing the risk? >> And, how... and what is a proper level of investment? Do I have too many vendors, do I have not enough vendors? All those... all of those issues, it's increasing, we have to get-- We have to make our security capacity, our security capabilities, dramatically more productive. And that is going to be one of the major gates on how fast all of these technologies evolve. Can we introduce new AI? Can we introduce faster hardware? Can we introduce new ways of engaging? Can we bring biology and kind of that bio-to-silicon interface and start building things around that? Well, there's a lot of things that we can do, but if we can't secure it, we probably shouldn't do it. >> Lisa: Absolutely. >> So, a security profile is going to be one of the very natural and necessary, reasonable gates on how fast the industry evolves over the next 20-30 years. And that's going to have an enormous bearing and impact on how well we can solve some of the complex problems that we face. >> Well, I'm excited to co-host today with you, Peter. I think we're going to have some great, very informative conversations from some of Fortinet's leaders, to their customers, to their channel partners, and really get a great sense of the things that they're seeing in the field and how that's going to be applied internally to really have security be that enabler of true business transformation. >> Peter: Excellent. >> Alright. Well, stick around. I'm Lisa Martin. Let's hope I don't screw up the outro. Hosting with Peter all day. We're excited that you're joining us live from Fortinet Accelerate 2018. Stick around. We'll be right back. (upbeat techno music)
SUMMARY :
brought to you by Fortinet. Some of the themes that popped up and the notion of digital security. that are going to be talking to us today, the major themes we hear today, Lisa: That's genius. Accelerate this journey... a lot of the things that coopetition that needs to happen that the first step is is that the industry, and we've got Phil Quade, and the technologies, and how the chief digital and that the data and the and the right evolution to manage and the security platform And that is going to be So, a security profile is going to be and how that's going to We're excited that you're
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Ken Xie | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
Derek Manky | PERSON | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
Peter | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
20 | QUANTITY | 0.99+ |
2018 | DATE | 0.99+ |
2017 | DATE | 0.99+ |
Phil Quade | PERSON | 0.99+ |
Vegas | LOCATION | 0.99+ |
Phil | PERSON | 0.99+ |
Coca Cola | ORGANIZATION | 0.99+ |
90% | QUANTITY | 0.99+ |
John Madison | PERSON | 0.99+ |
Today | DATE | 0.99+ |
1.8 billion | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Earth | LOCATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
second time | QUANTITY | 0.99+ |
over 330,000 customers | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
first step | QUANTITY | 0.99+ |
One | QUANTITY | 0.98+ |
nearly 18,000 new customers | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
second year | QUANTITY | 0.97+ |
Fortinet Accelerate | ORGANIZATION | 0.97+ |
three stages | QUANTITY | 0.97+ |
this morning | DATE | 0.94+ |
Fortinet 20 | ORGANIZATION | 0.93+ |
Fortinet Accelerate | EVENT | 0.87+ |
later today | DATE | 0.87+ |
Nest | ORGANIZATION | 0.86+ |
theCUBE | ORGANIZATION | 0.85+ |
Alexa | TITLE | 0.82+ |
CSO | ORGANIZATION | 0.8+ |
three verticals | QUANTITY | 0.8+ |
this year | DATE | 0.77+ |
previous year | DATE | 0.77+ |
30 different | QUANTITY | 0.75+ |
Clark County School District | ORGANIZATION | 0.74+ |
those | QUANTITY | 0.74+ |
Tri-City | ORGANIZATION | 0.73+ |
S&P 100 | TITLE | 0.67+ |
DONOTPOSTKen Xie, Fortinet | Fortinet Accelerate 2018
>> (Narrator) Live from Las Vegas. It's theCUBE. Covering Fortinet Accelerate 18. Brought to you by Fortinet. >> Welcome to Fortinet Accelerate 2018. I'm Lisa Martin with theCUBE and we're excited to be here doing our second year of coverage of this longstanding event. My cohost for the day is Peter Burris; excited to be co-hosting with Peter again, and we're very excited to be joined by the CEO, Founder, and Chief Chairman of Fortinet, Ken Xie, Ken welcome back to theCUBE. >> Thank you, Lisa, thank you, Peter. Happy to be here. >> It's great to be here for us as well, and the title of your Keynote was Leading the Change in Security Transformation, but something as a marketer I geeked out on before that, was the tagline of the event, Strength in Numbers. You shared some fantastic numbers that I'm sure you're quite proud of. In 207, $1.8 in billing, huge growth in customer acquisitions 17.8 thousand new customers acquired in 2017 alone, and you also shared that Forinet protects around 90% of the Global S&P 100. Great brands and logos you shared Apple, Coca Cola, Oracle. Tell us a little bit more and kind of as an extension of your Keynote, this strength in numbers that you must be very proud of. >> Yeah, I'm an engineer background, always liked the number, and not only we become much bigger company, we actually has 25 to 30% global employment in a network security space. That give a huge customer base and last year sales grow 19% and we keeping leading the space with a new port out we just announced today. The FortiGate 6000 and also the FortiOS 6.0. So all this changing in the landscape and like I said last year we believe the space is in a transition now, they've got a new generation infrastructure security, so we want to lead again. We started the company 18 years ago to get into we called a UTM network firewall space. We feel infrastructure security is very important now. And that we want to lead in the transition and lead in the change. >> So growth was a big theme or is a big theme. Some of the things that we're also interesting is another theme of really this evolution, this landscape I think you and Peter will probably get into more the technology, but give our viewers a little bit of an extension of what you shared in your keynote about the evolution. These three generations of internet and network security. >> Yeah, when I first start my network security career the first company I was study at Stanford University, I was in the 20s. It was very exciting is that a space keeping changing and grow very fast, that makes me keeping have to learning everyday and that I like. And then we start a company call Net Screen when it was early 30s, that's my second company. We call the first generation network security which secured a connection into the trust company environment and the Net Screens a leader, later being sold for $4 billion. Then starting in 2000, we see the space changing. Basically you only secure the connection, no longer enough. Just like a today you only validate yourself go to travel with a ticket no longer enough, they need to see what you carry, what's the what's the luggage has, right. So that's where we call them in application and content security they call the UTM firewall, that's how Fortinet started. That's the second generation starting replacing the first generation. But compared to 18 years ago, since change it again and nowadays the data no longer stay inside company, they go to the mobile device, they go to the cloud, they call auditive application go to the IoT is everywhere. So that's where the security also need to be changed and follow the important data secure the whole infrastructure. That's why keeping talking from last year this year is really the infrastructure security that secure fabric the starting get very important and we want to lead in this space again like we did 18 years ago starting Fortinet. >> Ken, I'd like to tie that, what you just talked about, back to this notion of strength in numbers. Clearly the bad guys that would do a company harm are many and varied and sometimes they actually work together. There's danger in numbers Fortinet is trying to pull together utilizing advanced technologies, new ways of using data and AI and pattern recognition and a lot of other things to counter effect that. What does that say about the nature of the relationships that Fortinet is going to have to have with its customers going forward? How is that evolving, the idea of a deeper sharing? What do you think? >> Actually, the good guy also started working together now. We formed the they call it the Cyber Threat Alliance, the CTA, and Fortinet is one of the founding company with the five other company including Palo Alto Network, Check Point and McAfee and also feel a Cisco, there's a few other company all working together now. We also have, we call, the Fabric-Ready Program which has a 42 bigger partner including like IBM, Microsoft, Amazon, Google, all this bigger company because to defend the latest newest Fabric threat you have to be working together and that also protect the whole infrastructure. You also need a few company working together and it's a because on average every big enterprise they deploy 20 to 30 different products from different company. Management cost is number one, the highest cost in the big enterprise security space because you have to learn so many different products from so many different vendor, most of them competitor and now even working together, now communicate together. So that's where we want to change the landscape. We want to provide how infrastructure security can work better and not only partner together but also share the data, share the information, share the intelligence. >> So fundamentally there is the relationship is changing very dramatically as a way of countering the bad actors by having the good actors work more closely together and that drives a degree of collaboration coordination and a new sense of trust. But you also mentioned that the average enterprise is 20 to 30 fraud based security products. Every time you introduce a new product, you introduce some benefits you introduce some costs, potentially some new threat surfaces. How should enterprises think about what is too many, what is not enough when they start thinking about the partnerships that needed put together to sustain that secure profile? >> In order to have the best protection today you need to secure the whole infrastructure, the whole cyberspace. Network security still the biggest and also grow very fast and then there's the endpoint and there's a like a cloud security, there's a whole different application, email, web and all the other cloud all the other IoT. You really need to make sure all these different piece working together, communicate together and the best way is really, they have to have a single panel of our management service. They can look at them, they can make it integrate together they can automate together, because today's attack can happen within seconds when they get in the company network. It's very difficult for human to react on that. That's where how to integrate, how to automate, this different piece, that is so important. That's where the Fabric approach, the infrastructure approach get very important. Otherwise, you cannot react quick enough, in fact, to defend yourself in a current environment. On the other side for your question, how many vendor do you have, I feel the less the better. At least they have to work together. If they're not working together, will make it even more difficult to defend because each part they not communicate and not react and not automate will make the job very, very difficult and that's where all this working together and the less vendor they can all responsible for all your security it's better. So that's where we see some consolidation in the space. They do still have a lot of new company come up, like you mentioned, there's close to 2,000 separate security company. A lot of them try to address the point solution. I mentioned there's a four different level engineer after engineer work there because I see 90% company they do the detection. There's a certain application you can detect the intrusion and then the next level is where they after you attack what are going to do about it. Is it really the prevention setting kick in automatic pull out the bad actor. After that, then you need to go to the integration because there's so many different products, so many different piece you need to working together, that's the integration. Eventually the performance and cost. Because security on average still cost 100 times more expensive under same traffic and also much slower compared to the routing switch in networking device. That's what the performance cost. Also starting in the highest level, that's also very difficult to handle. >> So, we're just enough to start with the idea of data integration, secure data integration amongst the security platform, so enough to do as little as possible, as few as possible to do that, but enough to cover all the infrastructure. >> Yes, because the data is all a whole different structure. You no longer does have to trust environment. Because even inside the company, there's so many different way you can access to the outside, whether it by your mobile device so there's a multiple way you can connect on the internet and today in the enterprise 90% connection goes to Wi-Fi now it's not goes to a wired network, that's also difficult to manage. So that's where we will hide it together and make it all working together it's very important. >> So, in the spirit of collaboration, collaborating with vendors. When you're talking with enterprises that have this myriad security solutions in place now, how are they helping to guide and really impact Fortinet's technologies to help them succeed. What's that kind of customer collaboration like, I know you meet with a lot of customers, how are they helping to influence the leading security technologies you deliver? >> We always want to listen the customer. They have the highest priority, they gave us the best feedback. Like the presentation they talked about there's a case from Olerica which is where they have a lot of branch office and they want to use in the latest technology and networking technology. I see when I'm working together with security, that's ready the new trend and how to make sure they have all the availability, they have the flexibility software-defined networking there and also make sure to security also there to handle the customer data, that's all very important so that's what we work very closely with customer to response what they need. That's where I'm still very proud to be no longer kind of engineer anymore but will still try to build in an engineer technology company. Lesson to the customer react quick because to handle security space, cyber security, internet security, you have to be work quickly react for the change, on internet, on application. So that's where follow the customer and give them the quick best solution it's very very important. On the customer side in Anaemia we talked about that was talked a little bit about this morning with GDPR are is around the corner, May 2018. Do you see your work coordinates work with customers in Anaemia as potentially being, kind of, leading-edge to help customers in the Americas and Asia-Pacific be more prepared for different types of compliance regulations? >> We see the GDPR as an additional opportunity, as a additional complement solution compared to all the new product technology would come up. They definitely gave us an additional business rate, additional opportunity, to really help customer protect the data, make the data stay in their own environment and the same time, internet is a very global thing, and how to make sure different country, different region, working together is also very important. I think it's a GDPR is a great opportunity to keeping expanding a security space and make it safer for the consumer for the end-user. >> So Ken as CEO Fortinet or a CEO was tough act, but as CEO you have to be worried about the security of your business and as a security company you're as much attacked, if not more attacked than a lot of other people because getting to your stuff would allow folks to get to a lot of other stuff. How do you regard the Fortinet capabilities inside Fortinet capability as providing you a source of differentiation in the technology industry? >> Yeah we keep security in mind as the highest priority within a company. That's where we develop a lot of product, we also internally use tests first. You can see from endpoint, the network side, the email, to the web, to the Wi-Fi access, to the cloud, to the IoT, it's all developing internally, it tests internally so the infrastructure security actually give you multiple layer protection. No longer just have one single firewall, you pass the fire were all open up. It's really multiple layer, like a rather the ransomware or something they had to pass multiple layer protection in order to really reach the data there. So that's where we see the infrastructure security with all different products and developed together, engineer working together is very important. And we also have were strong engineer and also we call the IT security team lead by Phil Cauld, I think you are being interview him later and he has a great team and a great experience in NSA for about 30 years, secure country. And that's where we leverage the best people, the best technology to provide the best security. Not only the portal side, also our own the internal security in this space. >> So, in the last minute or so that we have here, one of the things that Patrice Perce your global sales leader said during his keynote this morning was that security transformation, this is the year for it. So, in a minute or so, kind of what are some of the things besides fueling security transformation for your customers do you see as priorities and an exciting futures this year for Fortinet, including you talked about IoT, that's a $9 billion opportunity. You mentioned the securing the connected car to a very cool car in there, what are some of the things that are exciting to you as the leader of this company in 2018? >> We host some basic technology, not another company has. Like a built in security for a single chip. I also mentioned like some other bigger company, like a Google started building a TPU for the cloud computing and Nvidia the GPU. So we actually saw this vision 18 years ago when we start a company and the combine the best hardware and best technology with solve for all this service together. So, long term you will see the huge benefit and that's also like translate into today you can see all these technology enable us to really provide a better service to the customer to the partner and we all starting benefit for all this investment right now. >> Well Ken, thank you so much for joining us back on theCUBE. It's our pleasure to be here at the 16th year of the event, our second time here. Thanks for sharing your insight and we're looking forward to a great show. >> Thank you, great questions, it's the best platform to really promoting the technology, promoting the infrastructure security, thank you very much. >> Likewise, we like to hear that. For my co-host Peter Burris, I'm Lisa Martin, we are coming to you from Fortinet Accelerate 2018. Thanks for watching, stick around we have great content coming up.
SUMMARY :
Brought to you by Fortinet. My cohost for the day is Peter Burris; Happy to be here. and the title of your Keynote was The FortiGate 6000 and also the FortiOS 6.0. Some of the things that we're also interesting they need to see what you carry, Ken, I'd like to tie that, what you just talked about, We formed the they call it the Cyber Threat Alliance, the bad actors by having the good actors and the best way is really, they have to have amongst the security platform, so enough to do Yes, because the data is all a whole different structure. the leading security technologies you deliver? They have the highest priority, they gave us and make it safer for the consumer for the end-user. a source of differentiation in the technology industry? the best technology to provide the best security. the things that are exciting to you as to the partner and we all starting benefit It's our pleasure to be here at the 16th year promoting the infrastructure security, thank you very much. we are coming to you from Fortinet Accelerate 2018.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IBM | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Peter Burris | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Peter | PERSON | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
Ken | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Patrice Perce | PERSON | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
McAfee | ORGANIZATION | 0.99+ |
20 | QUANTITY | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
2017 | DATE | 0.99+ |
Net Screen | ORGANIZATION | 0.99+ |
Ken Xie | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
May 2018 | DATE | 0.99+ |
Phil Cauld | PERSON | 0.99+ |
Coca Cola | ORGANIZATION | 0.99+ |
90% | QUANTITY | 0.99+ |
Palo Alto Network | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
25 | QUANTITY | 0.99+ |
Americas | LOCATION | 0.99+ |
$9 billion | QUANTITY | 0.99+ |
19% | QUANTITY | 0.99+ |
Check Point | ORGANIZATION | 0.99+ |
Nvidia | ORGANIZATION | 0.99+ |
100 times | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
$4 billion | QUANTITY | 0.99+ |
Net Screens | ORGANIZATION | 0.99+ |
second time | QUANTITY | 0.99+ |
2000 | DATE | 0.99+ |
CTA | ORGANIZATION | 0.99+ |
GDPR | TITLE | 0.99+ |
second year | QUANTITY | 0.99+ |
NSA | LOCATION | 0.99+ |
today | DATE | 0.99+ |
second company | QUANTITY | 0.99+ |
18 years ago | DATE | 0.99+ |
Anaemia | ORGANIZATION | 0.99+ |
about 30 years | QUANTITY | 0.99+ |
first generation | QUANTITY | 0.99+ |
Olerica | ORGANIZATION | 0.99+ |
Forinet | ORGANIZATION | 0.99+ |
second generation | QUANTITY | 0.99+ |
each part | QUANTITY | 0.98+ |
$1.8 | QUANTITY | 0.98+ |
207 | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
Cyber Threat Alliance | ORGANIZATION | 0.98+ |
16th year | QUANTITY | 0.98+ |
30% | QUANTITY | 0.97+ |
Stanford University | ORGANIZATION | 0.97+ |
FortiOS 6.0 | COMMERCIAL_ITEM | 0.97+ |
30 different products | QUANTITY | 0.97+ |
first | QUANTITY | 0.97+ |
FortiGate 6000 | COMMERCIAL_ITEM | 0.96+ |
around 90% | QUANTITY | 0.96+ |
early 30s | DATE | 0.96+ |
single chip | QUANTITY | 0.96+ |
this year | DATE | 0.95+ |