Image Title

Search Results for Fortinet ChampionshipSecurity Summit:

Breaking Analysis: Are Cyber Stocks Oversold or Still too Pricey?


 

>> From theCUBE Studios in Palo Alto in Boston, bringing you data driven insights from theCUBE and ETR. This is Breaking Analysis with Dave Vellante. >> Cybersecurity stocks have been sending mixed signals as of late, mostly negative like much of tech, but some such as Palo Alto Networks, despite a tough go of it recently have held up better than most tech names. Others like CrowdStrike, had been out performing Broader Tech in March, but then flipped in May. Okta's performance was pretty much tracking along with CrowdStrike for most of the past several months, a little bit below, but then the Okta hack changed the trajectory of that name. Zscaler has crossed the critical billion dollar ARR revenue milestone, and now sees a path to five billion dollars in revenue, but the company stock fell sharply after its last earnings report and has been on a down trend since last November. Meanwhile, CyberArk's recent beat and raise, was encouraging and the stock acted well after its last report. Security remains the number one initiative priority amongst IT organizations and the spending momentum for many high flying cyber names remain strong. So what gives in cyber security? Hello, and welcome to this week's Wikibon CUBE insights powered by ETR. In this breaking analysis, we focus on security and will update you on the latest data from ETR to try to make sense out of the market and read into what this all means in both the near and long term, for some of our favorite names in cyber. First, the news. There's always something happening in security news cycles. The big recent news is new President Rodrigo Chavez declared a national emergency in Costa Rica due to the preponderance of Russian cyber attacks on the country's critical infrastructure. Such measures are normally reserved for natural disasters like earthquakes, but this move speaks to the nature of today's cyber threats. Of no surprise is modern superpower warfare even for a depleted power like Russia almost certainly involves cyber warfare as we continue to see in Ukraine. Privately held Arctic Wolf Networks hired Dustin Williams as its new CFO. Williams has taken three companies to IPO, including Nutanix in 2016, a very successful IPO for that company. Whether AWN chooses to pull the trigger this year or will wait until markets are less choppy or obviously remains to be seen. But it's a pretty clear sign the company is headed to IPO at some point. Now, big point of discussion this week at Red Hat Summit in Boston and the prior week at Dell technologies world was security. In the case of Red Hat, securing the digital supply chain was the main theme. And from Dell building, many security features into its storage arrays and cyber resilience services into its as a service offering called Apex. And we're seeing a trend where buyers want to reduce the number of bespoke tools they use if they, in fact can. Here's IDC's Jim Mercer, sharing data from a recent survey they conducted on the topic. Play the clip. >> Interestingly, we did a survey, I think around last August or something. And one of the questions was around where do you want your security, right? Where do you want to get your DevSecOps security from? Do you want to get it from individual vendors, right? Or do you want to get it from like your platforms that you're using and deploying changes in Kubernetes? >> Great question. What did they say? >> The majority of them, they're hoping they can get it built into the platform. That's really what they want-- >> Now, whether that's actually achievable is debatable because you have so much innovation and investment going on from the likes of startups and for instance, lace work or sneak and security companies that you see even trying to build platforms, you've got CrowdStrike, Okta, Zscaler and many others, trying to build security platforms and put it all under their umbrella. Now the last point will hit here is there was a lot of buzz in the news about Okta. The reaction to what was a relatively benign hack was pretty severe and probably overblown, but Okta's stock is paying the price of what is generally considered a blown communications plan versus a technical failure. Remember, identity is not an easy thing to rip and replace and Okta remains a best-of-breed player and leader in the space. So we're going to look at some ETR data later in this segment to try and make sense of the recent action in the market and certain names. Speaking of which let's take a look at how some of the names in cybersecurity have fared relative to some of the indices and relative indicators that we like to look at. Here's a Google finance comparison for a number of stocks and names in the bottom there you can see we plot the hack ETF which tracks security stocks. This is a year to date view. And so we don't show it here but the tech heavy NASDAQ is off around 26% year to date whereas the cyber ETF that we're showing is down 18%, okay. So cyber holding up a little bit better than broader tech as we've reported earlier, was actually much better and still seems to be a gap there, but the data are mixed. You can see Okta is way off relative to its peers. That's a combination of the breach that we talked about but also the run up in the stock since COVID. CrowdStrike was actually faring better but broke this month, we'll see how it's upcoming earnings announcements are received when it announces on June 2nd after the close. Palo Alto in the light blue has done better than most and until recently was holding up quite well. And of course, Sailpoint is another identity specialist, it is kind of off the charts here because it's going private with the acquisition by Thoma Bravo at nearly seven billion dollars. So you see some mixed signals in cyber these past several months and weeks. And so we're trying to understand what that all means. So let's take a look at the survey data and see how spending momentum is holding up. As we've reported IT spending forecast, at the macro level, they've come off their 8% highs from the end of the year, the ETRS December survey, but robust tech spending is still there. It's expected at nearly seven percent and this is amongst 1200 ETR respondents. Here's a picture from the ETR survey of the cybersecurity landscape. That y-axis that's net score or a measure of spending momentum and that horizontal access is overlap. We used to talk about it as a market share which is a measure of pervasiveness in the data set. That dotted red line at 40% indicates an elevated spending momentum level on the vertical axis and we filter the names and limited to only those with a hundred or more responses in the ETR survey. Then the pictures still pretty crowded as you can see. You got lots of companies above the red dotted line, including Microsoft which is up into the right, they're so far off the chart, it's just amazing. But also Palo Alto and Okta, Auth0, which of course is now owned by Okta, Zscaler, CyberArk is making moves. Sailpoint and Cloudflare, they're all above that magic 40% line. Now, you look at Cisco, it shows a very large presence in the horizontal axis in the data set. And it's got pretty respectable momentum and you see Splunk doing okay, no before and tenable just below that 40% line and a lot of names in the very respectable 20% zone. And we've included some legacy names just for context that fall below the zero percent line with a negative net score. And that means a larger proportion, that negative net score means a larger proportion of their customers in the survey are spending less than those that are spending more. Now, typically for these legacy names you're going to have a huge proportion of customers who have flat spending that kind of fat middle and that's why they sort of don't have that highly elevated score, but they're still viable as they get the recurring revenue each year. But the bottom line is that spending remains robust for some of the top names that we've talked about earlier despite their rocky stock performance. Now, let's filter this data a bit more to make it a little bit easier to read. So to do that, we take out Microsoft because they're just so dominant and we cherry pick some names to make the data more consumable and scannable. The other data point we've added is Okta's net score breakdown, the multicolored rows there, that row in the bottom right. Net score, it measures the percent of customers that are adding the platform new, that's the lime green, at 18% for Okta. The forest green is at 42%. That's the percent of customers in the survey that are spending six percent or more. The gray is flat spending. That's 32% for Okta, this past survey. The pink is customers that are spending less, that's three percent. They're spending six percent or worse in the survey, so only three percent for Okta. And the bright red at three percent is decommissioning the platform. You subtract the reds from the greens and you get a net score, well, into the 50s for Okta and you can see. We highlight Okta here because it's a name that we've been following for quite some time and customers have given us really solid feedback on the technology and up until the hack, they're affinity to Okta, but that seems to be continuing. We'll talk more about that. This recent breach to Okta has caused us to take a closer look. And you may recall, we reported with our ETR colleague, Eric Bradley. The breach was announced right in the middle of ETR collecting data in the last survey. And while we did see a noticeable downtick right after the announcement, the exposure of the hack and Okta's net score just after the breach was disclosed, you can see the combination of Okta and Auth0 remains very strong. I asked Eric Bradley this morning what he thought about Okta, and he pointed out that you can't evaluate this company on its price to earnings ratio. But it's forward sales multiple is now below 7X. And while attractive, these high flyers at some point, Eric says, they got to start making a profit. So you going to hold that thought, we'll come back to that. Now, another cut of the ETR data to look at our four star security names here. A while back we developed a methodology to try and cut through the noise of the crowded security sector using the ETR data to evaluate two key metrics; net score and shared N. Net score again is, spending momentum, the latter is an indicator of presence in the data set which is a proxy for market presence. Okay, we assigned those companies that cracked the top 10 in both net score and shared N, we give them four stars, okay, if they make the top 10. This chart here shows the April survey data for those companies with an N that's greater than, equal to a hundred responses. So again, we're filtering on those with a hundred or more responses. The table on the left that you see there, that's sorted by net score, okay. So we're sorting by spending momentum. And then the one on the right is sorted by shared N, so their presence in the data set. Seven companies hit the top 10 for both categories; Palo Alto Network, Splunk, CrowdStrike Okta, Proofpoint, Fortinet and Zscaler. Now, remember, take a look, Okta excludes Auth0, in this little methodology that we came up with. Auth0 didn't make the cuts but it hits the top 10 for net score. So if you add in Auth0's 112 N there that you see on the right. You add that into Okta, we put Okta in the number two spot in the survey on the right most table with the shared N of 354. Only Cisco has a higher presence in the data set. And you can see Cisco in the left lands just below that red dotted line. That's the top 10 in security. So if we were to combine Okta and Auth0 as one, Cisco would make the cut and earn four stars. Now, some other notables are CyberArk, which is just below the red line on the right most chart with an impressive 177 shared N. Again, if you combine Auth0 and Okta, CyberArk makes the four star grade because it's in the top 10 for net score on the left. And Sailpoint is another notable with a net score above 50% and it's got a shared N of 122, which is respectable. So despite the market's choppy waters, we're seeing some positive signs in the survey data for some of the more prominent names that we've been following for the last couple of years. So what does this mean for the markets going forward? As always, when we see these confusing signs we like to reach out to the network and one of the sharpest traders out there is Chip Simonton. We've quoted him before and we like to share some of his insights. And so we're going to highlight some of that here. So technically, almost every good tech stock is oversold. And as such, he suggested we might see a bounce here. We certainly are seeing that on this Friday, the 13th. But the right call tactically has been to sell into the rally these past several months, so we'll see what happens on Monday. The key issue with the name like Okta and some other momentum names like CrowdStrike and Zscaler is that when money comes back into tech, it's likely going to go to the FAANG stocks, the Facebook, Apple, Amazon, Netflix, Google, and of course, you put Microsoft in there as well. And we'll see about Amazon, by the way, it's kind of out of favor right now, as everyone's focused on the retail side of the business meanwhile it's cloud business is booming and that's where all the profit is. We think that should be the real focus for Amazon. But the point is, for these momentum names in cybersecurity that don't make money, they face real headwinds, as growth is slowing overall and interest rates rise, that makes the net present value of these investments much less attractive. We've talked about that before. But longer term, we agree with Chip Simonton that these are excellent companies and they will weather the storm and we think they're going to lead their respective markets. And in cyber, we would expect continued M&A activity, which could act as a booster shot in the arms of these names. Now in 2019, we saw the ETR data, it pointed to CrowdStrike, Zscaler, Okta and others in the security space. Some of those names that really looked to us like they were moving forward and the pandemic just created a surge in these names and admittedly they got out over their skis. But the data suggests that these leading companies have continued momentum and the potential for stay in power. Unlike the SolarWinds hack, it seems at this point anyway that Okta will recover in the market. For the reasons that we cited, investors, they might stay away for some time but longer term, there's a shift in CSO security strategies that appear to be permanent. They're really valuing cloud-based modern platforms, these platforms will likely continue to gain share and carry their momentum forward. Okay, that's it for now, thanks to Stephanie Chan, who helps with the background research and with social, Kristen Martin and Cheryl Knight help get the word out and do some great work as well. Alex Morrison is on production and handles all of our podcast. Alex, thank you. And Rob Hof is our Editor in Chief at SiliconANGLE. Remember, all these episodes, they're available as podcast, you can pop in the headphones and listen, just search "Breaking Analysis Podcast." I publish each week on wikibon.com and SiliconANGLE.com. Don't forget to check out etr.ai, best in the business for real customer data. It's an awesome platform. You can reach me at dave.vellante@siliconangle.com or @dvellante. You can comment on our LinkedIn posts. This is Dave Vellante for the CUBEinsights powered by ETR. Thanks for watching. And we'll see you next time. (bright upbeat music)

Published Date : May 13 2022

SUMMARY :

in Palo Alto in Boston, and the prior week at Dell And one of the questions was around What did they say? it built into the platform. and a lot of names in the

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AmazonORGANIZATION

0.99+

Dustin WilliamsPERSON

0.99+

AppleORGANIZATION

0.99+

FacebookORGANIZATION

0.99+

NetflixORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

Jim MercerPERSON

0.99+

2016DATE

0.99+

OktaORGANIZATION

0.99+

Stephanie ChanPERSON

0.99+

Eric BradleyPERSON

0.99+

EricPERSON

0.99+

Rob HofPERSON

0.99+

MarchDATE

0.99+

Alex MorrisonPERSON

0.99+

Dave VellantePERSON

0.99+

Cheryl KnightPERSON

0.99+

2019DATE

0.99+

MayDATE

0.99+

NutanixORGANIZATION

0.99+

FortinetORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

AprilDATE

0.99+

June 2ndDATE

0.99+

Arctic Wolf NetworksORGANIZATION

0.99+

six percentQUANTITY

0.99+

SplunkORGANIZATION

0.99+

8%QUANTITY

0.99+

AWNORGANIZATION

0.99+

ZscalerORGANIZATION

0.99+

ProofpointORGANIZATION

0.99+

Kristen MartinPERSON

0.99+

MondayDATE

0.99+

CyberArkORGANIZATION

0.99+

UkraineLOCATION

0.99+

Palo Alto NetworkORGANIZATION

0.99+

Seven companiesQUANTITY

0.99+

WilliamsPERSON

0.99+

CrowdStrikeORGANIZATION

0.99+

Palo AltoLOCATION

0.99+

PresidentPERSON

0.99+

SailpointORGANIZATION

0.99+

20%QUANTITY

0.99+

AlexPERSON

0.99+

five billion dollarsQUANTITY

0.99+

50sQUANTITY

0.99+

32%QUANTITY

0.99+

ETRORGANIZATION

0.99+

dave.vellante@siliconangle.comOTHER

0.99+

40%QUANTITY

0.99+

last NovemberDATE

0.99+

42%QUANTITY

0.99+

three percentQUANTITY

0.99+

18%QUANTITY

0.99+

FirstQUANTITY

0.99+

zero percentQUANTITY

0.99+

Auth0ORGANIZATION

0.99+

bothQUANTITY

0.99+

DellORGANIZATION

0.99+

three companiesQUANTITY

0.99+

Costa RicaLOCATION

0.99+

Chip SimontonPERSON

0.99+

Merritt Baer, AWS | Fortinet Security Summit 2021


 

>> Narrator: From around the globe, It's theCUBE! Covering Fortinet Security Summit, brought to you by Fortinet. >> And welcome to the cube coverage here at the PGA champion-- Fortinet championship, where we're going to be here for Napa valley coverage of Fortinet's, the championships security summit, going on Fortinet, sponsoring the PGA, but a great guest Merritt Baer, who's the principal in the office of the CISO at Amazon web services. Great to see you. Thanks for coming on. >> Merritt: Thank you for having me. It's good to be here. >> So Fortinet, uh, big brand now, sponsoring the PGA. Pretty impressive that they're getting out there with the golf. It's very enterprise focused, a lot of action. A lot of customers here. >> Merritt: It seems like it, for sure. >> Bold move. Amazon, Amazon web services has become the gold standard in terms of cloud computing, seeing DevOps people refactoring. You've seen the rise of companies like Snowflake building on Amazon. People are moving not only to the cloud, but they're refactoring their business and security is top of mind for everyone. And obviously cybersecurity threats that Fortinet helps cover, you guys are partnering with them, is huge. What is your state of the union for cyber? What's the current situation with the threat landscape? Obviously there's no perimeter in the cloud. More end points are coming on board. The Edge is here. 5G, wavelength with outpost, a lot happening. >> That was a long question, but I'll, I'll try. So I think, you know, as always business in innovation is the driver. And security needs to be woven into that. And so I think increasingly we're seeing security not be a no shop, but be an enabler. And especially in cloud, when we're talking about the way that you do DevOps with security, I know folks don't like the term DevSecOps, but you know, to be able to do agile methodology and be able to do the short sprints that are really agile and, and innovative where you can-- So instead of nine months or whatever, nine week timelines, we're talking about short sprints that allow you to elastically scale up and down and be able to innovate really creatively. And to do that, you need to weave in your security because there's no like, okay, you pass go, you collect $200. Security is not an after the fact. So I think as part of that, of course the perimeter is dead, long live the perimeter, right? It does matter. And we can talk about that a little bit. You know, the term zero trust is really hot right now. We can dig into that if that's of interest. But I think part of this is just the business is kind of growing up. And as you alluded to we're at the start of what I think is an S curve that is just at the beginning. >> You know, I was really looking forward to Reinforced this year. It was got canceled last year, but the first inaugural event was in Boston. I remember covering that. This year it was virtual, but the keynote Steven gave was interesting, security hubs at the center of it. And I want to ask you, because I need you to share your view on how security's changed with the cloud, because there's now new things that are there to take advantage of if you're a business or an enterprise, yeah on premises, there's a standard operating procedure. You have the perimeter, et cetera. That's not there anymore, but with the cloud, there's a new, there's new ways to protect and security hub is one. What are some of the new things that cloud enables for security? >> Well, so just to clarify, like perimeters exist logically just like they do physically. So, you know, a VPC for example, would be a logical perimeter and that is very relevant, or a VPN. Now we're talking about a lot of remote work during COVID, for example. But one of the things that I think folks are really interested with Security Hub is just having that broad visibility and one of the beauties of cloud is that, you get this tactile sense of your estate and you can reason about it. So for example, when you're looking at identity and access management, you can look at something like access analyzer that will under the hood be running on a tool that our, our group came up with that is like reasoning about the permissions, because you're talking about software layers, you're talking about computer layer reasoning about security. And so another example is in inspector. We have a tool that will tell you without sending a single packet over the network, what your network reach ability is. There's just like this ability to do infrastructure as code that then allows you to do security as code. And then that allows for ephemeral and immutable infrastructures so that you could, for example, get back to a known good state. That being said, you know, you kill a, your web server gets popped and you kill it and you spin up a new one. You haven't solved your problem, right? You need to have some kind of awareness of networking and how principals work. But at the same time, there's a lot of beauties about cloud that you inherit from a security perspective to be able to work in those top layers. And that's of course the premise of cloud. >> Yeah, infrastructure as code, you mentioned that, it's awesome. And the program ability of it with, with server-less functions, you're starting to see new ways now to spin up resources. How is that changing the paradigm and creating opportunities for better security? Is it, is it more microservices? Is it, is, are there new things that people can do differently now that they didn't have a year ago or two years ago? Because you're starting to see things like server-less functions are very popular. >> So yes, and yes, I think that it is augmenting the way that we're doing business, but it's especially augmenting the way we do security in terms of automation. So server-less, under the hood, whether it's CloudWatch events or config rules, they are all a Lambda function. So that's the same thing that powers your Alexa at home. These are server-less functions and they're really simple. You can program them, you can find them on GitHub, but they are-- one way to really scale your enterprise is to have a lot of automation in place so that you put those decisions in ahead of time. So your gray area of human decision making is scaled down. So you've got, you know, what you know to be allowable, what you know to be not allowable. And then you increasingly kind of whittled down that center into things that really are novel, truly novel or high stakes or both. But the focus on automation is a little bit of a trope for us. We at Amazon like to talk about mechanisms, good intentions are not enough. If it's not someone's job, it's a hope and hope is not a plan, you know, but creating the actual, you know, computerized version of making it be done iteratively. And I think that is the key to scaling a security chain because as we all know, things can't be manual for long, or you won't be able to grow. >> I love the AWS reference. Mechanisms, one way doors, raising the bar. These are all kind of internal Amazon, but I got to ask you about the Edge. Okay. There's a lot of action going on with 5G and wavelength. Okay, and what's interesting is if the Edge becomes so much more robust, how do you guys see that security from a security posture standpoint? What should people be thinking about? Because certainly it's just a distributed Edge point. What's the security posture, How should we be thinking about Edge? >> You know, Edge is a kind of catch all, right, we're talking about Internet of Things. We're talking about points of contact. And a lot of times I think we focus so much on the confidentiality and integrity, but the availability is hugely important when we're talking about security. So one of the things that excites me is that we have so many points of contact and so many availability points at the Edge that actually, so for example, in DynamoDB, the more times you put a call on it, the more available it is because it's fresher, you've already been refreshing it, there are so many elements of this, and our core compute platform, EC2, all runs on Nitro, which is our, our custom hardware. And it's really fascinating, the availability benefits there. Like the best patching is a patching you don't have to do. And there are so many elements that are just so core to that Greengrass, you know, which is running on FreeRTOS, which has an open source software, for example, is, you know, one element of zero trust in play. And there are so many ways that we can talk about this in different incarnations. And of course that speaks to like the breadth and depth of the industries that use cloud. We're talking about automotive, we're talking about manufacturing and agriculture, and there are so many interesting use cases for the ways that we will use IOT. >> Yeah. It's interesting, you mentioned Nitro. we also got Annapurna acquisition years ago. You got latency at the Edge. You can handle low latency, high volume compute with the data. That's pretty powerful. It's a paradigm shift. That's a new dynamic. It's pretty compelling, these new architectures, most people are scratching their heads going, "okay, how do I do this, like what do I do?" >> No, you're right. So it is a security inheritance that we are extremely calculated about our hardware supply chain. And we build our own custom hardware. We build our own custom Silicon. Like, this is not a question. And you're right in that one of the things, one of the north stars that we have is that the security properties of our engineering infrastructure are built in. So there just is no button for it to be insecure. You know, like that is deliberate. And there are elements of the ways that nature works from it running, you know, with zero downtime, being able to be patched running. There are so many elements of it that are inherently security benefits that folks inherit as a product. >> Right. Well, we're here at the security summit. What are you excited for today? What's the conversations you're having here at the Fortinet security summit. >> Well, it's awesome to just meet folks and connect outside. It's beautiful outside today. I'm going to be giving a talk on securing the cloud journey and kind of that growth and moving to infrastructure as code and security as code. I'm excited about the opportunity to learn a little bit more about how folks are managing their hybrid environments, because of course, you know, I think sometimes folks perceive AWS as being like this city on a hill where we get it all right. We struggle with the same things. We empathize with the same security work. And we work on that, you know, as a principal in the office of the CISO, I spend a lot of my time on how we do security and then a lot of my time talking to customers and that empathy back and forth is really crucial. >> Yeah. And you've got to be on the bleeding edge and have the empathy. I can't help but notice your AWS crypto shirt. Tell me about the crypto, what's going on there. NFT's coming out, is there a S3 bucket at NFT now, I mean. (both laughing) >> Cryptography never goes out of style. >> I know, I'm just, I couldn't help-- We'll go back to the pyramids on that one. Yeah, no, this is not a, an advertisement for cryptocurrency. It is, I'm a fangirl of the AWS crypto team. And as a result of wearing their shirts, occasionally they send me more shirts. And I can't argue with that. >> Well, love, love, love the crypto. I'm big fan of crypto, I think crypto is awesome. Defi is amazing. New applications are going to come out. We think it's going to be pretty compelling, again, let's get today right. (laughing) >> Well, I don't think it's about like, so cryptocurrency is just like one small iteration of what we're really talking about, which is the idea that math resolves, and the idea that you can have value in your resolution that the math should resolve. And I think that is a fundamental principle and end-to-end encryption, I believe is a universal human right. >> Merritt, thank you for coming on the cube. Great, great to have you on. Thanks for sharing that awesome insight. Thanks for coming on. >> Merritt: Thank you. >> Appreciate it. Okay. CUBE coverage here in Napa valley, our remote set for Fortinet's security cybersecurity summit here as part of their PGA golf Pro-Am tournament happening here in Napa valley. I'm John Furrier. Thanks for watching.

Published Date : Sep 15 2021

SUMMARY :

brought to you by Fortinet. of Fortinet's, the It's good to be here. now, sponsoring the PGA. What's the current situation the way that you do DevOps You have the perimeter, et cetera. But one of the things that I think How is that changing the paradigm but creating the actual, you know, but I got to ask you about the Edge. And of course that speaks to You got latency at the Edge. is that the security properties What's the conversations you're having And we work on that, you know, and have the empathy. of the AWS crypto team. Well, love, love, love the crypto. and the idea that you can for coming on the cube. Thanks for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AmazonORGANIZATION

0.99+

John FurrierPERSON

0.99+

MerrittPERSON

0.99+

AWSORGANIZATION

0.99+

BostonLOCATION

0.99+

$200QUANTITY

0.99+

FortinetORGANIZATION

0.99+

Merritt BaerPERSON

0.99+

last yearDATE

0.99+

Napa valleyLOCATION

0.99+

Napa valleyLOCATION

0.99+

StevenPERSON

0.99+

nine monthsQUANTITY

0.99+

nine weekQUANTITY

0.99+

AnnapurnaORGANIZATION

0.99+

This yearDATE

0.99+

two years agoDATE

0.99+

todayDATE

0.98+

this yearDATE

0.98+

bothQUANTITY

0.98+

PGA golf Pro-AmEVENT

0.98+

NFTORGANIZATION

0.98+

oneQUANTITY

0.98+

one elementQUANTITY

0.97+

NitroORGANIZATION

0.97+

a year agoDATE

0.97+

Fortinet championshipEVENT

0.96+

Fortinet Security SummitEVENT

0.95+

Fortinet Security Summit 2021EVENT

0.95+

CloudWatchTITLE

0.95+

EC2TITLE

0.95+

DevSecOpsTITLE

0.94+

AlexaTITLE

0.94+

GreengrassORGANIZATION

0.94+

PGAEVENT

0.9+

single packetQUANTITY

0.89+

GitHubORGANIZATION

0.89+

DynamoDBTITLE

0.87+

FortinetEVENT

0.86+

COVIDTITLE

0.86+

zeroQUANTITY

0.85+

one wayQUANTITY

0.85+

FreeRTOSTITLE

0.84+

zero trustQUANTITY

0.82+

LambdaTITLE

0.8+

Amazon webORGANIZATION

0.8+

years agoDATE

0.78+

one small iterationQUANTITY

0.77+

security cybersecurity summitEVENT

0.76+

first inauguralQUANTITY

0.75+

DevOpsTITLE

0.74+

Fortinet security summitEVENT

0.73+

championships security summitEVENT

0.72+

SiliconORGANIZATION

0.71+

CISOORGANIZATION

0.71+

SnowflakeORGANIZATION

0.71+

S3COMMERCIAL_ITEM

0.69+

EdgeTITLE

0.68+

thingsQUANTITY

0.58+

casesQUANTITY

0.52+

Security HubTITLE

0.51+

5GORGANIZATION

0.34+

Fortinet Security Summit Wrap | Fortinet Security Summit 2021


 

>>From around the globe. It's the cube covering Fortinet security summit brought to you by Fortinet. >>Welcome back to the cubes coverage of 40 net championship security summit from beautiful Napa valley. Lisa Martin here with John farrier, John, and has been phenomenal to do an event in person outdoors and Napa valley. >>You're so bright. We have to wear shades. It's been sunny and it's been hot. It's been great. It's been a great, it's been a great day. I mean, I think Fordanet stepping up to that sponsorship for the PGA is a bold move they're doing well on the business front. They're expanding it. It's good for their customers. It's a new, bold marketing step. Affordanet honestly, they're doing extremely well on the business front. As I mentioned, they got a lot of cash coming in. They got happy customers and they're all here. And golf is a great environment for tech buyers. We know that. So it's great to have the cube on the sports circuit and, uh, we'll be doing more of them. It's it's awesome. >>Good. I, it is great to be on this sport circuit. One of the things that I talked with several folks about today, John Madison being one that CEO, CFO, COO, and then Kenzie, the CEO of Fordanet about the cultural synergies between the PGA and Ford nine. It was really nice to hear how both of these companies, both of these organizations are so invested in things like women in technology and steam and stem programs, and they really align on those two cultures. >>Yeah, there's a, it's a, it's a, it's a culture fit. I mean, they basically, it's a winning formula. Look at Ford and net. Um, you know, and having that kind of representation is good. They, they have a great reputation put in. It does PGA does as well and it's quality, right? So people like, like quality and they want to line that. So it's a great business move for Fordanet to, uh, to do the, uh, the golf sponsorship, uh, multiple years. I think it's six years, five or six years, they get they're doing this. Um, it's phenomenal. I think they're going to Fortnite is going to turn into a marketing powerhouse. I think you're going to start to see John Madison and the team, uh, really gin up some nice new things, because you can do a lot with the PGA. Again, this foundations is charities, again, a lot of causes that are involved in, in fundraising around the PGA and you got the tour players and honestly the tech scene. So I think tech and sports has always been something that I've loved. And I think, you know, we'd love to come and bring our sets here and having the cube here is just a really fun kind of winning formula as well. We'd love it. And we, and we wish we could eat it for more days this year. I think we will, but this has been so much, >>It has been so much fun. There's been about over 300 customers and partners here. Fortnite is a, is a hundred percent partner driven organization. Lot of innovation being discussed the last eight hours or so, but one of the things that you definitely feel is the strength in their partner, community and Fortinets commitment to it. Also something that really impresses me is their commitment to helping to fill the cybersecurity skills gap. This is a gap that has been growing for the last five years. They last week announced a pledge to train 1 million people in the next five years to help shorten that gap. And as we know that the threat landscape is only continuing to expand. So the great combination there, >>And it's a, cause that's a good business logic behind it because there's a of negative unemployment. They need more people to do cybersecurity careers, but also you mentioned women in tech, you know, a lot of that's a big movement too. You start to see a much more women in tech scene here. We had, uh, Merritt bear on principal office of the CSO at Amazon web services on she's amazing. She's wearing the Amazon Krypto shirts. That was a home run, love that interview, but you started to see them afford a net with the whole scene. Here is they're taking their message directly to their customers and they're including their customers. So the magic of this formula that they have with the PGA and this whole program is they don't have live concert series. They got a pavilion here with all their top partners, with customers that doing a summit behind us with their top marquee customers. And they're telling the story direct and you're going, I think you need to shift to see Fordanet really do more of that. What we love in the key, which is take that direct to, to media model, to their customers and contents data. We had great conversations here. I mean, that's all you, you know, viewing the, uh, head VP SVP of at and T cybersecurity, uh, amazing, uh, uh, candidate there's great cube guests. And he was just traveling some serious wisdom. So great guests all along. Fantastic. >>Well, it's, it's been an inspiring day. It's nice that 40 minute has taken the step to do an in-person event. Obviously they did it extremely safely. We were outdoors, but people are, I think a lot of people and I'm speaking for myself, for sure, ready for this to come back and meet the threat landscape that changes that that 40 net has seen in the last 18 months are phenomenal. The growth in ransomware, nearly 11 X in a year. And you had this massive shift to work from home. And now they're talking about how they're partnering with links us, for example, to help enterprises, to really make that remote work environment far more secure, faster, and optimize for the worker. Who's on video conferencing, communication tools. All the kids at home gaming are probably going to be pretty bummed about this, but it really shows coordinates commitment to this. There's a lot of permanence to what we're seeing here in this model. >>I know you and I have done ton of interviews together and, uh, with great guests around cybersecurity and the phrase always comes up and over the past decade, there's there is no more perimeter here. You couldn't, you couldn't, it was louder than ever here because now you have so much going on connected devices. The future of work is at home with the virtual, uh, issues with the pandemic. And now with the Delta variant, uh, continuing at forward, it's a reality, we're in a hybrid world and, um, everything's going hybrid. And I think that's a new thing for companies to operationalize. So they got, there's no playbook. So there is a security playbook. And what these guys are doing is building an ecosystem to build product that people can wrap services around and to solve the key security problems. And that's that, that to me is a good business model. And the SAS is, again, you're seeing everyone go SAS. They want to go SAS product, or, you know, uh, some sort of business models involved in cloud. So cloud security, SAS all kind of rolled up. It's really kinda interesting trend. >>Yeah. We've talked about a whole bunch of trends today. One of them is just one of the marketing terms I've been using and I don't like to use it, but around for years as a future ready people, tech companies always describing solutions and technologies and products is future ready? Well, what does that really mean? Well, when the pandemic struck, none of us were future ready, but what we did hear and see and feel today from 40 net and their partners is how much acceleration they've done. So that going forward, we are going to be future ready for situations that arise like in this challenging cybersecurity landscape that businesses in every industry can prepare for. >>I think, I think the talks here in the cyber security summit behind us, it's interesting. Uh, Tufin one of their customers on a lot of the talks were the same thing, talking about the cultural shift, the cultural shift and security departments has to become more agile. And so that is a big untold story right now is that security departments. Aren't well-liked, they slow things down. I mean, you know, app review everything's gotta be looked at and it takes weeks. That is not good for developers. So app developers in the cloud, they want minutes, you know, shift left is something that we talk about all the time in our events with the developers dev ops movement is putting pressure on the security teams, culturally, who moves first. You don't go faster. You're going to be replaced, but you can't replace a security team. So I find that whole security cloud team dynamic, real organizational challenges. That's something I'm going to look into is one of my key takeaways from this this week. Yeah. >>A huge organizational change. And with that comes, you know, obviously different cultures with these organizations, but at the same time, there really is no more choice. They have to be working together. And as Kenzie and I were talking about, you know, security is no longer an ITP, this is a board level initiative and discussion businesses in every industry, whether it's a retailer or PGA tour have to be prepared. >>Yeah. I mean, I'm a security Hawk. I think every company needs to be prepared to take an offensive strike and be ready on the defense. And this is a huge agility and speed cause ransomware, you get taken down, you know, I mean that's business critical issue. You're dead, you're dead in the water. So, so again, this is all part of his quote digital transformation, uh, that everyone's talking about and is a do over, everyone's doing it over and doing it with the cloud. And I remember just recently in 2012, people were saying, oh, the cloud is not secure. It's now some more secure than anything else. So we starting to see that shift so that realities hit everybody. So it's been great. >>What are some of the things that excited you about the conversations that you had today? >>I was pretty impressed by the fact that one was a physical advantage. You mentioned. So, you know, people in personal, I found it refreshing. I think people here, I noticed we're one relieved to be out and about in public and talking on the cube. Um, but I was really impressed with, uh, the guests from Amazon web services. She was a crypto shirt that got me there. But I think this idea that security is not just a guy thing, right? So to me, women in tech was a, was a big conversation. I thought it was very positive this week, um, here and still a lot more work to do, but I think that's, what's cool. And just the talks were great. I mean, it's cutting edge concepts here. And I thought at, and T was great. I thought, uh, Tufin was a great conversation and again, all the guests that were awesome. So what did you think, what was your take? >>Just how much acceleration we've seen in the last year on innovation and partnerships that really jumped out that when, like I said, we talked about future ready and go, wow. So much of the world wasn't future ready a year and a half ago when this came out and all of the innovation and the positivities that have come out of technology companies creating, because we don't have a choice. We have to figure out secure work from home. For example, we know that some amount of it's going to persist hybrid maybe here to stay, to see what 40 net and their partner ecosystem have done in a short time period. Given the fact that you mentioned ransomware and their global threat landscape, I was talking with Derek, nearly X increased in ransomware and just, >>And they've got four to guard. They got all this. I think your interview with Ken, the CEO, I thought it was really compelling. It was one point he said, um, we're making a lot more investments when you asked him a pointed question. And I think that theme comes across really strong in all of our interviews today. And the conversations in the hallway here is that people that are making the investments are doing well. And so there's more investments being made and that's like, people kind of say, oh yeah, we can do this one, but you have to now. And so the other thing that I thought was awesome with John Madison, talking about their strategy around the PGA, it's a bold move, but it's kind of got this mindset of always innovating, but they're not, they go step at a time, so they get better. So I'm, I'm expecting next year to be better than this year, bigger, uh, and more integrated because that's what they do. They make things better. Um, I think that's gonna be fun to watch, but I think that's a bold move for Affordanet to be doing this kind of marketing. It's really, they haven't done that in the, in the past. So I think this is a really bold move. >>I agree. And they've spun this out of their accelerate event, which is an event that we've covered for years in person. So this was the first time that they've pulled the security summit out as its own event. And clearly there was a great buzz behind us all day. Lots of, lots of topics, a lot of discussions, a lot of partnership. And you're right. A lot of talk about investment investment in their partner ecosystem and investment internally. Yes. >>It's fun too. On a personal note, we've been following Fordanet for many, many years. You and I both got doing the interviews and you do and go to the events is watching them grow and be successful. And it's kind of proud though. I, yeah, I'll go for it. And that kind of rooting for him. And I want to thank them for inviting the cube here because we're so psyched to be here and be part of this awesome event. And again, golf, the cube kind of go together, right? Sports, the cubes. We love it. So always fun. So thanks to, for, to net out there for, uh, supporting us and being, being part of the cube. >>Well, you got the gear, you got your Fordanet Gulf t-shirt I got one too. And pink. It's beautiful. Yeah. You got some shades, but we also have some gear here help us in the morning for our next shows. Be caffeinated. Yeah. But no, it's been great. It's been great to be here. Great to hook co-host with you again in person if for 20 months or so, and looking forward to seeing how 49 and how back >>He was back up the vents. Thanks to the crew. Chuck Leonard, every one's era, Brendan. Right. Well done. Fordanet thank you. Thank you for >>John's been great. Thanks for having me up here today. Looking forward to the next time from Napa valley, Lisa Martin, for John farrier, you've been watching the cube

Published Date : Sep 14 2021

SUMMARY :

security summit brought to you by Fortinet. Welcome back to the cubes coverage of 40 net championship security summit from beautiful Napa valley. So it's great to have the cube on the sports circuit and, uh, One of the things that I talked with several folks about And I think, you know, we'd love to come and bring our sets here and having the cube here is just a last eight hours or so, but one of the things that you definitely feel is the strength They need more people to do cybersecurity careers, but also you mentioned women in tech, you know, It's nice that 40 minute has taken the step to do an in-person event. And I think that's a new thing for companies So that going forward, we are going to be future ready for situations You're going to be replaced, but you can't replace a security team. And with that comes, you know, obviously different cultures I think every company needs to be prepared to take an offensive strike and be ready on the defense. And I thought at, and T was great. So much of the world wasn't future ready a year and a half ago when this came out and I think that's gonna be fun to watch, but I think that's a bold move for Affordanet to be doing this kind of marketing. And clearly there was a great buzz behind us all day. And I want to thank them for inviting the cube here because we're Great to hook co-host with you again in person Thanks to the crew. Looking forward to the next time from Napa

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

KenPERSON

0.99+

John MadisonPERSON

0.99+

2012DATE

0.99+

Chuck LeonardPERSON

0.99+

KenziePERSON

0.99+

AmazonORGANIZATION

0.99+

20 monthsQUANTITY

0.99+

BrendanPERSON

0.99+

JohnPERSON

0.99+

PGAORGANIZATION

0.99+

Napa valleyLOCATION

0.99+

John farrierPERSON

0.99+

fiveQUANTITY

0.99+

FordORGANIZATION

0.99+

six yearsQUANTITY

0.99+

40 minuteQUANTITY

0.99+

next yearDATE

0.99+

Napa valleyLOCATION

0.99+

DerekPERSON

0.99+

TufinPERSON

0.99+

todayDATE

0.99+

last weekDATE

0.99+

bothQUANTITY

0.99+

1 million peopleQUANTITY

0.99+

FordanetORGANIZATION

0.99+

OneQUANTITY

0.99+

oneQUANTITY

0.99+

one pointQUANTITY

0.99+

FortniteORGANIZATION

0.99+

Fortinet Security SummitEVENT

0.99+

a year and a half agoDATE

0.99+

hundred percentQUANTITY

0.98+

two culturesQUANTITY

0.98+

over 300 customersQUANTITY

0.98+

last yearDATE

0.98+

this yearDATE

0.98+

Delta variantOTHER

0.98+

first timeQUANTITY

0.98+

this yearDATE

0.98+

this weekDATE

0.97+

FortinetORGANIZATION

0.97+

Ford nineORGANIZATION

0.97+

Fortinet Security Summit 2021EVENT

0.96+

pandemicEVENT

0.95+

aboutQUANTITY

0.94+

FordanetPERSON

0.93+

FortinetsORGANIZATION

0.93+

MerrittPERSON

0.91+

nearly 11 XQUANTITY

0.9+

fourQUANTITY

0.89+

40 netQUANTITY

0.88+

a yearQUANTITY

0.88+

AffordanetPERSON

0.86+

FordanetTITLE

0.86+

CSOORGANIZATION

0.86+

Fortinet security summitEVENT

0.84+

firstQUANTITY

0.8+

ton of interviewsQUANTITY

0.79+

last 18 monthsDATE

0.78+

last five yearsDATE

0.78+

SASORGANIZATION

0.76+

next five yearsDATE

0.72+

49QUANTITY

0.71+

past decadeDATE

0.7+

Rupesh Chokshi, AT&T Cybersecurity | Fortinet Security Summit 2021


 

>>From around the globe. It's the cube covering Fortinet security summit brought to you by Fortinet. >>Welcome back to the cube. Lisa Martin here at the Fordham het championship security summit. Napa valley has been beautiful and gracious to us all day. We're very pleased to be here. I'm very pleased to welcome a first-timer to the cube. Rupesh Chuck Chuck Xi, VP a T and T cybersecurity and edge solutions at, at and T cybersecurity. Refresh. Welcome. >>Thank you. Thank you so much for having me, Lisa, I'm looking forward to our conversation today. >>Me too. First of all, it's we're in Napa we're outdoors. It's beautiful venue, no complaints, right? We're at a golf PGA tournament. Very exciting. Talk to me about the at and T Fordanet relationship. Give me, give me an, a good insight into the partnership. >>Sure, sure. So, as you said, you know, beautiful weather in California, Napa it's my first time. Uh, so it's kind of a new experience for me going back to your question in terms of the relationship between eight P and T and Ford in that, uh, a long lasting, you know, 10 plus years, you know, hand in hand in terms of the product, the technology, the capabilities that we are brought together in the security space for our customers. So a strategic relationship, and I'm so thrilled to be here today as a, Fordanet invited us to be part of the championship. Tommy, >>Talk to me. So your role VP of, and T cybersecurity and edge solutions, give me an, a deep dive into what's in your purview. >>Sure, sure. So I, uh, sort of, you know, run the PNL or the profit and loss center for product management for all of at and T cybersecurity and ed solutions and the whole concept behind putting the teams together is the convergence in networking and security. Um, so, you know, we are supporting the entire customer continuum, whether it's a fortune 50, the fortune 1000 to mid-market customers, to small businesses, to, you know, government agencies, you know, whether it's a local government agency or a school district or a federal agency, et cetera. And my team and I focus on bringing new product and capabilities to the marketplace, you know, working with our sales team from an enablement perspective, go to market strategy. Um, and the whole idea is about, uh, you know, winning in the marketplace, right? So delivering growth and revenue to the business, >>Competitive differentiation. So we've seen so much change in the last year and a half. I know that's an epic understatement, but we've also seen the proliferation at the edge. What are some of the challenges that you're seeing and hearing from customers where that's concerned >>As you stated, right. There's a lot happening in the edge. And sometimes the definition for edge varies when you talk with different people, uh, the way we look at it is, you know, definitely focused on the customer edge, right? So if you think about many businesses, whether I am a, a quick serve restaurant or I'm a banking Institute or a financial services or an insurance agency, or I'm a retail at et cetera, you know, lots of different branches, lots of different transformation taking place. So one way of approaching it is that when you think about the customer edge, you see a lot of virtualization, software driven, a lot of IOT endpoints, et cetera, taking place. So the cyber landscape becomes more important. Now you're connecting users, devices, capabilities, your point of sale system to a multi-cloud environment, and that, you know, encryption of that data, the speed at which it needs to happen, all of that is very important. And as we think ahead with 5g and edge compute and what that evolution revolution is going to bring, it's going to get even more excited because to me, those are kind of like in a playgrounds of innovation, but we want to do it right and keep sort of, you know, cyber and security at the core of it. So we can innovate and keep the businesses safe. >>How do you help customers to kind of navigate edge cybersecurity challenges and them not being synonymous? >>That's a great, great question. You know, every day I see, you know, different teams, different agendas, different kinds of ways of approaching things. And what I tell customers and even my own teams is that, look, we have to have a, a blueprint and architecture, a vision, you know, what are the business outcomes that we want to achieve? What the customer wants to achieve. And then start to look at that kind of technology kind of convergence that is taking place, and especially in the security and the networking space, significant momentum on the convergence and utilize that convergence to create kind of full value stack solutions that can be scaled, can be delivered. So you are not just one and done, but it's a continuous innovation and improvement. And in the security space, you need that, right. It's never going to be one and done. No >>We've seen so much change in the last year. We've seen obviously this rapid pivot to work from home that was overnight for millions and millions of people. We're still in that too. A fair amount. There's a good amount of people that are still remote, and that probably will be permanently there's. Those that are going to be hybrid threat landscape bloated. I was looking at and talking with, um, 40 guard labs and the, the nearly 11 X increase in the last 12 months in ransomware is insane. And the ransomware as a business has exploded. So security is a board level conversation for businesses I assume in any. >>Absolutely. Absolutely. I agree with you, it's a board level conversation. Security is not acknowledged the problem about picking a tool it's about, you know, the business risk and what do we need to do? Uh, you mentioned a couple of interesting stats, right? So we've seen, uh, you know, two things I'll share. One is we've seen, you know, 440 petabytes of data on the at and T network in one average business day. So 440 petabytes of data. Most people don't know what it is. So you can imagine the amount of information. So you can imagine the amount of security apparatus that you need, uh, to Tofino, protect, and defend and provide the right kind of insights. And then the other thing that VOC and along the same lines of what you were mentioning is significant, you know, ransomware, but also significant DDoSs attacks, right? So almost like, you know, we would say around 300% plus said, DDoSs mitigations that we did from last year, you know, year over year. >>So a lot of focus on texting the customer, securing the end points, the applications, the data, the network, the devices, et cetera. Uh, the other two points that I want to mention in this space, you know, again, going back to all of this is happening, right? So you have to focus on this innovation at the, at the speed of light. So, you know, artificial intelligence, machine learning, the software capabilities that are more, forward-looking have to be applied in the security space ever more than ever before, right. Needs these do, we're seeing alliances, right? We're seeing this sort of, you know, crowdsourcing going on of action on the good guys side, right? You see the national security agencies kind of leaning in saying, Hey, let's together, build this concept of a D because we're all going to be doing business. Whether it's a public to public public, to private, private, to private, all of those different entities have to work together. So having security, being a digital trust, >>Do you think that the Biden administrations fairly recent executive order catalyst of that? >>I give it, you know, the president and the, the administration, a lot of, you know, kudos for kind of, and then taking it head on and saying, look, we need to take care of this. And I think the other acknowledgement that it is not just hunting or one company or one agency, right? It's the whole ecosystem that has to come together, not just national at the global level, because we live in a hyper connected world. Right. And one of the things that you mentioned was like this hybrid work, and I was joking with somebody the other day that, and really the word is location, location, location, thinking, network security, and networking. The word is hybrid hybrid hybrid because you got a hybrid workforce, the hybrid cloud, you have a hybrid, you have a hyper-connected enterprise. So we're going to be in this sort of, you know, hybrid for quite some time are, and it has to >>Be secure and an org. And it's, you know, all the disruption of folks going to remote work and trying to get connected. One beyond video conference saying, kids are in school, spouse working, maybe kids are gaming. That's been, the conductivity alone has been a huge challenge. And Affordanet zooming a lot there with links to us, especially to help that remote environment, because we know a lot of it's going to remain, but in the spirit of transformation, you had a session today here at the security summit, talked about transformation, formation plan. We talk about that word at every event, digital transformation, right? Infrastructure transformation, it security. What context, where you talking about transformation in it today? What does it transformation plan mean for your customers? >>That's a great question because I sometimes feel, you know, overused term, right? Then you just take something and add it. It's it? Transformation, network, transformation, digital transformation. Um, but what we were talking today in, in, in the morning was more around and sort of, you know, again, going back to the network security and the transformation that the customers have to do, we hear a lot about sassy and the convergence we are seeing, you know, SD van takeoff significantly from an adoption perspective application, aware to experiences, et cetera, customers are looking at doing things like internet offload and having connectivity back into the SAS applications. Again, secure connectivity back into the SAS applications, which directly ties to their outcomes. Um, so the, the three tenants of my conversation today was, Hey, make sure you have a clear view on the business outcomes that you want to accomplish. Now, the second was work with a trusted advisor and at and T and in many cases is providing that from a trusted advisor perspective. And third, is that going back to the one and done it is not a one and done, right? This is a, is a continuous process. So sometimes we have to be thinking about, are we doing it in a way that we will always be future ready, will be always be able to deal with the security threats that we don't even know about today. So yeah, >>You bring up the term future ready. And I hear that all the time. When you think of man, we really weren't future ready. When the pandemic struck, there was so much that wasn't there. And when I was talking with 49 earlier, I said, you know, how much, uh, has the pandemic been a, uh, a catalyst for so much innovation? I imagine it has been the same thing that >>Absolutely. And, you know, I remember, you know, early days, February, March, where we're all just trying to better understand, right? What is it going to be? And the first thing was, Hey, we're all going to work remote, is it a one week? Is it a two week thing? Right? And then if you're like the CIO or the CSO or other folks who are worried about how am I going to give the productivity tools, right. Businesses in a one customer we work with, again, tobacco innovation was said, Hey, I have 20,000 call center agents that I need to take remote. How do you deliver connectivity and security? Because that call center agent is the bloodline for that business interacting with their end customers. So I think, you know, it is accelerated what would happen over 10 years and 18 months, and it's still unknown, right? So we're still discovering the future. >>There's a, there will be more silver linings to come. I think we'll learn to pick your brain on, on sassy adoption trends. One of the things I noticed in your abstract of your session here was that according to Gardner, the convergence of networking and security into the sassy framework is the most vigorous technology trend. And coming out of 2020, seeing that that's a big description, most vigorous, >>It's a big, big description, a big statement. And, uh, we are definitely seeing it. You know, we saw some of that, uh, in the second half of last year, as the organizations were getting more organized to deal with, uh, the pandemic and the change then coming into this year, it's even more accelerated. And what I mean by that is that, you know, I look at sort of, you know, three things, right? So one is going back to the hybrid work, remote work, work from anywhere, right. So how do you continue to deliver a differentiated experience, highly secure to that workforce? Because productivity, human capital very important, right? The second is that there's a back and forth on the branch transformation. So yes, you know, restaurants are opening back up. Retailers are opening back up. So businesses are thinking about how do I do that branch transformation? And then the third is explosive business IOT. So the IOT end points, do you put into manufacturing, into airports in many industries, we continue to see that. So when you think about sassy and the framework, it's about delivering a, a framework that allows you to protect and secure all of those endpoints at scale. And I think that trend is real. I've seen customer demand, we've signed a number of deals. We're implementing them as we speak across all verticals, healthcare, retail, finance, manufacturing, transportation, government agencies, small businesses, mid-sized businesses. >>Nope, Nope. Not at all. Talk to me about, I'm curious, you've been at, at and T a long time. You've seen a lot of innovation. Talk, talk to me about your perspectives on seeing that, and then what to you think as a silver lining that has come out of the, the acceleration of the last 18 months. >>She and I, I get the question, you know, I've been with at and T long time. Right. And I still remember the day I joined at T and T labs. So it was one of my kind of dream coming out of engineering school. Every engineer wants to go work for a brand that is recognized, right. And I, I drove from Clemson, South Carolina to New Jersey Homedale and, uh, I'm still, you know, you can see I'm still having the smile on my face. So I've, you know, think innovation is key. And that's what we do at, at and T I think the ability to, um, kind of move fast, you know, I think what the pandemic has taught us is the speed, right? The speed at which we have to move the speed at which we have to collaborate the speed at which we have to deliver, uh, to agility has become, you know, the differentiator for all of us. >>And we're focusing on that. I also feel that, uh, you know, there have been times where, you know, product organizations, technology organizations, you know, we struggle with jumping this sort of S-curve right, which is, Hey, I'm holding onto something. Do I let go or not? Let go. And I think the pandemic has taught us that you have to jump the S-curve, you have to accelerate because that is where you need to be in, in a way, going back to the sassy trend, right. It is something that is real, and it's going to be there for the next three to five years. So let's get ready. >>I call that getting comfortably uncomfortable, no businesses safe if they rest on their laurels these days. I think we've learned that, speaking of speed, I wanna, I wanna get kind of your perspective on 5g, where you guys are at, and when do you think it's going to be really impactful to, you know, businesses, consumers, first responders, >>The 5g investments are happening and they will continue to happen. And if you look at what's happened with the network, what at and T has announced, you know, we've gotten a lot of kudos for whatever 5g network for our mobile network, for our wireless network. And we are starting to see that, that innovation and that innovation as we anticipated is happening for the enterprise customers first, right? So there's a lot of, you know, robotics or warehouse or equipment that needs to sort of, you know, connect at a low latency, high speed, highly secure sort of, you know, data movements, compute edge that sits next to the, to the campus, you know, delivering a very different application experience. So we're seeing that, you know, momentum, uh, I think on the consumer side, it is starting to come in and it's going to take a little bit more time as the devices and the applications catch up to what we are doing in the network. And if you think about, you know, the, the value creation that has happened on, on the mobile networks is like, if you think about companies like Uber or left, right, did not exist. And, uh, many businesses, you know, are dependent on that network. And I think, uh, it will carry on. And I think in the next year or two, we'll see firsthand the outcomes and the value that it is delivering you go to a stadium at and T stadium in Dallas, you know, 5g enabled, you know, that the experience is very different. >>I can't wait to go to a stadium again and see it came or live music. Oh, that sounds great. Rubbish. Thank you so much for joining me today, talking about what a T and T is doing with 49, the challenges that you're helping your customers combat at the edge and the importance of really being future. Ready? >>Yes. Thank you. Thank you so much. Really appreciate you having me. Thanks for 49 to invite us to be at this event. Yes. >>Thank you for refresh talk. She I'm Lisa Martin. You're watching the cube at the 40 net championship security summits.

Published Date : Sep 14 2021

SUMMARY :

security summit brought to you by Fortinet. a first-timer to the cube. Thank you so much for having me, Lisa, I'm looking forward to our conversation today. Talk to me about the at and T Fordanet uh, a long lasting, you know, 10 plus years, you know, hand in hand So your role VP of, and T cybersecurity and edge solutions, give me an, Um, and the whole idea is about, uh, you know, What are some of the challenges that you're but we want to do it right and keep sort of, you know, cyber and security at the core of a vision, you know, what are the business outcomes that we want to achieve? And the ransomware as a business acknowledged the problem about picking a tool it's about, you know, the business risk and what do mention in this space, you know, again, going back to all of this is happening, So we're going to be in this sort of, you know, hybrid for quite some time are, And it's, you know, all the disruption of folks going to remote in, in the morning was more around and sort of, you know, again, going back to the network security And when I was talking with 49 earlier, I said, you know, how much, uh, has the pandemic been you know, it is accelerated what would happen over 10 years and 18 months, and it's One of the things I noticed in your abstract of your session here was that according to Gardner, So the IOT end points, do you put into manufacturing, seeing that, and then what to you think as a silver lining that has come out of the, She and I, I get the question, you know, I've been with at and T long time. I also feel that, uh, you know, there have been times where you guys are at, and when do you think it's going to be really impactful to, you know, that needs to sort of, you know, connect at a low latency, high speed, Thank you so much for joining me today, talking about what a T and T is doing with Thank you so much. Thank you for refresh talk.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Rupesh ChokshiPERSON

0.99+

Lisa MartinPERSON

0.99+

UberORGANIZATION

0.99+

LisaPERSON

0.99+

440 petabytesQUANTITY

0.99+

NapaLOCATION

0.99+

TommyPERSON

0.99+

2020DATE

0.99+

millionsQUANTITY

0.99+

one weekQUANTITY

0.99+

440 petabytesQUANTITY

0.99+

last yearDATE

0.99+

thirdQUANTITY

0.99+

Rupesh Chuck Chuck XiPERSON

0.99+

Napa valleyLOCATION

0.99+

two weekQUANTITY

0.99+

10 plus yearsQUANTITY

0.99+

TofinoORGANIZATION

0.99+

todayDATE

0.99+

secondQUANTITY

0.99+

New Jersey HomedaleLOCATION

0.99+

FortinetORGANIZATION

0.99+

one companyQUANTITY

0.99+

FebruaryDATE

0.98+

DallasLOCATION

0.98+

one agencyQUANTITY

0.98+

two pointsQUANTITY

0.98+

next yearDATE

0.98+

first timeQUANTITY

0.98+

GardnerPERSON

0.98+

OneQUANTITY

0.98+

over 10 yearsQUANTITY

0.98+

three tenantsQUANTITY

0.98+

one customerQUANTITY

0.98+

two thingsQUANTITY

0.98+

20,000 call center agentsQUANTITY

0.98+

around 300%QUANTITY

0.97+

pandemicEVENT

0.97+

three thingsQUANTITY

0.97+

FordORGANIZATION

0.97+

MarchDATE

0.96+

oneQUANTITY

0.96+

Fortinet Security Summit 2021EVENT

0.95+

FordanetORGANIZATION

0.95+

Clemson, South CarolinaLOCATION

0.94+

last year and a halfDATE

0.93+

FirstQUANTITY

0.91+

first thingQUANTITY

0.91+

18 monthsQUANTITY

0.9+

eightQUANTITY

0.9+

40 guard labsQUANTITY

0.89+

Fordham het championship security summitEVENT

0.89+

TPERSON

0.88+

millions of peopleQUANTITY

0.88+

AT&T CybersecurityORGANIZATION

0.88+

this yearDATE

0.88+

T and TORGANIZATION

0.87+

firstQUANTITY

0.87+

five yearsQUANTITY

0.86+

one wayQUANTITY

0.83+

California, NapaLOCATION

0.83+

twoDATE

0.83+

T FordanetORGANIZATION

0.83+

Fortinet security summitEVENT

0.82+

second half of last yearDATE

0.78+

49DATE

0.74+

one average businessQUANTITY

0.74+

last 18 monthsDATE

0.74+

last 12 monthsDATE

0.72+

threeQUANTITY

0.7+

40 net championship security summitsEVENT

0.7+

nearly 11 XQUANTITY

0.7+

BidenORGANIZATION

0.66+

VOCORGANIZATION

0.65+

TORGANIZATION

0.64+

Ken Xie, Fortinet | Fortinet Security Summit 2021


 

>>from around the globe. >>It's the cube >>covering fortunate security summit brought to you by ford in it. >>Welcome back to the cubes coverage, affording that security summit at the ford championship here in napa. I'm lisa martin and I'm very pleased to welcome back to the cube kenzi founder and chairman and ceo affording that, ken. Welcome back to the program. >>Thank you is uh, we're happy to be here after almost two years and uh, >>I know it's great to see you in person. I was saying before we went live, I forgot how tall you are. So this is a great event. But I want you to talk to me a little bit about some of the amazing growth. The Fortinet has seen 500,000 customers close to 30% year on year growth continuing to post solid earnings stock is more than double this year. What are some of the things that you attribute this group to and what do you think in your opinion differentiates format? >>I think some of the more strategic long term investment we made started paying off like uh, we're still the only company actually develop basic chip which can making a huge computing power advantage compared to using software to all the security function computing Because security tend to need about like 1300 times more company in power to process the same data as a routing switching. So that's where for the network security definitely a chap, a huge advantage And we invested very early and take a long term and also a big investment and so far started paying off the other thing we also keeping a lot of innovation and the internal organic growth for the company instead of do a lot of acquisition and that's also started making all these different products integrate well ultimately to get well. And that's also driving a huge growth, not just that was security, but also we see the fabric also has global fast, >>interesting. So you're really keeping it organic, which is not common a lot of these days we see a lot of acquisitions, but one of the things, a lot of growth, another thing that we do know that's growing is the threat landscape I was mentioning before we went live that I spoke with Derek Manky a couple times this summer and John Madison and the global threat landscape report showing ransomware up nearly 11 times in the last year. Of course we had this rapid transition to work from home and all these devices on accessing corporate networks from home. Talk to me about some of the security challenges that you're helping customers deal with. >>I think during the pandemic, definitely you see a lot of security issues that come up because work from home with your remote access a lot of important information, a lot of important data there At the same time. The ransomware attacks studying like a mentioning 11 times compared to like one or two years ago all this driving all there's a new technology for security. So now you cannot just secure the board anymore. So you have a secure the whole infrastructure. Both internal to a lot of internal segmentation And also go outside security when like I see when the 5G. Connection and how to secure work from home and they trust their trust access environment all these drive a lot of security growth. So we see the yeah it's a it's a pretty healthy market >>it's definitely a healthy market that's one thing looking at it from that lens. What are some of the customer conversation? How have the customer conversations changed? Are you now talking with different levels and organizations security Being a board level conversation discussion and talk to me about how those conversations have evolved. >>Security now become very important part of I. T. And uh pretty much all top one top two on the 80 spending now and the same time what to work from home or some other uh definitely seeing the board level conversation right now because you can see if there's a security issue for the company the damage could be huge. Right? So that's where the secure awareness especially ransomware is very very huge And plus the supply chain issues some other attack on the infrastructure. So we see a lot of security conversation in the bowl level in the Ceo in the in the executive level now compared to before more I. T. Conversation. So it's to drive the huge awareness of security and that's also we see everybody citing concerns security now. >>But I'm sure I imagine that's across every industry. Yes. >>Yeah pretty much all the vertical right? And especially a lot of new area traditionally they don't have much security like some smb some consumer some traditional Ot IOT space now it's all security studying that very important for them now. >>So let's talk about, here we are. The security summit at the fortunate championship. Give me your perspective on the P. G. A. Ford in that relationship. >>Uh first I think it's a golf is also event sports especially during the epidemic that's probably become the most favorite spot. And for me also I'm a golfer for 30 years. Never market golfer but I love the sport on the other side we see sometimes it's uh working with a lot of a customer a lot of a partner they behave if we can combine some business and there was certain like activity especially outdoor that's also be great. And also helping Brandon and that's another way we can contribute back to the community. So they say hey then then that's that's the first time for us. We just love it gets going. >>It's great to be outdoors right at 40 minutes doing an event outdoors showing that yes you can do that safely. But also I also hear from some of your other team members that it's a very culturally synergistic relationship. The pgn format. >>Yes. Exactly. Yeah that's where we love this golf and especially working with a different partner and different partner and also all the team working together. So it's a team sport kind of on the other side it's all do and enjoy a combined working uh activity altogether. Everybody love it. >>Something that so many of us have missed Ken for the last 18 months or so. So we're at the security summit, there's over 300 technology leaders here. Talk to me about some of the main innovations that are being discussed. >>Uh definitely see security starting uh little covered whole infrastructure and uh especially in a lot of environment. Traditionally no security cannot be deployed like internal segmentation because internal network can be 10, 200 faster than the one connection. So it has to be deployed in the in the internal high speed environment whether inside the company or kind of inside the data center, inside the cloud on the other side, like a lot of one connection traditionally like whether they see one or the traditional like cuba more than the S E O. They also need to be combined with security and also in the zero trust access environment to really supporting work from home and also a lot of ot operation technology and a lot of other IOT space utility. All these different kind of like environment need to be supported, sometimes recognized environment. So we see security studying deport everywhere whether the new small city or the like connected car environment and we just see become more and more important. That's also kind of we studying what we call in a secure driven networking because traditionally you can see today's networking just give you the connectivity and speed so they treat everything kind of uh no difference but with security driven network and you can make in the networking decision move based on the security function, like a different application or different content, different user, different device, even different location, you can make a different kind of level decision so that we see is a huge demand right now can make the whole environment, whole infrastructure much secure. >>That's absolutely critical that pivot to work from home was pretty much overnight a year and a half ago and we still have so many people who are permanently remote, remote but probably will be permanently and a good amount will be hybrid in the future, some TBD amount. Uh and one of the challenges is of course you've got people suddenly from home you've got a pandemic. So you've got an emotional situation, you've got people multitasking, they've got kids at home trying to learn maybe spouses working, they're trying to do Everything by a video conferencing and collaboration tools and the security risks. There are huge and we've seen some of that obviously reflected in the nearly 11 x increase in ransomware but talk to me about what 14 announced yesterday with links is to help on that front in a considerable way. >>That's where we totally agree with you the work from home or kind of hybrid way to work in. Pretty much will become permanent. And that's where how to make a home environment more kind of supporting is a remote working especially like when you have a meeting, there are some other things going on in the whole activity and also sometimes data you access can be pretty important, pretty confidential. That's where whether in the zero trust environment or making the home connection more reliable, more secure. It's all very, very important for us. Uh, that's where we were happy to partner with Lynxes and some other partner here uh, to support in this hybrid working environment to make work from home more secure. And uh, as we see is a huge opportunity, >>huge opportunity and a lot of industries, I had the pleasure of talking with links to Ceo Harry do is just an hour or so ago and I asked him what are some of the vertical, since we know from a security and a ransomware perspective, it's just wide open. Right, Nobody's safe anymore from it. But what are some of the verticals that you think are going to be early adopters of this technology, government health care schools, >>I think pretty much all vertical start and see this work from home and it's very, very important for us. There's a few top vertical, traditionally finance service, uh, spend a lot of money healthcare, spend a lot of money on security. So they are still the same? We don't see that change March on the other side. A lot of high tech company, which also one of the big vertical for us now, I say maybe half or even more than half the employee they want to work for home. So that's also making they say uh they call home branch now, so it's just make home always just secure and reliable as a branch office and at the same time of Southern government and the sort of education vertical and they all started C is very, very important to do this, remote their trust access approach and the same time working with a lot of service providers to supporting this, both the D. N. A. And also the sassy approach. So we are only companies on the saturday company partner, a lot of IT service provider. We do believe long term of the service provider, they have the best location, best infrastructure, best team to supporting Sassy, which we also build ourselves. If customers don't have a service provider, we're happy to supporting them. But if they have a service provider, we also prefer, they go to service provider to supporting them because we also want to have a better ecosystem and making everybody like uh benefit has women's situation. So that's what we see is whether they trust no access or sassy. Very happy to work with all the partners to making everybody successful. >>And where our customers in that evolution from traditional VPN to Z T and a for example, are you seeing an acceleration of that given where we are in this interesting climate >>uh definitely because work from home is uh if you try to access use VPN, you basically open up all the network to the home environment which sometimes not quite secure, not very reliable. Right? So that's where using a Z T N A, you can access a certain application in a certain like environment there. And the same leverage ste when there's other huge technology advantage can lower the cost of the multiple link and balance among different costs, different connection and uh different reliability there. Uh it's a huge advantage, >>definitely one of the many advantages that reporting it has. So this afternoon there's going to be a, as part of the security summit, a panel that you and several other Fortinet execs are on taking part in A Q and a, what are some of the topics that you think are going to come up? And as part of that Q and >>A. I see for certain enterprise customer, definitely the ransomware attack, how to do the internal segmentation, how to securely do the remote access work from home. So we are very important For some service provider. We also see how to supporting them for the sassy environment and certain whole infrastructure security, whether the 5G or the SD went because everyone has a huge demand and uh it's a group over for us, we become a leader in the space. It's very very important for them. We also see uh like a different vertical space, Some come from healthcare, some from come from education. Uh they all have their own kind of challenge. Especially like there's a lot of uh oh T IOT device in healthcare space need to be secured and the same thing for the O. T. IOT space, >>Tremendous amount of opportunity. One thing I want to ask it, get your opinion on is the cybersecurity skills gap. It's been growing year, over year for the last five years. I know that just last week 14 that pledge to train one million professionals in the next five years, you guys have been focused on this for a while. I love that you have a veterans program. I'm the daughter of a Vietnam combat veterans. So that always warms my heart. But is that something, is the cybersecurity skills got something that customers ask you ken? How do you recommend? We saw this? >>Yes, we have been doing this for over 10 years. We have the program, we call the network secured expert program a different level. So we have 24 million people. We also commit a traditional million people because there's a huge shortage of the scale separate security expert there. So we do work in with over like a 4500 university globally at the same time. We also want to offer the free training to all the people interested, especially all the veterans and other Like even high school graduate high school student there and at the same time anyone want to learn several security. We feel that that's, that's very good space, very exciting space and very fast-growing space also still have a huge shortage globally. There's a 3-4 million shortage of skilled people in the space, which is a or fast growing space. And so we were happy to support all the train education with different partners at the same time, try to contribute ourselves. >>I think that's fantastic. Will be excited to see over the next five years that impact on that training one million. And also to see it to your point with how much the industry is changing, how much, how fast supporting that's growing. There's a lot of job opportunity out there. I think it was Sandra who said that I was talking to her this morning that there's no job security like cybersecurity. It's really true. If you think about it. >>Yeah, I totally agree. Yeah. Like remember a few years ago when we started the first time to do all this interview, I said, hey, it's a barber hot space now, let's get harder and harder, more people interested now. And I really thank you cube and you give all the support it all these years and we're happy to be here. >>Absolutely. It's our pleasure. Well, I know you are paired up. You said tomorrow with Phil Mickelson for the pro am. That's pretty exciting, ken. >>I'm not sure I'm a very good golfer, but I will try my best. >>You try your best. I'm sure it will be a fantastic experience. Thank you for having the cube here for bringing people back together for this event, showing that we can do this, we can do this safely and securely. And also what Fortinet is doing to really help address that cyber security skills gap and uh, really make us more aware of the threats and the landscape and how we, as individuals and enterprises can help sort to quiet that storm >>also will be happy to be here and also being honored to be part of the program at the same time. We also want to thank you a lot of partner model customer and join us together for this big PJ event and thank you for everyone. >>Absolutely. And you guys are a big partner driven organization. I'm sure the partners appreciate that, ken, Thank you so much. >>Thank you. Thank you lisa >>for kenzi. I'm lisa martin. You're watching the cue from the Fortinet security summit in napa valley. >>Yeah. Mhm

Published Date : Sep 14 2021

SUMMARY :

Welcome back to the cubes coverage, affording that security summit at the ford championship here in napa. What are some of the things that you attribute this group to and what do you think in your opinion differentiates format? And that's also driving a huge growth, not just that was security, but also we see the fabric a lot of acquisitions, but one of the things, a lot of growth, another thing that we do know that's growing is So you have a secure the whole infrastructure. What are some of the customer conversation? the executive level now compared to before more I. T. Conversation. But I'm sure I imagine that's across every industry. Yeah pretty much all the vertical right? So let's talk about, here we are. on the other side we see sometimes it's uh working with a lot of a It's great to be outdoors right at 40 minutes doing an event outdoors showing that yes you can do that safely. So it's a team sport kind of on the other side it's all do and Talk to me about some of the main innovations that are being discussed. So it has to be deployed in the That's absolutely critical that pivot to work from home was pretty much overnight a year and a half ago and we still That's where we totally agree with you the work from home or kind of hybrid way huge opportunity and a lot of industries, I had the pleasure of talking with links to Ceo Harry do is just I say maybe half or even more than half the employee they want to work for home. So that's where using a Z T N A, you can access a certain a, as part of the security summit, a panel that you and several other Fortinet execs are on We also see how to supporting them for the sassy environment and certain is the cybersecurity skills got something that customers ask you ken? So we do work in with over like a 4500 And also to see it to your point with how much the industry is changing, And I really thank you cube and you give for the pro am. and the landscape and how we, as individuals and enterprises can help sort to quiet that storm We also want to thank you a lot of partner model customer and join us And you guys are a big partner driven organization. Thank you lisa I'm lisa martin.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
SandraPERSON

0.99+

40 minutesQUANTITY

0.99+

30 yearsQUANTITY

0.99+

Derek MankyPERSON

0.99+

lisa martinPERSON

0.99+

one millionQUANTITY

0.99+

500,000 customersQUANTITY

0.99+

11 timesQUANTITY

0.99+

yesterdayDATE

0.99+

tomorrowDATE

0.99+

Phil MickelsonPERSON

0.99+

10, 200QUANTITY

0.99+

John MadisonPERSON

0.99+

LynxesORGANIZATION

0.99+

kenziPERSON

0.99+

Ken XiePERSON

0.99+

BrandonPERSON

0.99+

24 million peopleQUANTITY

0.99+

last yearDATE

0.99+

FortinetORGANIZATION

0.99+

halfQUANTITY

0.99+

napa valleyLOCATION

0.99+

lisaPERSON

0.99+

over 10 yearsQUANTITY

0.99+

last week 14DATE

0.99+

first timeQUANTITY

0.99+

over 300 technology leadersQUANTITY

0.98+

million peopleQUANTITY

0.98+

kenPERSON

0.98+

30%QUANTITY

0.98+

SassyORGANIZATION

0.98+

D. N. A.LOCATION

0.98+

saturdayDATE

0.97+

3-4 millionQUANTITY

0.97+

one million professionalsQUANTITY

0.97+

this yearDATE

0.97+

oneQUANTITY

0.96+

todayDATE

0.96+

a year and a half agoDATE

0.96+

napaLOCATION

0.96+

more than halfQUANTITY

0.96+

BothQUANTITY

0.96+

bothQUANTITY

0.95+

this summerDATE

0.95+

two years agoDATE

0.94+

OneQUANTITY

0.93+

oneDATE

0.93+

one connectionQUANTITY

0.93+

zero trustQUANTITY

0.92+

few years agoDATE

0.92+

pandemicEVENT

0.92+

80QUANTITY

0.92+

4500 universityQUANTITY

0.92+

this afternoonDATE

0.92+

fordEVENT

0.91+

more than doubleQUANTITY

0.91+

1300 timesQUANTITY

0.9+

firstQUANTITY

0.9+

VietnamLOCATION

0.89+

Fortinet Security Summit 2021EVENT

0.89+

this morningDATE

0.89+

nearly 11 timesQUANTITY

0.87+

couple timesQUANTITY

0.87+

one thingQUANTITY

0.87+

top oneQUANTITY

0.86+

last 18 monthsDATE

0.85+

rogramPERSON

0.85+

last five yearsDATE

0.84+

Southern governmentORGANIZATION

0.84+

fordORGANIZATION

0.84+

Fortinet security summitEVENT

0.84+

top twoQUANTITY

0.78+

an hour orDATE

0.76+

KenPERSON

0.76+

nearly 11 xQUANTITY

0.76+

PJEVENT

0.74+

zeroQUANTITY

0.73+

5GORGANIZATION

0.72+

Ceo HarryORGANIZATION

0.72+

P.ORGANIZATION

0.71+

aboutQUANTITY

0.71+

MarchDATE

0.7+

almost two yearsQUANTITY

0.68+

cubaLOCATION

0.68+

fiveDATE

0.66+

next five yearsDATE

0.6+

yearsQUANTITY

0.58+

employeeQUANTITY

0.57+

Ruvi Kitov, Tufin | Fortinet Security Summit 2021


 

>>From around the globe. It's the cube covering Fortinet security summit brought to you by Fortinet. >>Okay. Welcome back everyone. To the cubes, coverage of Fortinets championship golf tournament, we're here for the cybersecurity summit. David got a great guest, Ruby cutoff CEO, and co-founder of Tufin great to have you on. Thank you for coming on the cube. We were chatting before. Came on. Camera, big talk. You just gave it. Thanks mom. Thanks >>For having me >>Not a bad place here. Golf tournament, golf and cybersecurity, kind of go together. You know, keep the ball in the middle of the fairway. You know, don't let it get out of bounds, you know, >>And it's a beautiful place. So, uh, very happy to be here and be a premier sponsor of the event. >>Congratulations and a good, good to have you on let's get into the cybersecurity. We were talking before we came on camera around how transformation is really hard. We went to the cloud is really hard refactoring. You're just really hard, but security is really, really hard. That's true. So how do you look at how security is perceived in companies? Is there dynamics that are being amplified by the rapid moved movement to the cloud? You seeing apps being developed really fast changes fast. What's the, what's the barometer of the industry right now? Sure, >>Sure. It's interesting. And this hasn't really changed in the past, but we've seen like exacerbated getting worse and worse. I think a lot of companies security is actually seen as a blocker and frankly security is probably the most hated department in the organization because a lot of times, first of all, the security says no, but also they just take their time. So if you think about organizations, enterprises, they run on top of their enterprise applications. They have applications that their own in-house developers are writing, and those developers are changing their apps all the time. They're driving change in it as well. So you end up having dozens of change requests from developers want to open connectivity. You want to go from point a to point B on the network. They open a ticket. It reaches the network security team that ticket might take several days until it's implemented in production. So the level of service that security provides the application teams today is really not very high. So you can really understand why security is not, um, looked upon favorably by the rest of the organization. >>And some organizations. My perception is, is that, you know, the hardcore security teams that have been around for awhile, they've got standards and they're hardcore, a new app comes in, it's gotta be approved. Something's gotta get done. And it's slower, right? It slows people down the perception. It could be slow. How is it changing? Yes, >>So it changing because when you're moving to the cloud and a lot of organizations are adopting the cloud in many ways, private cloud, public cloud hybrid cloud, you know, they're working in cloud native environments and those environments, you know, the developers are, they own the keys to the kingdom, right? They're managing AWS Azure, Google cloud to managing get hub. You know, they got the place to themselves. So they're pushing changes in their apps without asking it for permission. So they're suddenly exposed to this is how fast it can really be. And while anything that they do in the on-prem or sort of traditional applications is still moving very slowly unless they're using an automated approach to policy. So one of the things that I spoke about today is the need for organizations to adopt a policy centric approach. So they need to define a policy of who can talk to whom and what conduct to what across the entire organizational network, whether it's firewalls routers, which is cloud platforms. >>And then once you have that policy, you can start automated based on the policy. So the concept is somebody opens a ticket, a developer wants to make a change. They want a ticket in service. Now remedy that ticket reaches, uh, some system that's going to check for compliance against the policy. If you're able to immediately tell if that change is compliant or not, then you're able to make that split-second decision, which might take an analyst a couple of days, and then you can design the perfect minimal change to implement on the network. That is really agile, right? That's what developers want to see. And a lot of security departments are really struggling with that today. >>Why, why are they? That seems like a no brainer because policy-based innovation has been around in the network layer for many, many years decades. Right? We'll see, makes things go better, faster. Why would they be against it? Where were they? >>Yeah. So they're not really against it. I think it's just the sheer complexity and size of today's networks is nothing compared to where it was 10 years ago. So you have tens to hundreds of firewalls in large enterprises, thousands of routers and switches, load balancers, private cloud SDN, like NSX and ACI public cloud Kubernetes. It's just a plethora of networking. So we're thinking of it as proliferation of networking is getting worse and worse, especially with IOT and now moving to the cloud. So it is just so complex that if you don't have specialized tools, there's absolutely no way they'll, you'll be able to. >>So your talk must so gone over well, because I do a lot of interviews and I hear developers talking about shift left, right? Which is, you know, basically vernacular for do security in the dev CIC D pipelining. So while you're there rather than having to go fix the bugs later, this seems to be a hot trend. People like it, they want it, they want to check it off, get it done, move on this policy-based automation, help them here. >>It does in some ways, I mean, so you need a policy for the cloud as well, but there's a different challenge that I see altogether in the cloud. And one of the challenges that we're saying is that there's actually a political divide. You have network security folks who are managing, you know, firewalls routers, switches, and maybe the hub to the cloud. And then inside the spokes inside the cloud itself, you have a different team, cloud operators, cloud security folks. And those two teams don't really talk to each other. Some companies have set up centers of excellence, where they're trying to bring all the experts together. But most companies, network security, folks who want to understand what's happening inside the cloud are sort of given the Heisman. They're not invited to meetings. Um, and there's lack of which I think is tragic because it's not going to go over well. So there's huge challenges in security in the cloud. And unless these two departments are going to talk to each other and work together, we're not going to get anywhere near the level of security that we need. >>The cloud team, the cloud guys, if you will, you know, quote guys or gals and the security guys and gals, they're not getting along. What's the, what's the, is it historical? Just legacy structures? Is it more of my department? I own the keys to the kingdom. So go through me kind of the vibe, or is it more of just evolution of the, developer's going to say, I'm going to go around you like shadow it, um, created the cloud. Is there like a shadow security, but trend around this? >>Yeah, there is. And I think it stems from what we covered in the beginning, which is, you know, app developers are now used to and trained to fear security. Every change they want on the on-prem network takes a week, right? They're moving to the cloud. Suddenly they're able to roam freely, do things quickly. If network security folks come by and say, oh, we want to take a look at those changes. What they're hearing, the music is all we're going to slow you down. And the last thing cloud guys want to hear is that we're going to slow you down. So they have they're fearfully. You know, they're, they're rightly afraid of what's going to happen. If they enable a very cumbersome and slow process, we got to work differently. Right? So there's new paradigms with dev DevSecOps where security is built into the CIC pipeline, where it doesn't slow down app developers, but enables compliance and visibility into the cloud environments at the same time. Great stuff. >>Great insight. I want to ask you your, one of your things in your top that I found interesting. And I like to have you explain it in more detail is you think security can be an enabler for digital transformation. Digital transformation can kick the wrong yeah. With transforming. Okay. Everyone knows that, but security, how does security become that enabler? >>So, I mean, today security is a, um, as a blocker to digital transformation. I think anybody that claims, Hey, we're on a path to digital transformation. We're automated, we're digitally transformed. And yet you asked the right people and you find out every change takes a week on the network. You're not digitally transformed, right? So if you adopt a, a framework where you're able to make changes in a compliant secure matter and make changes in minutes, instead of days, suddenly you'll be able to provide a level of service to app developers like they're getting in the cloud, that's digital transformation. So I see the network change process as pretty much the last piece of it that has not been digitally transformed yet. >>And this is where a lot of opportunity is. Exactly. All right. So talk about what you guys are doing to solve that problem, because you know, this is a big discussion. Obviously security is on everyone's mind. They're reactive to proactive that buying every tool they can platforms are coming out. You're starting to see a control plane. You're starting to see things like collective intelligence networks forming, uh, what's the solution to all this, >>Right? So what we've developed is a security policy layer that sits on top of all the infrastructure. So we've got, uh, four products in the two for an orchestration suite where we can connect to all the major firewalls, router, switches, cloud platforms, private cloud SDN. So we see the configuration in all those different platforms. We know what's happening on the ground. We build a typology model. That is one of the industry's best apology models that enables us to query and say, okay, from point a to point B, which firewalls, router switches and cloud platforms will you traverse. And then we integrate it with ticketing system, like a remedy or service now, so that the user experiences a developer opens a ticket for a change that ticket gets into Tufin. We check it against the policy that was defined by the security managers, the security manager defined a policy of who can talk to whom and what conducted what across the physical network and the cloud. >>So we can tell within a split second, is this compliant or not? If it's not compliant, we don't waste an engineer's time. We kick it back to the original user. But if it is compliant, we use that typology model to perform network change design. So we design the perfect minimal change to implement an every firewall router switch cloud platform. And then the last mile is we provision that change automatically. So we're able to make a change in minutes, instead of days would dramatically better security and accuracy. So the ROI on Tufin is not just security, but agility balanced with security at the same time. So you like the rules of the road, >>But the roads are changing all the time. That's how do you keep track of what's going on? You must have to have some sort of visualization technology when you lay out the topology and things start to be compliant, and then you might see opportunity to do innovative buckets. Hey, you know, I love this policy, but I'm, I'm going to work on my policy because sure. Got to up your game on policy and continue to iterate. Is that how do they, how do your customers Daniel? >>So listen, we we're, uh, we're not a tiny company anymore. We've grown. We went public in April of 2019 race and capital. We have over 500 employees, we sold over 2000 customers worldwide. So, um, you know, when customers ask us for advice, we come in and help them with consulting or professional services in terms of deployment. And the other piece is we gotta keep up all the time with what's happening with Fortnite. For example, as, as one of our strategic partners, every time fortnight makes the change we're on the beta program. So we know about a code change. We're able to test them the lab we know about their latest features. We got to keep up with all that. So that takes a lot of engineering efforts. We've hired a lot of engineers and we're hiring more. Uh, so it takes a lot of investment to do this at scale. And we're able to deliver that for our customers. >>I want the relationship with 400. I see you're here at the golf tournament. You're part of the pavilion. You're part of the tournament by the way. Congratulations. Great, great, great event. Thank you. What's the relationship with food and air from a product and a customer technology standpoint, >>We're working closely with Fortnite, where they're a strategic partner of ours. We're integrated into their Fordham manager, APIs. We're a fabric ready solution for them. So obviously working closely. Some of our biggest customers are fortnight's biggest customers will get the opportunity to sponsor this event, which is great tons of customers here and very interesting conversations. So we're very happy with that relationship. >>This is good. Yeah. So that ask you, what have you learned? I think you got great business success. Looking back now to where we are today, the speed of the market, what's your big takeaway in terms of how security changed and it continues to be challenging and these opportunities, what was the big takeaway for you? >>Well, I guess if you were like spanning my career, uh, the big takeaway is, uh, first of all, and just in startup world, patients think things come to those away, but also, um, you know, just, you got to have the basics, right? What we do is foundational. And there were times when people didn't believe in what we do or thought, you know, this is minor. This is not important as people move to the cloud, this won't matter. Oh, it matters. It matters not just in on-prem and it matters in the cloud as well. You gotta have a baseline of a policy and you gotta base everything around that. Um, and so w we've sort of had that mantra from day one and we were right. And we're, we're very happy to be where we are today. Yeah. >>And, you know, as a founder, a co-founder of the company, you know, most of the most successful companies I observed is usually misunderstood for a long time. That's true. Jesse's favorite quote on the cube. He's now the CEO of Amazon said we were misunderstood for a long time. I'm surprised it took people this long to figure out what we were doing. And, and that was good. A good thing. So, you know, just having that north star vision, staying true to the problem when there were probably opportunities that you are like, oh, we, you know, pressure or sure. Yeah. I mean, you stayed the course. What was the, what was the key thing? Grit focused. Yes. >>Looking to startup life. It's sorta like being in sales. We, we got told no, a thousand times before we got told yes. Or maybe a hundred times. So, uh, you gotta, you gotta be, um, you got to persevere. You gotta be really confident in what you're doing and, uh, just stay the course. And we felt pretty strongly about what we're building, that the technology was right. That the need of the market was right. And we just stuck to our guns. >>So focus on the future. What's the next five, five years look like, what's your focus? What's the strategic imperative for you guys. What's your, what's your, what do you mean working on? >>So there's several things that on the business side, we're transitioning to a subscription-based model and we're moving into SAS. One of our products is now a SAS based product. So that's very important to us. We also are now undergoing a shift. So we have a new version called Tufin Aurora Tufin Aurora is a transformation. It's our next generation product. Uh, we're rearchitected the entire, uh, underlying infrastructure to be based on microservices so we could be cloud ready. So that's a major focus in terms of engineering, uh, and in terms of customers, you know, we're, we're selling to larger and larger enterprises. And, uh, we think that this policy topic is critical, not just in the on-prem, but in the cloud. So in the next three years, as people move more and more to the cloud, we believe that what we do will be, become even more relevant as organization will straddle on-premise networks and the cloud. So >>Safe to say that you believe that policy based architecture is the key to automation. >>Absolutely. You can't automate what you don't know, and you can't people, like I mentioned this in my talk, people say, oh, I can do this. I can cook up an Ansible script and automate, all right, you'll push a change, but what is the logic? Why did you make that decision? Is it based on something you've got to have a core foundation? And that foundation is the policy >>Really great insight. Great to have you on the cube. You've got great success and working knowledge and you're in the right place. And you're skating to where the puck is and will be, as they say, congratulations on your success. Thank >>You very much. Thanks for having >>Me. Okay. Keep coming here. The Fortinet championship summit day, cybersecurity summit, 40 minutes golf tournament here in Napa valley. I'm John Firmicute. Thanks for watching.

Published Date : Sep 14 2021

SUMMARY :

security summit brought to you by Fortinet. and co-founder of Tufin great to have you on. You know, don't let it get out of bounds, you know, And it's a beautiful place. Congratulations and a good, good to have you on let's get into the cybersecurity. So if you think about organizations, enterprises, they run on top of their enterprise applications. My perception is, is that, you know, the hardcore security teams that have been around for awhile, and those environments, you know, the developers are, they own the keys to the kingdom, And then once you have that policy, you can start automated based on the policy. That seems like a no brainer because policy-based innovation has been around in the network layer So you have tens to hundreds of firewalls Which is, you know, basically vernacular for do security in the dev CIC You have network security folks who are managing, you know, firewalls routers, switches, The cloud team, the cloud guys, if you will, you know, quote guys or gals and the security And the last thing cloud guys want to hear is that we're going to slow you down. And I like to have you explain it in So if you So talk about what you guys are doing to solve that problem, So we see the configuration So you like the rules of the road, You must have to have some sort of visualization technology when you lay out the topology and things start And the other piece is we gotta keep up all the time You're part of the tournament by the way. So we're very happy with that relationship. I think you got great business but also, um, you know, just, you got to have the basics, And, you know, as a founder, a co-founder of the company, you know, most of the most successful companies I observed is So, uh, you gotta, So focus on the future. as people move more and more to the cloud, we believe that what we do will be, become even more relevant You can't automate what you don't know, and you can't people, Great to have you on the cube. You very much. Thanks for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavidPERSON

0.99+

April of 2019DATE

0.99+

John FirmicutePERSON

0.99+

Ruvi KitovPERSON

0.99+

AmazonORGANIZATION

0.99+

Napa valleyLOCATION

0.99+

twoQUANTITY

0.99+

tensQUANTITY

0.99+

FortniteORGANIZATION

0.99+

JessePERSON

0.99+

TufinPERSON

0.99+

FortinetORGANIZATION

0.99+

AWSORGANIZATION

0.99+

thousandsQUANTITY

0.99+

DanielPERSON

0.99+

oneQUANTITY

0.99+

two departmentsQUANTITY

0.99+

two teamsQUANTITY

0.99+

FordhamORGANIZATION

0.99+

over 500 employeesQUANTITY

0.99+

over 2000 customersQUANTITY

0.99+

TufinORGANIZATION

0.98+

todayDATE

0.98+

10 years agoDATE

0.98+

a weekQUANTITY

0.97+

ACIORGANIZATION

0.96+

four productsQUANTITY

0.95+

NSXORGANIZATION

0.91+

Fortinet Security Summit 2021EVENT

0.91+

SASORGANIZATION

0.89+

DevSecOpsTITLE

0.88+

FortniteTITLE

0.86+

point BOTHER

0.85+

five yearsQUANTITY

0.84+

GoogleORGANIZATION

0.83+

dozens of change requestsQUANTITY

0.83+

next three yearsDATE

0.83+

cybersecurity summitEVENT

0.83+

Fortinet security summitEVENT

0.82+

Ruby cutoffPERSON

0.82+

hundred timesQUANTITY

0.81+

Fortinet championship summit dayEVENT

0.8+

hundreds of firewallsQUANTITY

0.8+

AzureTITLE

0.79+

AnsibleORGANIZATION

0.78+

CIC DTITLE

0.78+

Fortinets championshipEVENT

0.77+

40 minutes golfQUANTITY

0.75+

thousand timesQUANTITY

0.74+

TufinTITLE

0.74+

firstQUANTITY

0.71+

day oneQUANTITY

0.7+

cloudTITLE

0.69+

One of our productsQUANTITY

0.65+

400ORGANIZATION

0.65+

northORGANIZATION

0.63+

Aurora Tufin AuroraCOMMERCIAL_ITEM

0.6+

fiveQUANTITY

0.59+

point aOTHER

0.57+

KubernetesTITLE

0.55+

thingsQUANTITY

0.53+

routersQUANTITY

0.5+

daysQUANTITY

0.46+

HeismanTITLE

0.35+

Harry Dewhirst, Linksys | Fortinet Security Summit 2021


 

>>From around the globe. It's the cube covering Fortinet security summit brought to you by Fortinet. >>Welcome back to Napa Lisa Martin here at the 40, that championship security summit. I'm pleased to welcome the CEO of links us who joins me next. Harry do Hurst, Harry, welcome to the program. Great to you're here we are in an in-person event. One, which is fantastic. Two we're outdoors, three we're in Napa. >>What's not to love. >>There's nothing, nothing not to love. So you had a session this morning. Talk to me about some of the things that you shared with attendees. >>So the session was, was talking about hybrid work and really the how to make that successful. And, you know, we, as a business have really focused making it, not just work for companies, but for companies to thrive and to really embrace, um, the hybrid work and, and, and extract the Mo the most benefit from it. So we, we spoke about the challenges that, that, that, uh, that has, and some of the solutions to, uh, to solving those challenges. >>Tell me about some of the solutions I'm very familiar with as someone who has been working from home for 18 months, some of the challenges I know, understand it too, from an enterprise security perspective, but what are some of the solutions that links us CS? >>So the solutions are fall into kind of three main categories. The first is of course having the best and latest wireless technologies. So that's wifi six wifi, um, it's of course, needs to be coupled with having a good pipe into your home, or all leveraging 5g and other wireless technologies to have, have great connectivity, then having mesh networking to enable it to be wall-to-wall coverage, seamless roaming between, between all the devices to mean that your, your network infrastructure within the home is very robust. Th th the second kind of pillar of, of, of solution is, is around. Now, you can bring enterprise grade security into the home. Typically it would sit in server cupboards in, in, in, in offices and now, um, with, with us and fortunate, we've created a product which brings that enterprise grade technology for the first time into the, into the home. So it managers no longer have to, um, compromise when it comes to security and they can apply the same policies that they would be doing in an office of 10,000 people to 10,000 offices that are in individual's homes. And, and that's a kind of a first, first world first, I would say, but, um, is going to be critical. And again, it, it, it's about moving from it's good enough to let's make it amazing. Um, and let's not compromise on something as critical as security and safety. >>Absolutely. We know we've spoken a lot with 40 net today and over the last year and a half about the massive changes to the threat landscape, the expansion of it, especially with this pivot, when suddenly there were all of these devices, personal devices on home networks, corporate devices on home networks, it's really changed, not just the threat landscape, but also what enterprises need to do. You guys, you mentioned this new announcement came out yesterday, the Linx has homework solution powered by Fordanet talk to us about that, the Genesis of it, and what we're enterprises can actually get access to this. >>Sure. So, so yeah, this is a product that really it's been a meeting of minds. You know, lynxes, lynxes are a leader and have been a leader since the very beginning of wireless. And, and we are, you know, a leader today. Um, Fortnite of course, we're a leader in enterprise security. So the two combined providing the best in class, uh, home internet experience coupled with, um, the, the security, which can be managed by the business. So when as a, as a, as an end user, as a, as a, as an employee, when I plug in this equipment, it automatically phones home to, to, to, to link LyncSys. And then in turn to force net, we know that it's Harriet LyncSys, that that has been been plugged in. It will spin up a network for me, personally, and my family to use in the home. So the, the benefit to the, to the, to the consumer is that there's a fantastic wifi, six mesh solution throughout their home, which is most likely a significant upgrade on their Verizon equipment or whatever it might be. Um, and it's been spins up a corporate network and that corporate network for all intensive purposes is, is imitating exactly like if you were sitting at your desk in the office, in the corporate office. So it becomes an extension of the corporate network. Um, and as I say, it sits behind, behind the FortiGate. >>Talk to me about the Genesis of the solution. Was it the pandemic, because lynxes has seen the challenges from the consumer centric point of view. Talk to me about really kind of the catalyst for these two powerhouses coming together. >>So it was actually something that we were working on three pandemic and fortunate work. We're, we're, we're also looking at how to support the remote work because remote work is not like totally new, this, this pandemic has rapidly accelerated it, but, um, there was already a market and growing, this has just accelerated it. So both businesses independently of one another, where we're kind of toying with it. So when, when we then kind of came together, it was, it was a no brainer. And there was a kind of light bulb moment. And, and we, we realized that the combined solution with the two businesses and bringing together the expertise from both was really, would be how, how we would succeed. >>Do you see any in the last, I know it was just announced yesterday, but any, any industries in particular that you think are really like low-hanging fruit for this type of technology? >>I mean, I think finance is of course, um, you know, there's the high stakes poker in, in that industry. So, um, same goes for healthcare, um, and, and, and even education. So ones that where security is paramount of, and of course security is paramount everywhere, but those ones in particular, given the nature of, of the, those industries. So, so we really expect to see banking, finance, healthcare, uh, pharma, as, as key verticals that we would, uh, we would expect to be successful. >>Okay, excellent. Well, one of the challenges with the ransomware increases, the 40 net threat landscape report showed it's nearly up 11% in the last 12 months. Of course, we have that rapid pivot to work from home 18 months ago, and ransomware and phishing and, and techniques and social engineering getting so much more sophisticated and personalized. Now you've got someone working from home who probably has a million distractions, kids, spouses, et cetera. So easy to click on a link that for most of it looks very legitimate. So having a solution like this in place is really critical for >>Absolutely. And, and I think, you know, until those vulnerabilities are sealed, you know, the attacks will continue. And this solution is part of the, the, the soul for that. Because as soon as, as soon as these, these holes in the bucket of a tape shut, um, you know, the, the appetite to, to invest time in, in attacks, we'll, we'll, we'll fade, >>Hopefully that's the direction that we need to see it going, right. Not up until the right down. Talk to me about, so you mentioned from the it perspective, I'm looking for the benefits for an enterprise, it organization, centralized visibility, they can see in terms of productivity. I imagine it's much better for the end user, but give me that kind of it business perspective, how does this help them come together? >>So for all intents and purposes, the it manager will see within their, their fortunate, uh, interface, these devices, these links devices in people's homes, just in the same way that they would see 40 gates in their office in New York or their office in Pittsburgh. So, um, you know, it really is this, there were 15,000 people in five offices. There's now 15,000 people in 15,000 offices, and, but they can push and manage an and, and push those security, um, policies seamlessly down to all 15,000. They can categorize them. They can, they can do fall intensive purposes. Those, those employees are sitting in the, in one of their facilities. And, and that's really the, the bar that I believe companies should be holding themselves to because, um, it, it provides security for the company. It provides security for the employee, and of course, then by them being able to connect efficiently and secure securely and with great speed and no interruption, that's good for productivity, which is good for the company's profitability. >>Absolutely. It's all interconnected. And this is tuned for video conferencing. Is that >>Yes. So, so we've actually partnered with, um, both zoom and teams, Microsoft teams to, um, we've done an integration with them whereby we're able to identify and optimize that traffic within the network. So, so that adds an added benefit to, to users of those services. And we'll, we'll, we'll be rolling out further, um, partnerships with other key, um, utilities that enable that to optimization to, to, to help it be streamlined. >>So prioritize zoom and teams for the parents kick the kids >>Off. I mean, we've all experienced. The apple TV gets fired up, zoom goes down or, or fought for fortnight, uh, gaming sessions cause you know, havoc within the home. So it it's that application prioritization and optimization that, that I think will also really benefit, um, companies and the employees. The, the frustration is immense. >>I agree I've experienced some of that, but what you're really doing is providing a very secure lifeline that the enterprise needs, the employee needs. It, it's all tied together, productive employees, that our customer experience that our products and services it's, it's really these days, especially considering we don't know how much longer this is going to persist. We expect that there will be some amount of hybrid that will probably be permanent, but that's a lifeline. >>Yes, no, absolutely. I think to your point around the permanence of this, you know, of course we're not all going to be hermits and leave live at home forever, but that, you know, I think this has opened both companies and individuals eyes to what's possible. And I think if you implement these, these types of measures, then you you're setting it up for success. And, and, um, you know, I believe that the solution that we've launched is, is a part of the, the, the piece of the puzzle. >>Maybe the acceleration of it had a bit of a silver lining from what we've all experienced in the last 18 months. Yes. Yes. Talk to me about some of the comments and the feedback that you got from your session this morning. I'm sure people are very excited to hear about what you're doing. >>Yeah. I mean, since, since the announcement came out yesterday, there's been, there's been certainly a lot of interests in appetite. Um, and yeah, we're super excited about the reception it's received. Um, I think that a lot of people that are like, oh, wow, of course, why, why wouldn't this exist already? Um, and, and when you look at it like that, it kind of is obvious, but it, you know, no one expected of course the pandemic and therefore the, no one was ready for it and it's taken us a year or so to, to get a product that's, that's, that's viable and ready and going to be going to be really, really, um, a great utility for companies, but there really was nothing else out there. >>It is surprising in a sense, but then you're right. No one was prepared for the pandemic. We didn't see it coming. And we didn't think that this was a situation that we were going to have to prepare for, let alone live for as long as, as TBD, long as we have. >>Yeah, no, absolutely. That's um, I think it caught everyone by surprise. I think maybe if, if it had happened several years later than the hybrid work movement had started, it was in its infancy. It got very, very quickly ramped up to adulthood. >>I definitely >>Did. So, uh, so great news, very exciting. What you guys are doing with 49. I'm sure that there's going to be great customer feedback. We'll be excited to watch what happens as it gets deployed and rolled out and see how this really transforms the enterprise experience, the employee experience. And I imagine this is a great differentiator for links us business. No. Um, I think it's, it's a really exciting next chapter of, of our, of our history. You know, we've been around for 30 plus years and, um, I think this is, this is a real step change in, in, in where we're focused and I'm super excited about the future. >>I like that change in the future. Well, here we are in beautiful Napa. You said you're not a golfer, but your wife has, >>My wife is golfing. I I'm going to be keeping very many fingers crossed tomorrow during the program for this, for the safety of the spectators. >>That's awesome that she's in the program and here you are settled with all these meetings and all those >>Things. >>Exactly. Well, Harry, it's been a pleasure talking to you. Thank you for joining me on the program, explaining the links as homework solution powered by 49 and all the great things that are going to come from that. Thank you for Harry. Do Hurst. I'm Lisa Martin. You're watching the cube and Napa at the 40 minute security championship.

Published Date : Sep 14 2021

SUMMARY :

security summit brought to you by Fortinet. Welcome back to Napa Lisa Martin here at the 40, that championship security summit. Talk to me about some of the things that and some of the solutions to, uh, to solving those challenges. coverage, seamless roaming between, between all the devices to mean that a half about the massive changes to the threat landscape, the expansion of it, So it becomes an extension of the corporate network. Talk to me about the Genesis of the solution. So it was actually something that we were working on three pandemic and fortunate work. I mean, I think finance is of course, um, you know, there's the high So easy to click on a link that for most of it looks very legitimate. of a tape shut, um, you know, the, the appetite to, Talk to me about, so you mentioned from the it perspective, I'm looking for the benefits for an enterprise, It provides security for the employee, and of course, then by them being able to connect And this is tuned for video conferencing. to optimization to, to, to help it be streamlined. So it it's that application prioritization the enterprise needs, the employee needs. and, um, you know, I believe that the solution that we've launched is, is a part of the, the, Talk to me about some of the comments and the feedback you know, no one expected of course the pandemic and therefore the, And we didn't think that this was a situation that we were going to have to prepare for, I think maybe if, if it had happened several years later than the hybrid I'm sure that there's going to be great customer feedback. I like that change in the future. I I'm going to be keeping very many fingers crossed tomorrow during the program powered by 49 and all the great things that are going to come from that.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

HarryPERSON

0.99+

MicrosoftORGANIZATION

0.99+

PittsburghLOCATION

0.99+

New YorkLOCATION

0.99+

VerizonORGANIZATION

0.99+

NapaLOCATION

0.99+

five officesQUANTITY

0.99+

15,000 peopleQUANTITY

0.99+

15,000 peopleQUANTITY

0.99+

15,000 officesQUANTITY

0.99+

18 monthsQUANTITY

0.99+

yesterdayDATE

0.99+

two businessesQUANTITY

0.99+

lynxesORGANIZATION

0.99+

10,000 officesQUANTITY

0.99+

TwoQUANTITY

0.99+

tomorrowDATE

0.99+

a yearQUANTITY

0.99+

15,000QUANTITY

0.99+

Harry DewhirstPERSON

0.99+

bothQUANTITY

0.99+

twoQUANTITY

0.99+

FortinetORGANIZATION

0.99+

30 plus yearsQUANTITY

0.99+

10,000 peopleQUANTITY

0.99+

LinxORGANIZATION

0.99+

OneQUANTITY

0.99+

threeQUANTITY

0.99+

first timeQUANTITY

0.99+

40 gatesQUANTITY

0.98+

both businessesQUANTITY

0.98+

firstQUANTITY

0.98+

40 minuteQUANTITY

0.98+

six meshQUANTITY

0.98+

todayDATE

0.97+

this morningDATE

0.97+

both companiesQUANTITY

0.96+

18 months agoDATE

0.96+

two powerhousesQUANTITY

0.96+

LinksysORGANIZATION

0.95+

several years laterDATE

0.95+

second kindQUANTITY

0.94+

LyncSysTITLE

0.93+

oneQUANTITY

0.92+

pandemicEVENT

0.92+

40 netORGANIZATION

0.91+

40 net threatQUANTITY

0.88+

last 18 monthsDATE

0.88+

FortiGateORGANIZATION

0.86+

40EVENT

0.86+

three main categoriesQUANTITY

0.83+

11%QUANTITY

0.83+

last 12 monthsDATE

0.83+

Fortinet Security Summit 2021EVENT

0.82+

5gOTHER

0.8+

apple TVCOMMERCIAL_ITEM

0.79+

last year and a halfDATE

0.76+

Fortinet security summitEVENT

0.73+

49QUANTITY

0.72+

FordanetORGANIZATION

0.61+

HarrietPERSON

0.47+

FortniteORGANIZATION

0.46+

million distractionsQUANTITY

0.44+

John Maddison, Fortinet | Fortinet Security Summit 21


 

>> Narrator: From around the globe, it's theCUBE, covering Fortinet Security Summit, brought to you by Fortinet. >> Welcome back to theCUBE, Lisa Martin here live in Napa Valley at the Fortinet Championship. This is the site of kickoff to the 2021-22 FedEx Cup regular series. We're here with Fortinet and we're here with one of our distinguished alumni, John Madison, the CMO and EVP of products. John, it's great to see you in person. >> Yes, Lisa it's been a while. >> It has been a while. >> Good to be back here, live. >> I know, you're not on Zoom, you're actually right six feet across from me. >> Yep, look, yes, it's definitely physical. >> It does, talk to me about the PGA and Fortinet. What are some of the synergies? >> There's a lot. I think one of the biggest ones is the culture of the two companies. So I mean, PGA tour, I think they've donated almost $3 billion to charities over the last 15 years, 20 years and we're the same. We would definitely want to give back to the community. We want to make sure we're providing training and education. We're trying to re-skill some of the veterans, for example, over 2000, also women in technology, you may have heard one of the key notes today about that, attempts from a education and training perspective. So there's a lot of synergies between the PGA Tour, and Fortinet from a cultural perspective. >> I love that. Cultural synergy is so important but also some of the initiatives, women in tech, STEM, STEAM, those are fantastic. Give our audience a little overview of what's going on here. We've got over 300 partners and customers here. What are some of the key themes being discussed today? >> Yeah, we're going to try and keep it smaller, this event. We don't want 10,000, 20,000 people. We'll keep it smaller. So about 300 customers and partners, and what we want to do is bring together, you know, the top people in cybersecurity and networking, we want to bring in customers so they can net with each other, we want to bring the partners here. And so, what you're going to see is you can see the tech expo behind you there, where people are talking technology. Some of the keynotes focus on areas like ransomware, for example, and cyber security in different industries. So definitely it's a smaller gathering, but I think it's very focused on cybersecurity and networking. >> Well, that's such an important topic these days. You know, you and I have spoken a number of times this summer by Zoom, and talking about the threat landscape and the changes-- >> Yep. >> And the work from anywhere. When you and I spoke, I think it was in June, you said 25% we expect are going to go back to the office, 25% permanently remote and the other 50 sort of transient. Do you still think given where we are now in September that that's still-- >> Yeah, I'm going to modify my prediction a bit, I think it's going to be hybrid for some time. And I don't think it's just at home or not at home or at work or not at work, I think it's going to be maybe one or two days, or maybe three days versus five days. And so, we definitely see the hybrid mode of about 50% for the next couple of years at least. I think that, you know, ransomware has been in the news a lot. You saw the Colonial, the ransomware has increased. We did a threat report recently. Showed about a 10X increase in ransomware. So, I think customers are very aware of the cybersecurity threats. The damage now is not just sucking information out and IP, it's causing damage to the infrastructure. So definitely the, you know, the attack surface is increased with people working from home, versus in the office, and then you've got the threat landscape, really, really focused on that ransomware piece. >> Yeah, ransomware becoming a household word, I'm pretty sure even my mom knows what that is. And talking about the nearly 11X increase in, what was that, the first half of 2021? >> Yeah, over the last 12 months. And I think what's also happened is ransomware used to be a broad attack. So let me send out, and see if I can find a thousand companies. Again, you saw with the Colonial attack, it's very targeted now as well. So you've got both targeted and broad ransomware campaigns going on. And a lot of companies are just rethinking their cybersecurity strategy to defend against that. And that work from home component is another attack surface. So a lot of companies that were operational technology companies that had air gaps and people would come to work, now that you can remotely get into the network, it's again, you can attack people at home, back into the network. >> Is that a direct correlation that you've saw in the last year, in terms of that increase in ransomware and this sudden shift to working from home? >> Well, I also think there's other components. And so, I think the ransomware organizations, the gangs, could use crypto more reasonably than checks and dollars and stuff like that. So they could get their money out. It became very profitable versus trying to sell credit card data on the dark web. So you saw that component. You also saw, as I said, the attack surface be larger for companies, and so those two things unfortunately have come together, and you know, really seen an exponential rise in attacks. >> Perfect storm. Let's talk about some of your customer conversations and how they've changed and evolved in the last 18 months. Give me a snapshot of when you're talking with customers, what are some of the things that they're coming to you for help, looking for the most guidance? >> Yeah, well I think, you know, the digital innovation transformation is almost accelerated because of, you know, COVID. They've accelerated those programs, especially in industries like retail, where it becomes almost essential now to have that digital connectivity. So they can't stop those programs. They need to accelerate those programs, but as they move those programs faster, again they expand their attack surface. And so, what I'm definitely seeing is a convergence of traditional kind of networking, connectivity, and cybersecurity teams like the CIO and the CSO working on projects jointly. So whether it be the WAN connectivity, or whether it be endpoint, or whether it be cloud, both teams are working much more closely going forward. >> Synergies there that are absolutely essential. Talk to me about what you guys announced with Linksys yesterday, speaking of work from home and how that has transformed every industry. Talk to us about the home work solution powered by Fortinet. >> Yeah, well, we definitely see work from home being there for some time. And so the question is, what do you do there? So I think initially 18 months ago, what happened was companies turned on their, what they call a VPN, which gives them an encrypted access when they went from 5% to a 100% people on the VPN. I speak to customers now and they're saying, that was kind of a temporary solution. It puts an end point security there. It was kind of temporary and now I need a longer-term solution because I can see this at least 50% for the next two years, being this hybrid work from home, and some of them are saying, "Well, let's look at something. Let's try and take the best of enterprise networking and security, and then try and match that with an easy to set up Wi-Fi or routing system." So the two companies, you know, have come together with this joint venture. We're taking Linksys technology from an ease of use at home, it's very simple to set up, you can do it on an app or whatever. And then we integrate the Fortinet technology inside there from a security and enterprise networking. The enterprises can manage themselves, the enterprise component and the consumer can manage their piece. What's very important is that separation as well. So the privacy of your home network, and then to make sure the enterprise piece is secure, and then also introducing some simple, what we call quality of service. So for a business person, things like Teams or Zoom as preference over some of the gaming and downloads of the family. So I think it brings the best of both worlds: ease of use and enterprise security together. >> I'm sure the kids won't like that it's not optimized for gaming, but it is optimized for things like video conferencing which, in the last year we've been dependent on for collaboration and communication. Tell me a little bit about the tuning for video conferencing and collaboration. >> Yeah, so we announced both Zoom and Microsoft Teams, probably the two biggest apps, which I use from a work from home business perspective. And definitely if you've got a normal system at home and your kids they've been downloading something, a new game or something like that, they can just take the whole bandwidth. And so the ability to kind of scale that back and make sure the Zoom meeting or the Teams meeting is first priority, I think is very important, to get that connectivity and that quality of service, but also have that security component as well. >> Yeah, the security component is increasingly important. Talk to me about why Linksys, was COVID the catalyst for this partnership? >> Well, I think we looked at it and we have our own work from home solutions as well. I mean, our own gear. We definitely wanted to find something where we could integrate into more of a ease of use solution set. And it just so happened we were speaking to Linksys on some other things and as soon as we started talking, it was very, very clear that this would be a great relationship and joint venture and so we made the investment. Not just "here's some of our code", we made a substantial investment in Linksys and yeah, we see some other things coming in the future as well. >> Can you talk to me a little bit about what the go to market will be, how can enterprises and consumers get this? >> Yeah. So it's more of an enterprise sale. I know some people think Linksys, they think consumer straight away. For us, this is a sale to the enterprises. So the enterprises buy it, it's a subscription service. So they just pay a monthly fee and they can have different levels of service inside there as well. They will get, you know, for each employee they'll get one, two or three nodes. And then so the, so the enterprise is paying for it, which I think will help a bit and they will manage it through their system, but the consumer will get this kind of a game that's very easy to use, very high speed connectivity, mesh technology. So yes, Linksys will sell some of it as well. But I think, you know, actually Fortinet will be the major kind of go to market because of our 500,000 business customers we have out there. >> Right. And your huge partner network. >> Yes. >> So let's talk about, give me a little bit of a view in terms of the benefit that IT will get leveraging the Linksys home work solution. I imagine that centralized visibility of all the devices connected to the corporate network, even though, wherever the devices are? >> Yeah, it actually extends the corporate network. So not in this initial release, in the second release. In the first release, they can go to a cloud portal and they can manage what they can manage from an enterprise perspective. The employee can go to the same portal, but gets a different view, can manage their piece. In the second release, we'll actually have support in our management systems. So if you're an existing Fortinet customer and you've got our management systems and say you've got, I don't know, 250 sites, and you're managing some of our firewalls or SD WAN systems, You'll be able to see all the employees links as systems as well, in that same management system. But again, there's a separation of duty and privacy where they can just manage the enterprise components, not they can't see the traffic from the employees' side, from the non-business transactions. >> Good. That privacy is key there. Do you think that in a perfect world, would help quiet down some of the perfect storm that we're seeing with ransomware and this explosion, this work from anywhere, work from home, going to be persisting technologies, like what you're doing with Linksys, is going to help make a dent in that spike? >> I think it's a component. So for us, the long term strategy for users, end point, this kind of Linksys component is an element. We also feel like there needs to be a transition of VPN technology into zero trust. So you're limiting again, the access to applications versus the network. And then definitely the third component would be a technology like EDR, which is more behavioral-based versus signature-based. And so you bring all those three together. Absolutely we'll make a dent in ransomware because you're just reducing the attack surface greatly, but also scanning the technology to make sure if you see something, you can act straight away. >> And then pair that with what you guys are doing and the investment that Fortinet's been making for a while in training and helping to fill that cybersecurity skills gap, which is growing year on year. >> Yeah. I speak to a lot of CSOs and CIOs and they go "What's the latest technology? What can you do next?" I say, well, the most important thing you can do is train your people. Train them not to click on that phishing link, right? Because still our numbers are around 6% of employees click on things and it doesn't matter what company you are. And so the education and the training is the one of the core, the most basic steps. We're introducing what we call an IT awareness program as part of NSC, which allows companies to download some tools. And they'll try some phishing emails that go out there, they'll see the response, see how they can (mumbles). So I always say that the people, the social engineering is the first step to try and fix and reduce. That's the biggest attack surface you will have. >> It's getting so sophisticated and so personalized. I mean I've seen examples with training that I've done for various companies where you really have to look 2, 3, 4 times at it and have the awareness alone to know that this might not be legitimate. >> Yeah, especially when people are just clicking on more things because they're going to more places. And so you have to be very careful. You can stop a bunch of that with some rule sets. So the systems, but if they're faking the domain, spear phishing, where they know exactly the context of where the email's coming out, it's hard, but you've just got to be very, very careful. If in doubt don't click on it. >> I agree if in doubt, don't click it. Well, John, it's always great talking to you. Exciting to hear the growth of Fortinet, what you're doing with PGA tour, the synergies there, the cultural synergies and the growth in customers and partners, lots of stuff to come. Can't wait till our next conversation, which I hope is also in person. >> Yes, yes, yes, for sure. You know, I think this is a great venue in that it's- as you can see it's open, which helps a lot. >> Yeah. >> It's not far from our headquarters, just down the road there, we've committed to this event for six or seven years. And so this is our first time, but definitely we're hoping to get out a bit more as we go forward. >> Excellent. I'm glad to see to see a company like Fortinet taking the lead and you look like you're dressed for golf. You said you have meetings, but I'm going to let you go because you probably have to get to that. >> I have a few more meetings. I wish they would leave a little gap for some golf. I'll try and work one as we go forward. >> Yeah. Anyway, John, thank you for joining me, great to see you. For John Madison, I'm Lisa Martin. You're watching theCUBE from the Fortinet Championship Security Summit in Napa. (Upbeat music)

Published Date : Sep 14 2021

SUMMARY :

brought to you by Fortinet. This is the site of kickoff to the 2021-22 I know, you're not definitely physical. What are some of the synergies? some of the veterans, but also some of the Some of the keynotes focus and talking about the threat And the work from anywhere. I think it's going to be And talking about the Yeah, over the last 12 months. credit card data on the dark web. and evolved in the last 18 months. like the CIO and the CSO Talk to me about what you guys announced And so the question is, in the last year we've been dependent on And so the ability to kind of the catalyst for this partnership? coming in the future as well. the major kind of go to And your huge partner network. the devices connected to In the first release, they the perfect storm that we're the access to applications what you guys are doing and the the first step to try and fix and reduce. awareness alone to know So the systems, but if and partners, lots of stuff to come. as you can see it's the road there, we've taking the lead and you I have a few more meetings. great to see you.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

LinksysORGANIZATION

0.99+

John MaddisonPERSON

0.99+

JohnPERSON

0.99+

oneQUANTITY

0.99+

SeptemberDATE

0.99+

John MadisonPERSON

0.99+

FortinetORGANIZATION

0.99+

Napa ValleyLOCATION

0.99+

JuneDATE

0.99+

two companiesQUANTITY

0.99+

John MadisonPERSON

0.99+

LisaPERSON

0.99+

5%QUANTITY

0.99+

sixQUANTITY

0.99+

second releaseQUANTITY

0.99+

three daysQUANTITY

0.99+

five daysQUANTITY

0.99+

first releaseQUANTITY

0.99+

25%QUANTITY

0.99+

two companiesQUANTITY

0.99+

seven yearsQUANTITY

0.99+

250 sitesQUANTITY

0.99+

two daysQUANTITY

0.99+

twoQUANTITY

0.99+

MicrosoftORGANIZATION

0.99+

PGAORGANIZATION

0.99+

threeQUANTITY

0.99+

18 months agoDATE

0.99+

500,000 business customersQUANTITY

0.99+

two biggest appsQUANTITY

0.99+

first timeQUANTITY

0.99+

last yearDATE

0.99+

six feetQUANTITY

0.99+

each employeeQUANTITY

0.99+

third componentQUANTITY

0.98+

NapaLOCATION

0.98+

first stepQUANTITY

0.98+

last yearDATE

0.98+

bothQUANTITY

0.98+

two thingsQUANTITY

0.98+

yesterdayDATE

0.98+

4 timesQUANTITY

0.98+

both worldsQUANTITY

0.98+

around 6%QUANTITY

0.98+

todayDATE

0.98+

almost $3 billionQUANTITY

0.98+

Fortinet Security SummitEVENT

0.98+

about 50%QUANTITY

0.97+

Fortinet Championship Security SummitEVENT

0.97+

ZoomORGANIZATION

0.97+

NSCORGANIZATION

0.97+

this summerDATE

0.96+

both teamsQUANTITY

0.96+

over 300 partnersQUANTITY

0.96+

about 300 customersQUANTITY

0.96+

2021-22 FedEx CupEVENT

0.95+

10,000, 20,000 peopleQUANTITY

0.95+

firstQUANTITY

0.94+

3QUANTITY

0.93+

Fortinet ChampionshipEVENT

0.93+

first half of 2021DATE

0.9+

Fortinet Security Summit 21EVENT

0.88+

next couple of yearsDATE

0.88+

100% peopleQUANTITY

0.86+

20 yearsQUANTITY

0.84+

over 2000QUANTITY

0.83+

last 12 monthsDATE

0.83+

last 18 monthsDATE

0.81+

Glenn Katz, Comcast | Fortinet Security Summit 2021


 

>> It's The Cube covering Fortinet Security Summit brought to you by Fortinet. >> Hey and welcome back to the cubes coverage of Fortinets championship series. Cybersecurity summit here in Napa valley Fortinet is sponsoring the PGA tour event, kicking off the season here, and the cubes here as part of the coverage. And today is cybersecurity day where they bring their top customers in. We got Glenn Katz SVP, general manager, Comcast Enterprise Solutions. Glenn, thanks for coming on The Cube. Thanks for taking time out of your day. - Thank you no This is great. This is great. >> Interviewer: Tell me to explain what you guys do in the Comcast business enterprise group. >> That's our Comcast business. We're a part of Comcast overall. I always like to explain what Comcast really is. If you look at Comcast, it's a technology innovation company by itself that happens to focus on communications and media type of, of markets, right? And if you look at the Comcast side there on the communication side, it's really everything residential with customers. Then there's the us Comcast business and we're the fastest growing entity over the last 15 years within Comcast. And we started in small business, voice, video, and data to small businesses. Then we moved up to provide fiber ethernet type of a transport to mid-market. And then my group started in 2014. And what we do is focus on managed services. It doesn't matter who the transport layer is for enterprise Fortune 1000 type companies. And then when you layer in all these managed wider network services. So that's my business unit. >> Interviewer: Well, we appreciate it we're a customer by the way in Palo Alto >> Glen: Oh great >> So give a shout out to you guys. Let's get into the talk you're giving here about cybersecurity, because I mean, right now with the pandemic, people are working at home. Obviously everyone knows the future of work is hybrid now you're going to see more decentralized defy and or virtual spaces where people are going to want to work anywhere and businesses want to have that extension, right? What people are talking about, and it's not new, but it's kind of new in the sense of reality, right? You've got to execute. This is a big challenge. >> Glen: It is - What's your thoughts on that, >> Well it's a big challenge. And one of the things that I'll try to, I'll speak to this afternoon here, which is at least from the enterprise perspective, which includes the headquarters, the enterprise, the branch locations, the digital commerce, everywhere else, commerce is being done. It's not just at a store anymore. It's everywhere. Even if you only have a store and then you have the remote worker aspect. I mean, they do that to your point earlier. We're not in that fortress sort of security mentality anymore. There's no more DMZs it's done. And so you've got to get down to the zero trust type of network architecture. And how do you put that together? And how does that work? Not just for remote workers that have to access the enterprise applications, but also for simple, you know, consumers or the business customers of these, of these enterprises that have to do business from over the phone or in the store. >> Interviewer: What are the some of the challenges you hear from your customers, obviously, business of the defend themselves now the, the, the attacks are there. There's no parameters. You mentioned no fortress. There's more edge happening, right? Like I said, people at home, what are the top challenges that you're hearing from customers? >> So the biggest challenge, and this is, I would think this is, this is mostly focused on the enterprise side of it is that the is two interesting phenomenons going on. This is sort of beginnings before the pandemic. And then of course the pandemic, the role of the CIO has been elevated to now, they have a real seat at the table. Budgets are increasing to a point, but the expertise needed in these, in these it departments for these large enterprises, it's, it's impossible to do what you were just talking about, which is create a staff of people that can do everything from enterprise applications, e-commerce analytics, the network. How do you secure that network all the way down to the end users? Right? So it's that middle portion. That's the biggest challenge because that takes a lot of work and a lot of effort. And that's where folks like Comcast can come in and help them out. That's their biggest challenge. They can handle the enterprise, they can handle the remote workers. They can handle their own applications, which are continually trying to be, you know, have to be it's competitive out there. It's that middle area, that communications layer that their challenged with. >> Interviewer: Yeah. And John Madison's EVP, CMO Ford. It's always talking about negative unemployment in cybersecurity. Nevermind just the staff that do cyber >> Glen: That's exactly right, that's given. If you're a business, you can't hire people fast enough and you might not have the budget for you want to manage service. So how do you get cyber as a service? >> Glen: Well, so it's even bigger than that. It's not just the cyber as a service because it's now a big package. That's what SASE really is SASE is Secure Access Service Edge. But think of it where I think of it is you've got remote users, remote workers, mobile apps on one side, you've got applications, enterprise or commercial that are now moved into different cloud locations. And in the middle, you've got two real fundamental layers, the network. And, and that includes uh, the actual transport, the software defined wide area, networking components, everything that goes with that, that's the network as a service. And then you've got the secure web gateway portion, which includes everything to secure all the data, going back and forth between your remote laptop, the point of sales. And let's say the cloud based applications, right? So that's really the center stage right there. >> Interviewer: And the cloud has brought more service at the top of the stack. I mean, people thought down stack up stack is kind of like a geeky terms. You're talking about innovation. If you're down stack with network and transport, those are problems that you have to solve on behalf of your customers And make that almost invisible. And that's your job >> That's our job. That's our job is to service provider What's interesting is though back in the day, I mean, when, I mean, back in the day, it could have been 10 years ago in 20. You really, you know, you had stable networks, they were ubiquitous, they were expensive and they were slow. That's kind of the MPLS legacy TDM. Yeah. So you just put them in and you walked away and you still did all your enterprise. You still did all of your applications, but you had your own private data centers. Everything was nicer. It was that fortress mentality right now. It's different. Now everybody needs broadband. Well guess what? Comcast is a big company, but we don't have broadband everywhere. ATT doesn't have it. Verizon doesn't have it Charter doesn't have it. Right. So you need, so now to think about that from enterprise, I'm going to go, I'll give you an example. All of our customers to fulfill a nationwide network, just for the broadband infrastructure, that's, you know, redundant. If you want to think of it that way we, we source probably 200 to 300 different providers to provide an ubiquitous network nationwide for broadband. Then we wrap a layer of the SD wan infrastructure for that, as an example, over the top of that, right? You can't do that by yourself. I mean, people try and they fail. And that's the role of a managed service provider like us is to pull all that together. Take that away. We have that expertise. >> Interviewer: I think this is a really interesting point. Let's just unpack that just for a second. Yeah. In the old days, we want to do an interconnect. You had an agreement. You did, you have your own stuff, do an interconnected connect. >> Glen: Yep. >> Now this, all this mishmash, you got to traverse multiple hops, different networks. >> Glen: That's right >> Different owners, different don't know what's on that. So you guys have to basically stitch this together, hang it together and make it work. And you guys put software on the top and make sure it's cool is that how it works? >> Glen: Yeah. Software and different technology components for the SD wan. And then we would deliver the shore and manager all that. And that's, that's where I really like what's happening in the industry, at least in terminology, which is they try, you have to try to simplify that because it's very, very complicated, but I'm going to give you the network as a service mean, I'm going to give you all the transport and you have to don't have to worry about it. I'm going to rent you the, the SD wan technology. And then I'm going to have in my gateways all these security components for a firewall as a service, zero trust network access, cloud brokerage services. So I will secure all of your data as you go to the cloud and do all of that for you. That's really what we, that's what we bring to the table. And that's what is really, really hard for enterprises to do today. Just because they can't, the expertise needed to do that is just not there. >> Interviewer: Well, what's interesting is that first you have to do it now because the reality of your business now is you don't do it. You won't have customers, but you're making it easier for them. So they don't have to think about it. - [Glen] That's right. >> But now you bring in hybrid networking hybrid cloud, they call it or multi-cloud right. It's essentially a distributed computing and essentially what you're doing, but with multiple typologies, >> Glen: that's right. >> Interviewer: I got an edge device. - [Glen] That's right. If I'm a business. - [Glen] That's right. >> That's where it could be someone working at home >> Glen: That's right. - Or it could be my retail >> Or whatever it could be. So edge is just an extension of what you guys already do. And is that right? Am I getting that right? >> Glen: Yeah that's exactly right. And, and, but the point is, is to make it economic and to make it really work for the end user. If you're a branch, you may have a, a application that's still being run via VPN, but you also need wifi internet for your customers because you want to use your mobile device. They've entered into your store and you want to be able to track that right. And push something to them. And then you've got the actual store applications could be point of sales could be back of house comparing that's going up to AWS. Azura whatever. Right. And that all has to be, it all has to come from one particular branch and someone has to be able to manage that capability. >> Interviewer: It's funny, - Its so different >> Interviewer: just as you're talking, I'm just thinking, okay. Facial recognition, high, high bandwidth requirements, >> Glen: Huge high bandwidth requirements >> Processing at the edge becomes huge. >> Glen: It does. >> So that becomes a new dynamic. >> Glen: It does. It's got to be more dynamic. It's not a static IP end point. >> Glen: Well, I'll give you another an example. Let's say it's, it seems silly, but it's so important from a business perspective, your quick service restaurant, the amount of digital sales from applications are just skyrocketing. And if you yourself, and particularly in the pandemic, you order something, or that goes up to the cloud, comes back through, goes to the point of sales. And then the, the back of house network in a particular restaurant, if that doesn't get there, because one line of you only have one internet connection and it's down, which sometimes happens, right? You lose business, you lose that customer. It's so important. So what's being pushed down to the edge is, you know, reliable broadband hybrid networks, where you have a primary wire line and a secondary wire line, maybe a tertiary wireless or whatever. And then a box, a device that can manage between those two so that you can keep that 99.9, 9% availability at your branch, just for those simple types of applications. >> Interviewer: You know Glenn, you as you're talking most people, when we talk tech, like this is mostly inside the ropes, Hey, I can get it. But most people can relate with the pandemic because they've ordered with their phone on - [Glen] Exactly right >> With the QR code. - [Glen] That's exactly right >> They see the menu - [Glen] That's right >> They get now what's happening - [Glen] That's right that their phone is now connected to the service. >> Glen: That's right >> This is not going away. The new normal. >> Glen: No, it's absolutely here. And what I've seen are there are many, many companies that already knew this and understood this pre pandemic. And they were, they had already changed their infrastructure to really fit what I was calling that network as a service in the SASE model, in different ways. Then there were a bunch that didn't, and I'm not going to name names, but you can look at those companies and you can see how they're, they're struggling terribly. But then there was this. Now there's a, a much bigger push and privatization again, see, I was sending, Hey, I asked for this before. It's not like the CIO didn't know, but management said, well, maybe it wasn't important. Now it is. And so you're seeing this actual amazing surge in business requests and requirements to go to the model that we're all talking about here, which is that SASE type of implementation high-speed broadband. That's not going away for the same reason. And you need a resilient network, right? Yes. >> Interesting. Best practice. Let's just take that advice to the, to the audience. I want to get your thoughts because people who didn't do any R and D or experimentation prior to the pandemic, didn't have cloud. Wasn't thinking about this new architecture got caught flat-footed. -Exactly. >> And they're hurting and or out of business. >> Correct. >> If people who were on the right side of that took advantage as a tailwind and they got lifts. >> That's exactly right. >> So what is the best practice? How should a business think about putting their toe in the water a little bit or jumping in and getting immersed in the new, new architecture? What advice would you give? Because people don't want to be in the wrong side of history. >> No, they don't. >> What's your guy's best practice? >> I may sound biased, but I'm really not trying to be biased. And this'll be some of the I'll speak about here later today. You have to try it. You, as the end user, the enterprise customer, to, to fulfill these types of needs, you've got to really probe your managed service providers. You've got to understand which ones, not just can give you a nice technology presentation and maybe a POC, but who's going to be there for the longterm who has the economic wherewithal to be able to give the resources needed to do what I was talking about, which is you're going to outsource your entire network to me and your sh, and a good portion of your security for the network to a service provider. that service provider has to be able to provide all that has to be able to have the financial capabilities, to be able to provide you with an operating type of model, not you have to buying equipment all the time. That service provider has to be able to have teams that can deliver all of that 200 to 300 different types of providers aggregate all that, and then be there for day two. Simple thing. Like if you know, most companies, if you're not a really large location, you can't afford to, you know, double types of routers that are connected. And if one fails you have fail over, right, most of them will have one router and they'll have, but they'll have two backup paths. Well, what happens is that router or switch, single switch fails? You need to have a meantime to repair a four hours. I mean, that's kind of basic and well do that. How do you do that? You've got to have depots around the entire country. These are the types of questions that any enterprise customers should be probing their managed service provider, right? It's not just about the technology. It's about how can you deliver this and assure this going forward. >> And agility too cause when, if, if things do change rapidly, being agile... >> Exactly >> means shifting and being flexible with your business. >> That's exactly right. And that's important. That's a really important question. And the agility comes from this financial agility, right? Like new threat, new box. I want, I want this old one. I'm going to upgrade to a different type of service. The service providers should be able to do that without me having to force you to go get some more CapEx and buy some more stuff. Cause that's number one. But the other agility is every enterprise is different. Every enterprise believes that its network is the only network in the world and they have opinions and they've tested different technologies. And you're going to have to adapt a little bit to that. And if you don't, you're not going to get out of this. >> It's funny. The old days non-disruptive operations was like a benefit, we have non-disrupt- now it's a table stakes. You can't disrupt businesses. - You can't. You can't at the branch at the remote worker. If you're on a zoom call or whatever, or you're on a teams call, we've all been there. We're still doing it. If it breaks in the middle of a presentation to a customer that's problem. >> Glenn thanks for coming on the cube with great insight. >> Oh great. This was fun. >> Are you exciting and plays golf? You're going to get out there on the range? >> I played, I played golf a lot when I was younger, but I haven't. And so I have a few other things I do, but I guess I'm going to have to learn now that we're also a sponsor of PGA, so yeah, for sure. >> Great. Well, great to have you on - All right thank you and great talk. Thanks for coming on and sharing your insight. >> This was great. I appreciate okay. >> Keep coverage here. Napa valley with Fortinet's Cybersecurity Summit as part of their PGA tour event, that's happening this weekend. I'm John for the Cube. Thanks for watching.

Published Date : Sep 14 2021

SUMMARY :

brought to you by Fortinet. and the cubes here as in the Comcast business enterprise group. And if you look at the So give a shout out to you guys. do that to your point earlier. you hear from your customers, is that the is two interesting just the staff that do cyber So how do you get cyber as a service? And in the middle, those are problems that you have to solve And that's the role of a managed did, you have your own stuff, you got to traverse multiple And you guys put software on the top but I'm going to give you the that first you have to do it now But now you bring in hybrid - [Glen] That's right. Glen: That's right. of what you guys already do. And that all has to be, Interviewer: just as you're talking, It's got to be more dynamic. to the edge is, you know, is mostly inside the ropes, With the QR code. connected to the service. This is not going away. And you need a resilient network, right? prior to the pandemic, And they're hurting the right side of that took to be in the wrong side of for the network to a service provider. And agility too cause when, flexible with your business. having to force you to go get You can't at the branch the cube with great insight. This was fun. but I guess I'm going to Well, great to have I appreciate okay. I'm John for the Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
ComcastORGANIZATION

0.99+

GlennPERSON

0.99+

2014DATE

0.99+

GlenPERSON

0.99+

VerizonORGANIZATION

0.99+

Glenn KatzPERSON

0.99+

Glenn KatzPERSON

0.99+

John MadisonPERSON

0.99+

Palo AltoLOCATION

0.99+

JohnPERSON

0.99+

200QUANTITY

0.99+

AWSORGANIZATION

0.99+

ATTORGANIZATION

0.99+

Comcast Enterprise SolutionsORGANIZATION

0.99+

99.9, 9%QUANTITY

0.99+

Napa valleyLOCATION

0.99+

twoQUANTITY

0.99+

CharterORGANIZATION

0.99+

10 years agoDATE

0.98+

two interesting phenomenonsQUANTITY

0.98+

four hoursQUANTITY

0.98+

Fortinet Security SummitEVENT

0.98+

pandemicEVENT

0.97+

one lineQUANTITY

0.97+

SASETITLE

0.97+

firstQUANTITY

0.97+

one sideQUANTITY

0.97+

oneQUANTITY

0.96+

CapExORGANIZATION

0.96+

one routerQUANTITY

0.96+

todayDATE

0.96+

300 different providersQUANTITY

0.95+

PGAEVENT

0.94+

two real fundamental layersQUANTITY

0.94+

FortinetORGANIZATION

0.94+

day twoQUANTITY

0.94+

one internet connectionQUANTITY

0.93+

PGAORGANIZATION

0.92+

this afternoonDATE

0.92+

zeroQUANTITY

0.91+

Fortinet Security Summit 2021EVENT

0.89+

AzuraORGANIZATION

0.88+

FortinetEVENT

0.87+

later todayDATE

0.86+

20QUANTITY

0.85+

one particular branchQUANTITY

0.85+

Cybersecurity SummitEVENT

0.84+

SVPPERSON

0.84+

two backupQUANTITY

0.84+

last 15 yearsDATE

0.82+

a secondQUANTITY

0.82+

300 different typesQUANTITY

0.76+

single switchQUANTITY

0.75+

Sandra Wheatley, Fortinet | Fortinet Security Summit 2021


 

>> Narrator: From around the globe, it's theCUBE, covering Fortinet Security Summit brought to you by Fortinet. >> Welcome to theCUBE. I'm Lisa Martin. We are live at the Fortinet Championship, the PGA Tour Kickoff to the 2021-2022 FedEx Regular Season Cup. And this is so exciting to be here with Fortinet, to be at an in-person event, and to be talking about a very important topic of cybersecurity. One of our alumni is back with me, Sandra Wheatley is here, the SVP of Marketing, Threat Intelligence, and Influencer Communications at Fortinet. Sandra, it's great to see you. >> You too, Lisa. Thank you for having me. >> This is a great event. >> Yeah, it's awesome, yeah. >> Great to be outdoors, great to see people again, and great for Fortinet for being one of the first to come back to in-person events. One of the things I would love to understand is here we are at the PGA tour, what's the relationship with Fortinet and the PGA Tour? >> Well, first of all, I think the PGA tour is an amazing brand. You just have to look around here and it's extremely exciting, but beyond the brand, there's a lot of synergies between the PGA tour and Fortinet CSR initiatives, particularly around STEM, diversity inclusion, as well as veterans rescaling. And so some of the proceeds from the Fortinet Championship will go to benefit local nonprofits and the local community. So that's something we're very excited about overall. >> Lisa: Is this a new partnership? >> It is a new partnership and we will be the Fortinet Championship sponsor for about the next five years. So we're looking forward to developing this partnership and this relationship, and benefiting a lot of nonprofits in the future. >> Excellent, that's a great cause. One of the things, when you and I last saw each other by Zoom earlier in the summer, we were talking about the cybersecurity skills gap. And it's in its fifth consecutive year, and you had said some good news on the front was that data show that instead of needing four million professionals to fill that gap, it's down to three, and now there's even better news coming from Fortinet. Talk to me about the pledge that you just announced to train one million people in the next five years. >> Absolutely, we're very excited about this. You know, Fortinet has been focused on reducing the skills gap for many years now. It continues to be one of the biggest issues for cybersecurity leaders if you think about it. You know, we still need about 3.1 million professionals to come into the industry. We have made progress, but the need is growing at about 400,000 a year. So it's something that public and private partnerships need to tackle. So last week we did announce that we are committed to training a million professionals over the next five years. We're very excited about that. We're tackling this problem in many, many ways. And this really helps our customers and our partners. If you really think about it, in addition to the lack of skills, they're really tackling cybersecurity surface that's constantly changing. In our most recent FortiGuard's threat report, we saw that ransomware alone went up 10 times over the last year. So it's something that we all have to focus on going forward. And this is our way of helping the industry overall. >> It's a huge opportunity. I had the opportunity several times to speak with Derek Manky and John Maddison over the summer, and just looking at what happened in the first half, the threat landscape, we spoke last year, looking at the second half, and ransomware as a service, the amount of money that's involved in that. The fact that we are in this, as Fortinet says, this work from anywhere environment, which is probably going to be somewhat persistent with the attack surface expanding, devices on corporate networks out of the home, there's a huge opportunity for people to get educated, trained, and have a great job in cybersecurity. >> Absolutely, I like to say there's no job security like cybersecurity, and it is. I mean, I've only been in this industry about, I'm coming up on six years, and it's definitely the most dynamic industry of all of the IT areas that I've worked in. The opportunities are endless, which is why it's a little bit frustrating to see this big gap in skills, particularly around the area of women and minorities. Women make up about 20%, and minorities are even less, maybe about 3%. And so this is a huge focus of ours. And so through our Training Advancement Agenda, our TAA initiative, we have several different pillars to attack this problem. And at the core of that is our Network Security Expert Training or NSC training and certification program. We made that freely available to everybody at the beginning of COVID. It was so successful, at one point we we're seeing someone register every five minutes. And that was so successful, we extended that indefinitely. And so to date, we've had about almost 700,000 certifications. So it's just an amazing program. The other pillars are Security Academy Program, where we partner with nonprofits and academia to train young students. And we have something like 419 academies in 88 countries. >> Lisa: Wow. >> And then the other area that's very important to us is our Veterans Program. You know, we have about 250,000 veterans every year, transfer out of the service, looking for other jobs in the private sector. And so not only do we provide our training free, but we do resume building, mentoring, all of these types of initiatives. And we've trained about 2,000 veterans and spouses, and about 350 of those have successfully got jobs. So that's something we'll continue to focus on. >> That's such a great effort. As the daughter of a Vietnam combat veteran, that really just hits me right in the heart. But it's something that you guys have been dedicated for. This isn't something new, this isn't something that is coming out of a result of the recent executive order from the Biden administration. Fortinet has been focused on training and helping to close that gap for a while. >> That's exactly true. While we made the commitment to train a million people on the heels of the Biden administration at Cybersecurity Summit about two weeks ago, we have been focused on this for many years. And actually, a lot of the global companies that were part of that summit happened to be partners on this initiative with us. For example, we work with the World Economic Forum, IBM, and Salesforce offer our NSC training on their training platforms. And this is an area that we think it's really important and we'll continue to partner with larger organizations over time. We're also working with a lot of universities, both in the Bay Area, local like Berkeley, and Stanford and others to train more people. So it's definitely a big commitment for us and has been for many years. >> It'll be exciting to see over the next few years, the results of this program, which I'm sure will be successful. Talk to me a little bit about this event here. Fortinet is 100% partner driven company, more than 300 or so partners and customers here. Tell me a little bit about what some of the interesting topics are that are going to be discussed today. >> Sure, yeah, so we're delighted to bring our partners and customers together. They will be discussing some of the latest innovations in cybersecurity, as well as some of the challenges and opportunities. We are seeing, you know, during COVID we saw a lot of change with regards to cybersecurity, especially with remote working. So we'll discuss our partnership with LYNX that we just announced. We'll also be talking about some of the emerging technologies like CTNA, 5G, SASE, cloud, and really understanding how we can best help protect our customers and our partners. So it's very exciting. In addition to our Technology Summit, we have a technology exhibition here with many of our big sponsors and partners. So it's definitely going to be a lot of dynamic conversation over the next few days. >> We've seen so much change in the last year and a half. That's just an understatement. But one of the things that you touched on this a minute ago, and we're all feeling this is is when we all had to shift to work from home. And here we are using corporate devices on home networks. We're using more devices, the edge is expanding, and that became a huge security challenge for enterprises to figure out how do we secure this. Because for some percentage, and I think John Maddison mentioned a few months ago to me, at least 25% will probably stay remote. Enterprises have to figure out how to keep their data secure as people are often the weakest link. Tell me about what you guys announced with LYNX that will help facilitate that. >> Well, we're announcing an enterprise grade security offering for people who are working remotely. And the nice thing about this offering is it's very easy to set up and implement, so consumers and others can easily set this up. It also provides a dashboard for the enterprise, IT organization to, they can see who's on the network, devices, everything else. So this should really help because we did see a big increase in attacks, really targeting remote workers. As cyber criminals try to use their home as a foothold into the enterprise. So we're very excited about this partnership, and definitely see big demand for this going forward. >> Well, can you tell me about the go-to market for that and where can enterprises and people get it? >> Well, we're still working through that. I know you'll talk with John later on, he'll have more details on that. But definitely, we'll be targeting both of our different sets of customers and the channel for this. And I definitely think this is something that will, it's something that enterprises are definitely looking for, and there'll be more to come on this over the next few months. >> It's so needed. The threat landscape just exploded last year, and it's in a- >> Sandra: Yeah, absolutely. >> Suddenly your home. Maybe your kids are home, your spouse is working, you're distracted, ransomware, phishing emails, so legitimate. >> Sandra: They do. >> Lisa: But the need for what you're doing with LYNX is absolutely essential these days. >> Sandra: Yeah, these threats are so sophisticated. They're really difficult. And the other thing we did in addition to LYNX was as we got into COVID, we saw that, or the most successful organizations were really using this as an opportunity to invest for the longterm in cybersecurity. We also saw that, and this continues to be the case that, the insider threat continues to be one of the biggest challenges, where an employee will accidentally hit on a phishing email. So we did roll out an infosec awareness training, and we made that free for all of our customers and partners. So we're trying to do everything we can to really help our customers through this demanding time. >> Lisa: Right, what are some of the feedback that you're hearing from customers? I'm sure they're very appreciative of the education, the training, the focus effort from Fortinet. >> Sandra: Absolutely, it's definitely huge. And more and more we're seeing partners who want to work with us and collaborate with us on these initiatives. We've had a really positive response from some of the companies that I mentioned earlier, some of the big global names. And we're very excited about that. So we feel like we have some key initiatives on pillars, and we'll continue to expand on those and bring more partners to work with us over time. >> Lisa: Expansion as the business is growing amazingly well. Tell me a little bit about that. >> Sandra: Yeah, I think, in our last quarter we announced our largest billings growth for many, many years. And so, Fortinet, we're been very fortunate over the last few years, has continued to grow faster than the market. We now have half a million customers, and I think our platform approach to security is really being adopted heavily. And we continue to see a lot of momentum, especially around our solutions like SD-WAN. I think we're the only vendor who provides security in SD-WAN appliance. And so that's been a key differentiator for us. The other thing that's increasingly important, especially with the rollout of 5G is performance. And, you know, Fortinet, from the very beginning, created its own customized ASX or SPU, which really provides the best performance in security compute ratings in the industry. So all of this is really helping us with our growth, and we're very excited about the opportunities ahead. >> Lisa: And last question, on that front, what are some of the things that you're excited about as we wrap up 2021 calendar year and go into 2022? >> Sandra: Well, this been very exciting year for Fortinet. And I think we're in a great position to take advantage of many of the different growth areas we're seeing in this new and changing space. And, you know, we're all on board and ready to take advantage of those opportunities, and really fire ahead. >> Lisa: Fire ahead, I like that. Sandra, thank you so much for joining me today, talking about the commitment, the long standing commitment that Fortinet has to training everybody from all ages, academia, veterans, to help close that cybersecurity skills gap. And such an interesting time that we've had. There's so much opportunity, and it's great to see how committed you are to helping provide those opportunities to people of all ages, races, you name it. >> Sandra: Thank you, Lisa, I really appreciate it. >> Lisa: Ah, likewise. For Sandra Wheatley, I'm Lisa Martin. You're watching theCube at the Fortinet Championship Security Summit. (soft bright music)

Published Date : Sep 14 2021

SUMMARY :

the globe, it's theCUBE, the PGA Tour Kickoff to the 2021-2022 Thank you for having me. Fortinet and the PGA Tour? And so some of the proceeds for about the next five years. in the next five years. and private partnerships need to tackle. happened in the first half, and it's definitely the in the private sector. and helping to close that gap for a while. on the heels of the Biden administration the results of this program, So it's definitely going to be But one of the things that you And the nice thing about this offering and the channel for this. It's so needed. so legitimate. Lisa: But the need for and this continues to be the case that, appreciative of the education, from some of the companies Lisa: Expansion as the business from the very beginning, the different growth areas and it's great to see I really appreciate it. at the Fortinet Championship

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
SandraPERSON

0.99+

JohnPERSON

0.99+

FortinetORGANIZATION

0.99+

IBMORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

LYNXORGANIZATION

0.99+

Sandra WheatleyPERSON

0.99+

LisaPERSON

0.99+

six yearsQUANTITY

0.99+

10 timesQUANTITY

0.99+

Derek MankyPERSON

0.99+

John MaddisonPERSON

0.99+

2022DATE

0.99+

2021DATE

0.99+

SalesforceORGANIZATION

0.99+

last yearDATE

0.99+

100%QUANTITY

0.99+

last weekDATE

0.99+

oneQUANTITY

0.99+

419 academiesQUANTITY

0.99+

Bay AreaLOCATION

0.99+

OneQUANTITY

0.99+

one million peopleQUANTITY

0.99+

first halfQUANTITY

0.99+

FortiGuardORGANIZATION

0.99+

second halfQUANTITY

0.99+

more than 300QUANTITY

0.99+

about 3%QUANTITY

0.99+

88 countriesQUANTITY

0.99+

a million professionalsQUANTITY

0.99+

about 20%QUANTITY

0.98+

half a million customersQUANTITY

0.98+

Fortinet Championship Security SummitEVENT

0.98+

Cybersecurity SummitEVENT

0.98+

four million professionalsQUANTITY

0.98+

StanfordORGANIZATION

0.98+

World Economic ForumORGANIZATION

0.98+

BidenORGANIZATION

0.98+

last quarterDATE

0.98+

bothQUANTITY

0.98+

todayDATE

0.97+

Fortinet ChampionshipEVENT

0.97+

fifth consecutive yearQUANTITY

0.97+

2021-2022 FedEx Regular Season CupEVENT

0.97+

about 3.1 million professionalsQUANTITY

0.97+

Fortinet Security SummitEVENT

0.96+

about 400,000 a yearQUANTITY

0.96+

about 350QUANTITY

0.96+

about 250,000 veteransQUANTITY

0.96+

VietnamLOCATION

0.95+

last year and a halfDATE

0.95+

Fortinet Security Summit 2021EVENT

0.94+

a million peopleQUANTITY

0.94+

firstQUANTITY

0.94+

threeQUANTITY

0.94+

Robert Groat, Executive VP, Technology and Strategy, Smartronix Feb 2018


 

>> Announcer: Live, from Washington D.C. It's Cube Conversations, with John Furrier. >> Hello there, welcome to the special Cube Conversation, I'm John Furrier with the Cube here in Washington D.C. at the headquarters of Amazon Web Services Public Sector, here in Arlington, Virginia, right around the corner from D.C. Our next guest is Robert Groat, with the Executive Vice President of Technology at Smartronix, a service provider in Cloud and an IT. Thanks for joining us. >> Thank you John. >> So we're in D.C. and the Cube's getting the lay of the land, so much innovation happening around Cloud and disruption, you got one group going, scratching their heads, wondering what's happening, some groups saying what happened, and you got people making it happen, right? >> Exactly. >> What's the big "ah-ha" moment people might not know looking into D.C. now? What is the real trend? What are the people that are making it, what are they doing? Is it the Cloud, is it mobile, is it data-driven? >> Yeah, I think it's all of those components, but I think one of the things that you're really seeing is that the Cloud is enabling these organizations, these traditional organizations, to really transform in the way that they deliver and consume IT services. IT services have been a mess in this town for a long time, the contracting process has been a mess, some of the things that happened, some of the smaller organizations have had a chance to be really innovative and take a leadership role in delivering services to the community and not just the large beltway bandits that we've seen in the past. So I think some of the "ah-ha" moments are probably around, you know, we've been working, Smartronix has been working with the public sector and Cloud since 2009, so really one of the early pioneers, and we used to run across all of these issues where security was the blocker, and it would take a long time to convince people that the security in the Cloud really was what it needed to be. Now we're seeing, in terms of an "ah-ha" moment, we're seeing that security is the enabler, we're seeing that these organizations are really embracing the fact that you can do things in the Cloud from the security perspective that you could never do before. And I think that you've got this kind of next generation of managed service provider that embraces those tenants of how to manage services and manage security services and it's really disrupting the way that the Federal Government's done business in the past. >> You know, we were at the Public Sector Summit last June, and we were commeters, the first time the Cube was at an event, which we had been to other ones before that, but it was very clear to me that we're in a no-excuses government at this point, cause there's a lot of forcing functions. You have one, connected social media, and everyone's like hey, why can't I do that over there? It's like the old iPhone moment on the enterprise. Why can't I bring me iPhone to work? You know, years ago, right? >> Exactly. >> Now you have security looking down the barrel, and IOT happening, and you don't have a thing, so you have Swiss cheese called malware, attacking every hole, every corner of the network potentially is compromised. >> Exactly. >> So security is forcing, and we're at cyberwar. >> We are! >> You can't deny that, so why isn't the Congress emergency funding for more security, or is it happening? >> Well, they need to be, but if you look at, if you look at the way traditional data centers are built and on-premise infrastructure is built, you had a variety of contractors coming in, each kind of doing their own thing, you had this heterogeneous infrastructure that was all built and kind of tangled together, and there wasn't this great way of being able to look at Cloud services or be able to look at a Greenfield environment, and have everything that's happening in that environment aware to you. And that's really what the Cloud is enabling. You're actually. >> You mean program the whole infrastructure? >> Programmable infrastructure, exactly. You're actually, every single thing that happens in a Cloud environment ends up being an API call. Each one of those API calls ends up being logged, and when you have every event that's happening in your environment, you don't have that in a traditional data center. When you have every event that's happening in that environment, and you can apply some of these new primatives that AWS is providing around machine learning and AI, now you're using those to attack those vectors that you're talking about, to protect critical infrastructure, really in ways that you couldn't do before, and you can actually, with this programmable infrastructure, you can actually really look at being able to respond to events, and have autonomic response and remediation of these events. So when something happens, you've programmatically defined how you're going to respond to those events, and it's repeatable. >> Yeah, one of the things I'll share with you, I did an interview with, I think it was the CTO or the CSO of Fortinet, which is a security vendor, >> Mhmm. >> And we were talking, and we were totally geeking out, he was like the complexity of the Cloud actually is an advantage in the security, and I said what do you mean by that? He goes, most of the hackers will focus the main payload of their vector on one particular item, and that's where all their energy, if they have to hunt too far, they kind of give up.6 >> It's just like on the battlefield. The surface area of attack matters, and when you have such a wide, vast surface area of attack, there's no way for them to. >> So you agree with that? >> 100% agree with that. >> How is that, how do I turn that complexity, obviously there's a main range of tools to make the Cloud easier, but complexity of scale, how do I turn that as an IT person or a manager, or an executive, into a security advantage? What do I do? >> So the security advantage is that every time you build a rule, every time you think about compliance and maintaining compliance for your organization, you're actually starting to build knowledge and a new capability. That can be applied programmatically now, across your entire set of enclaves that you use for managing infrastructure, so when we develop one thing as a manage service provider, to make sure we're meeting some kind of compliance mandate, that now can be shared across all of our clients in the space, and this can start to really help create that protective ops infrastructure. >> So you scale more observation space to get more data, that gives you also an advantage. >> It does, it does. And then when you can actually take that data and use it to train to understand where these advance persistent threats are, you can then really start to do things, that this was the province of really large organizations, only in the past. And now AWS has democratized that ability to use these tools around artificial intelligence and machine learning to improve security. >> Robert, you can't go back five years without hearing, are you kidding me, that Cloud is insecure. Turns out, Cloud is becoming a better security paradigm than building on site because of human error or other force majors or any kind of other acts. >> That's exactly right. Anybody who's looking at it from a security perspective and thinks that they can have the same kind of security that, you know, a multi-billion dollar company like AWS can provide, they're mistaken. And the main thing around that is, they don't have transparency to every event happening in that environment, and that's what you get when you start to utilize Cloud services. >> Yeah, I think Verizon was the first company that notified me that this might be the trend. I think this was like a 2011 time-frame. Don't discount a multi-tenant Cloud. >> Exactly. >> Like okay, and they realized and have been tracking that like okay, so big trends in technology, tailwinds and headwinds. What trends are tailwinds for the growth, and what are the headwinds, what's the blockers? >> Well the tailwinds is the fact that I think everybody's kind of not resigned to the fact, but they're seeing the Cloud first as probably a strategy that they should take. And, you know, we've seen the government be laggards in the past with adopting new technology, I think what they're seeing now, especially in the Department of Defense, and then some of the Federal organizations that we're working with, they're actually seeing that perhaps their adversaries are having a competitive advantage by moving into the Cloud, maybe they should look at the competitive advantages that they should have moving into the Cloud infrastructure. Not just security, but the ability to be innovative and agile and deliver services much faster than they've ever been able to deliver them before. >> Well we had a different approach and automated actual code bases so that you can actually deploy services and automatically code them up with glue instantly, so it's interesting. >> That is one of the fundamental things, that when you start looking at infrastructure's code, and you look at things that you can make repeatable in these environments, then look at how many times the government's probably built out a particular enterprise software staff, whether it's Share-A-Plan or >> Authentication. >> It all gets repeated, once that gets cauterized and done right with the right subject-matter experts, then you can start to create service catalogs that these organizations can use and rapidly deploy things in a repeatable and manageable fashion. >> This is an open-source ethos. >> It is. >> We're on the shoulders of others, why replicate something that's already a service, throw it in a service catalog, make it a micro-service, make it an API. >> And that culture's finally transformed in the Federal Government, that didn't used to be the culture, right? >> People must be like, finally! >> It used to be, I have to have my arms wrapped around this, I have to be able to understand everything that's happening, and you would always hear some of these larger organizations say, you know, I don't want to have vendor lock-in. Even now sometimes, you'll see it a little bit. I don't want go with, maybe AWS, because I'll have vendor lock-in, yet for dozens of years, they've been locked into proprietary databases to commercial enterprise platforms, these behemoth software things that AWS again has helped to democratize by providing these primitives and allowing people to build things backed on open-source. >> You're speaking our language, we talk about this all the time, the lock-in, there's always a lock-in spec somewhere, if it's good, the issue is proprietary software and switching costs. >> Yes. >> And choice, right? So that the dimensions to evaluate for customers that we've seen that's successful is, okay, I don't mind lock-in if it's a damn good solution, I'm going to lock that in. >> Right. >> But I have choice. This is going to be interesting, right? So the multi-cloud conversation that is going on around the DOD is interesting, we've been reporting and out in the field, we've been getting the data coming in, saying hey, this DOD kind of overture is interesting, because now if they take the same route as the CIA, we're talking about massive infiltration of Amazon Web Services across the government, because that CIA's kicking ass and taking names with Amazon. >> Mhmm. >> Now you've got the DOD looking down potentially a single-cloud option, other vendors are crying foul calling, we need spec in policy, which is a hijack model of putting in multi-cloud requirement. What's your thoughts on that? Should it be requirement or should we jump off? >> Well, for one, when you have innovators in a space and they take a lead in the space, you're going to get, that's a forcing function for other companies to compete, and that's not a bad thing, it really isn't. And a lot of these organizations, there might be reasons that are very valid reasons for them to consider multi-cloud, or even consider what they have within their own on-premise infrastructure. You've got, you know, tens and tens of years of legacy technical debt in your data center, there's not a reason to pull everything into the Cloud environment, there might be reasons to just let that die a slow death and sunset that. >> Got the mainframe. >> And, like the mainframe stuff, for them to look at even migrating mainframe capabilities into the Cloud, it's a lot of rewrite, it's a lot of things that need to happen. And maybe there's ways that you can extend that on-premise environment, breathe a little bit of life into the on-premise environment, while you're building out your new infrastructure. And that's probably the right path to take. >> And some people choose to have Cobalt code running banks right now, and just because they have that process. >> And it's working, and you know, they'll inevitably come to the time that they have to do that migration. >> Great commentary, great to have you on, great to chat about the technology trends. Smartronix, what are you guys doing, how do you guys fit into this trend, take a minute to talk about what you guys do, and your opportunity. >> Sure, Smartronix is about a 20-year-old company, we talk about some of our competitors will talk about being born in the Cloud, we were actually pretty much born in the enterprise, we helped the Marine Core establish their network operation security command, 20 some years ago, we were first to kind of lead virtualization technologies to help the forward-deployed forces move in and create kind of these tactical data centers, mobile data centers that can move into theater, so it's always kind of been on the forefront of network operations and cybersecurity, and innovative solutions, innovative use of technology, in government. >> The battle field's an instant case of how to deploy. >> Absolutely. >> You need wireless. >> Austere environments, you know, low-power, they used to bring trucks in to be able to set up their mobile data center, and we actually using virtualization technology back in 2004, you know. >> You got to push the envelope. >> You have to. >> Your job is to push the envelope. >> And that's really where I think Smartronix has done a really good job, is that we've helped these large organizations that are in very secure and highly-regulated compliance-driven environments, and utilize technology in innovative ways. More securely, and more optimally in these environments. So when we had a chance in 2009, to do a solution for President Obama at the time, they introduced the Recovery Act, they needed a website to track 750 billion dollars worth of funding. We came in with a pretty innovative solution. They said they had 10 weeks to build this, you're not going to do that in a data center environment. We came in with a solution that said on day one, we're going to utilize Amazon Web Services capabilities, we're going to build out the test endeavor while we build out the data center environment, and we're going to make your deadline by October 1st. And that was really the jumpstart of what we did. >> Do you meet your deadline? >> We absolutely did. >> What was that other website that you didn't actually get the deadline done, they had to bring in? >> Yeah, the healthcare. >> Oh, the Obama. >> So this one was recovery.gov, a very well-documented success, it ended up being the very first cloud-first initiative for the Federal Government. The very first government property running on public Cloud infrastructure, and then from there we migrated to >> Well, he doesn't get the credit he deserves on open government. >> He doesn't. >> He opened up data sets, he changed the game. >> He did, and again, that was, I think when you look at historically, when you look back at the CTOs and CIOs of the Federal Government at that time, they were really trying to look to see how commercial technologies could be applied in the government, how you could get that agility and innovation, and speed of business of commercial and do that in the Federal Government. And I think we embraced that at Smartronix pretty early on, and we were kind of on the leading edge sometimes of delivering this kind of abilities and services. >> Literally. So, you guys are the right group to call for IT to get modernized, because this is is problem. No one can hide anymore, there's no more excuses. And again, this is the lack of innovation. If you've been sitting around not innovating, now there's cyberwars attacking, you got cybersecurity, IT needs to transform, they got to do it like really fast. >> You got all of these competing pressures, security, you've got time, you've got cost, you've got capabilities, all of those things competing. You need to have a trusted advisor, a partner, to get you through that. What Smartronix has created, we call it our four pillars, and these are very simple pillars, but it's really really required for really looking at Cloud services strategy. You have to help the organization define what the business outcomes are that they want in these environments, help them think through what the roadmap and strategy is to get there, and then when you go to the second pillar, which is design, there's unique ways to design things to make it cloud-native, to utilize cloud-native services that also, when you get to the implementation and migration point, you're building these in a programmatic way that makes it easier to operate and manage, and that's the fourth pillar. So if you can get these organizations to think from strategy all the way through to run, all the way through to operations management, you're going to have the more effective organization and better services in your environment. >> Robert Groat, Executive Vice President of Technology at Smartronix, thanks for spending that time with me. >> Thanks, John. >> I'm John Furrier with the Cube, in Washington D.C., actually in Arlington, Virginia at Amazon Web Services Public Sector headquarters, thanks for watching. (bright music)

Published Date : Feb 21 2018

SUMMARY :

It's Cube Conversations, with John Furrier. at the headquarters of Amazon Web Services and you got people making it happen, right? What are the people that are making it, the fact that you can do things in the Cloud from the Cube was at an event, which we had been to other and IOT happening, and you don't have a thing, Well, they need to be, but if you look at, and when you have every event that's and I said what do you mean by that? and when you have such a wide, vast surface area of attack, So the security advantage is that every time you that gives you also an advantage. And then when you can actually take that data hearing, are you kidding me, that Cloud is insecure. that environment, and that's what you get that notified me that this might be the trend. and what are the headwinds, what's the blockers? Not just security, but the ability to be innovative actual code bases so that you can actually then you can start to create service catalogs We're on the shoulders of others, why replicate and you would always hear some of these larger organizations the issue is proprietary software and switching costs. So that the dimensions to evaluate for customers and out in the field, we've been getting the data a hijack model of putting in multi-cloud requirement. Well, for one, when you have innovators in a space And that's probably the right path to take. And some people choose to have Cobalt code And it's working, and you know, they'll inevitably take a minute to talk about what you guys do, so it's always kind of been on the forefront Austere environments, you know, low-power, the Recovery Act, they needed a website to track cloud-first initiative for the Federal Government. Well, he doesn't get the credit he deserves on and do that in the Federal Government. So, you guys are the right group to call for IT to get and then when you go to the second pillar, at Smartronix, thanks for spending that time with me. I'm John Furrier with the Cube, in Washington D.C.,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
VerizonORGANIZATION

0.99+

Robert GroatPERSON

0.99+

AmazonORGANIZATION

0.99+

RobertPERSON

0.99+

2004DATE

0.99+

JohnPERSON

0.99+

2011DATE

0.99+

SmartronixORGANIZATION

0.99+

AWSORGANIZATION

0.99+

CIAORGANIZATION

0.99+

Washington D.C.LOCATION

0.99+

Recovery ActTITLE

0.99+

John FurrierPERSON

0.99+

October 1stDATE

0.99+

D.C.LOCATION

0.99+

CongressORGANIZATION

0.99+

FortinetORGANIZATION

0.99+

Amazon Web ServicesORGANIZATION

0.99+

10 weeksQUANTITY

0.99+

Feb 2018DATE

0.99+

2009DATE

0.99+

Arlington, VirginiaLOCATION

0.99+

750 billion dollarsQUANTITY

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

fourth pillarQUANTITY

0.99+

Department of DefenseORGANIZATION

0.99+

five yearsQUANTITY

0.99+

last JuneDATE

0.98+

dozens of yearsQUANTITY

0.98+

100%QUANTITY

0.98+

second pillarQUANTITY

0.98+

oneQUANTITY

0.97+

first timeQUANTITY

0.97+

Each oneQUANTITY

0.97+

Public Sector SummitEVENT

0.96+

four pillarsQUANTITY

0.96+

one groupQUANTITY

0.96+

Federal GovernmentORGANIZATION

0.96+

DODTITLE

0.96+

CubeORGANIZATION

0.95+

20-year-oldQUANTITY

0.95+

first companyQUANTITY

0.95+

Amazon Web Services Public SectorORGANIZATION

0.93+

ObamaPERSON

0.93+

firstQUANTITY

0.91+

tens andQUANTITY

0.91+

eachQUANTITY

0.89+

President ObamaPERSON

0.88+

day oneQUANTITY

0.88+

DODORGANIZATION

0.87+

20 some years agoDATE

0.87+

multi-billion dollarQUANTITY

0.86+

SwissOTHER

0.86+

GreenfieldLOCATION

0.84+

one particular itemQUANTITY

0.82+

aboutQUANTITY

0.82+

Executive Vice PresidentPERSON

0.82+

Marine CoreORGANIZATION

0.81+

tens of yearsQUANTITY

0.8+

first cloud-first initiativeQUANTITY

0.8+

first governmentQUANTITY

0.79+

CloudTITLE

0.76+

recovery.govORGANIZATION

0.74+

Beth Cohen, Verizon - OpenStack Summit 2017 - #OpenStackSummit - #theCUBE


 

>> Narrator: Live from Boston, Massachusetts, it's the CUBE covering OpenStack Summit 2017, brought to you by the OpenStack Foundation; Red Hat, an additional ecosystem of support. (upbeat synthesizer music) >> Welcome back, I'm Stu Miniman, joined by my cohost John Troyer. This is The CUBE, worldwide leader in live enterprise tech coverage. Coming into the show this year, here, at OpenStack, discussion of edge was something that had a little bit of buzz. Last year's show in Austin, the telecommunication all of the NFV solutions were definitely one of the highlights. Happy to welcome to the program a first-time guest, Beth Cohen, who is the SDN and NFV Network Product Strategy at Verizon. Thanks so much for joining us. >> Thank you, yes. >> All right, so Beth, I mean, we hear cloud in a box, Edge, all those pieces in the keynote, Monday. People are excited, you know, telecommunications. I worked in telecom back in the '90s. I'm excited to see that people are getting involved and looking at this, but before we get into all the tech, just tell us, briefly, about you and your role inside Verizon. >> Sure. So, I actually work at Verizon as a New Product Strategist, so I come up with new products, so I do product management. This is actually my second product for Verizon. The previous one was Secure Cloud Interconnect which is a very successful product. Who would have thought that connecting privately to the cloud would be a good idea? It turns out, everybody thinks that's an excellent idea, but I worked in telecom back, for GTE, back in the 1990s and through BBN, so I've been in this industry for a while and I've always stayed kind of on the cutting edge of things, so I'm very excited to be working on these cutting-edge projects within Verizon. >> All right, so speaking of cutting edge, let's cut to the Edge. >> Beth: Cut to the Edge (laughs). >> And, give our audience a little bit about what the announcement was, >> Sure. >> the actual product itself. >> So, Virtual Network Services, is the product. We originally announced it in July with a universal CP box. That box was not a, what we're calling a white box which I think is the industry term, now. That one was based on the Juniper NFX250 which is, we call, a gray box, so it's using the Juniper NFX software, but the new, new announcement is this is truly a white box. It's an x86 box. It's generic, any x86 will work, and, in fact, the product has, we realized, actually, working with customers that some customers want to have a very small box, very small footprint, low cost, that only supports maybe two, possibly three, NFVs, Virtual Network Functions, all the way up to our largest box, is 36 core. So, we have four core at the bottom, so that's used for the coffee shops or the small retail-type functions where they're only looking for security in routing or security in SDN or SD-WAN or whatever, so very small, compact use all the way up to 36 core which can support, you know, 10 or 12 different functions, so load balancing, routing, security, whatever you want, >> Yeah. >> cloud in a box. >> There's so many pieces of OpenStack and they've been, for years, talking about the complexity. This, really, if I understand it right, I mean, it's OpenStack at the edge in a small box, so how do we kit such a complicated thing in a little box and what kind of functionality does that bring? You know, what will customers get with it? >> So, obviously, it's, we didn't take old everything, >> Right. >> of course, so, you know, it does include Neutron for the networking and it does include Nova in the computes and so it has the core components that you need for OpenStack. And, why did we choose that? Because OpenStack really gave us that consistent platform across both out at the edge and also within the core, so we are building the hosted network services platform which we're using internally, as well, to host our, to support our network services and we're also supporting customers on this same platform. So, that gives us the ability to give a customer experience both out at the edge and within the core. So, of course, everybody wants to know the secret source. How did we cram that in? Containers, so we containerize OpenStack. One of the requirements is it had to be a single core, so it is a single core in the box because, of course, particularly in a small box, you want to leave as much space as possible for services that our customers want because the OpenStack is the infrastructure that supports it all. >> That's great, I mean, so, Beth, that was one of the highlights of the whole show, for me, right. I like when tech blows my mind a little bit and the idea of something that we might have run on a some embedded Linux source or embedded OS before, now, it's actually running a whole cloud platform, in a box, in my office, was amazing. As you're looking at the center of the network versus the edge, is that one, to you and to network ops, is that one big cloud, is that a cloud of clouds? What's kind of the architecture? >> Beth: Cloud of clouds. >> Yeah. >> Is it fog? (co-hosts laughing) >> It's, yeah, you could say it is a fog, because one of the things when you pull a network to the edge like that, Verizon lives, I mean, we live and breathe networks and the networks are WANs, Wide Area Networks, right, they're everywhere, so we live and breathe that every day. So, traditionally, as I mentioned in the keynote, is that cloud has been sort of the data center centric, right, and that changes the equation because, if you think about it, most data center centric clouds, the network ends at, there's some mystery thing that happens and the end, right? It just goes to that network router, you know, NNI, network-to-network net router and it just kind of disappears, right? Well, of course, we know what's on the other side, so what we've done is we've said, okay, we have functionality within that data center, but we've expanded that out to the edge and we understand that you can't just have everything sitting in the cloud and then rely on that edge to just work, so you need to move pieces of it out so it's not reliant on that inside data center. So, there's tools back there, but if that data center connection goes away, that function will still work out at the edge. >> That's great. You talked about both SDN and NFV, a big conversation at OpenStack for the last several years. >> Yeah. >> Can you talk a little bit about maybe the state of SDN and NFV and how you all are looking at that and are we there yet? What do we still, >> (laughs) Are we there yet? >> what places do you still see we need to go? >> So, when I worked with the marketing team, they were like, "Oh, we're going to have to use this NFV term. "We have to use the SDN," and when I talk to customers, inevitably, they're like, "What is the NFV stuff?" They have no idea, so, really, at the end of the day, I see NFV as a telco thing. Absolutely, we need it, but we have to translate what that means to customers because all that back-end stuff, as far as they're concerned, that's magic. That's the magic: that we deliver the services. Those packets just arrive, they do what they're supposed to do. So, I say, okay, network services is really what you're talking about, because they understand, "Oh, yeah, I need that security, I need that firewall, "I need that WAN Optimizer, I need that load balancer." That, they understand. >> Yeah. >> Well, Beth, I, with my telecom background, I think of, there's lots of hardware, there's lots of cabling, there's the challenges that you have with wireless and we're talking a lot about 5G, you're talking about software, though, and it's delivering >> Yeah. >> those services that the customer needs, so, right, is that what they ask for? Is it, I need these pieces and now I can do it via software as opposed to before, I had to, you know, we talked, it's the appliances to the software move? >> Right. >> What are the, your customers asking for and how are they embracing this? >> Well, so our customers are very excited. I can't think of a single customer that I have gone to that have said, "Why would I do that?" They're all saying, "No, this is really exciting," and so what they're doing is they're really rethinking the network because they're used to having stacks of boxes, so the appliance base, you know, that was really pioneered back, of course, Cisco sort of pioneered it back in the '90s but I remember talking to Infoblox back in the, oh, like the early 2000s when they came out with DHCP DNS appliance and I was like, "Wow, that's so cool." So, this is sort of the next generation, so why do you need to have six different boxes that do a single thing? Why don't we just make it a cloud in the box and put all those functions together and service chain them? That gives you a lot more flexibility. You're not stuck with that proprietary hardware and then worrying about, I mean, I can't tell you how many customers want to do this for tech refresh. They have end-of-life equipment that the vendor is saying, "Forget it, (laughs) this is 10-year-old equipment. "We're not supporting it anymore." >> Yeah, but what are the security implications, here, though? We've seen the surface area of where attacks can come from just seems to be growing exponentially. I think, I go to the edge, I've got way more devices, there's more vulnerabilities. Your last product, you said, was security. How does security fit into all of this? What are you hearing from your costumers? How do you partner with other people? >> So, security is absolutely paramount to our customers. As I mentioned in the talk, there was a, we did a survey of our customers. Security was absolutely the top priority, but security's a lot more sophisticated, as you said, than it used to be and the vectors for attack are much more sophisticated and so it's not enough to just have a firewall. That's, your attack is, you know, the sqiushy inside and the hard outside, forget it. That's just (laughs)-- >> Yeah, yeah, yeah. You get it. >> That's just not there anymore. >> Indeed, the moats are gone. They're in the castle. >> Yeah. >> They're in the castle, right. So, for us, it's very appealing to our customers, that, the idea that they can put the security where they need it, so they can put it out at the edge and some of them so want it at the edge and we give them the choice of setting up a sort of a minimal basic firewall or a full-featured next-gen firewall. We also find customers kind of like the brand names, so we offer Palo Alto, Fortinet, Cisco, Juniper and others will be coming, so that appeals to them. They tend to be a shop of one or the other. >> John: All on a software basis? >> All on a software basis. >> Giving them the virtual clients discount? >> Right, yeah, all virtual clients is right. And, you know, at the end of the day, our customers don't actually care about the hardware. For them, it's the service. >> I wanted to take it over to OpenStack itself for a little bit. You know, the great conversation here, this week, has been something about modularization, talking about the ecosystem, talking about containers, both the app layer up on top and the packaging layer down below, which is kind of really cool, as well. How are you seeing the OpenStack community engage with the ecosystem be available to different use cases like this? Right, slim it down, take what you need, leave the rest, different, for a while, the conversation was, there were so many projects and, about everything, and do you feel like OpenStack is going where we need it to go, now, in terms of, again, a usable partner and community to work with? >> I do believe that because, so, my product is really a portfolio, if you think about it, so it's a portfolio of services and I view our use of OpenStack in the same way. So, we're really taking that portfolio of OpenStack services and pulling, you know, putting together the package that we need to deliver the services. So, what's out at the edge, that package of OpenStack services at the edge, that's not the same set of services as what's within the core data center. There's some commonality, but we've chosen the ones that are important to us for the edge and chosen the ones that are important to us for the core. So, I think that the OpenStack community is really embracing this notion and we really welcome that, that thing. Now, what I'm finding is that the vendors that we're supporting, you know, that, in the ecosystem, at the application layer, are still struggling with, "Okay, do we containerize? "Do we support, what do, how do we support it?" I can't tell you how many vendors I've gone to and I said, "If you want to be in our portfolio," and obviously most of them do, you know, Verizon's a big company, "you have to be virtualized. "You have to be able to support, run under OpenStack," and they have to get past that, (laughs) that issue. >> Beth, I noticed in some of your social feeds, you've attended some of the Women at OpenStack event. >> Yes. >> I wonder if you have any comment on the events there and diversity in general in the community? >> So, one of the things I love about OpenStack is it's really, really gone out of its way in, within the open source community, in general, to really focus on the value of diversity and it really does track the number of women that, you know, there's a metric that says the percentage of women at every summit and it's going up and the Women of OpenStack community focus on mentoring, and it's not just women, because mentoring's very important, but it really allows, but women are, have sort of special challenges and minorities have special challenges, as well, and we really try to embrace that fact that you do need a leg up if you're not a 50-year-old white guy (laughs). >> All right, Beth Cohen, really appreciate you joining us. Congratulations on the keynote, the product and wish you the best of luck going forward. >> Thank you. >> We'll be back with more coverage here from OpenStack Summit in Boston. For John and myself, thanks for watching The CUBE. (upbeat synthesizer music)

Published Date : May 10 2017

SUMMARY :

brought to you by the OpenStack Foundation; all of the NFV solutions were definitely All right, so Beth, I mean, we hear cloud in a box, Edge, kind of on the cutting edge of things, let's cut to the Edge. So, Virtual Network Services, is the product. I mean, it's OpenStack at the edge in a small box, and so it has the core components and the idea of something that we might have run and that changes the equation for the last several years. That's the magic: that we deliver the services. so the appliance base, you know, that was really pioneered the security implications, here, though? and the vectors for attack are much more sophisticated Yeah, yeah, yeah. That's just not They're in the castle. We also find customers kind of like the brand names, And, you know, at the end of the day, and the packaging layer down below, and chosen the ones that are important to us for the core. the Women at OpenStack event. and the Women of OpenStack community focus on mentoring, and wish you the best of luck going forward. For John and myself, thanks for watching The CUBE.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
VerizonORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

Beth CohenPERSON

0.99+

FortinetORGANIZATION

0.99+

John TroyerPERSON

0.99+

JulyDATE

0.99+

JohnPERSON

0.99+

JuniperORGANIZATION

0.99+

GTEORGANIZATION

0.99+

Stu MinimanPERSON

0.99+

BostonLOCATION

0.99+

AustinLOCATION

0.99+

OpenStackORGANIZATION

0.99+

InfobloxORGANIZATION

0.99+

twoQUANTITY

0.99+

second productQUANTITY

0.99+

10QUANTITY

0.99+

1990sDATE

0.99+

BethPERSON

0.99+

Palo AltoORGANIZATION

0.99+

Boston, MassachusettsLOCATION

0.99+

OpenStack FoundationORGANIZATION

0.99+

36 coreQUANTITY

0.99+

this yearDATE

0.99+

#OpenStackSummitEVENT

0.98+

early 2000sDATE

0.98+

OneQUANTITY

0.98+

Red HatORGANIZATION

0.98+

this weekDATE

0.98+

NFVORGANIZATION

0.98+

OpenStack Summit 2017EVENT

0.98+

Last yearDATE

0.98+

MondayDATE

0.98+

bothQUANTITY

0.98+

LinuxTITLE

0.98+

four coreQUANTITY

0.98+

first-timeQUANTITY

0.98+

threeQUANTITY

0.97+

single coreQUANTITY

0.97+

12 different functionsQUANTITY

0.96+

50-year-oldQUANTITY

0.96+

SDNORGANIZATION

0.96+

OpenStackTITLE

0.96+

oneQUANTITY

0.96+

six different boxesQUANTITY

0.95+

OpenStack SummitEVENT

0.95+

Virtual Network ServicesORGANIZATION

0.95+

single thingQUANTITY

0.94+

single customerQUANTITY

0.93+

BBNORGANIZATION

0.93+

NNIORGANIZATION

0.92+

'90sDATE

0.88+

10-year-oldQUANTITY

0.88+

OpenStackEVENT

0.86+

telcoORGANIZATION

0.85+

last several yearsDATE

0.78+

The CUBETITLE

0.78+

up to 36 coreQUANTITY

0.77+

every summitQUANTITY

0.77+

yearsQUANTITY

0.76+

CUBEORGANIZATION

0.7+

NeutronORGANIZATION

0.69+

Fortinet Accelerate Wrap - Fortinet Accelerate 2017 - #Accelerate2017 - #theCUBE


 

>> Announcer: Live, from Las Vegas, Nevada, it's theCUBE, covering Accelerate 2017. Brought to you by Fortinet. Now, here are your hosts, Lisa Martin and Peter Burris. >> Welcome back to theCUBE, I'm Lisa Martin joined by Peter Burris. We have been in Vegas all day at Accelerate 2017. What an exciting, buzz-filled day that we've had, Peter. I feel like we've learned, I've learned a lot myself, but also just that the passion and the opportunity for helping companies become more secure, as security is evolving, is really palpable. >> Well, yeah, I totally agree with you, Lisa. In fact, if there's one kind of overarching theme of what we heard and what we experienced, it's this is one of the first conferences, security conferences, that I've been to, where we spent more time talking about business opportunity, business outcome, the role that security is going to play in facilitating business change. And we spent a lot less time talking about security speed, security feeds, geeking out about underlying security technologies. And I think that portends a pretty significant seismic shift in how people regard security. We'll still always have to be very focused and understand those underlying technologies in the speeds and feeds, but increasingly, the business conversation is creeping into, and in fact, starting to dominate how we regard security. It's past become reviewed in a digital world, it has to become viewed as a strategic business asset, and not just as the thing you do to make sure your devices don't get stolen or appropriated. >> Right, and that context was set from the beginning with the keynotes this morning. The CEO Ken Xie, a lot of folks that we talked to today, said he normally gets quite technical in keynotes, and today kept things really at a business level. >> And we heard that many people thought it was the best keynote they've seen him give in a long time. >> That's right, that's a great point. >> And one of his key messages was that at the end of the day, digital business is not about some new observations on channels or new observations on products. It really is about how you use data to differentiate, differentially create sustained customers. My words, not his, but it's very, very much in line. The difference between any business and digital business is how you use your data. And we heard that over and over and over today, and how security, technologies, and practices, and capabilities have to evolve to focus more on what businesses want to do with data. That is where, certainly Fortinet, sees the market going, and they're trying to steer their customers so that they can take advantages of those opportunities. >> Right, and that's a great point that you made. Their CFO, who we had on the program as well, Drew Del Matto, talked about in his keynote, that it's critical for a company to be able to have digital trust. We talk about trust in lots of different contexts, but what does trust mean to a business? >> As you said, he's the CFO. It's interesting, CFO is typically focused on things like is the ownership getting a return on the capital that they've invested in this company? It was very, to me anyway, refreshing to hear a CFO expressly state data is becoming an increasing feature of the capital stock of the company. And we have to take explicit steps to start to protect it and secure it, because in fact, it's through security that data is turned into an asset. If you don't secure your data, it's everywhere. It's easily copied, it flies around. Data and security-- at least data asset, the concept of data asset, and security, are inextricably bound because it is through security that you create the asset notion of data. The thing that generates value. Because if you don't, it's everywhere. It's easy to copy. I thought he did a wonderful job of starting to tie together the idea of data in business in a very straightforward, tactical, CFO approach. It was a good conversation about where business people are starting to think about how this is going to evolve. >> He also talked about the role of the CSO, and there was a panel during the general session of three CSOs from different industries. That's an interesting evolution as security has evolved from perimeter only to web, to cloud, to-- Now, where we need to be as Ken Xie talked about, we're at this third generation. It's about fabric. He talked about that, and the importance of that, and the capabilities. But it's also interesting to hear security's now a conversation in the boardroom. This is not something that is simply owned by a CIO or CSO, that that role has to facilitate a company becoming a digital army in order to create value from that data. A lot of folks said today, too, that mindset of "If I can't see it, I can't protect it." >> Yeah, we heard that this morning from the CFO, we also heard it from George, the CSO of Azure, Microsoft Azure. We heard the relationship, the evolving role of the CSO, or the Chief Security Officer multiple times today. Security's hard. This is not easy stuff. We can bring a lot of automation, and we can bring a lot of technology to bear on making it easier and simplifying it. And we heard a lot about how that's happening. But this is a hard, hard thing to do, for a lot of reasons. But it's one that must be done, especially in a digital world. And the role, or the impact on the CSO role, is profound. You're not going to have everybody in the organization-- They all have a stake in it, but they're all not going to perform security routines, necessarily. Yet, it's too big, as we heard from George, for one person. We have to start increasingly thinking about security as a strategic business capability that may be championed by the CSO, but is going to be undertaking in a lot of different places. One of the things that the Microsoft gentleman, George-- >> Lisa: George Moore. >> George Moore bought up, was the idea that increasingly, if you do security right, you can secure things at a relatively technical level and present them as services so that other parts of the business can start to consume them, and they become part of their security architecture. And it goes into their products, or it goes into their services, or it goes into how they engage customers. >> Facilitating scale. >> Or whatever else it might be, logistics. I think that that is a very powerful way of thinking about how security's going to work through a fabric, being able to present a hierarchy of security capabilities that go all the way out to your customers and actually allow you to engage your customers at a security conversation level. Which is, we also heard that talked about a little bit today. The role, the brand value of trust, but we still don't have an answer for how that's going to play out. >> If we look at some of the other things that were talked about in Ken's keynote, hyperconnectivity. From the proliferation of mobile and IoT, which IoT devices, there's 20 billion that are predicted to be connected by 2020, which is just a few years away. As that sounds, well it doesn't sound, it is increasing the threat surface, and we are also hearing from some of the folks that were on the program today, Derek Manky being one of them, who wrote a great blog just published recently on Fortinet talking about the major trends that are being seen and the challenges there. I think we're also seeing that companies like Fortinet and their suite of technology alliance partners like Microsoft, like Nazomi, going all the way out to the endpoints and back, that these companies are coming together to collaborate, to start mitigating the risks that are increasingly there with the threat surface being larger. I think there was a lot more positivity than I honestly anticipated. When you hear of all these attacks that it's daily, and that's such a common thing. The collaboration of the technology and the integration is exciting to hear where these companies are going to be able to limit damage. >> And to put one more number on it, the 20 billion devices, but it's what those devices are doing. Again, George Moore from Microsoft Azure talked about I think he said, it was 800 billion events that they're dealing with a day. And in 2017, Microsoft Azure is going to cross a threshold of dealing with one trillion events a day that they have to worry about from a security standpoint. If you think about that industry wide, Microsoft Azure's big, but there are others. We're talking today, probably somewhere, I just estimated, he said, "Yeah, that sounds about right," about five trillion, five trillion events a day that businesses have to worry about in aggregate from a security standpoint. And that number is just going to keep growing exponentially. In a year's time, he talked about three, four, five x. So we're talking about hundreds of trillions of events. >> Staggering numbers. >> Within the next decade or so. There is virtually no way that human beings are set up to deal with those kinds of numbers. It's going to require great technology-- >> Automation. >> That provides great automation. That nonetheless, works with humans so that the discretion that human beings bring, the smarts, and the collaboration that human beings bring to bear. The value that they create stays there. We're going to see more productivity coming out of these incredibly smart people that are doing security, because the tooling's going to improve and make it possible. And if it doesn't happen, then that's going to put a significant break on how fast a lot of this digital business evolution takes place. >> Another point that was quite prevalent among our conversations today, was that there isn't, with the exception maybe of healthcare, it's quite an agnostic problem that enterprises are facing in terms of security threats. When we talked to Derek, he mentioned healthcare being one because that information is so pervasive. It's very personal and private. But something that kind of surprised me, I almost thought we might see or hear about a hierarchy, maybe healthcare, financial services. But really, what everyone talked about today, was that the security threats are really pervasive across all industries. All the way, even to industrial control systems and HVAC systems. Which shows you the breadth of the challenge ahead. But to your point, and some of the points that some of our guests made, it's going to be a combination of the humans and the machines coming together to combat these challenges. >> Well I think what we're seeing is that there's a high degree of data specialization within a lot of industries based on different terms, different tactics, different risk profiles, et cetera. But that many of the algorithms necessary to understand exceptions or deal with anomalies, or one of those other things, are applicable across a lot of different industries. What we are likely to see over the next few years is we're still likely to see some of that specialization by industry, by data. Nonetheless, become featured in the output, but the algorithms are going to be commonly applied. They'll get better and better and better. There's still likely to be some degree of specialization if only because the data itself is somewhat specialized, but the other thing that we heard is that it's pretty clear that the bad guys want to get access. Well, let's put it this way, not all data is of equal value. And the bad guys want to get access to the data that is especially valuable to them. A lot of that data is in healthcare systems. To bring these common algorithms that specialize data to secure the especially challenging problems associated with healthcare is a real, real big issue for a lot of businesses today. Not just healthcare businesses, but people who are buying insurance for their employees, et cetera. >> Exactly, it becomes a pervasive problem. You were mentioning today that this was very much a business conversation versus speeds and fees. We did hear about a couple of technologies moving forward that are going to be key to driving security forward. Analytics, data science, in fact-- We also talked about kind of the difference between security fabric which Fortinet rolled out last year, and a platform and how businesses are kind of mobilized around that, and the differences there. Control versus spreading that out. One of the things that Forinet did about, I think it was in June of last year, was they acquired AccelOps. Bringing in monitoring, bringing in realtime analytics. A lot of our guests talked about the essentialness of that realtime capability to discover, detect, remediate, and clear things up. From a 2017 perspective, besides analytics and data science, what are some of the other things you see here as essential technologies to facilitate where the security evolution trajectory is going? >> I think in many respects, it comes back to some of the things we just talked about. That as digital business increasingly-- Let's step back. The way we define, at Wikibon SiliconANGLE, what digital business is, what differentiates your digital business from any other kind of business is data. It's how you use your data to create and sustain customers. That's a pretty big world. There's a lot of-- You know, most of us operate in the analog world. There's some very interesting ways of turning that analog information into digital information. There's voice, there's photographs, there's a lot of other-- We talked a little bit about industrial internetive things. There's an enormous set of investments being made today to turn the analog world that all of us operate in, and the processes that we normally think about, into digital representations that then can be turned into models for action, models for insight, new software systems that can then have an impact on how the business actually operates. And I think that, if we think the notion of analytics and data science, and by the way, security's one of those places where that set of disciplines have really, really matured through fraud detection and other types of things. But I think what we're going to look at, is as new types of data are created by different classes of business or different classes of industry, or different roles and responsibilities, that that data, too, will have to be made secure. What we're going to see, is as the world figures out new ways of using data to create new types of value, that the security industry is going to have to be moving in lockstep so that security doesn't once again become the function that says no to everything, but rather the function that says, "Yeah, we can do that." We can go from idea to execution really fast, because we know how to make that data secure. >> Well, Peter, it's been such a pleasure, an honor, co-hosting with you today. Thank you so much for sharing the desk with me. >> Absolutely, Lisa. >> Look forward to doing it some other time. And we want to thank you so much for joining us on theCUBE today as well. I want to also point you to some of the upcoming events. Go to SiliconANGLE.tv. Next week, we've got the VTUG Winter Warmer going on. You'll also be able to see that on the website. Women and Data Science with yours truly in early February. And then the Spark Summit in February, Feb 7-9 in Boston. Again, that's SiliconANGLE.tv. For my co-host Peter Burris, I'm Lisa Martin. Thanks so much for watching, and we'll see ya next time. (techno music)

Published Date : Jan 11 2017

SUMMARY :

Brought to you by Fortinet. but also just that the the role that security is going to play folks that we talked to today, And we heard that many people thought and capabilities have to to be able to have digital trust. of the capital stock of the company. that that role has to facilitate a company that may be championed by the CSO, of the business can start to consume them, that go all the way out that are predicted to that they have to worry about to deal with those kinds of numbers. so that the discretion that of the humans and the But that many of the algorithms necessary that are going to be key to that the security sharing the desk with me. see that on the website.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
GeorgePERSON

0.99+

Peter BurrisPERSON

0.99+

MicrosoftORGANIZATION

0.99+

DerekPERSON

0.99+

Lisa MartinPERSON

0.99+

Drew Del MattoPERSON

0.99+

Ken XiePERSON

0.99+

Peter BurrisPERSON

0.99+

George MoorePERSON

0.99+

Derek MankyPERSON

0.99+

VegasLOCATION

0.99+

2017DATE

0.99+

BostonLOCATION

0.99+

FortinetORGANIZATION

0.99+

PeterPERSON

0.99+

LisaPERSON

0.99+

800 billion eventsQUANTITY

0.99+

2020DATE

0.99+

20 billionQUANTITY

0.99+

ForinetORGANIZATION

0.99+

Next weekDATE

0.99+

NazomiORGANIZATION

0.99+

fourQUANTITY

0.99+

last yearDATE

0.99+

todayDATE

0.99+

fiveQUANTITY

0.99+

KenPERSON

0.99+

oneQUANTITY

0.99+

early FebruaryDATE

0.98+

20 billion devicesQUANTITY

0.98+

third generationQUANTITY

0.98+

hundreds of trillions of eventsQUANTITY

0.97+

Spark SummitEVENT

0.97+

OneQUANTITY

0.97+

Las Vegas, NevadaLOCATION

0.97+

Wikibon SiliconANGLEORGANIZATION

0.97+

one personQUANTITY

0.97+

about five trillionQUANTITY

0.97+

a dayQUANTITY

0.96+

threeQUANTITY

0.96+

this morningDATE

0.95+

a yearQUANTITY

0.95+

first conferencesQUANTITY

0.95+

three CSOsQUANTITY

0.95+

SiliconANGLE.tvOTHER

0.94+

June of last yearDATE

0.94+

next decadeDATE

0.94+

February, Feb 7-9DATE

0.93+

#Accelerate2017EVENT

0.91+

AccelOpsORGANIZATION

0.89+

one trillion events a dayQUANTITY

0.88+

AzureORGANIZATION

0.85+

five trillion events a dayQUANTITY

0.83+

CEOPERSON

0.83+

Microsoft AzureORGANIZATION

0.81+

AccelerateORGANIZATION

0.74+

Accelerate 2017EVENT

0.74+