Image Title

Search Results for Framework:

Fast-Track Your Path to a Cloud Operating Model With the HPE Edge-to-Cloud Adoption Framework


 

(bright upbeat music) >> Welcome back to theCube's coverage of HPE's Green Lake announcement. We've been following the caves of Green Lake's announcement for several quarters now, and even years. And we're going to look at cloud adoption and frameworks to help facilitate cloud adoptions. You know, in 2020, the world was on a forced march to digital and there was a lot that they didn't know. Big part of that was how to automate, how to reduce your reliance on physically, manually and plugging things in. And so, customers need an adoption framework to better understand and how to de-risk that journey to the cloud. And with me to talk about that are Alexia Clements, who's the Vice President at Worldwide go to market for GreenLake cloud services at HPE and Alexei Gerasimov who's the vice president of Hybrid Cloud Delivery advisory and professional services at Hewlett Packard Enterprise. Folks, welcome to theCube. >> Alexia: Thanks so much for having us. >> You're very welcome. So, Alexei, what is a cloud adoption framework? How does that all work? >> Gerasimov: Yeah, thanks Dave. So the framework is a structured approach to elevate the conversation, to help our customers get outcomes. So we've been helping customers adopt the benefits in the most of IT for a decade. And we've noticed that they basically focus on eight key areas as they transform to cloud-like capabilities. It's a strategy and governance, it's innovation, people, a dev ops applications, operations security, and data. So we've structured our framework around those core components to help our customers get value. Because end of the day, it's all about changing the way they operate. To get the advantage of all of it. >> Yes. So you can't just pave the cow path and kind of plug your existing process. There's a lot that's unknown, as I said up front. So, so Alexia, maybe you could talk a little bit more about some of the real problems that you're solving with customers that you see in the field. >> Alexey: Yeah, absolutely. So most customers are going through some form of digital transformation and these transformations are difficult and they need a structured approach to help them through that journey. I kind of like to think of it as a recipe to make a meal. So you need to know what ingredients to buy and what are the steps to perform to make that meal. >> Okay. So when you talk to customers, what do you, what do you tell them? That's in it for them after the, after you've actually successfully helped them deploy? What are they telling you? >> Yeah, well, they're telling they now have reached their business outcomes and they're, you know, they're a more agile organization. >> What's the experience look like when you, when you go through one of these journeys and you, you apply the adoption framework, can you sort of paint a picture for us? >> Yeah, absolutely. So every customer is in some sort of transformation, like Alexia said, that transformation implies you've got to know where you start and again, know where you're going. So the experience traditionally is customers need to understand what are my current hybrid cloud capabilities? What do I have, what am I missing? What's lacking and then determine where do you want to go? And in order to get from point A to point B, they have to get a prescriptive approach. So the framework sort of breaks down their path from where they are to their desired maturity. And it takes them in the very prescriptive path to get there. >> So you start with an assessment, you do a gap analysis based on their skill sets. I presume you identify what's possible, help them understand, you know, best practice, which they may not achieve, but this is kind of their north star. Right? And then do you help? How do you help them fill those gaps? Because are skills gaps. Everybody talks about that today. You guys presumably can provide additional services to do that, but so can you add a little bit color to that scope? >> Yeah, yeah, absolutely. And so to your point, the first is a maturity level. So once you figure out the maturity level, you understand what needs to be done. So if you look at our domain, the eight domains that I mentioned and the framework, people is a big one, right? Most of the folks are struggling with people's skills and organizational capabilities. And it's so because it's an operating model change, right? And people are the key component to this operating model change. So we help our customers figure out how do we achieve that optimal operating level and operating a model maturity. And that could be on-prem that could be on public cloud. That could be hybrid. That could be at the edge. And yeah, we, if we can HP, the framework, by the way is pretty, pretty open and pretty objective. If we can help our customers address and achieve their sales gaps great. If we can not directly, then we can have a partner that can help them, you know, plug in something that we don't have. >> Are you finding that, that in terms of the maturity that most people have some kind of experience with, with cloud, but they're struggling to bring that cloud experience to their on-premise state. They don't want to just shove everything into the cloud. Right. So, what does that kind of typical journey look like for folks? I know there's--it's a wide spectrum, or you've got people that are maybe more mature. Maybe some of the folks in financial services got more resources, but can you sort of give us a sense as to what the typical, the average. >> Oh yeah yeah yeah, absolutely. By the way. So that give you a customer example, perfect example of a large North American integrated energy company. They decided to go cloud fresh, like a lot of companies. that wants to do cloud first. And why? The reason was agility. So they started going to the cloud and they realized in order to get agility, you can't just go to you, pick your public CSP, you got to change the way to operate. So they brought us in and they asked, could you help me figure out how we can change the organization? So we actually operate on the proper level of maturity. So we brought our team in. We help them figure out what do we need to look at? We need to look at operations. We need to look at people. We need to look at applications, and we need to figure out what gives you the best value. So when all said and done, they realized that their initial desire of, you know, public first or cloud first, wasn't really public cloud first. It's a way to operate. So now the customer is in three different public CSPs. They're on-prem, there are at edge and everywhere. So that's the focus. Yeah. >> Is the scope predominantly the technical organization. How deep does it go into the, to the business? Is it obviously the application development team is involved, but how deep into the business does this go? The framework. >> Right, and it's absolutely not a technology focused, the whole concept areas, it's outcomes based, and it's a results based. So if you look at the framework, there's really not a single element of the framework that says tech, like storage or compute. No, it's its people, its data, it's business value, strategy and governance, because the goal for us is being objective is we're just trying to help them address the outcomes. Not necessarily to give them more tech. >> So Alexia, I like that answer because it's a wider scope as, I mean, if we just focused on the tech and that's the swim lane, it'd be a lot easier. But as we all know, it's the people in the process that are really the hard part. So that, that makes the challenge for customers greater. You're hurting more cats. So what are the, some of the obstacles that potentially you help customers before they dive in understand. >> Yeah. So we're giving them a roadmap on where they need to go. So we're like I mentioned that recipe, so we're really trying to identify what is their strategy and where do they, what are the outcomes that they're trying to drive and help them on a street, you know, with that path to meet those outcomes. So some of those, I mean, every customer's a little bit different. I mean, we had one customer, which was a, one of the largest hospitals in north America and they, they would needed to, they wanted to go to the cloud, but they realized they couldn't put all of their patient data on the cloud. So what we did was we helped them in changing their operating model and really look to see how does that, how do they need to what's that end game for them, and actually help redo their operating model to have some in the cloud and some on-prem and, and really identify, you know, where they needed to go for their roadmap. So that was an obstacle that they had, hey, we can't put all this stuff out there. How does that now need to work in this new world? >> I would think the data model is a big deal here. I mean, you just gave an example where there's a, there's a, there's a governance and compliance aspect to it. So thinking about that example, did they have to change the way in which they provided federated governance was that presumably identify whose whose responsibility that was to adjudicate, but also had to get the, the implementers to follow that's the, how does that all work? Is it just the deep conversations? And then you figure out how to codify it or. >> No. So what so we have, so through those eight domains that Alexia mentioned, we go through, step-by-step how they need to think about it. And within mind, what are their business outcomes and goals that they're trying to achieve? So really identifying how they need to change that operating model to meet those business outcomes. >> So what's the output, it's a plan, right. That's tailored to the customer. Is that, is that correct? And, and then sort of assistance in implementing downstream or what do they get? >> Yeah, yeah, absolutely. Just to piggyback to what Alexia said, the alignment, the early alignment, the strategy and governance, as you mentioned, this is probably the most important thing, because everybody says we want to be cloud first, but what does that mean? Cloud first means different things to everyone. So we said, give him a plan. The first we'll help with figure out is what does that mean for you? Because at the end of the day, you're not going to the cloud for the sake of cloud, or anywhere you go into the cloud to get some sort of value. So what's that alignment. So the plan is supposed to help you on your road to that value, right? So we'll help them figure out what I want to do, why, for what purpose, what's going to actually address my business value. So yes, they will get a plan as part of it. But more importantly, they get, they get a set of activities, communication plans, which by the way, another block that you got to address. >> Dave: Huge. >> Yeah. >> Yeah. I mean, a lot of executives tell me, look, if you don't change your operating model and go to the cloud, yeah. You're talking, you know, nickels and dimes. If you want to get telephone numbers, you know, big companies, you want to get into bees with billions, you have to change the operating model. And the problem that they tell me is a lot of times the corner offices, okay, we're doing this, but everybody in the fat middle says, what are we doing? >> Right. And now more than ever, I mean, customers need to look at that model like a more modern operating model to realize the benefits of cloud capabilities, whether that be at the edge, their data centers, their colos cloud. So they really need to look at that. And what we've seen is with our framework, we're really helping customers accelerate their business outcomes. De-risk their transformation, and really optimize that cloud operating model. >> It's that alignment you reducing friction within the organization, confusing confusion. When people don't know which direction they're going, they'll just going to go wherever they're pointed. Right. Right. >> And you back to the alignment. So you've got alignment and you mentioned communication. You have to communicate up and down and left and right across the organization because that's one of the most probably ignored elements of any transformation lots of people don't know. So you got to communicate. And then you have to actually measure and report on how they, you know, how the transformation is happening. So we can help in all three of those. >> Especially when everybody's remote. Yeah. Right. And then I said, hey, these digital transformations, there's so much, that's unknown. >> Alexia: Right. It's difficult. >> It's a lot of new. And so you also have to, I presume part of the plan is, Hey, you're not, it's not going to be a hundred percent perfect. So you have to have. >> Alexia: Right. And you're constantly iterating on that plan. >> What does this have to do with GreenLake? >> Alexia: Yeah. So, I mean, GreenLake is HPE's you know, cloud everywhere. And what we're really doing is this framework is helping customers with that path to get that cloud-like experience and as a service model. And so the framework is really helping clients understand where do they need to go and what GreenLake solutions can help them get there. >> So the fundamental assumption of not every cloud player necessarily bad, I would say most hyperscalers is, hey, ultimately, all the data and the workloads are going to go to the cloud, that's their operating premise. So they all have an operating framework to facilitate that. >> Alexia: Right. >> It's, it's tongue in cheek, but it's true. So, but everybody has one of these. How was yours different? >> Yeah. So like, like you said, there's lots of different, you know, frameworks out there, but what we're really focused on is meeting those business goals and outcomes for clients. So we didn't focus on the technology. Like we mentioned what we were really focusing around. I mean, we kind of learned early on that every customer has technical capabilities, applications, data in multiple clouds, on-prem in colos and at the edge. So we didn't focus on like just the technology. So it's really driving business outcomes and their goals and, and the tech, all those frameworks that we just mentioned, they're really specifically driving a particular technology tool or vendor implementing a particular technology or vendor. >> So we've talked about outcomes a lot, but I wonder if we could peel the onion on that. So, you know, the highest level outcome is I want to increase revenue, cut costs, drop to the bottom line, increase shareholder value, improve employee experiences and retention, make customers happier, grow my business. I mean, those are, I mean, I, I don't know a lot of businesses that don't... >> Alexia: Right. >> want to do that, So. Okay. That's cool. But then I'm imagining you really start to peel the layers and say, okay, this is how we're going to get there. And you get down to specific objectives as to the, how is that sort of how this works? >> Right, and that's due to echo at Alexia. So that's exactly why ours is different. We're not focusing on how to adopt Microsoft or AWS or Alibaba with focusing on how we can deliver the customer experience or a better revenue, you know, or, you know, increase the value for the consumer for whatever the company will help him. So the framework we'll look at that and figure out how do we actually address it, whether it's on public cloud, whether it's on prem, whether it's at the edge. >> You mentioned Alexia, that something, hey, if we don't have the skills, we can get a partner who does, a big company. You got a huge partner network. So for example, if you might not have necessarily a deep industry expertise, that's where you might lean on a partner or is that, is that a good example or is there a better one? >> Yes and we know. We're not going to just like you mentioned AWS or Microsoft, Alibaba thing that everything will go to public cloud. I don't believe so, but at the same time we know not everything will stay on-prem. So the combination of on-prem, the edge, you know, private cloud and public cloud is what the customers are after. So our partners could be either third party, system integrator that can help us implement something or even the public CSPs, because we know our customers have capabilities everywhere. So the question becomes, how can we holistically address their needs, whether it's on-prem, whether it's in public cloud. >> Great. Guys, thanks so much. >> Alexia: Thank you. Thanks for having us. Appreciate it. >> My pleasure and thank you for watching everybody's as theCube's continuous coverage of HPE's GreenLake announcement, keep it right there for more great content. (bright upbeat music)

Published Date : Sep 28 2021

SUMMARY :

that journey to the cloud. How does that all work? So the framework is a structured bit more about some of the So you need to know what to customers, what do you, outcomes and they're, you know, So the framework sort of breaks So you start with an assessment, So once you figure out the maturity level, that in terms of the maturity So they started going to the the, to the business? So if you look at the framework, that are really the hard How does that now need to the implementers to follow that's the, they need to think about it. That's tailored to the customer. So the plan is supposed to And the problem that they So they really need to look at that. It's that alignment you So you got to communicate. And then I said, hey, Alexia: Right. So you have to have. iterating on that plan. And so the framework is really So the fundamental assumption So, but everybody has one of these. So we didn't focus on the technology. cut costs, drop to the bottom line, And you get down to specific So the framework we'll look at that's where you might lean on-prem, the edge, you know, Guys, thanks so much. for having us. you for watching everybody's

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Alexei GerasimovPERSON

0.99+

DavePERSON

0.99+

AlibabaORGANIZATION

0.99+

Alexia ClementsPERSON

0.99+

MicrosoftORGANIZATION

0.99+

GerasimovPERSON

0.99+

AWSORGANIZATION

0.99+

AlexiaPERSON

0.99+

2020DATE

0.99+

north AmericaLOCATION

0.99+

HPEORGANIZATION

0.99+

eight domainsQUANTITY

0.99+

Hewlett Packard EnterpriseORGANIZATION

0.99+

HPORGANIZATION

0.99+

AlexeiPERSON

0.99+

one customerQUANTITY

0.98+

firstQUANTITY

0.98+

todayDATE

0.98+

threeQUANTITY

0.98+

oneQUANTITY

0.98+

AlexeyPERSON

0.97+

Green LakeORGANIZATION

0.96+

billionsQUANTITY

0.96+

single elementQUANTITY

0.95+

GreenLakeTITLE

0.95+

AlexiaTITLE

0.93+

GreenLakeORGANIZATION

0.91+

hundred percentQUANTITY

0.89+

eight key areasQUANTITY

0.82+

echoCOMMERCIAL_ITEM

0.8+

GreenORGANIZATION

0.74+

point BOTHER

0.73+

LakeTITLE

0.72+

North AmericanLOCATION

0.68+

a decadeQUANTITY

0.62+

Vice PresidentPERSON

0.59+

HPE EdgeTITLE

0.56+

Hybrid CloudORGANIZATION

0.56+

theCubeORGANIZATION

0.46+

theCubeCOMMERCIAL_ITEM

0.46+

SiliconANGLE News | Swami Sivasubramanian Extended Version


 

(bright upbeat music) >> Hello, everyone. Welcome to SiliconANGLE News breaking story here. Amazon Web Services expanding their relationship with Hugging Face, breaking news here on SiliconANGLE. I'm John Furrier, SiliconANGLE reporter, founder, and also co-host of theCUBE. And I have with me, Swami, from Amazon Web Services, vice president of database, analytics, machine learning with AWS. Swami, great to have you on for this breaking news segment on AWS's big news. Thanks for coming on and taking the time. >> Hey, John, pleasure to be here. >> You know- >> Looking forward to it. >> We've had many conversations on theCUBE over the years, we've watched Amazon really move fast into the large data modeling, SageMaker became a very smashing success, obviously you've been on this for a while. Now with ChatGPT OpenAI, a lot of buzz going mainstream, takes it from behind the curtain inside the ropes, if you will, in the industry to a mainstream. And so this is a big moment, I think, in the industry, I want to get your perspective, because your news with Hugging Face, I think is another tell sign that we're about to tip over into a new accelerated growth around making AI now application aware, application centric, more programmable, more API access. What's the big news about, with AWS Hugging Face, you know, what's going on with this announcement? >> Yeah. First of all, they're very excited to announce our expanded collaboration with Hugging Face, because with this partnership, our goal, as you all know, I mean, Hugging Face, I consider them like the GitHub for machine learning. And with this partnership, Hugging Face and AWS, we'll be able to democratize AI for a broad range of developers, not just specific deep AI startups. And now with this, we can accelerate the training, fine tuning and deployment of these large language models, and vision models from Hugging Face in the cloud. And the broader context, when you step back and see what customer problem we are trying to solve with this announcement, essentially if you see these foundational models, are used to now create like a huge number of applications, suggest like tech summarization, question answering, or search image generation, creative, other things. And these are all stuff we are seeing in the likes of these ChatGPT style applications. But there is a broad range of enterprise use cases that we don't even talk about. And it's because these kind of transformative, generative AI capabilities and models are not available to, I mean, millions of developers. And because either training these elements from scratch can be very expensive or time consuming and need deep expertise, or more importantly, they don't need these generic models, they need them to be fine tuned for the specific use cases. And one of the biggest complaints we hear is that these models, when they try to use it for real production use cases, they are incredibly expensive to train and incredibly expensive to run inference on, to use it at a production scale. So, and unlike web search style applications, where the margins can be really huge, here in production use cases and enterprises, you want efficiency at scale. That's where Hugging Face and AWS share our mission. And by integrating with Trainium and Inferentia, we're able to handle the cost efficient training and inference at scale, I'll deep dive on it. And by teaming up on the SageMaker front, now the time it takes to build these models and fine tune them is also coming down. So that's what makes this partnership very unique as well. So I'm very excited. >> I want to get into the time savings and the cost savings as well on the training and inference, it's a huge issue, but before we get into that, just how long have you guys been working with Hugging Face? I know there's a previous relationship, this is an expansion of that relationship, can you comment on what's different about what's happened before and then now? >> Yeah. So, Hugging Face, we have had a great relationship in the past few years as well, where they have actually made their models available to run on AWS, you know, fashion. Even in fact, their Bloom Project was something many of our customers even used. Bloom Project, for context, is their open source project which builds a GPT-3 style model. And now with this expanded collaboration, now Hugging Face selected AWS for that next generation office generative AI model, building on their highly successful Bloom Project as well. And the nice thing is, now, by direct integration with Trainium and Inferentia, where you get cost savings in a really significant way, now, for instance, Trn1 can provide up to 50% cost to train savings, and Inferentia can deliver up to 60% better costs, and four x more higher throughput than (indistinct). Now, these models, especially as they train that next generation generative AI models, it is going to be, not only more accessible to all the developers, who use it in open, so it'll be a lot cheaper as well. And that's what makes this moment really exciting, because we can't democratize AI unless we make it broadly accessible and cost efficient and easy to program and use as well. >> Yeah. >> So very exciting. >> I'll get into the SageMaker and CodeWhisperer angle in a second, but you hit on some good points there. One, accessibility, which is, I call the democratization, which is getting this in the hands of developers, and/or AI to develop, we'll get into that in a second. So, access to coding and Git reasoning is a whole nother wave. But the three things I know you've been working on, I want to put in the buckets here and comment, one, I know you've, over the years, been working on saving time to train, that's a big point, you mentioned some of those stats, also cost, 'cause now cost is an equation on, you know, bundling whether you're uncoupling with hardware and software, that's a big issue. Where do I find the GPUs? Where's the horsepower cost? And then also sustainability. You've mentioned that in the past, is there a sustainability angle here? Can you talk about those three things, time, cost, and sustainability? >> Certainly. So if you look at it from the AWS perspective, we have been supporting customers doing machine learning for the past years. Just for broader context, Amazon has been doing ML the past two decades right from the early days of ML powered recommendation to actually also supporting all kinds of generative AI applications. If you look at even generative AI application within Amazon, Amazon search, when you go search for a product and so forth, we have a team called MFi within Amazon search that helps bring these large language models into creating highly accurate search results. And these are created with models, really large models with tens of billions of parameters, scales to thousands of training jobs every month and trained on large model of hardware. And this is an example of a really good large language foundation model application running at production scale, and also, of course, Alexa, which uses a large generator model as well. And they actually even had a research paper that showed that they are more, and do better in accuracy than other systems like GPT-3 and whatnot. So, and we also touched on things like CodeWhisperer, which uses generative AI to improve developer productivity, but in a responsible manner, because 40% of some of the studies show 40% of this generated code had serious security flaws in it. This is where we didn't just do generative AI, we combined with automated reasoning capabilities, which is a very, very useful technique to identify these issues and couple them so that it produces highly secure code as well. Now, all these learnings taught us few things, and which is what you put in these three buckets. And yeah, like more than 100,000 customers using ML and AI services, including leading startups in the generative AI space, like stability AI, AI21 Labs, or Hugging Face, or even Alexa, for that matter. They care about, I put them in three dimension, one is around cost, which we touched on with Trainium and Inferentia, where we actually, the Trainium, you provide to 50% better cost savings, but the other aspect is, Trainium is a lot more power efficient as well compared to traditional one. And Inferentia is also better in terms of throughput, when it comes to what it is capable of. Like it is able to deliver up to three x higher compute performance and four x higher throughput, compared to it's previous generation, and it is extremely cost efficient and power efficient as well. >> Well. >> Now, the second element that really is important is in a day, developers deeply value the time it takes to build these models, and they don't want to build models from scratch. And this is where SageMaker, which is, even going to Kaggle uses, this is what it is, number one, enterprise ML platform. What it did to traditional machine learning, where tens of thousands of customers use StageMaker today, including the ones I mentioned, is that what used to take like months to build these models have dropped down to now a matter of days, if not less. Now, a generative AI, the cost of building these models, if you look at the landscape, the model parameter size had jumped by more than thousand X in the past three years, thousand x. And that means the training is like a really big distributed systems problem. How do you actually scale these model training? How do you actually ensure that you utilize these efficiently? Because these machines are very expensive, let alone they consume a lot of power. So, this is where SageMaker capability to build, automatically train, tune, and deploy models really concern this, especially with this distributor training infrastructure, and those are some of the reasons why some of the leading generative AI startups are actually leveraging it, because they do not want a giant infrastructure team, which is constantly tuning and fine tuning, and keeping these clusters alive. >> It sounds like a lot like what startups are doing with the cloud early days, no data center, you move to the cloud. So, this is the trend we're seeing, right? You guys are making it easier for developers with Hugging Face, I get that. I love that GitHub for machine learning, large language models are complex and expensive to build, but not anymore, you got Trainium and Inferentia, developers can get faster time to value, but then you got the transformers data sets, token libraries, all that optimized for generator. This is a perfect storm for startups. Jon Turow, a former AWS person, who used to work, I think for you, is now a VC at Madrona Venture, he and I were talking about the generator AI landscape, it's exploding with startups. Every alpha entrepreneur out there is seeing this as the next frontier, that's the 20 mile stairs, next 10 years is going to be huge. What is the big thing that's happened? 'Cause some people were saying, the founder of Yquem said, "Oh, the start ups won't be real, because they don't all have AI experience." John Markoff, former New York Times writer told me that, AI, there's so much work done, this is going to explode, accelerate really fast, because it's almost like it's been waiting for this moment. What's your reaction? >> I actually think there is going to be an explosion of startups, not because they need to be AI startups, but now finally AI is really accessible or going to be accessible, so that they can create remarkable applications, either for enterprises or for disrupting actually how customer service is being done or how creative tools are being built. And I mean, this is going to change in many ways. When we think about generative AI, we always like to think of how it generates like school homework or arts or music or whatnot, but when you look at it on the practical side, generative AI is being actually used across various industries. I'll give an example of like Autodesk. Autodesk is a customer who runs an AWS and SageMaker. They already have an offering that enables generated design, where designers can generate many structural designs for products, whereby you give a specific set of constraints and they actually can generate a structure accordingly. And we see similar kind of trend across various industries, where it can be around creative media editing or various others. I have the strong sense that literally, in the next few years, just like now, conventional machine learning is embedded in every application, every mobile app that we see, it is pervasive, and we don't even think twice about it, same way, like almost all apps are built on cloud. Generative AI is going to be part of every startup, and they are going to create remarkable experiences without needing actually, these deep generative AI scientists. But you won't get that until you actually make these models accessible. And I also don't think one model is going to rule the world, then you want these developers to have access to broad range of models. Just like, go back to the early days of deep learning. Everybody thought it is going to be one framework that will rule the world, and it has been changing, from Caffe to TensorFlow to PyTorch to various other things. And I have a suspicion, we had to enable developers where they are, so. >> You know, Dave Vellante and I have been riffing on this concept called super cloud, and a lot of people have co-opted to be multicloud, but we really were getting at this whole next layer on top of say, AWS. You guys are the most comprehensive cloud, you guys are a super cloud, and even Adam and I are talking about ISVs evolving to ecosystem partners. I mean, your top customers have ecosystems building on top of it. This feels like a whole nother AWS. How are you guys leveraging the history of AWS, which by the way, had the same trajectory, startups came in, they didn't want to provision a data center, the heavy lifting, all the things that have made Amazon successful culturally. And day one thinking is, provide the heavy lifting, undifferentiated heavy lifting, and make it faster for developers to program code. AI's got the same thing. How are you guys taking this to the next level, because now, this is an opportunity for the competition to change the game and take it over? This is, I'm sure, a conversation, you guys have a lot of things going on in AWS that makes you unique. What's the internal and external positioning around how you take it to the next level? >> I mean, so I agree with you that generative AI has a very, very strong potential in terms of what it can enable in terms of next generation application. But this is where Amazon's experience and expertise in putting these foundation models to work internally really has helped us quite a bit. If you look at it, like amazon.com search is like a very, very important application in terms of what is the customer impact on number of customers who use that application openly, and the amount of dollar impact it does for an organization. And we have been doing it silently for a while now. And the same thing is true for like Alexa too, which actually not only uses it for natural language understanding other city, even national leverages is set for creating stories and various other examples. And now, our approach to it from AWS is we actually look at it as in terms of the same three tiers like we did in machine learning, because when you look at generative AI, we genuinely see three sets of customers. One is, like really deep technical expert practitioner startups. These are the startups that are creating the next generation models like the likes of stability AIs or Hugging Face with Bloom or AI21. And they generally want to build their own models, and they want the best price performance of their infrastructure for training and inference. That's where our investments in silicon and hardware and networking innovations, where Trainium and Inferentia really plays a big role. And we can nearly do that, and that is one. The second middle tier is where I do think developers don't want to spend time building their own models, let alone, they actually want the model to be useful to that data. They don't need their models to create like high school homeworks or various other things. What they generally want is, hey, I had this data from my enterprises that I want to fine tune and make it really work only for this, and make it work remarkable, can be for tech summarization, to generate a report, or it can be for better Q&A, and so forth. This is where we are. Our investments in the middle tier with SageMaker, and our partnership with Hugging Face and AI21 and co here are all going to very meaningful. And you'll see us investing, I mean, you already talked about CodeWhisperer, which is an open preview, but we are also partnering with a whole lot of top ISVs, and you'll see more on this front to enable the next wave of generated AI apps too, because this is an area where we do think lot of innovation is yet to be done. It's like day one for us in this space, and we want to enable that huge ecosystem to flourish. >> You know, one of the things Dave Vellante and I were talking about in our first podcast we just did on Friday, we're going to do weekly, is we highlighted the AI ChatGPT example as a horizontal use case, because everyone loves it, people are using it in all their different verticals, and horizontal scalable cloud plays perfectly into it. So I have to ask you, as you look at what AWS is going to bring to the table, a lot's changed over the past 13 years with AWS, a lot more services are available, how should someone rebuild or re-platform and refactor their application of business with AI, with AWS? What are some of the tools that you see and recommend? Is it Serverless, is it SageMaker, CodeWhisperer? What do you think's going to shine brightly within the AWS stack, if you will, or service list, that's going to be part of this? As you mentioned, CodeWhisperer and SageMaker, what else should people be looking at as they start tinkering and getting all these benefits, and scale up their ups? >> You know, if we were a startup, first, I would really work backwards from the customer problem I try to solve, and pick and choose, bar, I don't need to deal with the undifferentiated heavy lifting, so. And that's where the answer is going to change. If you look at it then, the answer is not going to be like a one size fits all, so you need a very strong, I mean, granted on the compute front, if you can actually completely accurate it, so unless, I will always recommend it, instead of running compute for running your ups, because it takes care of all the undifferentiated heavy lifting, but on the data, and that's where we provide a whole variety of databases, right from like relational data, or non-relational, or dynamo, and so forth. And of course, we also have a deep analytical stack, where data directly flows from our relational databases into data lakes and data virus. And you can get value along with partnership with various analytical providers. The area where I do think fundamentally things are changing on what people can do is like, with CodeWhisperer, I was literally trying to actually program a code on sending a message through Twilio, and I was going to pull up to read a documentation, and in my ID, I was actually saying like, let's try sending a message to Twilio, or let's actually update a Route 53 error code. All I had to do was type in just a comment, and it actually started generating the sub-routine. And it is going to be a huge time saver, if I were a developer. And the goal is for us not to actually do it just for AWS developers, and not to just generate the code, but make sure the code is actually highly secure and follows the best practices. So, it's not always about machine learning, it's augmenting with automated reasoning as well. And generative AI is going to be changing, and not just in how people write code, but also how it actually gets built and used as well. You'll see a lot more stuff coming on this front. >> Swami, thank you for your time. I know you're super busy. Thank you for sharing on the news and giving commentary. Again, I think this is a AWS moment and industry moment, heavy lifting, accelerated value, agility. AIOps is going to be probably redefined here. Thanks for sharing your commentary. And we'll see you next time, I'm looking forward to doing more follow up on this. It's going to be a big wave. Thanks. >> Okay. Thanks again, John, always a pleasure. >> Okay. This is SiliconANGLE's breaking news commentary. I'm John Furrier with SiliconANGLE News, as well as host of theCUBE. Swami, who's a leader in AWS, has been on theCUBE multiple times. We've been tracking the growth of how Amazon's journey has just been exploding past five years, in particular, past three. You heard the numbers, great performance, great reviews. This is a watershed moment, I think, for the industry, and it's going to be a lot of fun for the next 10 years. Thanks for watching. (bright music)

Published Date : Feb 22 2023

SUMMARY :

Swami, great to have you on inside the ropes, if you And one of the biggest complaints we hear and easy to program and use as well. I call the democratization, the Trainium, you provide And that means the training What is the big thing that's happened? and they are going to create this to the next level, and the amount of dollar impact that's going to be part of this? And generative AI is going to be changing, AIOps is going to be John, always a pleasure. and it's going to be a lot

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

SwamiPERSON

0.99+

Amazon Web ServicesORGANIZATION

0.99+

Jon TurowPERSON

0.99+

John MarkoffPERSON

0.99+

AWSORGANIZATION

0.99+

JohnPERSON

0.99+

AmazonORGANIZATION

0.99+

John FurrierPERSON

0.99+

40%QUANTITY

0.99+

AutodeskORGANIZATION

0.99+

50%QUANTITY

0.99+

Madrona VentureORGANIZATION

0.99+

20 mileQUANTITY

0.99+

Hugging FaceORGANIZATION

0.99+

FridayDATE

0.99+

second elementQUANTITY

0.99+

more than 100,000 customersQUANTITY

0.99+

AI21ORGANIZATION

0.99+

tens of thousandsQUANTITY

0.99+

first podcastQUANTITY

0.99+

three tiersQUANTITY

0.98+

SiliconANGLEORGANIZATION

0.98+

twiceQUANTITY

0.98+

Bloom ProjectTITLE

0.98+

oneQUANTITY

0.98+

SageMakerORGANIZATION

0.98+

Hugging FaceTITLE

0.98+

AlexaTITLE

0.98+

firstQUANTITY

0.98+

GitHubORGANIZATION

0.98+

one modelQUANTITY

0.98+

up to 50%QUANTITY

0.97+

ChatGPTTITLE

0.97+

FirstQUANTITY

0.97+

more than thousand XQUANTITY

0.97+

amazon.comORGANIZATION

0.96+

tens of billionsQUANTITY

0.96+

OneQUANTITY

0.96+

up to 60%QUANTITY

0.96+

one frameworkQUANTITY

0.96+

YquemORGANIZATION

0.94+

three thingsQUANTITY

0.94+

InferentiaORGANIZATION

0.94+

CodeWhispererTITLE

0.93+

fourQUANTITY

0.92+

three setsQUANTITY

0.92+

threeQUANTITY

0.92+

TwilioORGANIZATION

0.92+

Clint Sharp, Cribl | AWS re:Invent 2022


 

(upbeat music) (background crowd chatter) >> Hello, fantastic cloud community and welcome back to Las Vegas where we are live from the show floor at AWS re:Invent. My name is Savannah Peterson. Joined for the first time. >> Yeah, Doobie. >> VIP, I know. >> All right, let's do this. >> Thanks for having me Dave, I really appreciate it. >> I appreciate you doing all the hard work. >> Yeah. (laughs) >> You, know. >> I don't know about that. We wouldn't be here without you and all these wonderful stories that all the businesses have. >> Well, when I host with John it's hard for me to get a word in edgewise. I'm just kidding, John. (Savannah laughing) >> Shocking, I've never want that experience. >> We're like knocking each other, trying to, we're elbowing. No, it's my turn to speak, (Savannah laughing) so I'm sure we're going to work great together. I'm really looking forward to it. >> Me too Dave, I feel very lucky to be here and I feel very lucky to introduce our guest this afternoon, Clint Sharp, welcome to the show. You are with Cribl. Yeah, how does it feel to be on the show floor today? >> It's amazing to be back at any conference in person and this one is just electric, I mean, there's like a ton of people here love the booth. We're having like a lot of activity. It's been really, really exciting to be here. >> So you're a re:Ieinvent alumni? Have you been here before? You're a Cube alumni. We're going to have an OG conversation about observability, I'm looking forward to it. Just in case folks haven't been watching theCUBE for the last nine years that you've been on it. I know you've been with a few different companies during that time period. Love that you've been with us since 2013. Give us the elevator pitch for Cribl. >> Yeah, so Cribl is an observability company which we're going to talk about today. Our flagship product is a telemetry router. So it just really helps you get data into the right places. We're very specifically in the observability and security markets, so we sell to those buyers and we help them work with logs and metrics and open telemetry, lots of different types of data to get it into the right systems. >> Why did observability all of a sudden become such a hot thing? >> Savannah: Such a hot topic. >> Right, I mean it just came on the scene so quickly and now it's obviously a very crowded space. So why now, and how do you guys differentiate from the crowd? >> Yeah, sure, so I think it's really a post-digital transformation thing Dave, when I think about how I interact with organizations you know, 20 years ago when I started this business I called up American Airlines when things weren't working and now everything's all done digitally, right? I rarely ever interact with a human being and yet if I go on one of these apps and I get a bad experience, switching is just as easy as booking another airline or changing banks or changing telecommunications providers. So companies really need an ability to dive into this data at very high fidelity to understand what Dave's experience with their service or their applications are. And for the same reasons on the security side, we need very, very high fidelity data in order to understand whether malicious actors are working their way around inside of the enterprise. And so that's really changed the tooling that we had, which, in prior years, it was really hard to ask arbitrary questions of that data. You really had to deal with whatever the vendor gave you or you know, whatever the tool came with. And observability is really an evolution, allowing people to ask and answer questions of their data that they really weren't planning in advance. >> Dave: Like what kind of questions are people asking? >> Yeah sure so what is Dave's performance with this application? I see that a malicious actor has made their way on the inside of my network. Where did they go? What did they do? What files did they access? What network connections did they open? And the scale of machine data of this machine to machine communication is so much larger than what you tend to see with like human generated data, transactional data, that we really need different systems to deal with that type of data. >> And what would you say is your secret sauce? Like some people come at it, some search, some come at it from security. What's your sort of superpower as Lisa likes to say? >> Yeah, so we're a customer's first company. And so one of the things I think that we've done incredibly well is go look at the market and look for problems that are not being solved by other vendors. And so when we created this category of an observability pipeline, nobody was really marketing an observability pipeline at that time. And really the problem that customers had is they have data from a lot of different sources and they need to get it to a lot of different destinations. And a lot of that data is not particularly valuable. And in fact, one of the things that we like to say about this class of data is that it's really not valuable until it is, right? And so if I have a security breach, if I have an outage and I need to start pouring through this data suddenly the data is very, very valuable. And so customers need a lot of different places to store this data. I might want that data in a logging system. I might want that data in a metric system. I might want that data in a distributed tracing system. I might want that data in a data lake. In fact AWS just announced their security data lake product today. >> Big topic all day. >> Yeah, I mean like you can see that the industry is going in this way. People want to be able to store massively greater quantities of data than they can cost effectively do today. >> Let's talk about that just a little bit. The tension between data growth, like you said it's not valuable until it is or until it's providing context, whether that be good or bad. Let's talk about the tension between data growth and budget growth. How are you seeing that translate in your customers? >> Yeah, well so data's growing in a 25% CAGR per IDC which means we're going to have two and a half times the data in five years. And when you talk to CISOs and CIOs and you ask them, is your budget growing at a 25% CAGR, absolutely not, under no circumstances am I going to have, you know, that much more money. So what got us to 2022 is not going to get us to 2032. And so we really need different approaches for managing this data at scale. And that's where you're starting to see things like the AWS security data lake, Snowflake is moving into this space. You're seeing a lot of different people kind of moving into the database for security and observability type of data. You also have lots of other companies that are competing in broad spectrum observability, companies like Splunk or companies like Datadog. And these guys are all doing it from a data-first approach. I'm going to bring a lot of data into these platforms and give users the ability to work with that data to understand the performance and security of their applications. >> Okay, so carry that through, and you guys are different how? >> Yeah, so we are this pipeline that's sitting in the middle of all these solutions. We don't care whether your data was originally intended for some other tool. We're going to help you in a vendor-neutral way get that data wherever you need to get it. And that gives them the ability to control cost because they can put the right data in the right place. If it's data that's not going to be frequently accessed let's put it in a data lake, the cheapest place we can possibly put that data to rest. Or if I want to put it into my security tool maybe not all of the data that's coming from my vendor, my vendor has to put all the data in their records because who knows what it's going to be used for. But I only use half or a quarter of that information for security. And so what if I just put the paired down results in my more expensive storage but I kept full fidelity data somewhere else. >> Okay so you're observing the observability platforms basically, okay. >> Clint: We're routing that data. >> And then creating- >> It's meta observability. >> Right, observability pipeline. When I think a data pipeline, I think of highly specialized individuals, there's a data analyst, there's a data scientist, there's a quality engineer, you know, etc, et cetera. Do you have specific roles in your customer base that look at different parts of that pipeline and can you describe that? >> Yeah, absolutely, so one of the things I think that we do different is we sell very specifically to the security tooling vendors. And so in that case we are, or not to the vendors, but to the customers themselves. So generally they have a team inside of that organization which is managing their security tooling and their operational tooling. And so we're building tooling very specifically for them, for the types of data they work with for the volumes and scale of data that they work with. And that is giving, and no other vendor is really focusing on them. There's a lot of general purpose data people in the world and we're really the only ones that are focusing very specifically on observability and security data. >> So the announcement today, the security data lake that you were talking about, it's based on the Open Cybersecurity Framework, which I think AWS put forth, right? And said, okay, everybody come on. [Savannah] Yeah, yeah they did. >> So, right, all right. So what are your thoughts on that? You know, how does it fit with your strategy, you know. >> Yeah, so we are again a customer's first neutral company. So if OCSF gains traction, which we hope it does then we'll absolutely help customers get data into that format. But we're kind of this universal adapter so we can take data from other vendors, proprietary schemas, maybe you're coming from one of the other send vendors and you want to translate that to OCSF to use it with the security data lake. We can provide customers the ability to change and reshape that data to fit into any schema from any vendor so that we're really giving security data lake customers the ability to adapt the legacy, the stuff that they have that they can't get rid of 'cause they've had it for 10 years, 20 years and nothing inside of an enterprise ever goes away. That stuff stays forever. >> Legacy. >> Well legacy is working right? I mean somebody's actually, you know, making money on top of this thing. >> We never get rid of stuff. >> No, (laughing) we just added the toolkit. It's like all the old cell phones we have, it's everything. I mean we even do it as individual users and consumers. It's all a part of our little personal library. >> So what's happened in the field company momentum? >> Yeah let's talk trends too. >> Yeah so the company's growing crazily fast. We're north of 400 employees and we're only a hundred and something, you know, a year ago. So you can kind of see we're tripling you know, year over year. >> Savannah: Casual, especially right now in a lot of companies are feeling that scale back. >> Yeah so obviously we're keeping our eye closely on the macro conditions, but we see such a huge opportunity because we're a value player in this space that there's a real flight to value in enterprises right now. They're looking for projects that are going to pay themselves back and we've always had this value prop, we're going to come give you a lot of capabilities but we're probably going to save you money at the same time. And so that's just really resonating incredibly well with enterprises today and giving us an opportunity to continue to grow in the face of some challenging headwinds from a macro perspective. >> Well, so, okay, so people think okay, security is immune from the macro. It's not, I mean- >> Nothing, really. >> No segment is immune. CrowdStrike announced today the CrowdStrike rocket ship's still growing AR 50%, but you know, stocks down, I don't know, 20% right now after our- >> Logically doesn't make- >> Okay stuff happens, but still, you know, it's interesting, the macro, because it was like, to me it's like a slingshot, right? Everybody was like, wow, pandemic, shut down. All of a sudden, oh wow, need tech, boom. >> Savannah: Yeah, digitally transformed today. >> It's like, okay, tap the brakes. You know, when you're driving down the highway and you get that slingshotting effect and I feel like that's what's going on now. So, the premise is that the real leaders, those guys with the best tech that really understand the customers are going to, you know, get through this. What are your customers telling you in terms of, you know they're spending patterns, how they're trying to maybe consolidate vendors and how does that affect you guys? >> Yeah, for sure, I mean, I think, obviously, back to that flight to value, they're looking for vendors who are aligned with their interests. So, you know, as their budgets are getting pressure, what vendors are helping them provide the same capabilities they had to provide to the business before especially from a security perspective 'cause they're going to get cut along with everybody else. If a larger organization is trimming budgets across, security's going to get cut along with everybody else. So is IT operations. And so since they're being asked to do more with less that's you know, really where we're coming in and trying to provide them value. But certainly we're seeing a lot of pressure from IT departments, security departments all over in terms of being able to live and do more with less. >> Yeah, I mean, Celip's got a great quote today. "If you're looking to tighten your belt the cloud is the place to do it." I mean, it's probably true. >> Absolutely, elastic scalability in this, you know, our new search product is based off of AWS Lambda and it gives you truly elastic scalability. These changes in architectures are what's going to allow, it's not that cloud is cheaper, it's that cloud gives you on-demand scalability that allows you to truly control the compute that you're spending. And so as a customer of AWS, like this is giving us capabilities to offer products that are scalable and cost effective in ways that we just have not been able to do in the cloud. >> So what does that mean for the customer that you're using serverless using Lambda? What does that mean for them in terms of what they don't have to do that they maybe had to previously? >> It offers us the ability to try to charge them like a truly cloud native vendor. So in our cloud product we sell a credit model whereby which you deduct credits for usage. So if you're streaming data, you pay for gigabytes. If you're searching data then you're paying for CPU consumption, and so it allows us to charge them only for what they're consuming which means we don't have to manage a whole fleet of servers, and eventually, well we go to managing our own compute quite possibly as we start to get to scale at certain customers. But Lambda allowed us to not have to launch that way, not have to run a bunch of infrastructure. And we've been able to align our charging model with something that we think is the most customer friendly which is true consumption, pay for what you consume. >> So for example, you're saying you don't have to configure the EC2 Instance or figure out the memory sizing, you don't have to worry about any of that. You just basically say go, it figures that out and you can focus on upstream, is that right? >> Yep, and we're able to not only from a cost perspective also from a people perspective, it's allowed us velocity that we did not have before, which is we can go and prototype and build significantly faster because we're not having to worry, you know, in our mature products we use EC2 like everybody else does, right? And so as we're launching new products it's allowed us to iterate much faster and will we eventually go back to running our own compute, who knows, maybe, but it's allowed us a lot faster velocity than we were able to get before. >> I like what I've heard you discuss a lot is the agility and adaptability. We're going to be moving and evolving, choosing different providers. You're very outspoken about being vendor agnostic and I think that's actually a really unique and interesting play because we don't know what the future holds. So we're doing a new game on that note here on theCUBE, new game, new challenge, I suppose I would call it to think of this as your 30 second thought leadership highlight reel, a sizzle of the most important topic or conversation that's happening theme here at the show this year. >> Yeah, I mean, for me, as I think, as we're looking, especially like security data lake, et cetera, it's giving customers ownership of their data. And I think that once you, and I'm a big fan of this concept of open observability, and security should be the same way which is, I should not be locking you in as a vendor into my platform. Data should be stored in open formats that can be analyzed by multiple places. And you've seen this with AWS's announcement, data stored in open formats the same way other vendors store that. And so if you want to plug out AWS and you want to bring somebody else in to analyze your security lake, then great. And as we move into our analysis product, our search product, we'll be able to search data in the security data lake or data that's raw in S3. And we're really just trying to give customers back control over their future so that they don't have to maintain a relationship with a particular vendor. They're always getting the best. And that competition fuels really great product. And I'm really excited for the next 10 years of our industry as we're able to start competing on experiences and giving customers the best products, the customer wins. And I'm really excited about the customer winning. >> Yeah, so customer focused, I love it. What a great note to end on. That was very exciting, very customer focused. So, yo Clint, I have really enjoyed talking to you. Thanks. >> Thanks Clint. >> Thanks so much, it's been a pleasure being on. >> Thanks for enhancing our observability over here, I feel like I'll be looking at things a little bit differently after this conversation. And thank all of you for tuning in to our wonderful afternoon of continuous live coverage here at AWS re:Ieinvent in fabulous Las Vegas, Nevada with Dave Vellante. I'm Savannah Peterson. We're theCUBE, the leading source for high tech coverage. (bright music)

Published Date : Nov 30 2022

SUMMARY :

Joined for the first time. Dave, I really appreciate it. I appreciate you that all the businesses have. it's hard for me to want that experience. I'm really looking forward to it. Yeah, how does it feel to It's amazing to be back for the last nine years and security markets, so and how do you guys And for the same reasons And the scale of machine data And what would you And so one of the things I think that the industry is going in this way. Let's talk about the am I going to have, you We're going to help you the observability and can you describe that? And so in that case we that you were talking about, it's based on So what are your thoughts on that? the ability to change I mean somebody's actually, you know, It's like all the old cell and something, you know, a year ago. of companies are feeling that scale back. that are going to pay themselves back security is immune from the macro. the CrowdStrike rocket it's interesting, the Savannah: Yeah, and you get that slingshotting effect asked to do more with less the cloud is the place to do it." it's that cloud gives you and so it allows us to charge them only and you can focus on And so as we're launching new products I like what I've heard you and security should be the same way What a great note to end on. Thanks so much, it's And thank all of you for tuning in

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

AWSORGANIZATION

0.99+

ClintPERSON

0.99+

DavePERSON

0.99+

Dave VellantePERSON

0.99+

SavannahPERSON

0.99+

Savannah PetersonPERSON

0.99+

CriblORGANIZATION

0.99+

Clint SharpPERSON

0.99+

LisaPERSON

0.99+

20 yearsQUANTITY

0.99+

25%QUANTITY

0.99+

10 yearsQUANTITY

0.99+

Las VegasLOCATION

0.99+

American AirlinesORGANIZATION

0.99+

DatadogORGANIZATION

0.99+

2022DATE

0.99+

CrowdStrikeORGANIZATION

0.99+

20%QUANTITY

0.99+

SplunkORGANIZATION

0.99+

30 secondQUANTITY

0.99+

DoobiePERSON

0.99+

a year agoDATE

0.99+

LambdaTITLE

0.99+

five yearsQUANTITY

0.99+

halfQUANTITY

0.99+

2013DATE

0.99+

first companyQUANTITY

0.99+

first timeQUANTITY

0.99+

todayDATE

0.99+

2032DATE

0.99+

CubeORGANIZATION

0.98+

20 years agoDATE

0.98+

oneQUANTITY

0.98+

CriblPERSON

0.98+

EC2TITLE

0.98+

this yearDATE

0.97+

Las Vegas, NevadaLOCATION

0.96+

two and a half timesQUANTITY

0.96+

OCSFORGANIZATION

0.93+

S3TITLE

0.91+

this afternoonDATE

0.9+

IeinventORGANIZATION

0.86+

Open Cybersecurity FrameworkTITLE

0.84+

a hundred and somethingQUANTITY

0.82+

CelipPERSON

0.81+

one of the thingsQUANTITY

0.79+

InventEVENT

0.78+

last nine yearsDATE

0.77+

a quarterQUANTITY

0.77+

first neutral companyQUANTITY

0.75+

ARQUANTITY

0.75+

first approachQUANTITY

0.74+

dataQUANTITY

0.72+

re:InventEVENT

0.7+

north of 400 employeesQUANTITY

0.67+

SnowflakeORGANIZATION

0.67+

Mark Terenzoni, AWS | AWS re:Invent 2022


 

(upbeat music) >> Hello, everyone and welcome back to fabulous Las Vegas, Nevada, where we are here on the show floor at AWS re:Invent. We are theCUBE. I am Savannah Peterson, joined with John Furrier. John, afternoon, day two, we are in full swing. >> Yes. >> What's got you most excited? >> Just got lunch, got the food kicking in. No, we don't get coffee. (Savannah laughing) >> Way to bring the hype there, John. >> No, there's so many people here just in Amazon. We're back to 2019 levels of crowd. The interest levels are high. Next gen, cloud security, big part of the keynote. This next segment, I am super excited about. CUBE Alumni, going back to 2013, 10 years ago he was on theCUBE. Now, 10 years later we're at re:Invent, looking forward to this guest and it's about security, great topic. >> I don't want to delay us anymore, please welcome Mark. Mark, thank you so much for being here with us. Massive day for you and the team. I know you oversee three different units at Amazon, Inspector, Detective, and the most recently announced, Security Lake. Tell us about Amazon Security Lake. >> Well, thanks Savannah. Thanks John for having me. Well, Security Lake has been in the works for a little bit of time and it got announced today at the keynote as you heard from Adam. We're super excited because there's a couple components that are really unique and valuable to our customers within Security Lake. First and foremost, the foundation of Security Lake is an open source project we call OCFS, Open Cybersecurity Framework Schema. And what that allows is us to work with the vendor community at large in the security space and develop a language where we can all communicate around security data. And that's the language that we put into Security Data Lake. We have 60 vendors participating in developing that language and partnering within Security Lake. But it's a communal lake where customers can bring all of their security data in one place, whether it's generated in AWS, they're on-prem, or SaaS offerings or other clouds, all in one location in a language that allows analytics to take advantage of that analytics and give better outcomes for our customers. >> So Adams Selipsky big keynote, he spent all the bulk of his time on data and security. Obviously they go well together, we've talked about this in the past on theCUBE. Data is part of security, but this security's a little bit different in the sense that the global footprint of AWS makes it uniquely positioned to manage some security threats, EKS protection, a very interesting announcement, runtime layer, but looking inside and outside the containers, probably gives extra telemetry on some of those supply chains vulnerabilities. This is actually a very nuanced point. You got Guard Duty kind of taking its role. What does it mean for customers 'cause there's a lot of things in this announcement that he didn't have time to go into detail. Unpack all the specifics around what the security announcement means for customers. >> Yeah, so we announced four items in Adam's keynote today within my team. So I'll start with Guard Duty for EKS runtime. It's complimenting our existing capabilities for EKS support. So today Inspector does vulnerability assessment on EKS or container images in general. Guard Duty does detections of EKS workloads based on log data. Detective does investigation and analysis based on that log data as well. With the announcement today, we go inside the container workloads. We have more telemetry, more fine grain telemetry and ultimately we can provide better detections for our customers to analyze risks within their container workload. So we're super excited about that one. Additionally, we announced Inspector for Lambda. So Inspector, we released last year at re:Invent and we focused mostly on EKS container workloads and EC2 workloads. Single click automatically assess your environment, start generating assessments around vulnerabilities. We've added Lambda to that capability for our customers. The third announcement we made was Macy sampling. So Macy has been around for a while in delivering a lot of value for customers providing information around their sensitive data within S3 buckets. What we found is many customers want to go and characterize all of the data in their buckets, but some just want to know is there any sensitive data in my bucket? And the sampling feature allows the customer to find out their sensitive data in the bucket, but we don't have to go through and do all of the analysis to tell you exactly what's in there. >> Unstructured and structured data. Any data? >> Correct, yeah. >> And the fourth? >> The fourth, Security Data Lake? (John and Savannah laughing) Yes. >> Okay, ocean theme. data lake. >> Very complimentary to all of our services, but the unique value in the data lake is that we put the information in the customer's control. It's in their S3 bucket, they get to decide who gets access to it. We've heard from customers over the years that really have two options around gathering large scale data for security analysis. One is we roll our own and we're security engineers, we're not data engineers. It's really hard for them to build these distributed systems at scale. The second one is we can pick a vendor or a partner, but we're locked in and it's in their schemer and their format and we're there for a long period of time. With Security Data Lake, they get the best of both worlds. We run the infrastructure at scale for them, put the data in their control and they get to decide what use case, what partner, what tool gives them the most value on top of their data. >> Is that always a good thing to give the customers too much control? 'Cause you know the old expression, you give 'em a knife they play with and they they can cut themselves, I mean. But no, seriously, 'cause what's the provisions around that? Because control was big part of the governance, how do you manage the security? How does the customer worry about, if I have too much control, someone makes a mistake? >> Well, what we finding out today is that many customers have realized that some of their data has been replicated seven times, 10 times, not necessarily maliciously, but because they have multiple vendors that utilize that data to give them different use cases and outcomes. It becomes costly and unwieldy to figure out where all that data is. So by centralizing it, the control is really around who has access to the data. Now, ultimately customers want to make those decisions and we've made it simple to aggregate this data in a single place. They can develop a home region if they want, where all the data flows into one region, they can distribute it globally. >> They're in charge. >> They're in charge. But the controls are mostly in the hands of the data governance person in the company, not the security analyst. >> So I'm really curious, you mentioned there's 60 AWS partner companies that have collaborated on the Security lake. Can you tell us a little bit about the process? How long does it take? Are people self-selecting to contribute to these projects? Are you cherry picking? What does that look like? >> It's a great question. There's three levels of collaboration. One is around the open source project that we announced at Black Hat early in this year called OCSF. And that collaboration is we've asked the vendor community to work with us to build a schema that is universally acceptable to security practitioners, not vendor specific and we've asked. >> Savannah: I'm sorry to interrupt you, but is this a first of its kind? >> There's multiple schemes out there developed by multiple parties. They've been around for multiple years, but they've been built by a single vendor. >> Yeah, that's what I'm drill in on a little bit. It sounds like the first we had this level of collaboration. >> There's been collaborations around them, but in a handful of companies. We've really gone to a broad set of collaborators to really get it right. And they're focused around areas of expertise that they have knowledge in. So the EDR vendors, they're focused around the scheme around EDR. The firewall vendors are focused around that area. Certainly the cloud vendors are in their scope. So that's level one of collaboration and that gets us the level playing field and the language in which we'll communicate. >> Savannah: Which is so important. >> Super foundational. Then the second area is around producers and subscribers. So many companies generate valuable security data from the tools that they run. And we call those producers the publishers and they publish the data into Security Lake within that OCSF format. Some of them are in the form of findings, many of them in the form of raw telemetry. Then the second one is in the subscriber side and those are usually analytic vendors, SIM vendors, XDR vendors that take advantage of the logs in one place and generate analytic driven outcomes on top of that, use cases, if you will, that highlight security risks or issues for customers. >> Savannah: Yeah, cool. >> What's the big customer focus when you start looking at Security Lakes? How do you see that planning out? You said there's a collaboration, love the open source vibe on that piece, what data goes in there? What's sharing? 'Cause a big part of the keynote I heard today was, I heard clean rooms, I've cut my antenna up. I'd love to hear that. That means there's an implied sharing aspect. The security industry's been sharing data for a while. What kind of data's in that lake? Give us an example, take us through. >> Well, this a number of sources within AWS, as customers run their workloads in AWS. We've identified somewhere around 25 sources that will be natively single click into Amazon Security Lake. We were announcing nine of them. They're traditional network logs, BBC flow, cloud trail logs, firewall logs, findings that are generated across AWS, EKS audit logs, RDS data logs. So anything that customers run workloads on will be available in data lake. But that's not limited to AWS. Customers run their environments hybridly, they have SaaS applications, they use other clouds in some instances. So it's open to bring all that data in. Customers can vector it all into this one single location if they decide, we make it pretty simple for them to do that. Again, in the same format where outcomes can be generated quickly and easily. >> Can you use the data lake off on premise or it has to be in an S3 in Amazon Cloud? >> Today it's in S3 in Amazon. If we hear customers looking to do something different, as you guys know, we tend to focus on our customers and what they want us to do, but they've been pretty happy about what we've decided to do in this first iteration. >> So we got a story about Silicon Angle. Obviously the ingestion is a big part of it. The reporters are jumping in, but the 53rd party sources is a pretty big number. Is that coming from the OCSF or is that just in general? Who's involved? >> Yeah, OCSF is the big part of that and we have a list of probably 50 more that want to join in part of this. >> The other big names are there, Cisco, CrowdStrike, Peloton Networks, all the big dogs are in there. >> All big partners of AWS, anyway, so it was an easy conversation and in most cases when we started having the conversation, they were like, "Wow, this has really been needed for a long time." And given our breadth of partners and where we sit from our customers perspective in the center of their cloud journey that they've looked at us and said, "You guys, we applaud you for driving this." >> So Mark, take us through the conversations you're having with the customers at re:Inforce. We saw a lot of meetings happening. It was great to be back face to face. You guys have been doing a lot of customer conversation, security Data Lake came out of that. What was the driving force behind it? What were some of the key concerns? What were the challenges and what's now the opportunity that's different? >> We heard from our customers in general. One, it's too hard for us to get all the data we need in a single place, whether through AWS, the industry in general, it's just too hard. We don't have those resources to data wrangle that data. We don't know how to pick schema. There's multiple ones out there. Tell us how we would do that. So these three challenges came out front and center for every customer. And mostly what they said is our resources are limited and we want to focus those resources on security outcomes and we have security engines. We don't want to focus them on data wrangling and large scale distributed systems. Can you help us solve that problem? And it came out loud and clear from almost every customer conversation we had. And that's where we took the challenge. We said, "Okay, let's build this data layer." And then on top of that we have services like Detective and Guard Duty, we'll take advantage of it as well. But we also have a myriad of ISV third parties that will also sit on top of that data and render out. >> What's interesting, I want to get your reaction. I know we don't have much time left, but I want to get your thoughts. When I see Security Data Lake, which is awesome by the way, love the focus, love how you guys put that together. It makes me realize the big thing in re:Invent this year is this idea of specialized solutions. You got instances for this and that, use cases that require certain kind of performance. You got the data pillars that Adam laid out. Are we going to start seeing more specialized data lakes? I mean, we have a video data lake. Is there going to be a FinTech data lake? Is there going to be, I mean, you got the Great Lakes kind of going on here, what is going on with these lakes? I mean, is that a trend that Amazon sees or customers are aligning to? >> Yeah, we have a couple lakes already. We have a healthcare lake and a financial lake and now we have a security lake. Foundationally we have Lake Formation, which is the tool that anyone can build a lake. And most of our lakes run on top of Lake Foundation, but specialize. And the specialization is in the data aggregation, normalization, enridgement, that is unique for those use cases. And I think you'll see more and more. >> John: So that's a feature, not a bug. >> It's a feature, it's a big feature. The customers have ask for it. >> So they want roll their own specialized, purpose-built data thing, lake? They can do it. >> And customer don't want to combine healthcare information with security information. They have different use cases and segmentation of the information that they care about. So I think you'll see more. Now, I also think that you'll see where there are adjacencies that those lakes will expand into other use cases in some cases too. >> And that's where the right tools comes in, as he was talking about this ETL zero, ETL feature. >> It be like an 80, 20 rule. So if 80% of the data is shared for different use cases, you can see how those lakes would expand to fulfill multiple use cases. >> All right, you think he's ready for the challenge? Look, we were on the same page. >> Okay, we have a new challenge, go ahead. >> So think of it as an Instagram Reel, sort of your hot take, your thought leadership moment, the clip we're going to come back to and reference your brilliance 10 years down the road. I mean, you've been a CUBE veteran, now CUBE alumni for almost 10 years, in just a few weeks it'll be that. What do you think is, and I suspect, I think I might know your answer to this, so feel free to be robust in this. But what do you think is the biggest story, key takeaway from the show this year? >> We're democratizing security data within Security Data Lake for sure. >> Well said, you are our shortest answer so far on theCUBE and I absolutely love and respect that. Mark, it has been a pleasure chatting with you and congratulations, again, on the huge announcement. This is such an exciting day for you all. >> Thank you Savannah, thank you John, pleasure to be here. >> John: Thank you, great to have you. >> We look forward to 10 more years of having you. >> Well, maybe we don't have to wait 10 years. (laughs) >> Well, more years, in another time. >> I have a feeling it'll be a lot of security content this year. >> Yeah, pretty hot theme >> Very hot theme. >> Pretty odd theme for us. >> Of course, re:Inforce will be there this year again, coming up 2023. >> All the res. >> Yep, all the res. >> Love that. >> We look forward to see you there. >> All right, thanks, Mark. >> Speaking of res, you're the reason we are here. Thank you all for tuning in to today's live coverage from AWS re:Invent. We are in Las Vegas, Nevada with John Furrier. My name is Savannah Peterson. We are theCUBE and we are the leading source for high tech coverage. (upbeat music)

Published Date : Nov 29 2022

SUMMARY :

to fabulous Las Vegas, Nevada, the food kicking in. big part of the keynote. and the most recently First and foremost, the and outside the containers, and do all of the analysis Unstructured and structured data. (John and Savannah laughing) data lake. and they get to decide what part of the governance, that data to give them different of the data governance on the Security lake. One is around the open source project They've been around for multiple years, It sounds like the first we had and the language in in the subscriber side 'Cause a big part of the Again, in the same format where outcomes and what they want us to do, Is that coming from the OCSF Yeah, OCSF is the big part of that all the big dogs are in there. in the center of their cloud journey the conversations you're having and we have security engines. You got the data pillars in the data aggregation, The customers have ask for it. So they want roll of the information that they care about. And that's where the So if 80% of the data is ready for the challenge? Okay, we have a new is the biggest story, We're democratizing security data on the huge announcement. Thank you Savannah, thank We look forward to 10 Well, maybe we don't have of security content this year. be there this year again, the reason we are here.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
SavannahPERSON

0.99+

Mark TerenzoniPERSON

0.99+

CiscoORGANIZATION

0.99+

JohnPERSON

0.99+

Savannah PetersonPERSON

0.99+

MarkPERSON

0.99+

AmazonORGANIZATION

0.99+

10 timesQUANTITY

0.99+

John FurrierPERSON

0.99+

AWSORGANIZATION

0.99+

80%QUANTITY

0.99+

CrowdStrikeORGANIZATION

0.99+

AdamPERSON

0.99+

2019DATE

0.99+

10 yearsQUANTITY

0.99+

2023DATE

0.99+

last yearDATE

0.99+

seven timesQUANTITY

0.99+

60 vendorsQUANTITY

0.99+

2013DATE

0.99+

Peloton NetworksORGANIZATION

0.99+

MacyORGANIZATION

0.99+

three challengesQUANTITY

0.99+

CUBEORGANIZATION

0.99+

TodayDATE

0.99+

10 years laterDATE

0.99+

Las Vegas, NevadaLOCATION

0.99+

todayDATE

0.99+

10 more yearsQUANTITY

0.99+

80QUANTITY

0.99+

OneQUANTITY

0.99+

first iterationQUANTITY

0.98+

10 years agoDATE

0.98+

60QUANTITY

0.98+

two optionsQUANTITY

0.98+

FirstQUANTITY

0.98+

third announcementQUANTITY

0.98+

firstQUANTITY

0.98+

fourthQUANTITY

0.98+

one regionQUANTITY

0.98+

Las Vegas, NevadaLOCATION

0.98+

this yearDATE

0.98+

Data LakeORGANIZATION

0.97+

both worldsQUANTITY

0.97+

20 ruleQUANTITY

0.97+

Great LakesLOCATION

0.97+

single placeQUANTITY

0.96+

Security LakeORGANIZATION

0.96+

S3TITLE

0.96+

one placeQUANTITY

0.96+

one locationQUANTITY

0.96+

InstagramORGANIZATION

0.96+

EKSORGANIZATION

0.95+

Anand Birje & Prabhakar Appana, HCLTech | AWS re:Invent 2022


 

>>Hey everyone. Welcome back to Las Vegas. The cube is live at the Venetian Expo Center for AWS Reinvent 2022. There are thousands and thousands and thousands of people here joining myself, Lisa Martin at Dave Valante. David, it's great to see the energy of day one alone. People are back, they're ready to be back. They're ready to hear from AWS and what it's gonna announce to. >>Yeah, all through the pandemic. Of course, we've talked about digital transformation, but the conversation is evolving beyond that to business transformation now, deeper integration of the cloud to really transform fundamental business operations and And that's a new era. >>It is a new era. It's exciting. We've got a couple of guests that we're gonna unpack that with. Anan. Beji joins us, the President Digital Business Services at HCL Tech and Prar, SVP and Global head of AWS business unit. Also from HCL Tech. Guys, welcome. Thank >>You. Thank you, >>Thank you. >>Let's talk about some of the latest trends anon. We'll start with you. What are some of the latest trends in digitalization, especially as it relates to cloud adoption? What are you hearing out in the marketplace? >>Yeah, I think you said it right. The post pandemic, every industry, every enterprise and every industry realize that for resilience, for their ability to change and adapt change and their ability to increase, you know, velocity of change so that they can move fast and keep up the expectations of their consumers, their partners, their employees, they need to have composability at the core and resilience at the core. And so, digital transformation became all about the ability to change, an ability to pivot faster. Now, it's easier said than done, right? Larger enterprises, especially as you move into complex regulated industries, you know, oil and gas, manufacturing, life sciences, healthcare, utilities, these are industries that are not easy to change. They're not adaptable to change, and yet they had to really become more adaptable. And they saw cloud as an enabler to, to all of that, right? So they started looking at every area of their business, business processes that make up their value chains and really look at how can they increase the adaptability and the ability to change these value chains so that they can engage with their customers better, their partners, better their employees better, and also build some of the composability. >>And what might mean that is that just kind of like Lego blocks, they don't have to make changes that are sweeping and big that are difficult to make, but make them in parts so that they can make them again and again. So velocity of change becomes important. Clouds become an enabler to all of this. And so if I look at the last four years, every industry, whether regulated or not b2c, B2B to C, B2B is adopting cloud for digital acceleration. >>I'm curious to what you're seeing on the front lines, given the macro headwinds. You mentioned business resilience and during the pandemic, it was a lot of CIOs told us, wow, we were, we were kind of focused on disaster recovery, but our business wasn't resilient. We were really optimizing for efficiency. And then they started to okay, build in that business resilience. But now you got the economic headwinds. Yes. People are tapping their brakes a little bit. There's some uncertainty, a longer sales cycle, even the cloud's not immune. Yeah. Even though it's still growing at 30% plus per year. What are you guys seeing in the field with the AWS partnership? How are customers, you know, dealing with some of those more strategic transformation projects? Yeah, >>Yeah. So you know, first off, one thing that's changed and is different is every industry realizes that there is no choice. They don't have a choice to not be resilient. They don't have a choice to not be adaptable. The pandemic has taught them that the markets and the macros are increasingly changing supply chains. It's changing customer behavior for their own industries. It's changing their pricing and their cost models. And for all of that, they need to continue on their digital journeys. Now, what's different though is they wanna prioritize. They wanna prioritize and do more with less. They want to adapt faster, but also make sure that they don't, they don't just try to do everything together. And so there's a lot of focus on what do we prioritize? How do we leverage cloud to move faster, you know, and cheaper in terms of our change. >>And also to decide where do we consume and where do we compose? We'll talk a little bit more about that. There are certain things that you don't want to invent yourself. You can consume from cloud providers, whether it's business features, whether it is cloud capabilities. And so it's, there is a shift from adopting cloud just for cost takeout and just for resilience, but also for composability, which means let's consume what I can consume from the cloud and really build those features faster. So squeeze the go to market time, squeeze the time to market and squeeze the price to market, right? So that's the >>Change and really driving those business outcomes. As we talked about Absolut ard, talk to us about how hcl tech and AWS are working together. How are you enabling customers to achieve what an was talking about? >>Oh, absolutely. I mean, our partnership has started almost 10 years back, but over the last one year, we have created what we call as AWS dedicated business unit to look at end to end stock from an AWS perspective. So what we see in the market as a explained is more drive from clients for optimization, driving, app modernization, driving consolidation, looking at the cost, sustainability angles, looking at the IOT angle, manufacturing platforms, the industry adoption. All this is actually igniting the way the industry would look at AWS and as well as the partnership. So from an HCL tech and AWS partnership, we're actually accelerating most of these conversations by building bespoke accelerated industry solutions. So what I mean is, for example, there is an issue with a manufacturing plant and take Covid situation, people can't get into a a manufacturing plant. So how can AWS help put it in the cloud, accelerate those conversations. So we are building those industry specific solutions so that it can be everybody from a manufacturing sector can adopt and actually go to market. As well as you can access all this applications once it is in the cloud from anywhere, any device with a scalable options. That's where our partnership is actually igniting lot of cloud conversations and playing conversations in the market. So we see a lot of traction there. Lisa, on >>That, incredibly important during the last couple of years alone. >>Absolutely. I mean, last couple of years have been groundbreaking, right? Especially with the covid, for example, Amazon Connect, we use, we used Amazon Connect to roll out, you know, call center at the cloud, right? So you don't have to walk into an office, for example. People are working in the banking sector, especially in the trading platform. They were, they were not able to get there. So, but they need to make calls. How do you do the customer service? So Amazon Connect came right at the junction, so call center in the cloud and you can access, dial the number so the customer don't feel the pain of, you know, somebody not answering. It's accessible. That's where the partnership or the HCL tech partnership and AWS comes into play because we bring the scale, the skill set capability with the services of, you know, aws, Amazon, and that forms a concrete story for the client, right? That's one such example. And you know, many such examples are in the market that we are accelerating in the, in the discussions. >>And connect is a good example. Lisa, we were talking earlier about Amazon doubling down on the primitives, but also moving up up market as well, up chain up the value chain. And it needs partners like HCL to be able to go into various industries and apply that effectively. Absolutely. And that's where business transformation comes >>In. Absolutely. Absolutely. I think some of the aspects that we are looking at is, you know, while we do most of this cloud transformation initiatives from an tech perspective, what we are doing is we are encompassing them into a story, which we call it as cloud smart, right? So we are calling it as cloud smart, which is a go-to market offering from Atcl Tech, where the client doesn't have to look at each of these services from various vendors. So it's a one stop shop, right? From strategy consulting, look, implementation, underpinned by app modernization, consolidation, and the operational. So we do that as end to end service with our offerings, which is why helping us actually accelerate conversations on the crowd. What happen is the clients are also building these capabilities more and more often. You see a lot of new services are being added to aws, so not many clients are aware of it. So it is the responsibility of system integrator like us to make them aware and bring it into a shape where the client can consume in a low cost option, in an optimized way. That's where I think it's, it's, it's working out very well for us. With the partnership of, so >>You curate those services that you know will fit the customer's business. You, you know, the ingredients that you could put together, the, the dinner. >>Absolutely. You're preparing a dish, right? So you're preparing a dish, you know where the ingredients are. So the ingredients are supplied by aws. So you need to prepare a pasta dish, right? So you, you how spicy you want to make it howland, you want to make it, you know what source you want to use. How do you bring all those elements together? That's what, you know, tech has been focusing on. >>And you use the word curation, right? Curation is really industry process down, depending on your industry, every industry, every enterprise, there are things that are differentiating them. There's a business processes that differentiate you and there are business processes that don't necessarily differentiate you but are core to you. For example, if you're a retailer, you know, you're retailing, you're merchandising, how you price your products, how you market your products, your supply chains, those differentiate you. How you run your general ledger, your accounting, your payables. HR is core to your business but doesn't differentiate you. And the choices you make in the cloud for each of these areas are different. What differentiates you? You compose what doesn't differentiate you consume because you don't want to try and compose what >>Telco Exactly. Oh my gosh. >>Our biggest examples are in Telco, right? Right. Their omnichannel marketing, you know, how they connect with their consumers, how they do their billing systems, how they do their pricing systems. Those are their differentiations and things that don't they want to consume. And that's where cloud adoption needs to come with really a curation framework. We call it the Phoenix framework, which defines what differentiates you versus not. And based on that, what are the architectural choices you make at the applications layer, the integration layer, the data layer, and the infrastructure layer all from aws and how do you make those choices? >>Talk about a customer example anon that really articulates that value. >>Yeah, I'll give you an example that sort of, everybody can relate to a very large tools company that manufactures tools that we all use at home for, you know, remodeling our houses, building stuff, building furniture. Their business post pandemic dramatically shifted in every way possible. Nobody was going anymore to Home Depot and Lowe's to buy their tools, their online business surge by 200%. Their supply chains were changing because their manufacturers originally were in China and Malaysia. They were shifting a lot of that base to Taiwan and Germany and Latin America. Their pricing model was changing. Their last mile deliveries were changing cuz they were not used to delivering you and me last mile deliveries. So every aspect of their business was changing. They hadn't thought of their business in the same way, but guess what? That business was growing, but the needs were changing and they needed to rethink every value chain in their business. >>And so they had to adopt cloud. They leverage AWS at their core to rethink every part of their business. Rebuilding their supply chain applications, modernizing their warehouse management systems, modernizing their pricing systems, modernizing their sales and marketing platforms, every aspect you can think of and all of that within 24 months. Cuz otherwise they would lose market share, you know, in any given market. And all of this, while they were, you know, delivering their day to day business, they were manufacturing the goods and they were shipping products. So that was quite a lot to achieve in 24 months. And that's not just one example is across industries, examples like that that we have. That's >>One of the best business transformation examples I think I've heard. >>Absolutely. Absolutely. And so cloud does need to start with a business transformation objective. And that's what's happening to the cloud. It's changing away from an infrastructure consolidation discussion to business task. >>Because I know you guys have a theater session tomorrow on, on continuous modern, it was experiencing cloud transformation and continuous modernization. That's the theme. Pre-cloud. It was just a, you'd, you'd live, you'd rip and replace your infrastructure and it was a big application portfolio assessment and rationalization. It was just, it just became this years long, you know, like an SAP installation. Yes. How has cloud changed that and what's, tell us more about that session and that continuous modernization. Yeah, >>So, so we are doing a John session with a client on how HCL Tech helped the client in terms of transforming the landscape and adopting cloud much faster, you know, into the ecosystem. So what we are currently doing is, so it's a continuous process. So when we talk about cloud adoption transformation, it doesn't stop there. So it, it needs to keep evolving. So what we came up with a framework for the all such clients who are on the cloud transformation part need to look at which we call it a smart waste cloud, cloud smart. Where once it is in the clouds, smart waste to cloud for cloud and in the cloud. So what happens is, when it is to cloud, what do you do? What are the accelerators? What are the frameworks? Smart waste for clouds? How do you look at the governance of it? >>Okay? Consolidation activities of it, once it is in the cloud, how do we optimize, what do you look at? Security aspects, et cetera. So the client doesn't have to go to multiple ecosystem partners to look at it. So he is looking at one such service provider who can actually encompass and give all this onto the plate in a much more granular fashion with accelerated approach. So we build accelerated solutions frameworks, which helps the client to actually pick and choose in a much lower cost, I think. And it has to be a continuous modernization for the client. So why we are calling it as a continuous modernization is we are also also creating what we call cloud foundries and factories. What happens is the client can look at not only in a transformation journey, but also futuristic when there are new services are adapted, how this transformation and factories helping them in a lower cost option and driving that a acceleration story. So we are addressing it in multiple ways. One on the transformation front, one on the TCO front, one on the AX accelerated front, one on the operational front. So all this combined into one single framework, which is what is a continuous modernization of clouded option from xgl tech. >>When you apply this framework with customers, how do you deal with technical debt? Can you avoid technical debt? Can you hide technical debt? Or is it like debt and taxes? We're always gonna have technical debt because Amazon, you know, they'll talk about, they don't ever deprecate anything. Yeah. You know, are they gonna, are we gonna see Amazon take on tech? How do you avoid that? Or at least shield the customer for that technical debt. >>So every cio, right? Key ambitions are digital cloud, TCO optimization, sustainability. So we have a framework for that. So every CIO will look at, okay, I wanna spend, but I want to be optimized. My TCO should not go up. So that's where a system integrator like us comes. We have AOP story where, which does the complete financial analysis of your cloud adoption as to what estate and what technical client already has. How can we optimize that and how can we, how can we overlay on top of that our own services to make it much more optimized solution for the client? And there are several frameworks that we have defined for the CIO organizations where the CIO can actually look at some of these elements and adopt it internally within the system. You wanna pick it from there? >>Yeah, I think, I think it's, it's, it's a great question. First of all, there's a generational shift in the last three years where nobody's doing lift and shift of traditional applications or traditional data systems to the cloud. As you said, nobody's taking their technical debt to the cloud anymore. >>Business value's not there. >>There's no business value, right? The value is really being cloud native, which means you want to continuously modernize your value chains, which means your applications, your integration, your data to leverage the cloud and continuously modernize. Now you will still make priority decisions, right? Things that really differentiate you. You will modernize them through composition things that don't, you'll rather consume them, but in both factors, you're modernizing, I use the word surround and drown enterprises are surrounding their traditional, you know, environments and drowning them over a period of time. So over the next five years, you'll see more and more irrelevant legacy because the relevance is being built in the cloud, cloud for the future. That's the way I see it. >>Speaking of, take us out here, speaking of business value and on, we're almost outta time here. If there's a billboard on 1 0 1 in Palo Alto regarding HCL tech, what's the value prop? What does it say? >>It's a simple billboard. We say we are super charging our customers, our partners, our employees. We are super charging progress. And we believe that the strength that we bring from learnings of over 200,000 professionals that work at hcl working with over half of, you know, 500 of the, the largest Fortune thousands in the world is, is really bringing those learnings that we continuously look at every day that we live with, every day across all kind of regulations, all kind of industries, in adopting new technologies, in modernizing their business strategies and achieving their business transformation goals with the velocity they want. That's kind of the supercharging progress mantra, >>Super charging progress. Love it. Guys, thank you so much for joining. David, me on the program talking about, thank you for having a conversation. Our pleasure. What's going on with HCL Tech, aws, the value that you're delivering for customers. Thank you so much for your time. Thank >>You. Thank you. Thanks. Have a great time. >>Take care for our guests. I'm Lisa Martin, he's Dave Valante. You're watching The Cube, the leader in live enterprise and emerging tech coverage.

Published Date : Nov 29 2022

SUMMARY :

The cube is live at the Venetian Expo Center for AWS beyond that to business transformation now, deeper integration of the cloud to really transform We've got a couple of guests that we're gonna unpack that with. What are you hearing out in the marketplace? and their ability to increase, you know, velocity of change so that they can move fast and keep And so if I look at the last four years, every industry, How are customers, you know, dealing with some of those more And for all of that, they need to continue on their digital journeys. So squeeze the go to market How are you enabling customers to achieve what an was talking about? once it is in the cloud from anywhere, any device with a scalable options. so call center in the cloud and you can access, dial the number so the customer don't And it needs partners like HCL to be able to go into various industries and apply that effectively. So it is the responsibility of system integrator like us to make them You, you know, the ingredients that you could put together, the, the dinner. So you need to prepare a pasta dish, And the choices you make in the cloud for each of these We call it the Phoenix framework, which defines what differentiates you versus not. company that manufactures tools that we all use at home for, you know, remodeling our houses, And all of this, while they were, you know, And so cloud does need to start with a business transformation objective. you know, like an SAP installation. So what happens is, when it is to cloud, what do you do? So the client doesn't have to go to multiple We're always gonna have technical debt because Amazon, you know, they'll talk about, they don't ever deprecate anything. So we have a framework for that. As you said, nobody's taking their technical debt to the cloud anymore. So over the next five years, you'll see more What does it say? the strength that we bring from learnings of over 200,000 professionals that work at Thank you so much for your time. Have a great time. the leader in live enterprise and emerging tech coverage.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DavidPERSON

0.99+

Dave ValantePERSON

0.99+

Lisa MartinPERSON

0.99+

AWSORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

ChinaLOCATION

0.99+

LisaPERSON

0.99+

TaiwanLOCATION

0.99+

HCLORGANIZATION

0.99+

Las VegasLOCATION

0.99+

TelcoORGANIZATION

0.99+

AnanPERSON

0.99+

thousandsQUANTITY

0.99+

HCL TechORGANIZATION

0.99+

Atcl TechORGANIZATION

0.99+

GermanyLOCATION

0.99+

Palo AltoLOCATION

0.99+

MalaysiaLOCATION

0.99+

Latin AmericaLOCATION

0.99+

tomorrowDATE

0.99+

500QUANTITY

0.99+

JohnPERSON

0.99+

Home DepotORGANIZATION

0.99+

Anand BirjePERSON

0.99+

LoweORGANIZATION

0.99+

24 monthsQUANTITY

0.99+

both factorsQUANTITY

0.99+

BejiPERSON

0.99+

over 200,000 professionalsQUANTITY

0.99+

Prabhakar AppanaPERSON

0.99+

HCLTechORGANIZATION

0.98+

one exampleQUANTITY

0.98+

eachQUANTITY

0.98+

200%QUANTITY

0.97+

oneQUANTITY

0.97+

Venetian Expo CenterLOCATION

0.96+

LegoORGANIZATION

0.96+

The CubeTITLE

0.96+

OneQUANTITY

0.96+

hcl techORGANIZATION

0.96+

last one yearDATE

0.95+

one thingQUANTITY

0.94+

Absolut ardORGANIZATION

0.93+

FirstQUANTITY

0.91+

one single frameworkQUANTITY

0.91+

over halfQUANTITY

0.89+

pandemicEVENT

0.89+

awsORGANIZATION

0.89+

thousands of peopleQUANTITY

0.89+

firstQUANTITY

0.89+

last couple of yearsDATE

0.88+

AWS Reinvent 2022EVENT

0.88+

last four yearsDATE

0.88+

xgl techORGANIZATION

0.88+

PrarORGANIZATION

0.81+

day oneQUANTITY

0.8+

Amazon ConnectORGANIZATION

0.8+

last three yearsDATE

0.8+

almost 10 years backDATE

0.78+

PhoenixTITLE

0.77+

yearsDATE

0.77+

SVPPERSON

0.72+

30% plus per yearQUANTITY

0.72+

one stopQUANTITY

0.71+

Deepak Rangaraj, Dell technologies


 

(reveal music) >> We're kicking off with Deepak Rangaraj who's PowerEdge Security Product Manager at Dell Technologies. Deepak. Great to have you on the program. Thank you. >> Thank you for having me. >> So we're going through the infrastructure stack and in part one of this series, we looked at the landscape overall and how cyber has changed and specifically how Dell thinks about data protection in and security in a manner that both secures infrastructure and minimizes organizational friction. We also hit on the storage part of the portfolio. So now we want to dig into servers. So my first question is what are the critical aspects of securing server infrastructure that our audience should be aware of? >> Sure. So if you look at computing in general, right? It has rapidly evolved over the past couple of years especially with trends towards software defined data centers and with also organizations having to deal with hybrid environments, where they have private clouds public cloud, extra locations, remote offices and also remote workers. So on top of this, there's also an increase in the complexity of the supply chain itself, right? There are companies who are dealing with hundreds of suppliers as part of their supply chain. So all of this complexity provides a lot of opportunity for attackers because it's expanding the threat surface of what can be attacked. And attacks are becoming more frequent, more severe and more sophisticated. And this has also triggered around, in the regulatory and mandates around the security needs. And these regulations are not just in the government sector, right? So it extends to critical infrastructure. And eventually it will also get into the private sector. In addition to this organizations are also looking at their own internal compliance mandates and this could be based on the industry in which they're operating in or it could be their own security questions. And this is the landscape in which servers are operating in today. And given that servers are the foundational blocks of the data center it becomes extremely important to protect them, and given how complex the modern server platforms are, it's also extremely difficult and it takes a lot of effort. And this means protecting everything from the supply chain, to the manufacturing, and then eventually the assuring the hardware and software integrity of the platforms and also the operations. And there are very few companies that go to the lengths that Dell does in order to secure the server. We truly believe in the notion and the security mentality that, you know security should enable our customers to go focus on their business and proactively innovate on their business. And it should not be a burden to them. And we heavily invest to make that possible for our customers. >> So, this is really important because the premise that I set up at the beginning of this was really that I, as a security pro, I'm not a security pro, but if I were I wouldn't want to be doing all this infrastructure stuff because I now have all these new things I got to deal with. I want a company like Dell who has the resources to build that security in, to deal with the supply chain, to ensure the Providence et cetera. So I'm glad you hit on that but so given what you just said, what does cybersecurity resilience mean from a server perspective? For example, are there specific principles that Dell adheres to that are non-negotiable, let's say. How does Dell ensure that its customers can trust your server infrastructure? >> Yeah. Like when, when it comes to security at Dell, right it's ingrained in our product DNA. So that's the best way to put it. And security is non-negotiable, right? It's never an after thought where you come up with a design and then later on figure out how to go make it secure, right? With our security development life cycle, the products are being designed to counter these threats right from the beginning. And in addition to that, we are also testing and evaluating these products continuously to identify vulnerabilities. We also have external third party audits which supplement this process. And in addition to this Dell makes the commitment that we will rapidly respond to any mitigations and any vulnerabilities and exposures found out in the field and provide mitigations and patches for those in a timely manner. So this security principle is also built into our server life cycle, right? Every phase of it. So we want our products to provide cutting edge capabilities when it comes to security. So as part of that, we are constantly evaluating what our security model has done. We are building on it and continuously improving it. So till a few years ago, our model was primarily based on the NEST Framework of protect, detect, and regular. And it's still aligns really well to that framework. But over the past couple of years, we have seen how computers evolved, how the threats have evolved. And we have also seen the regulatory trends and we recognize the fact that the best security strategy for the modern world is a Zero Trust approach. And so now when we are building our infrastructure and tools and offerings for customers, first and foremost, they're cyber resilient, right? What we mean by that is they're capable of anticipating threats, withstanding attacks and rapidly recurring from attacks, and also adapting to the adverse conditions in which they're deployed. The process of designing these capabilities and identifying these capabilities, however is done through the Zero Trust Framework. And that's very important because now we are also anticipating how our customers will end up using these capabilities at their end to enable their own Zero Trust IT Environments and IT Zero Risk Deployments. We have completely adapted our security approach to make it easier for customers to work with us no matter where they are in their journey towards zero trust adoption. >> So thank you for that. You mentioned the NEST framework. You talked about Zero Trust. When I think about NEST I think as well about layered approaches. And when I think about Zero Trust, I think about if you don't have access to it, you're not getting access. You got to earn that access and you've got layers. And then you still assume that bad guys are going to get in. So you've got to detect that and you've got to response. So server infrastructure security is so fundamental. So my question is what is Dell providing specifically to for example, detect anomalies and breaches from unauthorized activity? How do you enable fast and easy or facile recovery from malicious incidents? >> Right, what that is, is exactly right. Breaches are bound to happen. Given how complex our current environment is it's extremely distributed and extremely connected, right? Data and users are no longer contained within offices where we can set up a parameter firewall and say, yeah, everything within that is good. We can trust everything within it. That's no longer true. The best approach to protect data and infrastructure in the current world is to use a Zero Trust approach which uses the principles, nothing is ever trusted, right? Nothing is trusted implicitly. You're constantly verifying every single user, every single device and every single access in your system at every single level of your IT environment. And this is the principle that we use on PowerEdge, right? But with an increased focus on providing granular controls and checks based on the principles of these privileged access. So the idea is that service first and foremost need to make sure that the threats never enter and they're rejected at the point of entry but we recognize breaches are going to occur. And if they do, they need to be minimized such that this fear of damage cost by attacker is minimized. So they're not able to move from one part of the network to something else, laterally or escalate their privileges and cause more damage, right? So the impact radius for instance, has to be reduced. And this is done through features like automated detection capabilities and automation, automated mediation capabilities. So some examples are, as part of our end to end boot resilience process we have what we call a system lockdown, right? We can lock down the configuration of the system and lock down the document versions and all changes to the system. And we have capabilities which automatically detect any drift from that lockdown configuration. And we can figure out if the drift was caused to do authorized changes or unauthorized changes. And if it is an unauthorized change can log it, generate security alerts. And we even have capabilities to automatically draw the firmware and roll those versions back to a known good version, and also the configurations, right? And this becomes extremely important because as part of Zero Trust, we need to respond to these things at machine speed, and we cannot do it at a human speed. And having these automated capabilities is a big deal when achieving that Zero Trust strategy. And in addition to this, we also have chassis intrusion detection where if the chassis, the box, the server box is opened up, it logs alerts and you can figure out, even later if there's an AC power cycle, you can go look at the logs to see that the boxes opened up and figure out if there was a, like an known authorized access or some malicious actor opening and changing something in your system. >> Great. Thank you for that. Lot of detail and appreciate that. I want to go somewhere else now because Dell has a renowned supply chain reputation. So what about securing the the supply chain and the server bill of materials? What does Dell specifically do to track the Providence of components it uses in its systems so that when the systems arrive a customer can be a hundred percent certain that that system hasn't been compromised. >> Right? And we talked about how complex the modern supply chain is, right? And that's no different for service. We have hundreds of components on the server and a lot of these require from where in order to be configured and run and these firmware competence could be coming from third party suppliers. So now the complexity that we are dealing with require the end to end approach. And that's where Dell pays a lot of attention into assuring the security of our supply chain. And it starts all the way from sourcing components, right? And then through the design and then even the manufacturing process where we are vetting the personal manufacturers and vetting the factories itself and the factories also have physical controls physical security controls built into them and even shipping, right? We have GPS tagging of packages. So all of this is built to ensure supply chain security but a critical aspect of this is also making sure that the systems which are built in the factories are delivered to the customers without any changes or any tamper. And we have a feature called the secure component verification, which is capable of doing this. What the feature does is when the system gets built in the factory, it generates an inventory of all the components in the system and it creates a cryptographic certificate based on the signatures presented to this by the competence. And this certificate is stored separately and sent to the customers separately from the system itself. So once the customers receive the system at their end they can run out to, it generates an inventory of the competence on the system at their end and then compare it to the golden certificate to make sure nothing was changed. And if any changes are detected we can figure out if there's an authorized change or an unauthorized change. Again authorized changes could be like, you know upgrades to the drives or memory and unauthorized changes could be any sort of tamper. So that's the supply chain aspect of it. And bill of materials is also an important aspect to guaranteeing security, right? And we provide a software bill of materials which is basically a list of ingredients of all the software pieces in the platform. So what it allows our customers to do is quickly take a look at all the different pieces and compare it to the vulnerability database and see if any of the vulnerable pieces which have been discovered out in the wild affect their platforms. So that's a quick way of figuring out if the platform has any known vulnerabilities and it has not been patched. >> Excellent. That's really good. My last question is, I wonder if you could, you know give us the sort of summary from your perspective. What are the key strengths of Dell server portfolio from a security standpoint? I'm really interested in, you know, the uniqueness and the strong suit that Dell brings to the table. >> Right? Yeah. We have talked enough about the complexity of the environment and how Zero Trust is necessary for the modern IT environment, right? And this is integral to Dell PowerEdge service. And as part of that, like, you know security stats with the supply chain, we have already talked about the second component verification which is a unique feature that Dell platforms have. And on top of it we also have a Silicon based platform mode of trust. So this is a key, which is programmed into the Silicon on the black server during manufacturing and can never be changed after. And this immutable key is what forms the anchor for creating the chain of trust. That is used to verify everything in the platform from the hardware and software integrity to the boot, all pieces of it. Right? In addition to that, we also have a host of data protection features, whether it is protecting data across in news or inflight, we have self encrypting drives which provides scalable and flexible encryption options. And this coupled with external key management provides really good protection for your data address. External key management is important because, you know somebody could physically steal the server, walk away but then the keys are not stored on the server. It's stored separately. So that provides your action layer security. And we also have dual layer encryption where we can compliment the hardware encryption on the secure encrypted drives with software encryption. In addition to this, we have identity and access management features like multifactor authentication, single sign on roles, scope, and time based access controls. All of which are critical to enable that granular control and checks for Zero Trust approach. So I would say like, you know, if you look at the Dell feature set, it's pretty comprehensive. And we also have the flexibility built in to meet the needs of all customers, no matter where they fall in the spectrum of, you know risk tolerance and security sensitivity. And we also have the capabilities to meet all the regulatory requirements and compliance requirements. So in a nutshell, I would say that, you know Dell PowerEdge service is cyber resilient infrastructure helps accelerate Zero Trust option for customers. >> Got it. So you've really thought this through, all the various things that you would do to sort of make sure that your server infrastructure is secure, not compromised, that your supply chain is secure, so that your customers can focus on some of the other things that they have to worry about, which are numerous. Thanks, Deepak, appreciate you coming on "The Cube" and participating in the program. >> Thank you for having me. >> You're welcome. In a moment, I'll be back to dig into the networking portion of the infrastructure. Stay with us for more coverage of a blueprint for trusted infrastructure and collaboration with Dell technologies on "The Cube". Your leader in enterprise and emerging tech coverage. (outro music)

Published Date : Sep 15 2022

SUMMARY :

Great to have you on the program. and in part one of this series, we looked and the security mentality that, you know important because the premise So that's the best way to put it. You mentioned the NEST framework. and lock down the document versions the supply chain and the So now the complexity that we are dealing and the strong suit that in the spectrum of, you know and participating in the program. of the infrastructure.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
DeepakPERSON

0.99+

DellORGANIZATION

0.99+

Deepak RangarajPERSON

0.99+

first questionQUANTITY

0.99+

Zero TrustORGANIZATION

0.99+

second componentQUANTITY

0.99+

hundredsQUANTITY

0.98+

Zero Trust FrameworkTITLE

0.98+

bothQUANTITY

0.98+

Dell TechnologiesORGANIZATION

0.98+

hundred percentQUANTITY

0.98+

hundreds of componentsQUANTITY

0.96+

CubeTITLE

0.94+

NESTTITLE

0.92+

one partQUANTITY

0.92+

firstQUANTITY

0.89+

few years agoDATE

0.87+

Zero TrustTITLE

0.87+

singleQUANTITY

0.87+

past couple of yearsDATE

0.86+

todayDATE

0.84+

PowerEdgeCOMMERCIAL_ITEM

0.82+

single userQUANTITY

0.79+

suppliersQUANTITY

0.78+

every single deviceQUANTITY

0.77+

ProvidenceLOCATION

0.76+

trustTITLE

0.75+

dualQUANTITY

0.72+

ZeroORGANIZATION

0.71+

zeroORGANIZATION

0.7+

The CubeTITLE

0.56+

every singleQUANTITY

0.54+

part oneOTHER

0.53+

ZeroQUANTITY

0.52+

PowerEdgeTITLE

0.51+

TrustTITLE

0.48+

Merritt Baer, AWS & Shariq Qureshi, Deloitte | AWS re:Inforce 2022


 

Okay. We're back at AWS reinforced 2022. My name is Dave Vellante, and this is the cube we're here in Boston, home of lobster and CDA. And we're here, the convention center where the cube got started in 2010, Shariq Qureshi is here the senior manager at Deloitte and two LL P and merit bear is back on the cube. Good to see >>You guys can't keep me away, >>Right? No. Well, we love having you on the cube shark set up your role at, at Deloitte and toosh what do you actually, what's your swim lane, if you will. >>Yeah, sure. You know, I spend, I wear a lot of hats. I spend a lot of time in the assurance, the controls advisory audit type of role. So I spend our time, a lot of time working with our clients to understand, you know, regulatory requirements, compliance requirements, and then controls that they need to have in place in order to address risks, technology risks, and ultimately business risks. >>So I like to put forth premise, you know, when I walk around a show like this and come up with some observations and then I like to share 'em and then people like me. Well, you know, maybe so help me course correct. My epiphany at this event is the cloud is becoming the first line of defense. The CISO at your customers is now the second line of defense. I think audit is maybe the th third line of defense. Do, do you buy that the sort of organizational layered approach? >>No, because in fact, what we're here to talk about today is audit manager, which is integrated, right? Like if you're doing so the whole notion of cloud is that we are taking those bottom layers of the stack, right? So the concrete floors up through layer for the hypervisor, the, the racks and stacks and HVAC and guards and gates up through the hypervisor, right? Our, our proprietary hardware nitro ecosystem, which has security inheritance is okay upon that. We are then virtualized. Right? And so what we're really talking about is the ways that audit looks different today, that you can reason about what you're doing. So you're doing infrastructure as code. You can do securities code, you can do compliances code, and that's the beauty of it. So like for better, or in your case for worse in your analogy, you know, these are integrated, these are woven together and they are an API call >>Seamless. >>It, it is like easy to describe, right? I mean, like you can command line knowledge about your resources. You can also reason about it. So like, this is something that's embedded, for example, an inspector you can do network reachability know whether you have an internet facing endpoint, which is a PCI, you know, requirement, but that'll be dashboarded in your security hub. So there's the cloud is all the stuff we take away that you don't have to deal with. And also all the stuff that we manage on top of it that then you can reason about and augment and, and take action on. >>Okay. So at the same time you can't automate the audit entirely. Right? So, but, but talk about the challenges of, of, of, of automating and auditing cloud environment. >>Yeah. I mean, when I look at cloud, you know, organizations move to take advantage of cloud characteristics and cloud capabilities, right? So elasticity, scalability is one of them. And, you know, for market conditions, business, business outcomes, you know, resources expand and contract. And one of the questions that we often get as an auditor is how do you maintain a control environment for resources that weren't there yesterday, but are there today, or that are, that are no longer there and that are there today. So how do you maintain controls and how do you maintain security consistently uniformly throughout an audit environment? It's not there. So that's a challenge auditors, you know, historically when you look at the on-prem environment, you have servers that are there, it's a physical, it's a physical box. You can touch it and see it. And if it goes down, then, you know, it's still there. You can hug >>It if you're some people >>It's still there. So, but you know, with, you know, with cloud things get torn down that you don't see. So how do you maintain controls? That's, you know, it, one challenges, it >>Sounds like you're describing a CMDB for audit. >>I mean, that's a, that's an outcome of having, you know, getting good controls of having a CMDB to keep track and have an inventory of your assets. >>But the problem with CMDB is they're out of date, like so, so quickly, is it different in the cloud world? >>Yeah, exactly. I mean, yes. And yes, they are outta date. Cuz like anything static will be manual and imprecise, like it's gonna be, did John go calculate, like go count how many servers we have. That's why I was joking about server huggers versus like virtualizing it. So you put out a call and you know, not just whether it exists, but whether it's been patched, whether it's, you know, like there are ways that we can reason about what we've done, permissioning pruning, you know, like, and these, by the way, correspond to audit and compliance requirements. And so yes, we are not like there, it's not a click of a, whatever, a snap of the fingers, right. It takes work to translate between auditors and us. And it also takes work to have customers understand how they can augment the way that they think about compliance. But a lot of this is just the good stuff that they already need to be doing, right? Knowing internet facing endpoints or whatever, you know, like pruning permissioning. And there's a lot of ways that, you know, access analyzer, for example, these are automated reasoning tools that come from our formal reasoning group, automated reason group that's in identity. Like they, computers can reason about things in ways that are more complex, as long as it can be resolved. It's like EEU utility in mathematics. You don't go out and try to count every prime number. We accept the infinitude of primes to be true. If you believe in math, then we can reason about it. >>Okay. So hearing that there's a changing landscape yeah. In compliance shift from a lot of manual work to one that's much more highly automated, maybe not completely integrated and seamless. Right. But, but working in that direction, right. Yeah. Is that right? And maybe you could describe that in a little bit more detail, how that, you know, journey has progressed. >>I mean, just the fact alone that you have, you know, a lot of services, a lot of companies that are out there that are trying to remove the manual component and to automate things, to make things more efficient. So then, you know, developers can develop and we can be more agile and to do the things that, you know, really what the core competencies are of the business to remove those manual, you know, components to take out the human element and there's a growing need for it. You know, like we always look at security as, you know, like a second class citizen, we don't take advantage of, you know, the, you know, the opportunities that we need to, to do to maintain controls. So, you know, there's an opportunity here for us to look at and, and automate compliance, to automate controls and, and to make things, you know, seamless >>As a fun side benefit, you will actually hopefully have improved your actual security and also retain your workforce because people don't wanna be doing manual processes. You know, they wanna be doing stuff that humans are designed for, which is creative thinking, innovation, you know, creating ways to make new pathways instead of just like re walking these roads that a computer can analyze, >>You mentioned audit manager, what is that? I mean, let's give a plug for the product or the service. What's that all about what problems does it solve? Let's get >>Into that. Yeah. I mean, audit manager is a first of its kind service. You're not gonna find this offered through any other hyperscaler it's specifically geared and tailored towards the second line, which is security and compliance and a third line function, which is internal audit. So what is it looking to do and what is it looking to address some of those challenges working in a cloud space working, and if you have a cloud footprint. So for example, you know, most organizations operate in a multi account strategy, right? You don't just have one account, but how do you maintain consistency of controls across all your accounts? Auto manager is a service that can give, you know, kind of that single pane of view that to see across your entire landscape, just like a cartographer has a map to see, you know, the entire view of what he's designing auto managers does the same thing only from a cloud perspective. So there's also other, you know, features and capabilities that auto managers trying to integrate, you know, that presents challenges for those in compliance those in the audit space. So, you know, most companies, organizations they have, you know, not just one framework like SOC two or GDPR, high trust, HIPAA PCI, you know, you can select an industry accepted framework and evaluate your cloud consumption against, you know, an industry accepted framework to see where you stand in terms of your control posture, your security hygiene, >>And that's exclusive to AWS. Is that what you're saying? You won't find that on any other hyper scale >>And you'll find similarities in other products, but you won't find something that's specifically geared towards the second line and third line. There's also other features and capabilities to collect evidence, which is, I don't see that in the marketplace. >>Well, the only reason I ask that is because, you know, you, everybody has multiple clouds and I would love, I would love a, you know, an audit manager that's, that's span that transcends, you know, one cloud, is that possible? Or is that something that is just not feasible because of the, the, the deltas between clouds? >>I mean, anything's possible with the APIs right now, the way that, you know, you have to ingrain in, right. There's, you know, a, a feature that was introduced recently for audit manager was the ability to pull in APIs from third party sources. So now you're not just looking, looking exclusively at one cloud provider, you're looking at your entire digital ecosystem of services, your tools, your SA solutions that you're consuming to get a full, comprehensive picture of your environment. >>So compliance, risk, audit security, they're like cousins that are all sort of hanging out on the same holiday, but, but they're different. Like what help us understand and squint through those different disciplines. >>Yeah. I mean, each of them have, you know, a different role and a hat to wear. So internal audit is more of your independent arm of management working or reporting directly towards, you know, to the audit committee or to the board to give an independent view on company control and posture security and compliance works with management to help design the, that there that are intended to prevent, detect, or even correct, you know, controls, breakdowns, you know, those action, those action verb items that you wanna prevent unauthorized access, or you wanna restrict changes from making its way into production unless it's approved and, and documented and tracked and so on and so forth. So each, you know, these roles they're very similar, but they're also different in terms of what their function is. >>How are customers dealing with regional differences? You mentioned GDPR, different regulations, data sovereignty, what are the global nuances and complexities that, that, that cloud brings. And how are you addressing those? >>Yeah. Merit, I don't know if you had any thoughts on that one. >>I mean, I think that a lot of what, and this will build off of your response to the sort of Venn diagrams of security and risk and compliance and audit. I think, you know, what we're seeing is that folks care about the same stuff. They care about privacy. They care about security. They care about incentivizing best practices. The form that that takes when it's a compliance framework is by definition a little bit static over time. Whereas security tends to be more quickly evolving with standards that are like industry standards. And so I think one of the things that, you know, all these compliance frameworks have in, in mind is to go after those best practices, the forms that they take may take different forms. You know what I mean? And so I, I see them as hopeful in the motivation sense that we are helping entities get the wherewithal, they need to grow up or mature or get even more security minded. I think there are times that they feel a little clunky, but you know, that's just Frank. Yeah. >>It, it, it can audit manager sort of help me solve that problem. Is that the intent? And I see what you're saying, merit, that there security is at a different pace than, than, you know, GDPR, a privacy, you know, person, >>Right. I mean, like security says, we want this outcome. We want to have, you know, data be protected. The compliance may say, it must be this particular encryption standard. You know what I mean? Like the form I see things taking over time will evolve and, and feels dynamic. Whereas I think that sometimes when we think about compliance and it's exactly why we need stuff like audit manager is to like help manage exactly what articulation of that are we getting in this place at this time for this regulated industry? And like almost every customer I have is regulated. If you're doing business, you're probably in PCI, right. >>And there's never just one silver bullet. So security is, is a number of things that you're gonna do, the number of tools that you're gonna have. And it's often the culture in, in what you develop in your people, your process and technology. So auto manager is one of the components of robust strategy on how to address security. >>But it's also one of those things where like, there are very few entities, maybe Deloitte is one that are like built to do compliance. They're built to do manufacturing, automotive hospitality. Yeah. You know, like they're doing some other industry as their industry. Right. And we wanna let them have less lag time as they make sure that they can do that core business. And the point is to enable them to move our, I mean like sure. I think that folks should move to the pod because of security, but you don't have to, you should move because it enables your business. And this is one of the ways in which it just like minimizes, you know, like whatever our tailwinds lagging or push it anyway, it pushes you. Right. I mean, like it minimizes the lag >>Definitely tailwind. So are you suggesting merit that you can inject that industry knowledge and specificity into things like audit manager and, and actually begin to automate that as, and of course Deloitte has, you know, industry expertise char, but, but, but how should we think about that? >>I mean, you're gonna, you're gonna look at your controls comprehensively a across the board. So if you operate in an industry, you're gonna look to see like, what's, what's important for you. What do you have to, you know, be mindful of? So if you have data residency concerns, you wanna make sure that you've tailored your controls based on the risks that you're addressing. So if there's a framework >>And remember that you can go in the console and choose what region you're, you know, like we never remove your data from your region that you have chosen, you know, like this is, there's an intentionality and an ability to do this with a click of a mouse or with an API call that's, you know, or with a cloud formation template. That's like, there is a deliberateness there. There's not just like best wishes. >>You know, >>ESG is in scope. I presume, you know, helping the CISO become more green, more diverse. Increasingly you're seeing ESG reports come out from major organizations. I presume that's part of the compliance, but maybe not, maybe it hasn't seeped in yet. Are you seeing >>For that? I think it's still a new service auto manager. It's still, you know, being developed, but, you know, continuous feedback to make sure that, you know, we're covering a, a broad range of services and, and, and those considerations are definitely in the scope. Yeah. >>I mean, are you hearing more of that from >>Clients? So, I mean, we have an internal commitment to sustainability, right. That has been very publicly announced and that I'm passionate about. We also have some other native tools that probably, you know, are worth mentioning here, like security hub that does, you know, CIS benchmarking and other things like that are traffic lighted in their dashboard. You know, like there are ways a lot of this is going to be the ways that we can take what might have been like an ugly ETL process and instead take the managed ness on top of it and, and consume that and allow your CISO to make high velocity decision, high velocity, high quality decisions. >>What's the relationship between your two firms? How do you work >>To I'm like we just met. >>Yeah. I sense that, so is it, is it, how do you integrate, I guess is >>A question. Yeah. I mean, I mean, from the audit perspective, our perspective, working with clients and understanding, you know, their requirements and then bringing the service audit manager from the technical aspect and how we can work together. So we have a few use cases, one we've working with the tech company who wanted to evaluate, you know, production workload that had content, you know, critical client information, client data. So they needed to create custom controls. We were working with them to create custom controls, which auto manager would evaluate their environment, which would, you know, there's a reporting aspect of it, which was used to, you know, to present to senior leadership. So we were working together with AWS and on helping craft what those custom controls were in implement at the customer. >>Yeah. I mean, among other things, delight can help augment workforce. It can help folks interpret their results when they get outputs and act upon them and understand industry standards for responsiveness there. I mean, mean like it's a way to augment your approach by, you know, bringing in someone who's done this before. >>Yeah. Cool, cool. Collaboration on a topic that's generally considered, sorry. Don't, don't hate me for saying this boring, but really important. And the fact that you're automating again makes it a lot more interesting guys. Excellent. Thanks for your sharp first time on the cube. Thank you. Absolutely on, appreciate it. Rapidly. Becoming a VIP. Thanks. Coming on. Hey, I'll take it. All right. Keep it right there. Thank you. This is Dave ante for the cube. You're watching our coverage of AWS reinforce 2022 from Boston. We'll be right back.

Published Date : Jul 27 2022

SUMMARY :

on the cube. No. Well, we love having you on the cube shark set up your role at, a lot of time working with our clients to understand, you know, regulatory requirements, compliance requirements, So I like to put forth premise, you know, when I walk around a show like this and come up with some observations and that you can reason about what you're doing. facing endpoint, which is a PCI, you know, requirement, but that'll be dashboarded in your security So, but, but talk about the challenges of, of, of, So that's a challenge auditors, you know, historically when you look So, but you know, with, you know, with cloud things get torn down that you don't see. I mean, that's a, that's an outcome of having, you know, getting good controls And there's a lot of ways that, you know, And maybe you could describe that in a little bit more detail, how that, you know, I mean, just the fact alone that you have, you know, a lot of services, a lot of companies that designed for, which is creative thinking, innovation, you know, creating ways to I mean, let's give a plug for the product or the service. you know, an industry accepted framework to see where you stand in terms of your control posture, Is that what you're saying? There's also other features and capabilities to collect evidence, I mean, anything's possible with the APIs right now, the way that, you know, you have to ingrain in, So compliance, risk, audit security, detect, or even correct, you know, controls, breakdowns, you know, those action, And how are you addressing those? I think there are times that they feel a little clunky, but you know, you know, GDPR, a privacy, you know, person, We want to have, you know, And it's often the culture in, in what you develop in your people, And this is one of the ways in which it just like minimizes, you know, like whatever our tailwinds you know, industry expertise char, but, but, but how should we think about that? So if you operate in an industry, you're gonna look to see like, what's, what's important for And remember that you can go in the console and choose what region you're, you know, like we never remove your data from your region I presume, you know, helping the CISO but, you know, continuous feedback to make sure that, you know, we're covering a, a broad range of services other native tools that probably, you know, are worth mentioning here, like security hub that does, how do you integrate, I guess is which would, you know, there's a reporting aspect of it, which was used to, you know, I mean, mean like it's a way to augment And the fact that you're automating again makes it a lot

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

AWSORGANIZATION

0.99+

DeloitteORGANIZATION

0.99+

2010DATE

0.99+

BostonLOCATION

0.99+

Shariq QureshiPERSON

0.99+

Merritt BaerPERSON

0.99+

two firmsQUANTITY

0.99+

second lineQUANTITY

0.99+

GDPRTITLE

0.99+

FrankPERSON

0.99+

yesterdayDATE

0.99+

eachQUANTITY

0.99+

oneQUANTITY

0.99+

todayDATE

0.99+

one accountQUANTITY

0.99+

third lineQUANTITY

0.99+

2022DATE

0.99+

DavePERSON

0.99+

JohnPERSON

0.99+

first lineQUANTITY

0.99+

first timeQUANTITY

0.98+

SOC twoTITLE

0.98+

ESGTITLE

0.96+

MeritPERSON

0.96+

singleQUANTITY

0.96+

one cloudQUANTITY

0.89+

third line functionQUANTITY

0.88+

one cloud providerQUANTITY

0.88+

firstQUANTITY

0.87+

one silver bulletQUANTITY

0.87+

CMDBORGANIZATION

0.86+

HIPAA PCITITLE

0.85+

one challengesQUANTITY

0.82+

EEUTITLE

0.8+

CDAORGANIZATION

0.75+

two LL PQUANTITY

0.75+

2022TITLE

0.74+

one frameworkQUANTITY

0.73+

forth premiseQUANTITY

0.68+

questionsQUANTITY

0.47+

Sheila Rohra & Omer Asad, HPE Storage | HPE Discover 2022


 

>> Announcer: "theCUBE" presents HPE Discover 2022. Brought to you by HPE. >> Welcome back to HPE Discover 2022. You're watching "theCUBE's" coverage. This is Day 2, Dave Vellante with John Furrier. Sheila Rohra is here. She's the Senior Vice President and GM of the Data Infrastructure Business at Hewlett Packard Enterprise, and of course, the storage division. And Omer Asad. Welcome back to "theCUBE", Omer. Senior Vice President and General Manager for Cloud Data Services, Hewlett Packard Enterprise storage. Guys, thanks for coming on. Good to see you. >> Thank you. Always a pleasure, man. >> Thank you. >> So Sheila, I'll start with you. Explain the difference. The Data Infrastructure Business and then Omer's Cloud Data Services. You first. >> Okay. So Data Infrastructure Business. So I'm responsible for the primary secondary storage. Basically, what you physically store, the data in a box, I actually own that. So I'm going to have Omer explain his business because he can explain it better than me. (laughing) Go ahead. >> So 100% right. So first, data infrastructure platforms, primary secondary storage. And then what I do from a cloud perspective is wrap up those things into offerings, block storage offerings, data protection offerings, and then put them on top of the GreenLake platform, which is the platform that Antonio and Fidelma talked about on main Keynote stage yesterday. That includes multi-tenancy, customer subscription management, sign on management, and then on top of that we build services. Services are cloud-like services, storage services or block service, data protection service, disaster recovery services. Those services are then launched on top of the platform. Some services like data protection services are software only. Some services are software plus hardware. And the hardware on the platform comes along from the primary storage business and we run the control plane for that block service on the GreenLake platform and that's the cloud service. >> So, I just want to clarify. So what we maybe used to know as 3PAR and Nimble and StoreOnce. Those are the products that you're responsible for? >> That is the primary storage part, right? And just to kind of show that, he and I, we do indeed work together. Right. So if you think about the 3PAR, the primary... Sorry, the Primera, the Alletras, the Nimble, right? All that, right? That's the technology that, you know, my team builds. And what Omer does with his magic is that he turns it into HPE GreenLake for storage, right? And to deliver as a service, right? And basically to create a self-service agility for the customer and also to get a very Cloud operational experience for them. >> So if I'm a customer, just so I get this right, if I'm a customer and I want Hybrid, that's what you're delivering as a Cloud service? >> Yes. >> And I don't care where the data is on-premises, in storage, or on Cloud. >> 100%. >> Is that right? >> So the way that would work is, as a customer, you would come along with the partner, because we're 100% partner-led. You'll come to the GreenLake Console. On the GreenLake Console, you will pick one of our services. Could be a data protection service, could be the block storage service. All services are hybrid in nature. Public Cloud is 100% participant in the ecosystem. You'll choose a service. Once you choose a service, you like the rate card for that service. That rate card is just like a hyperscaler rate card. IOPS, Commitment, MINCOMMIT's, whatever. Once you procure that at the price that you like with a partner, you buy the subscription. Then you go to console.greenLake.com, activate your subscription. Once the subscription is activated, if it's a service like block storage, which we talked about yesterday, service will be activated, and our supply chain will send you our platform gear, and that will get activated in your site. Two things, network cable, power cable, dial into the cloud, service gets activated, and you have a cloud control plane. The key difference to remember is that it is cloud-consumption model and cloud-operation model built in together. It is not your traditional as a service, which is just like hardware leasing. >> Yeah, yeah, yeah. >> That's a thing of the past. >> But this answers a question that I had, is how do you transfer or transform from a company that is, you know, selling boxes, of course, most of you are engineers are software engineers, I get that, to one that is selling services. And it sounds like the answer is you've organized, I know it's inside baseball here, but you organize so that you still have, you can build best of breed products and then you can package them into services. >> Omer: 100%. 100%. >> It's separate but complementary organization. >> So the simplest way to look at it would be, we have a platform side at the house that builds the persistence layers, the innovation, the file systems, the speeds and feeds, and then building on top of that, really, really resilient storage services. Then how the customer consumes those storage services, we've got tremendous feedback from our customers, is that the cloud-operational model has won. It's just a very, very simple way to operate it, right? So from a customer's perspective, we have completely abstracted away out hardware, which is in the back. It could be at their own data center, it could be at an MSP, or they could be using a public cloud region. But from an operational perspective, the customer gets a single pane of glass through our service console, whether they're operating stuff on-prem, or they're operating stuff in the public cloud. >> So they get storage no matter what? They want it in the cloud, they got it that way, and if they want it as a service, it just gets shipped. >> 100%. >> They plug it in and it auto configures. >> Omer: It's ready to go. >> That's right. And the key thing is simplicity. We want to take the headache away from our customers, we want our customers to focus on their business outcomes, and their projects, and we're simplifying it through analytics and through this unified cloud platform, right? On like how their data is managed, how they're stored, how they're secured, that's all taken care of in this operational model. >> Okay, so I have a question. So just now the edge, like take me through this. Say I'm a customer, okay I got the data saved on-premise action, cloud, love that. Great, sir. That's a value proposition. Come to HPE because we provide this easily. Yeah. But now at the edge, I want to deploy it out to some edge node. Could be a tower with Telecom, 5G or whatever, I want to box this out there, I want storage. What happens there? Just ship it out there and connects up? Does it work the same way? >> 100%. So from our infrastructure team, you'll consume one or two platforms. You'll consume either the Hyperconverged form factor, SimpliVity, or you might convert, the Converged form factor, which is proliant servers powered by Alletras. Alletra 6Ks. Either of those... But it's very different the way you would procure it. What you would procure from us is an edge service. That edge service will come configured with certain amount of compute, certain amount of storage, and a certain amount of data protection. Once you buy that on a dollars per gig per month basis, whichever rate card you prefer, storage rate card or a VMware rate card, that's all you buy. From that point on, the platform team automatically configures the back-end hardware from that attribute-based ordering and that is shipped out to your edge. Dial in the network cable, dial in the power cable, GreenLake cloud discovers it, and then you start running the- >> Self-service, configure it, it just shows up, plug it in, done. >> Omer: Self-service but partner-led. >> Yeah. >> Because we have preferred pricing for our partners. Our partners would come in, they will configure the subscriptions, and then we activate those customers, and then send out the hardware. So it's like a hyperscaler on-prem at-scale kind of a model. >> Yeah, I like it a lot. >> So you guys are in the data business. You run the data portion of Hewlett Packard Enterprise. I used to call it storage, even if we still call it storage but really, it's evolving into data. So what's your vision for the data business and your customer's data vision, if you will? How are you supporting that? >> Well, I want to kick it off, and then I'm going to have my friend, Omer, chime in. But the key thing is that what the first step is is that we have to create a unified platform, and in this case we're creating a unified cloud platform, right? Where there's a single pane of glass to manage all that data, right? And also leveraging lots of analytics and telemetry data that actually comes from our infosite, right? We use all that, we make it easy for the customer, and all they have to say, and they're basically given the answers to the test. "Hey, you know, you may want to increase your capacity. You may want to tweak your performance here." And all the customers are like, "Yes. No. Yes, no." Basically it, right? Accept and not accept, right? That's actually the easiest way. And again, as I said earlier, this frees up the bandwidth for the IT teams so then they actually focus more on the business side of the house, rather than figuring out how to actually manage every single step of the way of the data. >> Got it. >> So it's exactly what Sheila described, right? The way this strategy manifests itself across an operational roadmap for us is the ability to change from a storage vendor to a data services vendor, right? >> Sheila: Right. >> And then once we start monetizing these data services to our customers through the GreenLake platform, which gives us cloud consumption model and a cloud operational model, and then certain data services come with the platform layer, certain data services are software only. But all the services, all the data services that we provide are hybrid in nature, where we say, when you provision storage, you could provision it on-prem, or you can provision it in a hyperscaler environment. The challenge that most of our customers have come back and told us, is like, data center control planes are getting fragmented. On-premises, I mean there's no secrecy about it, right? VMware is the predominant hypervisor, and as a result of that, vCenter is the predominant configuration layer. Then there is the public cloud side, which is through either Ajour, or GCP, or AWS, being one of the largest ones out there. But when the customer is dealing with data assets, the persistence layer could be anywhere, it could be in AWS region, it could be your own data center, or it could be your MSP. But what this does is it creates an immense amount of fragmentation in the context in which the customers understand the data. Essentially, John, the customers are just trying to answer three questions: What is it that I store? How much of it do I store? Should I even be storing it in the first place? And surprisingly, those three questions just haven't been answered. And we've gotten more and more fragmented. So what we are trying to produce for our customers, is a context to ware data view, which allows the customer to understand structured and unstructured data, and the lineage of how it is stored in the organization. And essentially, the vision is around simplification and context to ware data management. One of the key things that makes that possible, is again, the age old infosite capability that we have continued to hone and develop over time, which is now up to the stage of like 12 trillion data points that are coming into the system that are not corroborated to give that back. >> And of course cost-optimizing it as well. We're up against the clock, but take us through the announcements, what's new from when we sort of last talked? I guess it was in September. >> Omer: Right. >> Right. What's new that's being announced here and, or, you know, GA? >> Right. So three major announcements that came out, because to keep on establishing the context when we were with you last time. So last time we announced GreenLake backup and recovery service. >> John: Right. >> That was VMware backup and recovery as a complete cloud, sort of SaaS control plane. No backup target management, no BDS server management, no catalog management, it's completely a SaaS service. Provide your vCenter address, boom, off you go. We do the backups, agentless, 100% dedup enabled. We have extended that into the public cloud domain. So now, we can back up AWS, EC2, and EBS instances within the same constructs. So a single catalog, single backup policy, single protection framework that protects you both in the cloud and on-prem, no fragmentation, no multiple solutions to deploy. And the second one is we've extended our Hyperconverged service to now be what we call the Hybrid Cloud On-Demand. So basically, you go to GreenLake Console control plane, and from there, you basically just start configuring virtual machines. It supports VMware and AWS at the same time. So you can provision a virtual machine on-prem, or you can provision a virtual machine in the public cloud. >> Got it. >> And, it's the same framework, the same catalog, the same inventory management system across the board. And then, lastly, we extended our block storage service to also become hybrid in nature. >> Got it. >> So you can manage on-prem and AWS, EBS assets as well. >> And Sheila, do you still make product announcements, or does Antonio not allow that? (Omer laughing) >> Well, we make product announcements, and you're going to see our product announcements actually done through the HPE GreenLake for block storage. >> Dave: Oh, okay. >> So our announcements will be coming through that, because we do want to make it as a service. Again, we want to take all of that headache of "What configuration should I buy? How do I actually deploy it? How do I...?" We really want to take that headache away. So you're going to see more feature announcements that's going to come through this. >> So feature acceleration through GreenLake will be exposed? >> Absolutely. >> This is some cool stuff going on behind the scenes. >> Oh, there's a lot good stuff. >> Hardware still matters, you know. >> Hardware still matters. >> Does it still matter? Does hardware matter? >> Hardware still matters, but what matters more is the experience, and that's actually what we want to bring to the customer. (laughing) >> John: That's good. >> Good answer. >> Omer: 100%. (laughing) >> Guys, thanks so much- >> John: Hardware matters. >> For coming on "theCUBE". Good to see you again. >> John: We got it. >> Thanks. >> And hope the experience was good for you Sheila. >> I know, I know. Thank you. >> Omer: Pleasure as always. >> All right, keep it right there. Dave Vellante and John Furrier will be back from HPE Discover 2022. You're watching "theCUBE". (soft music)

Published Date : Jun 29 2022

SUMMARY :

Brought to you by HPE. and of course, the storage division. Always a pleasure, man. Explain the difference. So I'm responsible for the and that's the cloud service. Those are the products that That's the technology that, you know, the data is on-premises, On the GreenLake Console, you And it sounds like the Omer: 100%. It's separate but is that the cloud-operational and if they want it as a and it auto configures. And the key thing is simplicity. So just now the edge, and that is shipped out to your edge. it just shows up, plug it in, done. and then we activate those customers, for the data business the answers to the test. and the lineage of how it is And of course and, or, you know, GA? establishing the context And the second one is we've extended And, it's the same framework, So you can manage on-prem the HPE GreenLake for block storage. that's going to come through this. going on behind the scenes. and that's actually what we Omer: 100%. Good to see you again. And hope the experience I know, I know. Dave Vellante and John

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
SheilaPERSON

0.99+

JohnPERSON

0.99+

DavePERSON

0.99+

Sheila RohraPERSON

0.99+

Dave VellantePERSON

0.99+

SeptemberDATE

0.99+

Dave VellantePERSON

0.99+

three questionsQUANTITY

0.99+

Hewlett Packard EnterpriseORGANIZATION

0.99+

100%QUANTITY

0.99+

AWSORGANIZATION

0.99+

John FurrierPERSON

0.99+

oneQUANTITY

0.99+

OmerPERSON

0.99+

John FurrierPERSON

0.99+

two platformsQUANTITY

0.99+

Omer AsadPERSON

0.99+

firstQUANTITY

0.99+

HPEORGANIZATION

0.99+

NimbleORGANIZATION

0.99+

first stepQUANTITY

0.99+

console.greenLake.comOTHER

0.99+

yesterdayDATE

0.99+

second oneQUANTITY

0.99+

OneQUANTITY

0.99+

AntonioPERSON

0.98+

12 trillion data pointsQUANTITY

0.98+

Two thingsQUANTITY

0.98+

AlletrasORGANIZATION

0.97+

HPE StorageORGANIZATION

0.97+

5GORGANIZATION

0.97+

theCUBETITLE

0.97+

bothQUANTITY

0.95+

GALOCATION

0.95+

StoreOnceORGANIZATION

0.95+

EBSORGANIZATION

0.94+

three major announcementsQUANTITY

0.94+

Cloud Data ServicesORGANIZATION

0.93+

PrimeraORGANIZATION

0.92+

AjourORGANIZATION

0.9+

GreenLakeORGANIZATION

0.9+

single paneQUANTITY

0.88+

single backup policyQUANTITY

0.86+

single catalogQUANTITY

0.86+

Day 2QUANTITY

0.85+

single protection frameworkQUANTITY

0.84+

VMwareTITLE

0.82+

theCUBEORGANIZATION

0.82+

EC2TITLE

0.79+

Alletra 6KsTITLE

0.77+

VMwareORGANIZATION

0.73+

KeynoteEVENT

0.72+

single stepQUANTITY

0.72+

HPE DiscoverORGANIZATION

0.7+

dollars per gigQUANTITY

0.7+

Lisa Cramer, LiveRamp & Chris Child, Snowflake | Snowflake Summit 2022


 

(upbeat music) >> Good afternoon, everyone. Welcome back to theCUBE's live coverage of Snowflake Summit 22, the fourth annual Snowflake Summit. Lisa Martin here with Dave Vellante, We're live in Vegas, as I mentioned. We've got a couple of guests here with us. We're going to be unpacking some more great information that has come out of the show news today. Please welcome Chris Child back to theCUBE, Senior Director of Product Management at Snowflake, and Lisa Cramer is here, Head of Embedded Products at LiveRamp, guys welcome. >> Thank you. >> Hi. >> Tell us a little bit about LiveRamp, what you guys do, what your differentiators are and a little bit about the Snowflake partnership? >> Sure, well, LiveRamp makes it safe and easy to connect data. And we're powered by core identity resolution capabilities, which enable our clients to resolve their data, and connect it with other data sets. And so we've brought these identity infrastructure capabilities to Snowflake, and built into the Native Application Framework. We focused on two initial products around device resolution, which enables our clients to connect customer data from the digital ecosystem. This powers things like, measurement use cases, and understanding campaign effectiveness and ROI. And the second capability we built into the Native Application Framework is called transcoding. And this enables a translation layer between identifiers, so that parties can safely and effectively share data at a person-based view. >> Chris, talk to us about, Snowflake just announced a lot of news this morning, just announced, the new Snowflake Native Application Framework. You alluded to this, Lisa, talk to us about that. What does it mean for customers, what does it do? Give us all the backstory. >> Yeah, so we had seen a bunch of cases for our customers where they wanted to be able to take application logic, and have other people use it. So LiveRamp, as an example of that, they've built a bunch of complicated logic to help you figure out who is the same person in different systems. But the problem was always that, that application had to run outside of the Data Cloud. And that required you to take your data outside of Snowflake, entrust your data to a third party. And so every time that companies have to go, become a vendor, they have to go through a security review, and go through a long onerous process, to be able to be allowed to process the really sensitive data that these customers have. So with the Native Applications Framework, you can take your application code, all of the logic, and the data that's needed to build it together, and actually push that through secure data sharing into a customer's account, where it runs, and is able to access their data, join it with data from the provider, all without actually having to give that provider access to your core data assets themselves. >> Is it proper to think of the Native Application Framework as a PaaS layer within the Data Cloud? >> That's a great way to think about it. And so, this is where we've integrated with the marketplace as well. So providers like LiveRamp will be able to publish these applications. They'll run entirely on effectively a PaaS layer that's powered by Snowflake, and be able to deliver those to any region, any cloud, any place that Snowflake runs. >> So, we get a lot of grief for this term, but we've coined a term called "supercloud". Okay, and the supercloud is an abstraction layer that hovers above the hyperscale infrastructure. Companies like yours, build on top of that. So you don't have to worry about the underlying complexities. And we've said that, in order to make that a reality, you have to have a super PaaS. So is that essentially what you're doing? You're building your product on top of that? You're not worrying about, okay, now I'm going to go to Azure, I'm going to go to AWS, or I'm going to go to, wherever, is that a right way to think about it? >> That's exactly right. And I think, Snowflake has really helped us, kind of shift the paradigm in how we work with our customers, and enabled us to bring our capabilities to where their data lives, right? And enabled them to, kind of run the analytics, and run the identity resolution where their data sits. And so that's really exciting. And I think, specifically with the Native Application Framework, Snowflake delivered on the promise of minimizing data movement, right? The application is installed. You don't have to move your data at all. And so for us, that was a really compelling reason to build into it. And we love when our customers can maintain control of their data. >> So the difference between what you are doing as partners, and a SaaS, is that, you're not worrying about all the capabilities, there in the data, all the governance, and the security components. You're relying on the Data Cloud for that, is that right? Or is it a SaaS? >> Yeah, I think there's components, like certainly parts of our business still run in the SaaS model. But I think the ability to rely on some of the infrastructure that Snowflake provides, and honestly kind of the connectivity, and the verticalized solutions that Snowflake brings to bear with data providers, and technology providers, that matter most to that vertical, really enable us to kind of rely on some of that to ensure that we can serve our customers as they want us to. >> So you're extending your SaaS platform and bringing new capabilities, as opposed to building, or are you building new apps in the Data Cloud? This is, I'm sorry to be so pedantic, but I'm trying to understand from your perspective. >> Oh yeah, so we built new capabilities within the Data Cloud. It's based on our core identity infrastructure capabilities, but we wanted to build into the Native Application Framework, so that data doesn't have to move and we can serve our customers, and they can maintain control over their data in their environment. So we built new capabilities, but it's all based on our core identity infrastructure. >> So safe sharing reminds me of like when procurement says, do we have an MSA? Yes, okay, go. You know, it's just frictionless. Versus no, okay, send some paper, go back and forth and it just takes forever. >> That's one of the big goals that we see. And to your point on, is it a PaaS, is it a SaaS? We honestly think of it as something a little bit different, in a similar way to where, at Snowflake we saw a whole generation of SaaS business models, and as a utility, and a consumption-based model, we think of ourselves as different from a SaaS business model. We're now trying to enable application providers, like LiveRamp, to take the core technology in IP that they've built over many, many years, but deliver it in a completely new different way that wasn't possible. And so part of this is extending what they're doing, and making it a little easier to deploy, and not having to go through the MSA process in the same way. But also we do think that this will allow entirely new capabilities to be brought that wouldn't be possible, unless they could be deployed and run inside the Data Cloud. >> Is LiveRamp a consumption pricing model, or is it a subscription, or a combo? >> We are actually a subscription, but with some usage capabilities. >> It's an hybrid. >> Chris, talk a little bit about the framework that you guys have both discussed. How is it part of the overall Snowflake vision of delivering secure and governed, powerful analytics, and data sharing to customers, and ecosystem partners? >> So this, for us we view this as kind of the next evolution of Snowflake. So Snowflake was all built on helping people consolidate their data, bring all your data into one place and then run all of your different workloads on it. And what we've seen over the years is, there are still a lot of different use cases, where you need to take your data out of the Data Cloud, in order to do certain different things. So we made a bunch of announcements today around machine learning, so that you don't have to take your data out to train models. And native applications is built on the idea of don't bring your data to the applications you need. Whether they're machine learning models, whether they're identity resolution, whether they're really even just analytics. Instead, take the application logic and bring that into the Data Cloud, and run it right on your data where it is. And so the big benefit of that is, I don't need copies of my data that are getting out of sync, and getting out of date. I don't need to give a copy of my data to anyone else. I get to keep it, I get to govern it. I get to secure it. I know exactly what's going on. But now, we can open this up to workloads, not just ones that Snowflake's building, but workloads that partners like LiveRamp, or anyone else is building. All those workloads can then run in a single copy of your data, in a single secure environment. >> And when you say in one place, Chris, people can get confused by that, 'cause it's really not in one place. it's the global thing that Benoit stressed this morning >> And that right, and so these, once you write a native app once, so the native app that they've written is one piece of code, one application, that now can be deployed by customers in any region, or on any cloud that they're running on without any changes at all. So to your point on the PaaS, that's where it gets very PaaS-like, because they write once to the Snowflake APIs, and now it can run literally anywhere the Snowflake runs. >> But the premise that we've put forth in supercloud is that, this is a new era. It's not multicloud. And it's consistent with a digital business, right? You're building, you've got a digital business, and this is a new value layer of a digital business. If I've got capabilities, I want to bring them to the cloud. I want to bring them to, every company's a software company, software's eating the world, data's eating software. I mean, I could go on and on and on, but it's not like 10 years ago. This is a whole new life cycle that we're just starting. Is that valid? I mean do you feel that way about LiveRamp? >> Definitely, I mean, I think it's really exciting to see all of the data connectivity that is happening. At the same time, I think the challenges still remain, right? So there are still challenges around being able to resolve your data, and being able to connect your data to a person-based view in a privacy safe way, to be able to partner with others in a data collaboration model, right? And to be able to do all of that without sharing anything from a sensitive identifier standpoint, or not having a resolved data set. And so I think you're absolutely right. There's a lot of really cool, awesome innovation happening, but the customer challenges, kind of still exist. And so that's why it's exciting to build these applications that can now solve those problems, where that data is. >> It's the cloud benefit, the heavy lifting thing, for data? 'Cause you don't have to worry about all that. You can focus on campaign ROI, or whatever new innovation that you want to bring out. >> And think about it from the end customer's perspective. They now, can come into their single environment where they have all their data, they can say, I need to match the identity, and they can pull in LiveRamp with a few clicks, and then they can say, I'm ready to take some actions on this. And they can pull in action tools with just a few more clicks. And they haven't made current marketing stack that you see. There's 20 different tools and you're schlepping data back and forth between each of them, and LiveRamp's just one stop on your journey to get this data out to where I'm actually sending emails or targeting ads. Our vision is that, all that happens on one copy of the data, each of these different tools are grabbing the parts they need, again in a secure well-governed, well-controlled way, enriching in ways that they need, taking actions that they need, pulling in other data sets that they need. But the end consumer maintains control over the data, and over the process, the entire way through. >> So one copy data. So you sometimes might make a copy, right? But you'd make as many copies as you need to, but no more, kind of thing, to paraphrase Einstein, or is that right? >> There's literally one copy of the data. So one of the nice things with Snowflake, with data sharing, and with native applications, the data is stored once in one file on disc and S3, which eventually is a disc somewhere. >> Yeah, yeah, right. >> But what can happen is, I'm really just granting permission to these different applications, to read and write from that single copy of the data. So as soon as a new customer touches my website, that immediately shows up in my data. LiveRamp gets access to that instantly. They enrich it. Before I've even noticed that that new customer signed up, the data's already been enriched, the identity's been matched, and they're already put into a bucket about what campaign I should run against them. >> So the data stays where it is. You bring the ISO compute, but the application. And then you take the results, right? And then I can read them back? >> You bring the next application, right to that same copy of the data. So what'll happen is you'll have a view that LiveRamp is accessing and reading and making changes on, LiveRamp is exposing its own view, I have another application reading from the LiveRamp view, exposing its own view. And ultimately someone's taking an action based on that. But there's one copy of the data all the way through. That's the really powerful thing. >> Okay, so yeah, so you're not moving the data. So you're not dealing with latency problems, but I can, if I'm in Australia and I'm running on US West, it's not a problem? >> Yes, so there, if you do want to run across different clouds, we will copy the data in that case, we've found it's much faster. >> Okay, great, I thought I was losing my mind. >> No, but as long as you're staying within a single region, there will be no copies of the data. >> Yeah, okay, totally makes sense, great. >> One of the efficiency there in speed to be able to get the insights. That's what it's all about, being able to turn the volume up on the data from a value perspective. Thanks so much guys for joining us on the program today talking about what LiveRamp and Snowflake are doing together and breaking down the Snowflake Native Application Framework. We appreciate your insights and your time, And thanks for joining us. >> Thank you both. >> Thank you guys. >> Thank you. >> For our guests, and Dave Vellante, I'm Lisa Martin. You're watching theCUBE Live from Snowflake Summit 22 from Las Vegas. We'll be right back with our next guest. (upbeat music)

Published Date : Jun 14 2022

SUMMARY :

that has come out of the show news today. and built into the Native Chris, talk to us about, and is able to access their data, and be able to deliver those Okay, and the supercloud and run the identity resolution and the security components. and honestly kind of the connectivity, apps in the Data Cloud? so that data doesn't have to move and it just takes forever. and run inside the Data Cloud. but with some usage capabilities. and data sharing to customers, and bring that into the Data Cloud, it's the global thing that So to your point on the PaaS, But the premise that we've put forth And to be able to do all of It's the cloud benefit, and over the process, to paraphrase Einstein, So one of the nice things with Snowflake, from that single copy of the data. So the data stays where it is. right to that same copy of the data. and I'm running on US West, Yes, so there, if you do want to run I was losing my mind. No, but as long as you're One of the efficiency there in speed We'll be right back with our next guest.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

Dave VellantePERSON

0.99+

Lisa MartinPERSON

0.99+

ChrisPERSON

0.99+

AustraliaLOCATION

0.99+

Chris ChildPERSON

0.99+

Lisa CramerPERSON

0.99+

VegasLOCATION

0.99+

Las VegasLOCATION

0.99+

LisaPERSON

0.99+

LiveRampORGANIZATION

0.99+

EinsteinPERSON

0.99+

Chris ChildPERSON

0.99+

BenoitPERSON

0.99+

one copyQUANTITY

0.99+

SnowflakeORGANIZATION

0.99+

AWSORGANIZATION

0.99+

20 different toolsQUANTITY

0.99+

Snowflake Summit 22EVENT

0.99+

eachQUANTITY

0.99+

one applicationQUANTITY

0.99+

one fileQUANTITY

0.99+

bothQUANTITY

0.98+

US WestLOCATION

0.98+

todayDATE

0.98+

Data CloudTITLE

0.98+

theCUBEORGANIZATION

0.97+

Snowflake SummitEVENT

0.97+

single copyQUANTITY

0.97+

second capabilityQUANTITY

0.97+

LiveRampTITLE

0.96+

Native Application FrameworkTITLE

0.96+

SnowflakeTITLE

0.95+

Snowflake Summit 2022EVENT

0.95+

PaaSTITLE

0.95+

one stopQUANTITY

0.95+

oneQUANTITY

0.94+

10 years agoDATE

0.93+

Native Application FrameworkTITLE

0.93+

this morningDATE

0.91+

one placeQUANTITY

0.9+

two initial productsQUANTITY

0.88+

onceQUANTITY

0.87+

single regionQUANTITY

0.86+

single environmentQUANTITY

0.82+

single secure environmentQUANTITY

0.79+

couple of guestsQUANTITY

0.73+

one piece of codeQUANTITY

0.73+

OneQUANTITY

0.71+

S3TITLE

0.7+

fourth annualQUANTITY

0.68+

Kirsten Newcomer, Red Hat | Managing Risk In The Digital Supply Chain


 

(upbeat music) >> Hello everyone, my name is Dave Vellante, and we're digging into the many facets of the software supply chain and how to better manage digital risk. I'd like to introduce Kirsten Newcomer, who is the Director of Cloud and DevSecOps Strategy at Red Hat. Hello Kirsten, welcome. >> Hello Dave, great to be here with you today. >> Let's dive right in. What technologies and practices should we be thinking about that can help improve the security posture within the software supply chain? >> So I think the most important thing for folks to think about really is adopting DevSecOps. And while organizations talk about DevSecOps, and many folks have adopted DevOps, they tend to forget the security part of DevSecOps. And so for me, DevSecOps is both DevSec, how do I shift security left into my supply chain, and SecOps which is a better understood and more common piece of the puzzle, but then closing that loop between what issues are discovered in production and feeding that back to the development team to ensure that we're really addressing that supply chain. >> Yeah I heard a stat. I don't know what the source is, I don't know if it's true, but it probably is that around 50% of the organizations in North America, don't even have a SecOps team. Now of course that probably includes a lot of smaller organizations, but the SecOps team, they're not doing DevSecOps, but so what are organizations doing for supply chain security today? >> Yeah, I think the most common practice, that people have adopted is vulnerability scanning. And so they will do that as part of their development process. They might do it at one particular point, they might do it at more than one point. But one of the challenges that, we see first of all, is that, that's the only security gate that they've integrated into their supply chain, into their pipeline. So they may be scanning code that they get externally, they may be scanning their own code. But the second challenge is that the results take so much work to triage. This is static vulnerability scanning. You get information that is not in full context, because you don't know whether a vulnerability is truly exploitable, unless you know how exposed that particular part of the code is to the internet, for example, or to other aspects. And so it's just a real challenge for organizations, who are only looking at static vulnerability data, to figure out what the right steps to take are to manage those. And there's no way we're going to wind up with zero vulnerabilities, in the code that we're all working with today. Things just move too quickly. >> Is that idea of vulnerability scanning, is it almost like sampling where you may or may not find the weakest link? >> I would say that it's more comprehensive than that. The vulnerability scanners that are available, are generally pretty strong, but they are, again, if it's a static environment, a lot of them rely on NVD database, which typically it's going to give you the worst case scenario, and by nature can't account for things like, was the software that you're scanning built with controls, mitigations built in. It's just going to tell you, this is the package, and this is the known vulnerabilities associated with that package. It's not going to tell you whether there were compiler time flags, that may be mitigated that vulnerability. And so it's almost overwhelming for organizations, to prioritize that information, and really understand it in context. And so when I think about the closed loop feedback, you really want not just that static scan, but also analysis that takes into account, the configuration of the application, and the runtime environment and any mitigations that might be present there. >> I see, thank you for that. So, given that this digital risk and software supply chains are now front and center, we read about them all the time now, how do you think organizations are responding? What's the future of software supply chain going to look like? >> That's a great one. So I think organizations are scrambling. We've certainly at Red Hat, We've seen an increase in questions, about Red Hat's own supply chain security, and we've got lots of information that we can share and make available. But I think also we're starting to see, this strong increased interest, in security bill of materials. So I actually started working with, automation and standards around security bill of materials, a number of years ago. I participated in The Linux Foundation, SPDX project. There are other projects like CycloneDX. But I think all organizations are going to need to, those of us who deliver software, we're going to need to provide S-bombs and consumers of our software should be looking for S-bombs, to help them understand, to build transparency across the projects. And to facilitate that automation, you can leverage the data, in a software package list, to get a quick view of vulnerabilities. Again, you don't have that runtime context yet, but it saves you that step, perhaps of having to do the initial scanning. And then there are additional things that folks are looking at. Attested pipelines is going to be key, for building your custom software. As you pull the code in and your developers build their solutions, their applications, being able to vet the steps in your pipeline, and attest that nothing has happened in that pipeline, is really going to be key. >> So the software bill of materials is going to give you, a granular picture of your software, and then what the chain of, providence if you will or? >> Well, an S-bomb depending on the format, an S-bomb absolutely can provide a chain of providence. But another thing when we think about it, from the security angles, so there's the providence, where did this come from? Who provided it to me? But also with that bill of materials, that list of packages, you can leverage tooling, that will give you information about vulnerability information about those packages. At Red Hat we don't think that vulnerability info should be included in the S-bomb, because vulnerability data changes everyday. But, it saves you a step potentially. Then you don't necessarily have to be so concerned about doing the scan, you can pull data about known vulnerabilities for those packages without a scan. Similarly the attestation in the pipeline, that's about things like ensuring that, the code that you pull into your pipeline is signed. Signatures are in many ways of more important piece for defining providence and getting trust. >> Got it. So I was talking to Asiso the other day, and was asking her okay, what are your main challenges, kind of the standard analyst questions, if you will. She said look, I got great people, but I just don't have enough depth of talent, to handle, the challenges I'm always sort of playing catch up. That leads one to the conclusion, okay, automation is potentially an answer to address that problem, but the same time, people have said to me, sometimes we put too much faith in automation. some say okay, hey Kirsten help me square the circle. I want to automate because I lack the talent, but it's not, it's not sufficient. What are your thoughts on automation? >> So I think in the world we're in today, especially with cloud native applications, you can't manage without automation, because things are moving too quickly. So I think the way that you assess whether automation is meeting your goals becomes critical. And so looking for external guidance, such as the NIST's Secure Software Development Framework, that can help. But again, when we come back, I think, look for an opinionated position from the vendors, from the folks you're working with, from your advisors, on what are the appropriate set of gates. And we've talked about vulnerability scanning, but analyzing the configed data for your apps it's just as important. And so I think we have to work together as an industry, to figure out what are the key security gates, how do we audit the automation, so that I can validate that automation and be comfortable, that it is actually meeting the needs. But I don't see how we move forward without automation. >> Excellent. Thank you. We were forced into digital, without a lot of thought. Some folks, it's a spectrum, some organizations are better shape than others, but many had to just dive right in without a lot of strategy. And now people have sat back and said, okay, let's be more planful, more thoughtful. So as you, and then of course, you've got, the supply chain hacks, et cetera. How do you think the whole narrative and the strategy is going to change? How should it change the way in which we create, maintain, consume softwares as both organizations and individuals? >> Yeah. So again, I think there's going to be, and there's already, need request for more transparency, from software vendors. This is a place where S-bombs play a role, but there's also a lot of conversation out there about zero trust. So what does that mean in, you have to have a relationship with your vendor, that provides transparency, so that you can assess the level of trust. You also have to, in your organization, determine to your point earlier about people with skills and automation. How do you trust, but verify? This is not just with your vendor, but also with your internal supply chain. So trust and verify remains key. That's been a concept that's been around for a while. Cloud native doesn't change that, but it may change the tools that we use. And we may also decide what are our trust boundaries. Are they where are we comfortable trusting? Where do we think that zero trust is more applicable place, a more applicable frame to apply? But I do think back to the automation piece, and again, it is hard for everybody to keep up. I think we have to break down silos, we have to ensure that teams are talking across those silos, so that we can leverage each other's skills. And we need to think about managing everything as code. What I like about the everything is code including security, is it does create auditability in new ways. If you're managing your infrastructure, and get Ops like approach your security policies, with a get Ops like approach, it provides visibility and auditability, and it enables your dev team to participate in new ways. >> So when you're talking about zero trust I think, okay, I can't trust users, I got to trust the verified users, machines, employees, my software, my partners. >> Yap >> Every possible connection point. >> Absolutely. And this is where both attestation and identity become key. So being able to, I mean, the SolarWinds team has done a really interesting set of things with their supply chain, after they were, in response to the hack they were dealing with. They're now using Tekton CD chains, to ensure that they have, attested every step in their supply chain process, and that they can replicate that with automation. So they're doing a combination of, yep. We've got humans who need to interact with the chain, and then we can validate every step in that chain. And then workload identity, is a key thing for us to think about too. So how do we assert identity for the workloads that are being deployed to the cloud and verify whether that's with SPIFFE SPIRE, or related projects verify, that the workload is the one that we meant to deploy and also runtime behavioral analysis. I know we've been talking about supply chain, but again, I think we have to do this closed loop. You can't just think about shifting security left. And I know you mentioned earlier, a lot of teams don't have SecOps, but there are solutions available, that help assess the behavior and runtime, and that information can be fed back to the app dev team, to help them adjust and verify and validate. Where do I need to tighten my security? >> Am glad you brought up the SolarWinds to Kirsten what they're doing. And as I remember after 911, everyone was afraid to fly, but it was probably the safest time in history to fly. And so same analogy here. SolarWinds probably has learned more about this and its reputation took a huge hit. But if you had to compare, what SolarWinds has learned and applied, at the speed at which they've done it with maybe, some other software suppliers, you might find that they've actually done a better job. It's just, unfortunately, that something hit that we never saw before. To me it was Stuxnet, like we'd never seen anything like this before, and then boom, we've entered a whole new era. I'll give you the last word Kirsten. >> No just to agree with you. And I think, again, as an industry, it's pushed us all to think harder and more carefully about where do we need to improve? What tools do we need to build to help ourselves? Again, S-bombs have been around, for a good 10 years or so, but they are enjoying a resurgence of importance signing, image signing, manifest signing. That's been around for ages, but we haven't made it easy to integrate that into the supply chain, and that's work that's happening today. Similarly that attestation of a supply chain, of a pipeline that's happening. So I think as a industry, we've all recognized, that we need to step up, and there's a lot of creative energy going into improving in this space. >> Excellent Kirsten Newcomer, thanks so much for your perspectives. Excellent conversation. >> My pleasure, thanks so much. >> You're welcome. And you're watching theCUBE, the leader in tech coverage. (soft music)

Published Date : Feb 15 2022

SUMMARY :

and how to better manage digital risk. Hello Dave, great to that can help improve the security posture and more common piece of the puzzle, that around 50% of the that particular part of the code It's not going to tell you going to look like? And to facilitate that automation, the code that you pull into but the same time, people have said to me, that it is actually meeting the needs. and the strategy is going to change? But I do think back to the to trust the verified users, that the workload is the to Kirsten what they're doing. No just to agree with you. thanks so much for your perspectives. the leader in tech coverage.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
KirstenPERSON

0.99+

Dave VellantePERSON

0.99+

Kirsten NewcomerPERSON

0.99+

DavePERSON

0.99+

NISTORGANIZATION

0.99+

oneQUANTITY

0.99+

SolarWindsORGANIZATION

0.99+

second challengeQUANTITY

0.99+

Red HatORGANIZATION

0.99+

bothQUANTITY

0.99+

TektonORGANIZATION

0.99+

North AmericaLOCATION

0.99+

10 yearsQUANTITY

0.99+

DevSecOpsTITLE

0.99+

KirPERSON

0.99+

more than one pointQUANTITY

0.98+

around 50%QUANTITY

0.98+

todayDATE

0.97+

sten NewcomerPERSON

0.97+

StuxnetPERSON

0.96+

firstQUANTITY

0.96+

DevSecTITLE

0.95+

Secure Software Development FrameworkTITLE

0.93+

SecOpsTITLE

0.9+

pointQUANTITY

0.89+

zero vulnerabilitiesQUANTITY

0.88+

zero trustQUANTITY

0.87+

AsisoORGANIZATION

0.85+

of years agoDATE

0.73+

911OTHER

0.7+

DevOpsTITLE

0.67+

CycloneDXTITLE

0.66+

OpsORGANIZATION

0.65+

SPIFFE SPIRETITLE

0.65+

DevSecOpsORGANIZATION

0.63+

theCUBEORGANIZATION

0.61+

SPDXTITLE

0.41+

LinuxORGANIZATION

0.21+

Kirsten Newcomer, Red Hat V2


 

(upbeat music) >> Hello everyone, my name is Dave Vellante, and we're digging into the many facets of the software supply chain and how to better manage digital risk. I'd like to introduce Kirsten Newcomer, who is the Director of Cloud and DevSecOps Strategy at Red Hat. Hello Kirsten, welcome. >> Hello Dave, great to be here with you today. >> Let's dive right in. What technologies and practices should we be thinking about that can help improve the security posture within the software supply chain? >> So I think the most important thing for folks to think about really is adopting DevSecOps. And while organizations talk about DevSecOps, and many folks have adopted DevOps, they tend to forget the security part of DevSecOps. And so for me, DevSecOps is both DevSec, how do I shift security left into my supply chain, and SecOps which is a better understood and more common piece of the puzzle, but then closing that loop between what issues are discovered in production and feeding that back to the development team to ensure that we're really addressing that supply chain. >> Yeah I heard a stat. I don't know what the source is, I don't know if it's true, but it probably is that around 50% of the organizations in North America, don't even have a SecOps team. Now of course that probably includes a lot of smaller organizations, but the SecOps team, they're not doing DevSecOps, but so what are organizations doing for supply chain security today? >> Yeah, I think the most common practice, that people have adopted is vulnerability scanning. And so they will do that as part of their development process. They might do it at one particular point, they might do it at more than one point. But one of the challenges that, we see first of all, is that, that's the only security gate that they've integrated into their supply chain, into their pipeline. So they may be scanning code that they get externally, they may be scanning their own code. But the second challenge is that the results take so much work to triage. This is static vulnerability scanning. You get information that is not in full context, because you don't know whether a vulnerability is truly exploitable, unless you know how exposed that particular part of the code is to the internet, for example, or to other aspects. And so it's just a real challenge for organizations, who are only looking at static vulnerability data, to figure out what the right steps to take are to manage those. And there's no way we're going to wind up with zero vulnerabilities, in the code that we're all working with today. Things just move too quickly. >> Is that idea of vulnerability scanning, is it almost like sampling where you may or may not find the weakest link? >> I would say that it's more comprehensive than that. The vulnerability scanners that are available, are generally pretty strong, but they are, again, if it's a static environment, a lot of them rely on NVD database, which typically it's going to give you the worst case scenario, and by nature can't account for things like, was the software that you're scanning built with controls, mitigations built in. It's just going to tell you, this is the package, and this is the known vulnerabilities associated with that package. It's not going to tell you whether there were compiler time flags, that may be mitigated that vulnerability. And so it's almost overwhelming for organizations, to prioritize that information, and really understand it in context. And so when I think about the closed loop feedback, you really want not just that static scan, but also analysis that takes into account, the configuration of the application, and the runtime environment and any mitigations that might be present there. >> I see, thank you for that. So, given that this digital risk and software supply chains are now front and center, we read about them all the time now, how do you think organizations are responding? What's the future of software supply chain going to look like? >> That's a great one. So I think organizations are scrambling. We've certainly at Red Hat, We've seen an increase in questions, about Red Hat's own supply chain security, and we've got lots of information that we can share and make available. But I think also we're starting to see, this strong increased interest, in security bill of materials. So I actually started working with, automation and standards around security bill of materials, a number of years ago. I participated in The Linux Foundation, SPDX project. There are other projects like CycloneDX. But I think all organizations are going to need to, those of us who deliver software, we're going to need to provide S-bombs and consumers of our software should be looking for S-bombs, to help them understand, to build transparency across the projects. And to facilitate that automation, you can leverage the data, in a software package list, to get a quick view of vulnerabilities. Again, you don't have that runtime context yet, but it saves you that step, perhaps of having to do the initial scanning. And then there are additional things that folks are looking at. Attested pipelines is going to be key, for building your custom software. As you pull the code in and your developers build their solutions, their applications, being able to vet the steps in your pipeline, and attest that nothing has happened in that pipeline, is really going to be key. >> So the software bill of materials is going to give you, a granular picture of your software, and then what the chain of, providence if you will or? >> Well, an S-bomb depending on the format, an S-bomb absolutely can provide a chain of providence. But another thing when we think about it, from the security angles, so there's the providence, where did this come from? Who provided it to me? But also with that bill of materials, that list of packages, you can leverage tooling, that will give you information about vulnerability information about those packages. At Red Hat we don't think that vulnerability info should be included in the S-bomb, because vulnerability data changes everyday. But, it saves you a step potentially. Then you don't necessarily have to be so concerned about doing the scan, you can pull data about known vulnerabilities for those packages without a scan. Similarly the attestation in the pipeline, that's about things like ensuring that, the code that you pull into your pipeline is signed. Signatures are in many ways of more important piece for defining providence and getting trust. >> Got it. So I was talking to Asiso the other day, and was asking her okay, what are your main challenges, kind of the standard analyst questions, if you will. She said look, I got great people, but I just don't have enough depth of talent, to handle, the challenges I'm always sort of playing catch up. That leads one to the conclusion, okay, automation is potentially an answer to address that problem, but the same time, people have said to me, sometimes we put too much faith in automation. some say okay, hey Kirsten help me square the circle. I want to automate because I lack the talent, but it's not, it's not sufficient. What are your thoughts on automation? >> So I think in the world we're in today, especially with cloud native applications, you can't manage without automation, because things are moving too quickly. So I think the way that you assess whether automation is meeting your goals becomes critical. And so looking for external guidance, such as the NIST's Secure Software Development Framework, that can help. But again, when we come back, I think, look for an opinionated position from the vendors, from the folks you're working with, from your advisors, on what are the appropriate set of gates. And we've talked about vulnerability scanning, but analyzing the configed data for your apps it's just as important. And so I think we have to work together as an industry, to figure out what are the key security gates, how do we audit the automation, so that I can validate that automation and be comfortable, that it is actually meeting the needs. But I don't see how we move forward without automation. >> Excellent. Thank you. We were forced into digital, without a lot of thought. Some folks, it's a spectrum, some organizations are better shape than others, but many had to just dive right in without a lot of strategy. And now people have sat back and said, okay, let's be more planful, more thoughtful. So as you, and then of course, you've got, the supply chain hacks, et cetera. How do you think the whole narrative and the strategy is going to change? How should it change the way in which we create, maintain, consume softwares as both organizations and individuals? >> Yeah. So again, I think there's going to be, and there's already, need request for more transparency, from software vendors. This is a place where S-bombs play a role, but there's also a lot of conversation out there about zero trust. So what does that mean in, you have to have a relationship with your vendor, that provides transparency, so that you can assess the level of trust. You also have to, in your organization, determine to your point earlier about people with skills and automation. How do you trust, but verify? This is not just with your vendor, but also with your internal supply chain. So trust and verify remains key. That's been a concept that's been around for a while. Cloud native doesn't change that, but it may change the tools that we use. And we may also decide what are our trust boundaries. Are they where are we comfortable trusting? Where do we think that zero trust is more applicable place, a more applicable frame to apply? But I do think back to the automation piece, and again, it is hard for everybody to keep up. I think we have to break down silos, we have to ensure that teams are talking across those silos, so that we can leverage each other's skills. And we need to think about managing everything as code. What I like about the everything is code including security, is it does create auditability in new ways. If you're managing your infrastructure, and get Ops like approach your security policies, with a get Ops like approach, it provides visibility and auditability, and it enables your dev team to participate in new ways. >> So when you're talking about zero trust I think, okay, I can't trust users, I got to trust the verified users, machines, employees, my software, my partners. >> Yap >> Every possible connection point. >> Absolutely. And this is where both attestation and identity become key. So being able to, I mean, the SolarWinds team has done a really interesting set of things with their supply chain, after they were, in response to the hack they were dealing with. They're now using Tekton CD chains, to ensure that they have, attested every step in their supply chain process, and that they can replicate that with automation. So they're doing a combination of, yep. We've got humans who need to interact with the chain, and then we can validate every step in that chain. And then workload identity, is a key thing for us to think about too. So how do we assert identity for the workloads that are being deployed to the cloud and verify whether that's with SPIFFE SPIRE, or related projects verify, that the workload is the one that we meant to deploy and also runtime behavioral analysis. I know we've been talking about supply chain, but again, I think we have to do this closed loop. You can't just think about shifting security left. And I know you mentioned earlier, a lot of teams don't have SecOps, but there are solutions available, that help assess the behavior and runtime, and that information can be fed back to the app dev team, to help them adjust and verify and validate. Where do I need to tighten my security? >> Am glad you brought up the SolarWinds to Kirsten what they're doing. And as I remember after 911, everyone was afraid to fly, but it was probably the safest time in history to fly. And so same analogy here. SolarWinds probably has learned more about this and its reputation took a huge hit. But if you had to compare, what SolarWinds has learned and applied, at the speed at which they've done it with maybe, some other software suppliers, you might find that they've actually done a better job. It's just, unfortunately, that something hit that we never saw before. To me it was Stuxnet, like we'd never seen anything like this before, and then boom, we've entered a whole new era. I'll give you the last word Kirsten. >> No just to agree with you. And I think, again, as an industry, it's pushed us all to think harder and more carefully about where do we need to improve? What tools do we need to build to help ourselves? Again, S-bombs have been around, for a good 10 years or so, but they are enjoying a resurgence of importance signing, image signing, manifest signing. That's been around for ages, but we haven't made it easy to integrate that into the supply chain, and that's work that's happening today. Similarly that attestation of a supply chain, of a pipeline that's happening. So I think as a industry, we've all recognized, that we need to step up, and there's a lot of creative energy going into improving in this space. >> Excellent Kirsten Newcomer, thanks so much for your perspectives. Excellent conversation. >> My pleasure, thanks so much. >> You're welcome. And you're watching theCUBE, the leader in tech coverage. (soft music)

Published Date : Dec 16 2021

SUMMARY :

and how to better manage digital risk. Hello Dave, great to that can help improve the security posture and more common piece of the puzzle, that around 50% of the that particular part of the code It's not going to tell you going to look like? And to facilitate that automation, the code that you pull into but the same time, people have said to me, that it is actually meeting the needs. and the strategy is going to change? But I do think back to the to trust the verified users, that the workload is the to Kirsten what they're doing. No just to agree with you. thanks so much for your perspectives. the leader in tech coverage.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
KirstenPERSON

0.99+

Dave VellantePERSON

0.99+

Kirsten NewcomerPERSON

0.99+

DavePERSON

0.99+

NISTORGANIZATION

0.99+

oneQUANTITY

0.99+

SolarWindsORGANIZATION

0.99+

second challengeQUANTITY

0.99+

Red HatORGANIZATION

0.99+

bothQUANTITY

0.99+

TektonORGANIZATION

0.99+

North AmericaLOCATION

0.99+

10 yearsQUANTITY

0.99+

DevSecOpsTITLE

0.99+

KirPERSON

0.99+

more than one pointQUANTITY

0.98+

around 50%QUANTITY

0.98+

todayDATE

0.97+

StuxnetPERSON

0.96+

firstQUANTITY

0.96+

DevSecTITLE

0.95+

Secure Software Development FrameworkTITLE

0.93+

SecOpsTITLE

0.9+

pointQUANTITY

0.89+

zero vulnerabilitiesQUANTITY

0.88+

zero trustQUANTITY

0.87+

AsisoORGANIZATION

0.85+

sten NewcomerPERSON

0.82+

of years agoDATE

0.73+

911OTHER

0.7+

DevOpsTITLE

0.67+

CycloneDXTITLE

0.66+

OpsORGANIZATION

0.65+

SPIFFE SPIRETITLE

0.65+

DevSecOpsORGANIZATION

0.63+

theCUBEORGANIZATION

0.61+

SPDXTITLE

0.41+

LinuxORGANIZATION

0.21+

Kirsten Newcomer, Red Hat


 

(upbeat music) >> Hello everyone, my name is Dave Vellante, and we're digging into the many facets of the software supply chain and how to better manage digital risk. I'd like to introduce Kirsten Newcomer, who is the Director of Cloud and DevSecOps Strategy at Red Hat. Hello Kirsten, welcome. >> Hello Dave, great to be here with you today. >> Let's dive right in. What technologies and practices should we be thinking about that can help improve the security posture within the software supply chain? >> So I think the most important thing for folks to think about really is adopting DevSecOps. And while organizations talk about DevSecOps, and many folks have adopted DevOps, they tend to forget the security part of DevSecOps. And so for me, DevSecOps is both DevSec, how do I shift security left into my supply chain, and SecOps which is a better understood and more common piece of the puzzle, but then closing that loop between what issues are discovered in production and feeding that back to the development team to ensure that we're really addressing that supply chain. >> Yeah I heard a stat. I don't know what the source is, I don't know if it's true, but it probably is that around 50% of the organizations in North America, don't even have a SecOps team. Now of course that probably includes a lot of smaller organizations, but the SecOps team, they're not doing DevSecOps, but so what are organizations doing for supply chain security today? >> Yeah, I think the most common practice, that people have adopted is vulnerability scanning. And so they will do that as part of their development process. They might do it at one particular point, they might do it at more than one point. But one of the challenges that, we see first of all, is that, that's the only security gate that they've integrated into their supply chain, into their pipeline. So they may be scanning code that they get externally, they may be scanning their own code. But the second challenge is that the results take so much work to triage. This is static vulnerability scanning. You get information that is not in full context, because you don't know whether a vulnerability is truly exploitable, unless you know how exposed that particular part of the code is to the internet, for example, or to other aspects. And so it's just a real challenge for organizations, who are only looking at static vulnerability data, to figure out what the right steps to take are to manage those. And there's no way we're going to wind up with zero vulnerabilities, in the code that we're all working with today. Things just move too quickly. >> Is that idea of vulnerability scanning, is it almost like sampling where you may or may not find the weakest link? >> I would say that it's more comprehensive than that. The vulnerability scanners that are available, are generally pretty strong, but they are, again, if it's a static environment, a lot of them rely on NVD database, which typically it's going to give you the worst case scenario, and by nature can't account for things like, was the software that you're scanning built with controls, mitigations built in. It's just going to tell you, this is the package, and this is the known vulnerabilities associated with that package. It's not going to tell you whether there were compiler time flags, that may be mitigated that vulnerability. And so it's almost overwhelming for organizations, to prioritize that information, and really understand it in context. And so when I think about the closed loop feedback, you really want not just that static scan, but also analysis that takes into account, the configuration of the application, and the runtime environment and any mitigations that might be present there. >> I see, thank you for that. So, given that this digital risk and software supply chains are now front and center, we read about them all the time now, how do you think organizations are responding? What's the future of software supply chain going to look like? >> That's a great one. So I think organizations are scrambling. We've certainly at Red Hat, We've seen an increase in questions, about Red Hat's own supply chain security, and we've got lots of information that we can share and make available. But I think also we're starting to see, this strong increased interest, in security bill of materials. So I actually started working with, automation and standards around security bill of materials, a number of years ago. I participated in The Linux Foundation, SPDX project. There are other projects like CycloneDX. But I think all organizations are going to need to, those of us who deliver software, we're going to need to provide S-bombs and consumers of our software should be looking for S-bombs, to help them understand, to build transparency across the projects. And to facilitate that automation, you can leverage the data, in a software package list, to get a quick view of vulnerabilities. Again, you don't have that runtime context yet, but it saves you that step, perhaps of having to do the initial scanning. And then there are additional things that folks are looking at. Attested pipelines is going to be key, for building your custom software. As you pull the code in and your developers build their solutions, their applications, being able to vet the steps in your pipeline, and attest that nothing has happened in that pipeline, is really going to be key. >> So the software bill of materials is going to give you, a granular picture of your software, and then what the chain of, providence if you will or? >> Well, an S-bomb depending on the format, an S-bomb absolutely can provide a chain of providence. But another thing when we think about it, from the security angles, so there's the providence, where did this come from? Who provided it to me? But also with that bill of materials, that list of packages, you can leverage tooling, that will give you information about vulnerability information about those packages. At Red Hat we don't think that vulnerability info should be included in the S-bomb, because vulnerability data changes everyday. But, it saves you a step potentially. Then you don't necessarily have to be so concerned about doing the scan, you can pull data about known vulnerabilities for those packages without a scan. Similarly the attestation in the pipeline, that's about things like ensuring that, the code that you pull into your pipeline is signed. Signatures are in many ways of more important piece for defining providence and getting trust. >> Got it. So I was talking to Asiso the other day, and was asking her okay, what are your main challenges, kind of the standard analyst questions, if you will. She said look, I got great people, but I just don't have enough depth of talent, to handle, the challenges I'm always sort of playing catch up. That leads one to the conclusion, okay, automation is potentially an answer to address that problem, but the same time, people have said to me, sometimes we put too much faith in automation. some say okay, hey Kirsten help me square the circle. I want to automate because I lack the talent, but it's not, it's not sufficient. What are your thoughts on automation? >> So I think in the world we're in today, especially with cloud native applications, you can't manage without automation, because things are moving too quickly. So I think the way that you assess whether automation is meeting your goals becomes critical. And so looking for external guidance, such as the NIST's Secure Software Development Framework, that can help. But again, when we come back, I think, look for an opinionated position from the vendors, from the folks you're working with, from your advisors, on what are the appropriate set of gates. And we've talked about vulnerability scanning, but analyzing the configed data for your apps it's just as important. And so I think we have to work together as an industry, to figure out what are the key security gates, how do we audit the automation, so that I can validate that automation and be comfortable, that it is actually meeting the needs. But I don't see how we move forward without automation. >> Excellent. Thank you. We were forced into digital, without a lot of thought. Some folks, it's a spectrum, some organizations are better shape than others, but many had to just dive right in without a lot of strategy. And now people have sat back and said, okay, let's be more planful, more thoughtful. So as you, and then of course, you've got, the supply chain hacks, et cetera. How do you think the whole narrative and the strategy is going to change? How should it change the way in which we create, maintain, consume softwares as both organizations and individuals? >> Yeah. So again, I think there's going to be, and there's already, need request for more transparency, from software vendors. This is a place where S-bombs play a role, but there's also a lot of conversation out there about zero trust. So what does that mean in, you have to have a relationship with your vendor, that provides transparency, so that you can assess the level of trust. You also have to, in your organization, determine to your point earlier about people with skills and automation. How do you trust, but verify? This is not just with your vendor, but also with your internal supply chain. So trust and verify remains key. That's been a concept that's been around for a while. Cloud native doesn't change that, but it may change the tools that we use. And we may also decide what are our trust boundaries. Are they where are we comfortable trusting? Where do we think that zero trust is more applicable place, a more applicable frame to apply? But I do think back to the automation piece, and again, it is hard for everybody to keep up. I think we have to break down silos, we have to ensure that teams are talking across those silos, so that we can leverage each other's skills. And we need to think about managing everything as code. What I like about the everything is code including security, is it does create auditability in new ways. If you're managing your infrastructure, and get Ops like approach your security policies, with a get Ops like approach, it provides visibility and auditability, and it enables your dev team to participate in new ways. >> So when you're talking about zero trust I think, okay, I can't trust users, I got to trust the verified users, machines, employees, my software, my partners. >> Yap >> Every possible connection point. >> Absolutely. And this is where both attestation and identity become key. So being able to, I mean, the SolarWinds team has done a really interesting set of things with their supply chain, after they were, in response to the hack they were dealing with. They're now using Tekton CD chains, to ensure that they have, attested every step in their supply chain process, and that they can replicate that with automation. So they're doing a combination of, yep. We've got humans who need to interact with the chain, and then we can validate every step in that chain. And then workload identity, is a key thing for us to think about too. So how do we assert identity for the workloads that are being deployed to the cloud and verify whether that's with SPIFFE SPIRE, or related projects verify, that the workload is the one that we meant to deploy and also runtime behavioral analysis. I know we've been talking about supply chain, but again, I think we have to do this closed loop. You can't just think about shifting security left. And I know you mentioned earlier, a lot of teams don't have SecOps, but there are solutions available, that help assess the behavior and runtime, and that information can be fed back to the app dev team, to help them adjust and verify and validate. Where do I need to tighten my security? >> Am glad you brought up the SolarWinds to Kirsten what they're doing. And as I remember after 911, everyone was afraid to fly, but it was probably the safest time in history to fly. And so same analogy here. SolarWinds probably has learned more about this and its reputation took a huge hit. But if you had to compare, what SolarWinds has learned and applied, at the speed at which they've done it with maybe, some other software suppliers, you might find that they've actually done a better job. It's just, unfortunately, that something hit that we never saw before. To me it was Stuxnet, like we'd never seen anything like this before, and then boom, we've entered a whole new era. I'll give you the last word Kirsten. >> No just to agree with you. And I think, again, as an industry, it's pushed us all to think harder and more carefully about where do we need to improve? What tools do we need to build to help ourselves? Again, S-bombs have been around, for a good 10 years or so, but they are enjoying a resurgence of importance signing, image signing, manifest signing. That's been around for ages, but we haven't made it easy to integrate that into the supply chain, and that's work that's happening today. Similarly that attestation of a supply chain, of a pipeline that's happening. So I think as a industry, we've all recognized, that we need to step up, and there's a lot of creative energy going into improving in this space. >> Excellent Kirsten Newcomer, thanks so much for your perspectives. Excellent conversation. >> My pleasure, thanks so much. >> You're welcome. And you're watching theCUBE, the leader in tech coverage. (soft music)

Published Date : Dec 15 2021

SUMMARY :

and how to better manage digital risk. Hello Dave, great to that can help improve the security posture and more common piece of the puzzle, that around 50% of the that particular part of the code It's not going to tell you going to look like? And to facilitate that automation, the code that you pull into but the same time, people have said to me, that it is actually meeting the needs. and the strategy is going to change? But I do think back to the to trust the verified users, that the workload is the to Kirsten what they're doing. No just to agree with you. thanks so much for your perspectives. the leader in tech coverage.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
KirstenPERSON

0.99+

Dave VellantePERSON

0.99+

Kirsten NewcomerPERSON

0.99+

DavePERSON

0.99+

NISTORGANIZATION

0.99+

oneQUANTITY

0.99+

SolarWindsORGANIZATION

0.99+

second challengeQUANTITY

0.99+

Red HatORGANIZATION

0.99+

bothQUANTITY

0.99+

TektonORGANIZATION

0.99+

North AmericaLOCATION

0.99+

10 yearsQUANTITY

0.99+

DevSecOpsTITLE

0.99+

KirPERSON

0.99+

more than one pointQUANTITY

0.98+

around 50%QUANTITY

0.98+

todayDATE

0.97+

StuxnetPERSON

0.96+

firstQUANTITY

0.96+

DevSecTITLE

0.95+

Secure Software Development FrameworkTITLE

0.93+

SecOpsTITLE

0.9+

pointQUANTITY

0.89+

zero vulnerabilitiesQUANTITY

0.88+

zero trustQUANTITY

0.87+

AsisoORGANIZATION

0.85+

sten NewcomerPERSON

0.74+

of years agoDATE

0.73+

911OTHER

0.7+

DevOpsTITLE

0.67+

CycloneDXTITLE

0.66+

OpsORGANIZATION

0.65+

SPIFFE SPIRETITLE

0.65+

DevSecOpsORGANIZATION

0.63+

theCUBEORGANIZATION

0.61+

SPDXTITLE

0.41+

LinuxORGANIZATION

0.21+

Clayton Coleman, Red Hat | KubeCon + CloudNative Con NA 2021


 

>>welcome back everyone to the cube con cloud, David Kahn coverage. I'm john for a host of the cube, we're here in person, 2020 20 a real event, it's a hybrid event, we're streaming live to you with all the great coverage and guests coming on next three days. Clayton Coleman's chief Hybrid cloud architect for Red Hat is joining me here to go over viewers talk but also talk about hybrid cloud. Multi cloud where it's all going road red hats doing great to see you thanks coming on. It's a pleasure to be >>back. It's a pleasure to be back in cuba con. >>Uh it's an honor to have you on as a chief architect at Red Hat on hybrid cloud. It is the hottest area in the market right now. The biggest story we were back in person. That's the biggest story here. The second biggest story, that's the most important story is hybrid cloud. And what does it mean for multi cloud, this is a key trend. You just gave a talk here. What's your take on it? You >>know, I, I like to summarize hybrid cloud as the answer to. It's really the summarization of yes please more of everything, which is, we don't have one of anything. Nobody has got any kind of real footprint is single cloud. They're not single framework, they're not single language, they're not single application server, they're not single container platform, they're not single VM technology. And so, um, and then, you know, looking around here in this, uh, partner space where eight years into kubernetes and there is an enormous ecosystem of tools, technologies, capabilities, add ons, plug ins components that make our applications better. Um the modern application landscape is so huge that I think that's what hybrid really is is it's we've got all these places to run stuff more than ever and we've got all this stuff to run more than ever and it doesn't slow down. So how do we bring sanity to that? How do we understand it? Bring it together and companies has been a big part of that, like it unlocked some of that. What's the next step? >>Yeah, that's a great, great commentary. I want to take into the kubernetes piece but you know, as we've been reporting the digital transformation at all time, high speed is the number one request. People want to go faster, not just speeds and feeds, but like ship code fast to build apps faster. Make it all run faster and secure. Okay, check, get that. Look what we were 15, 15 years ago, 10 years ago, five years ago, 2016. The first coupe con in Seattle we were there for small events kubernetes, we gotta sell it, figure it out. Right convince people >>that it's a it's worth >>it. Yeah. So what's your take on that? Well, I mean, it's mature, it's kind of de facto standard at this point. What's missing. Where is it? >>So I think Kubernetes has succeeded at the core mission which is helping us stop worrying about all the problems that we spent endless amounts of time arguing about, how do I deploy software, How do I roll it out? But in the meantime we've added more types of software. You know, the rise of ai ml um you know, the whole the whole ecosystem around training software models like what is a what is an Ai model? Is it look like an application, does it look like a job? It's part batch, part service. Um It's spread out to the edge. We've added mobile devices. The explosion in mobile computing over the last 10 years has co evolved. And so kubernetes succeeded at that kind of set a floor for what everybody thought was an application. And in the meantime we've added all these other parts of the application. >>It's funny, you know, David Anthony, we're talking about what's to minimum and networks at red hat will be on later. Back in the first two cubicles were like, you know, this is like a TCP I P moment, the Os I model that was a killer part of the stack. Now it was all standardized below TCP I. P. Company feels like a similar kind of construct where it's unifying, is creating some enablement, It's enabling some innovation and it kind of brought everyone together at the same time everyone realized that that's real, >>the whole >>cloud native is real. And now we're in an era now where people are talking about doing things that are completely different. You mentioned as a batch job house ai new software paradigm development paradigms, not to suffer during the lifecycle, but just like software development in general is impacted. >>Absolutely. And you know, the components like, you know, we spent a lot of time talking about how to test and build application, but those are things that we all kind of internalized now we we have seen the processes is critical because it's going to be in lots of places, people are looking to standardize. But sometimes the new technology comes up alongside the side, the thing we're trying to standardize, we're like, well let's just use the new technology instead function as a service is kind of uh it came up, you know, kubernetes group K Native. And then you see, you know, the proliferation of functions as a service choices, what do people use? So there's a lot of choice and we're all building on those common layers, but everybody kind of has their own opinions, everybody's doing something subtly different. >>Let me ask you your opinion on on more under the Hood kind of complexity challenge. There's general consensus in the industry that does a lot of complexity. Okay, you don't mean debate that, but that's in a way, a good thing in the sense if you solve that, that's where innovation comes in. So the goal is to solve complexity, abstract out of the heavy lifting under heavy living in Sandy Jackson. And I would say, or abstract away complexity make things easier to use >>Well and an open source and this ecosystem is an amazing um it's one of the most effective methods we've ever found for trying every possible solution and keeping the five or six most successful and that's a little bit like developers, developers flow downhill, developers are going to do, it's easy if it's easier to put a credit card in and go to the public cloud, you're gonna do it if you can take control away from the teams at your organization that are there to protect you, but maybe aren't as responsive as you like. People will, people will go around those. And so I think a little bit of what we're trying to do is what are the commonalities that we could pick out of this ecosystem that everybody agrees on and make those the downhill path that people follow, not putting a credit card into a cloud, but offering a way for you not to think about what clouds are on until you need to write, because you want to go to the fridge is a developer, you wanna go the fridge, pull out your favorite brand of soda, that favorite band Isoda might have an AWS label also >>talk about the open shift and the Kubernetes relationship, you guys push the boundaries. Um Den is being controlled playing and nodes, these are things that you talked about in your talk, talk about because you guys made some good bets on open shift, we've been covering that, how's that playing out now? It's a relationship now >>is interesting coming into kubernetes, we came in from the platform as a service angle, right, Platform as a service was the first iteration of trying to make the lowest cost path for developers to flow to business value um and so we added things on top of kubernetes, we knew that we were going to complex, so we built in a little bit um in our structure and our way of thinking about cube that it was never going to be just that basic bare bones package that you're gonna have to make choices for people that made sense. Ah obviously as the ecosystems grown, we've tried to grow with it, we've tried to be a layer above kubernetes, we've tried to be a layer in between kubernetes, we've tried to be a layer underneath kubernetes and all of these are valid places to be. Um I think that next step is we're all kind of asking, you know, we've got all this stuff, are there any ways that we can be more efficient? So I like to think about practical benefits, what is a practical benefit That a little bit of opinion nation could bring to this ecosystem and I think it's around applications, it's being application centric, it's what is a team, 90% of the time need to be successful, they need a way to get their code out, they need to get it to the places that they wanted to be, and that place is everywhere. It's not one cloud or on premises or a data center, it's the edge, it's running as a lambda. It's running inside devices that might be being designed in this very room today. >>It's interesting. You know, you're an architect, but also the computer science industry is the people who were trained in the area are learning. It's pretty fascinating and almost intoxicating right now in this this market because you have an operating system, dynamic systems kind of programming model with distributed cloud, edge on fire, that's only gonna get more complicated with 5G and high density data applications. Um and then you've got this changing modal mode of operations were programming with bots and Ai and machine learning to new things, but it's kind of the same distributed computing paradigm. Yeah. What's your reaction to that? >>Well, and it's it's interesting. I was kind of described like layers. We've gone from Lenox replaced proprietary UNIX or mainframe to virtualization, which, and then we had a lot of Lennox, we had some windows too. And then we moved to public cloud and private cloud. We brought config management and moved to kubernetes, um we still got that. Os at the heart of what we do. We've got, uh application libraries and we've shared services and common services. I think it's interesting like to learn from Lennox's lesson, which is we want to build an open expansive ecosystem, You're kind of like kind of like what's going on. We want to pick enough opinion nation that it just works because I think just works is what, let's be honest, like we could come up with all the great theories of what the right way computers should be done, but it's gonna be what's easy, what gets people help them get their jobs done, trying to time to take that from where people are today on cube in cloud, on multiple clouds, give them just a little bit more consolidation. And I think it's a trick people or convince people by showing them how much easier it could be. >>You know, what's interesting around um, what you guys have done a red hat is that you guys have real customers are demanding, you have enterprise customers. So you have your eye on the front edge of the, of the bleeding edge, making things easier. And I think that's good enough is a good angle, but let's, let's face it, people are just lifting and shifting to the cloud now. They haven't yet re factored and re factoring is a concept of taking what you're doing in the cloud of taking advantage of new services to change the operating dynamic and value proposition of say the application. So the smart money is all going there, seeing the funding come into applications that are leveraging the new platform? Re platform and then re factoring what's your take on that because you got the edge, you have other things happening. >>There are so many more types of applications today. And it's interesting because almost all of them start with real practical problems that enterprises or growing tech companies or companies that aren't tech companies but have a very strong tech component. Right? That's the biggest transformation the last 15 years is that you can be a tech company without ever calling yourself a tech company because you have a website and you have an upset and your entire business model flows like that. So there is, I think pragmatically people are, they're okay with their footprint where it is. They're looking to consolidate their very interested in taking advantage of the scale that modern cloud offers them and they're trying to figure out how to bring all the advantages that they have in these modern technologies to these new footprints and these new form factors that they're trying to fit into, whether that's an application running on the edge next to their load bouncer in a gateway, in telco five Gs happening right now. Red hat's been really heavily involved in a telco ecosystem and it's kubernetes through and through its building on those kinds of principles. What are the concepts that help make a hybrid application, an application that spans the data flowing from a device back to the cloud, out to a Gateway processed by a big data system in a private region, someplace where computers cheap can't >>be asylum? No, absolutely not has to be distributed non siloed based >>and how do we do that and keep security? How do we help you track where your data is and who's talking to whom? Um there's a lot of, there's a lot of people here today who are helping people connect. I think that next step that contact connectivity, the knowing who's talking and how they're connecting, that'll be a fundamental part of what emerges as >>that's why I think the observe ability to me is the data is really about a data funding a new data sector of the market that's going to be addressable. I think data address ability is critical. Clayton really appreciate you coming on. And giving a perspective an expert in the field. I gotta ask you, you know, I gotta say from a personal standpoint how open source has truly been a real enabler. You look at how fast new things could come in and be adopted and vetted and things get kicked around people try stuff that fails, but it's they they build on each other. Right? So a I for example, it's just a great example of look at what machine learning and AI is going on, how fast that's been adopted. Absolutely. I don't think that would be done in open source. I have to ask you guys at red hat as you continue your mission and with IBM with that partnership, how do you see people participating with you guys? You're here, you're part of the ecosystem, big player, how you guys continue to work with the community? Take a minute to share what you're working on. >>So uh first off, it's impossible to get anything done I think in this ecosystem without being open first. Um and that's something the red at and IBM are both committed to. A lot of what I try to do is I try to map from the very complex problems that people bring to us because every problem in applications is complex at some later and you've got to have the expertise but there's so much expertise. So you got to be able to blend the experts in a particular technology, the experts in a particular problem domain like the folks who consult or contract or helped design some of these architectures or have that experience at large companies and then move on to advise others and how to proceed. And then you have to be able to take those lessons put them in technology and the technology has to go back and take that feedback. I would say my primary goal is to come to these sorts of events and to share what everyone is facing because if we as a group aren't all working at some level, there won't be the ability of those organizations to react because none of us know the whole stack, none of us know the whole set of details >>And this text changing too. I mean you got to get a reference to a side while it's more than 80s metaphor. But you know, but that changed the game on proprietary and that was like >>getting it allows us to think and to separate. You know, you want to have nice thin layers that the world on top doesn't worry about below except when you need to and below program you can make things more efficient and public cloud, open source kubernetes and the proliferation of applications on top That's happening today. I >>mean Palmer gets used to talk about the hardened top when he was the VM ware Ceo Back in 2010. Remember him saying that he says she predicted >>the whole, we >>call it the mainframe in the cloud at the time because it was a funny thing to say, but it was really a computer. I mean essentially distributed nature of the cloud. It happened. Absolutely. Clayton, thanks for coming on the Cuban sharing your insights appreciate. It was a pleasure. Thank you. Right click here on the Cuban john furry. You're here live in L A for coupon cloud native in person. It's a hybrid event was streaming Also going to the cube platform as well. Check us out there all the interviews. Three days of coverage, we'll be right back Yeah. Mm mm mm I have

Published Date : Oct 13 2021

SUMMARY :

I'm john for a host of the cube, we're here in person, It's a pleasure to be back in cuba con. Uh it's an honor to have you on as a chief architect at Red Hat on hybrid cloud. And so, um, and then, you know, looking around here in this, I want to take into the kubernetes piece but you know, as we've been reporting the digital transformation Well, I mean, it's mature, it's kind of de facto standard at this point. And in the meantime we've added all these other parts of the application. Back in the first two cubicles were like, you know, this is like a TCP I P moment, the Os I model that development paradigms, not to suffer during the lifecycle, but just like software development in general And you know, the components like, you know, we spent a lot of time talking about So the goal is to solve complexity, abstract out of the heavy lifting to think about what clouds are on until you need to write, because you want to go to the fridge is a developer, you wanna go the fridge, talk about the open shift and the Kubernetes relationship, you guys push the boundaries. Um I think that next step is we're all kind of asking, you know, we've got all this stuff, you have an operating system, dynamic systems kind of programming model with distributed cloud, and moved to kubernetes, um we still got that. You know, what's interesting around um, what you guys have done a red hat is that you guys have real customers are demanding, you have an upset and your entire business model flows like that. How do we help you track where your data is and who's talking to whom? I have to ask you guys at red hat as And then you have to be able to take those lessons put I mean you got to get a reference to a side while it's more than 80s metaphor. that the world on top doesn't worry about below except when you need to and below program you can make Remember him saying that he says she predicted I mean essentially distributed nature of the cloud.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
fiveQUANTITY

0.99+

IBMORGANIZATION

0.99+

David KahnPERSON

0.99+

David AnthonyPERSON

0.99+

ClaytonPERSON

0.99+

Red HatORGANIZATION

0.99+

2010DATE

0.99+

Red HatORGANIZATION

0.99+

SeattleLOCATION

0.99+

LenoxORGANIZATION

0.99+

sixQUANTITY

0.99+

Clayton ColemanPERSON

0.99+

90%QUANTITY

0.99+

AWSORGANIZATION

0.99+

eight yearsQUANTITY

0.99+

K NativeORGANIZATION

0.99+

five years agoDATE

0.99+

LennoxORGANIZATION

0.99+

PalmerPERSON

0.99+

firstQUANTITY

0.99+

todayDATE

0.99+

KubeConEVENT

0.99+

telcoORGANIZATION

0.99+

10 years agoDATE

0.98+

Sandy JacksonPERSON

0.98+

Three daysQUANTITY

0.98+

first two cubiclesQUANTITY

0.98+

UNIXTITLE

0.98+

oneQUANTITY

0.98+

IsodaORGANIZATION

0.97+

red hatsORGANIZATION

0.97+

five GsCOMMERCIAL_ITEM

0.97+

bothQUANTITY

0.97+

redORGANIZATION

0.96+

CloudNative ConEVENT

0.96+

more than 80sQUANTITY

0.96+

2016DATE

0.95+

johnPERSON

0.95+

CubanOTHER

0.94+

15 years agoDATE

0.93+

first iterationQUANTITY

0.92+

15DATE

0.91+

single languageQUANTITY

0.88+

single cloudQUANTITY

0.85+

KubernetesORGANIZATION

0.84+

last 15 yearsDATE

0.84+

one cloudQUANTITY

0.83+

NA 2021EVENT

0.82+

last 10 yearsDATE

0.81+

TCP I. P.ORGANIZATION

0.8+

singleQUANTITY

0.78+

second biggest storyQUANTITY

0.73+

single frameworkQUANTITY

0.7+

CeoCOMMERCIAL_ITEM

0.7+

john furryPERSON

0.69+

HoodPERSON

0.68+

lot of peopleQUANTITY

0.67+

red hatORGANIZATION

0.66+

hatORGANIZATION

0.66+

2020 20DATE

0.59+

cubaEVENT

0.59+

one requestQUANTITY

0.58+

threeQUANTITY

0.57+

daysDATE

0.52+

coupeEVENT

0.45+

5GOTHER

0.44+

DenPERSON

0.41+

con.LOCATION

0.4+

conEVENT

0.37+

cubeORGANIZATION

0.34+

Unpacking IBM's Summer 2021 Announcement | CUBEconversation


 

(soft music) >> There are many constants in the storage business, relentlessly declining cost per bit, innovations that perpetually battled the laws of physics, a seemingly endless flow of venture capital, despite the intense competition. And there's one other constant in the storage business, Eric Hertzog, and he joins us today in this CUBE video exclusive to talk about IBM's recent storage announcements. Eric, welcome back to theCUBE. >> Great, Dave, thanks very much, we love being on theCUBE and you guys do a great job of informing the industry about what's going on in storage and IT in general. >> Well, thank you for that. >> Great job. >> We're going to cover a lot of ground today. IBM Storage, made a number of announcements the past month around data resilience, a new as-a-service model, which a lot of folks are doing in the industry, you've made performance enhancements. Can you give us the top line summary of the hard news, Eric? >> Sure, the top line summary is of course cyber security is on top of mind for everybody in the recent Fortune 500 list that came out, you probably saw, there was a survey of CEOs of Fortune 500 companies, they named cybersecurity as their number one concern, not war, not pandemic, but cybersecurity. So we've got an announcement around data resilience and cyber resiliency built on our FlashSystem family with our new offering, Safeguarded Copy. And the second thing is the move to a new method of storage consumption. Storage-as-a-Service, a pay-as-you-go model, cloud-like the way people buy cloud storage, that's what you can do now from IBM Storage with our Storage-as-a-Service. Those are the key, two takeaways, Dave. >> Yeah and I want to stay on the trends that we're seeing in cyber for a moment, the work from home pivot in the hybrid work approach has really created a new exposures, people aren't as secure outside of the walled garden of the offices and we've seen a dramatic escalation in the adversaries capabilities and techniques, another least of which is island hopping, in other words, putting code fragments in the digital supply chain, they reform once they're inside the company and it's almost like this organic creepy thing that occurs. They're also living as you know, stealthily for many, many months, sometimes years, exfiltrating data, and then just waiting and then when companies respond, the incidents response trigger a ransomware incident. So they escalate the cyber crime and it's just a really, really bad situation for victims. What are you seeing in that regard and the trends? >> Well, one of the key things we see as everyone is very concerned about cybersecurity. The Biden administration has issued (indistinct) not only to the government sector, but to the private sector, cyber security is a big issue. Other governments across the world have done the same thing. So at IBM Storage, what we see is taking a comprehensive view. Many people think that cybersecurity is moat with the alligators, the castle wall and then of course the sheriff of Nottingham to catch the bad guys. And we know the sheriff of Nottingham doesn't do a good job of catching Robin Hood. So it takes a while as you just pointed out, sitting there for months or even longer. So one of the key things you need to do in an overall cybersecurity strategy is don't forget storage. Now our announcement around Safeguarded Copy is very much about rapid recovery after an attack for malware or ransomware. We have a much broader set of cyber security technology inside of IBM Storage. For example, with our FlashSystem family, we can encrypt data at rest with no performance penalty. So if someone steals that data, guess what? It's encrypted. We can do anomalous pattern detection with our backup product, Spectrum Protect Plus, why would you care? Well, if theCUBE's backup was taking two hours on particular datasets and all of a sudden it was taking four hours, Hmm maybe someone is encrypting those backup data sets. And so we notify. So what we believe at IBM is that an overarching cybersecurity strategy has to keep the bad guys out, threat detection, anomalous pattern behavior on the network, on the servers, on the storage and all of that, chasing the bad guy down once they breach the wall, 'cause that does happen, but if you don't have cyber and data resilience built into your storage technology, you are leaving a gap that the bad guys can explain, whether that be the malware ransomware guys oh by the way, Dave, there still is internal IT theft that there was a case about 10 years ago now where 10 IT guys stole $175 million. I kid you not, $175 million from a bunch of large banks across the country, and that was an internal IT theft. So between the internal IT issues that could approach you malware and ransomware, a comprehensive cybersecurity strategy, must include storage. >> So I want to ask you about come back to Safeguarded Copy and you mentioned some features and capabilities, encrypting data at rest, your anomalous pattern recognition inferring, you're taking a holistic approach, but of course you've got a storage centricity, what's different about your cyber solution? What's your unique value probability to your (indistinct) . >> Well, when you look at Safeguarded Copy, what it does is it creates immutable copies that are logically air-gapped, but logically air-gapped locally. So what that means is if you have a malware or ransomware attack and you need to do a recovery, whether it be a surgical recovery or a full-on recovery, because they attacked everything, then we can do recovery in a couple hours versus a couple of days or a couple of weeks. Now, in addition to the logical local air-gapping with Safeguarded Copy, you also could do remote logical air-gapping by snapping out to the cloud, which we also have on our FlashSystem products and you also of course, could take our FlashSystem products and back up to tape, giving you a physical air gap. In short, we give our customers three different ways to help with malware and ransomware. >> Let me ask you- >> Are air-gapped locally. >> Yeah, please continue, I'm sorry. >> So our air-gapping locally for rapid recovery, air-gapping remotely, which again, then puts it on the cloud provider network, so hopefully they can't breach that. And then clearly a physical air gap going out to tape all three and on the mainframe, we have Safeguarded Copy already, Dave and several of our mainframe customers actually do two of those things, they'll do Safeguarded Copy or rapid recovery locally, but they'll also take that Safeguarded Copy and either put it out to tape or put it out to a cloud provider with a remote logical air-gap using a snapshot. >> I want to ask you a question about management 'cause when you ask CSOs, what's your number one challenge, they'll say lack of talent, We've got all these tools and all this lack of skills to really do all this stuff. Can't hire people fast enough and they don't have the skills. So when you think about it, and so what you do is you bring a lot of automation into the orchestration and management. My question is this, when you set up air gaps, do you recommend, or what do you see in terms of not, of logically and physically not only physically separating the data, but also the management and orchestration and automation does that have to be logically air-gapped as well or can you use the same management system? What's best practice there? >> Ah, so what we do is we work with our copy management software, which will manage regular copies as well, but Safeguarded Copies are immutable. You can't write to them, you can't get rid of them and they're logically air-gapped from the local hosts. So the hosts, for the Safeguarded Copies that immutable copy, you just made, the hosts don't even know that it's there. So you manage that with our copy management software, which by the way, we'll manage regular snapshots and replicas as well, but what that allows you to do is allows you to automate, for example, you can automate recovery across multiple FlashSystem arrays, the copy services manager will allow you to set different parameters for different Safeguarded Copies. So a certain Safeguarded Copy, you could say, make me a copy every four hours. And then on another volume on a different data set, you could say, make me a copy every 12 hours. Once you set all that stuff update, it's completely automated, completely automated. >> So, I want to come back to something you mentioned about anomalous pattern recognition and how you help with threat detection. So a couple of a couple of quick multi-part question here. First of all, the backup corpus is an obvious target. So that's an area that you have to protect. And so can, and you're saying, you've used the example if your backups taking too long, but so how do you do that? What's the technology behind that? And then can you go beyond, should you go beyond just the backup corpus, with primary data or copies on-prem, et cetera? Two part questions. >> So when we look at it, the anomalous pattern detection is part of our backup software, say Spectrum Protect and what it does it uses AI-based technology, it recognizes a pattern. So it knows that the backup dataset for the queue takes two hours and it recognizes that, and it sees that as the normal state of events. So if all of a sudden that backup that theCUBE was doing used to take two hours and starts taking four, what it does is that's an anomalous pattern, it's not a normal pattern. It'll send a note to the backup admin, the storage admin, whoever you designate it to and say the backup data set for theCUBE that used to take two hours, it's taken four hours, you probably ought to check that. So when we view cyber resiliency from a storage perspective, it's broad. We just talked about anomalous pattern detection in Spectrum Protect. We were talking most of the conversation about our Safeguarded Copy, which is available on the mainframe for several years and is now available on FlashSystems, making immutable local air-gap copies, that can be rapidly recovered and are immutable and can help you recover for a malware or ransomware attack. Our data at rest encryption happens to be with no performance penalty. So when you look at it, you need to create an overarching strategy for cybersecurity and then when you look at your storage estate, you need to look at your secondary storage, backup, replicas, snaps, archive, and have a strategy there to protect that and then you need a strategy to protect your primary storage, which would be things like Safeguarded Copy and encryption. So then you put it all together and in fact, Dave, one of the things we offer is a free cyber resilience assessment. It's not only for IBM Storage, but it happens to be a cyber resilience assessment that conforms to the NIST Framework and it's heterogeneous. So if you're a big company, you've got IBM EMC and HP Storage, guess what? It's all about the data sets not about the storage. So we say, you said these 10 data sets are critical, why are you not encrypting them? These data sets are XYZ, why are you not air-gapping them? So we come up based on the NIST Framework, a set of recommendations that are not IBM specific, but they are storage specific. Here's how you make your storage more resilient, both your secondary storage and your primary storage. That's how we see the big thing and Safeguarded Copy of course fits in on the primary storage side, A on the mainframe, which we've had for several years now and B in the Linux world, the Unix world and the Windows Server world on our FlashSystem portfolio with the announcement we did on July 20th. >> Great, thank you for painting that picture. Eric, are you seeing any use case patterns emerge in this space? >> Well, we see a couple of things. First of all, is A most resellers and most end-users, don't see storage an overarching part of the cybersecurity strategy, and that's starting to change. Second thing we're seeing is more and more storage companies are trying to get into this bailiwick of offering cyber and data resilience. The value IBM brings of course is much longer experience to that and we even integrate with other products. So for example, IBM offers a product called QRadar from the security divisions not a storage product, a security product, and it helps you with early data breach recognition. So it looks at servers, network access, it looks at the storage and it actually integrates now with our Safeguarded Copy. So, part of the value that we bring is this overarching strategy of a comprehensive data and cyber resilience across our whole portfolio, including Safeguarded Copy our July 20th announcement. But also integration beyond storage now with our QRadar product from IBM security division. And there will be future announcements coming in both Q4 and Q1 of additional integration with other security technologies, so you can see how storage can be a vital COD in the corporate cybersecurity strategy. >> Got it, thank you. Let's pivot to the, as-a-service it's, cloud obviously is brought in that as-a-service. Now, it seems like everybody has one now. You guys have announced obviously HPE, Dell, Lenovo, Cisco, Pure, everybody's gotten out there as-a-service model, what do we need to know about your as-a-service solution and why is it different from the others? >> Sure. Well, one of the big differences is we actually go on actual storage, not effective. So when you look at effective storage, which most of them do that includes creating the (indistinct) data sets and other things, so you're basically paying for that. Second thing we do is we have a bigger margin. So for example, if theCUBE says we want SLA-3 and we sell it by the SLA, Dave, SLA-1, two and three. So let's say theCUBE needs SLA-3 and the minimum capacity is a 100 terabytes, but let's say you think you need 300 terabytes. No problem. You also have a variable. One of the key differences is unlike many of our competitors, the rate for the base and the rate for the variable are identical. Several of our competitors, when you're in the base, you pay a certain amount, when you go into the variable, they charge you a premium. The other key differentiator is around data reduction. Some of our competitors and all storage companies have data reduction technology. Block-level D do thin provisioning, compression, we all offer those features. The difference is with IBM's pay-as-you-grow, Storage-as-a-Service model, if you have certain data sets that are not very deducible, not very compressible, we absorbed that with our competitors, most of them, if the dataset is not easily deducible, compressible, and they don't see the value, they actually charge you a premium for that. So that is a huge difference. And then the last big difference is our a 100% availability guarantee. We have that on our FlashSystem product line, we're the only one offering 100% availability guarantee. We also against many of the competitors offer a better base nines, as you know, availability characteristics. We offer six nines of availability, which is five minutes and 26 seconds of downtime and a 100% availability of offering. Some of our competitors only offer four nines of availability and if you want five or six, they charge you extra. We give you six nines base in which has only five minutes and change of downtime in a year. So those are the key difference between us and the other as-a-service models out there. >> So, the basic concept I think, is if you commit to more and buy more, you pay less per. I mean, that's the basic philosophy of these things, right? So, if- >> Yes. >> I commit to you X, let's say, I want to just sort of start small and I commit to you to X and great. I'm in now in, maybe I sign up for a multi-year term, I commit this much, whatever, a 100 terabytes or whatever the minimum is. And then I can say, Hey, you know what? This is working for me. The CFO likes it and the IT guys can provision more seamlessly, we got our chargeback or showback model goes, I want to now make a bigger commitment and I can, and I want to sort of, can I break my three-year term and come back and then renegotiate, kind of like reserved instances, maybe bigger and pay less? How do you approach that? >> Well, what you do is we do a couple of things. First of all, you could always add additional capacity, and you just call up. We assign a technical account manager to every account. So in addition to what you get from the regular sales team and what you get from our value business partners, by the way, we did factor in the business partners, Dave, into this, so business partners will have a great pay-as-you-go Storage-as-a-Service solution, that includes partners and their ability to leverage. In fact, several of our partners that do have both MSP and MHP businesses are working right now to leverage our Storage-as-a-Service, and then add on their own value with their own MSP and MHP capability. >> And they can white label that? Is that right or? >> Well, you'd still have Storage-as-a-Service from IBM. They would resell that to theCUBE and then they'd add in their own MHP or MSP. >> Got it. >> That said partners interested in doing a white label, we would certainly entertain that capability. >> Got it. I interrupted you, carry on please. >> Yeah, you can go ahead and add more capacity, not a problem. You also can change the SLA. So theCUBE, one of the leading an industry analyst firms, you bought every analyst firm in the world, and you're using IBM Storage-as-a-Service, pay-as-you-go cloud-like model. So what you do is you call up the technical account manager and say, Eric, we bought all these other companies they're using on-prem storage, we'd like to move to Storage-as-a-Service for all the companies we acquire. We can do that, so that would up your capacity. And then you could say, now we've been at SLA-2, but because we're adding all these new applications of workloads from our acquired companies, we want some of it to be at SLA-1. So we can have some of your workloads on SLA-2, others on SLA-1, you could switch everything to SLA-1, and you just call your technical account manager and they'll make that happen for you or your business partner, obviously, if you bought through the channel. >> I get it, the hard question is what if all those other companies theCUBE acquired are also IBM Storage-as-a-Service customers? Can I, what's that discussion like? Hey, can I consolidate those and get a better deal? >> Yeah, there are all Storage-as-a-Service customers and Dave I love that thought, we would just figure out a way to consolidate the agreement. The agreements are one through five years. What I think also that's very unique is let's say for whatever reason, and we all love finance people. Let's say the IT guys have called the finance and say, we did a one-year contract, we now like to do a three-year contract. The one year is coming up and guess what? Finance's delayed for whatever reason, the PO doesn't go through. So the ITI calls up the technical account manager, we love your service, it's delayed in finance. We will let them stay on their Storage-as-a-Service, even though they don't have a contract. Now, of course they've told us they want to do one, but if they exceed the contract by a quarter or two, because they can't get the finance guys are messing with the IT guys, that's fine. What the key differentiators? Exactly the same price. Several of our competitors will also extend without a contract, but until you do a contract, they charge you a premium, we do not, whatever, if you're an SLA-3, you're SLA-3, we'll extend you and no big deal. And then you do your contract, when the finance guys get their act together and you're ready to go. So that is something we can do and we'll do on a continual basis. >> Last question. Let's go way out. So, we're not doing any time, near-term forecasts, I'm trying to understand how popular you think as-a-service is going to be. I mean, if you think about the end of the decade, let's think industry total, IBM specific, how popular do you think as-a-service models will be? Do you think it will be the majority of the transacted business or it's kind of more of a, just one of many? >> So I think there will be many, some people will still have bare metal on-premises. Some people will still do virtualization on-premises or in a hybrid cloud configuration. What I do think though is Storage-as-a-Service will be over 50% by the end. Remember, we're sitting at 2021. So we're talking now 2029. >> Right. >> So I think Storage-as-a-Service will be over 50%. I think most of that Storage-as-a-Service will be in a hybrid cloud model. I think the days of a 100% cloud, which is the way it started. I think a lot of people realize that a 100% cloud actually is more expensive than a hybrid cloud or fully on-prem. I was at a major university in New York, they are in the healthcare space and I know their CIO from one of my past lives. I was talking to him, they did a full on analysis of all the cloud providers going a 100% cloud. And their analysis showed that a 100% cloud, particularly for highly transactional workloads was 50% more expensive than buying it, paying the maintenance and paying their employees. So we did an all in view. So what I think it's going to be is Storage-as-a-Service will be over 50%. I think most of that Storage-as-a-Service will be in a hybrid cloud configuration with storage on-prem or in a colo, like what our IBM pay-as-you-go service will do and then it will be accessed and available through a hybrid cloud configuration with IBM Cloud, Google, Amazon as or whoever the cloud provider is. So I do think that you're looking at over 50% of the storage being as-a-service, but I do think the bulk of that as-a-service will be as-a-service through someone like IBM or our competitors and then part of it will be from the cloud providers. But I do think you're going to see a mix because right now the expense of going a 100% cloud cloud storage is dramatically understated and when someone does an analysis like that major university in New York did, they had a guy from finance, help them do the analysis and it was 50% more expensive than doing on-premise either on-prem or on-prem as-a-service, both were way cheaper. >> But you own the asset, right? >> Yes. >> As-a-service model. >> We, right, we own the asset. >> And I would bet, >> I would bet that over the lifetime value of the spend and it as-a-service model, just like the cloud, if you do this with IBM or any of your competitors, I would bet that overall you're going to spend more just like you've seen in the cloud, but you get the benefit is the flexibility that you get. >> Yeah, yeah. If you compare it to the, so obviously the number one model would be to buy. That's probably going to be the least expensive. >> Right. >> But it's also the least flexible. Then you also have leasing, more flexibility, but leasing usually is more expensive. Just like when you lease your car, if you add up all the lease payments and then you, at the end, pay that balloon payment to buy, it's cheaper to buy the car up front than it is to lease a car. Same thing with any IT asset, now storage network servers, all are available on leasing, the net is at the bottom line, that's more than buying it upfront. And then Storage-as-a-Service will also be more expensive than buying it, my friend, but ultimate capability, altering SLAs, adding new capacity, being able to handle an app very quickly. We can provision the storage, as you mentioned, the IT guys can easily provision. We provision, the storage in 10 minutes, if you bought from IBM Storage or any competitor you bought and you need more storage, A you got to put a PO through your system and if you're not theCUBE, but you're a giant global Fortune 500, sometimes it takes weeks to get the PO done. Then the PO has to go to the business partner, the business partner has got to give a PO to the distributor and a PO to IBM. So it can take you weeks to actually get the additional storage that you need. With Storage-as-a-Service from IBM with our pay-as-you-go, cloud-like model, all you have to do is provision and you're done. And by the way, we provide a 50% overage for free. So if they end up needing more storage, that 50% is actually sitting on-prem already and if they get to 75% utilization of the total amount of storage, we then call them up, the technical account manager would call them up and their business partner and say, Dave, do you know that you guys are at 75% full? We'd like to come add some additional storage to get you back down to a 50% margin. And by the way, most of our competitors only do a 25% margin. So again, another differentiator for IBM Storage-as-a-Service. >> What about, I said, last question, but I have another question. What about day one? Like how long does it take, if I want to start fresh with as-a-service? >> Get it. >> How long does it take to get up and running? >> Basically you put the PO through, whatever it takes on your side or through your business partner, we then we'll sign the technical account manager, will call you up because you need to tell us, do you want to, in a colo facility that you're working with or do you want to put it on on-prem? And then once we do that, we just schedule a time for your IT guys do the install. So, probably two weeks. >> Yeah. >> It all depends because you've got to call back and say, Eric, we'd like it at our colo partner, our colo partners, ABC, we got to call ABC and then get back to you or on-prem , we're going to have guys in the office, a good day when it's not going to be too busy. Could you come two weeks from Thursday? Which now would be three weeks for sake of argument. But that would be, we interface with the customer, with the technical account manager to do it on your schedule on your time, whether you do it in your own facility or use a colo provider. >> Yeah, but once you tell, once I tell you, once we get through all that stuff, it's two weeks from when that's all agreed. >> Yeah. >> It's like the Xerox copier salesman, (Dave chuckles) Where are you going to put it? Once you decide where you're going to put it, then it's a couple of weeks. It's not a month or two months or yeah. >> Yeah, it's not. And we need additional capacity, remember there's a 50% margin sitting there. So if you need to go into the variable and use it, and when we hit a 75%, we actually track it with our storage insights pro. So we'll call you up and say, Dave, you're at 76%. We'd like to add more storage to give you better margin of extra storage and you would say, great, when can we do it? So, yeah, we're proactive about that to make sure that you stay at that 50% margin. Again, our competitors, all do only have 25% margin. So we're giving you that better margin, a larger margin in case you really have a high capacity demand for that quarter and we proactively will call you up, if we think you need more based on monitoring your storage usage. >> Great. Eric got to go, thank you so much for taking us through that great detail, I really appreciate it. Always good to see you. >> Great, thanks Dave, really appreciate it. >> Alright, thank you for watching this CUBE conversation, this is Dave Vellante and we'll see you next time. (soft music)

Published Date : Aug 19 2021

SUMMARY :

in the storage business, and you guys do a great job of the hard news, Eric? that's what you can do now of the offices and we've So one of the key things you need to do and you mentioned some and you also of course, could and either put it out to tape and so what you do is you So you manage that with our and how you help with threat detection. and then you need a strategy Eric, are you seeing any use case patterns and it helps you with early and why is it different from the others? So when you look at effective storage, is if you commit to more and and I commit to you to X and great. So in addition to what you get theCUBE and then they'd add in we would certainly entertain I interrupted you, and you just call your And then you do your contract, I mean, if you think about So I think there will be many, of the storage being as-a-service, the flexibility that you get. If you compare it to the, the additional storage that you need. if I want to start fresh will call you up because then get back to you Yeah, but once you Where are you going to put it? So if you need to go into you so much for taking us really appreciate it. Alright, thank you for

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

DavePERSON

0.99+

Eric HertzogPERSON

0.99+

DellORGANIZATION

0.99+

LenovoORGANIZATION

0.99+

IBMORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

EricPERSON

0.99+

July 20thDATE

0.99+

two hoursQUANTITY

0.99+

fiveQUANTITY

0.99+

one-yearQUANTITY

0.99+

100%QUANTITY

0.99+

three-yearQUANTITY

0.99+

New YorkLOCATION

0.99+

50%QUANTITY

0.99+

four hoursQUANTITY

0.99+

$175 millionQUANTITY

0.99+

five minutesQUANTITY

0.99+

XeroxORGANIZATION

0.99+

sixQUANTITY

0.99+

two monthsQUANTITY

0.99+

five yearsQUANTITY

0.99+

25%QUANTITY

0.99+

three weeksQUANTITY

0.99+

AmazonORGANIZATION

0.99+

ABCORGANIZATION

0.99+

26 secondsQUANTITY

0.99+

ThursdayDATE

0.99+

one yearQUANTITY

0.99+

300 terabytesQUANTITY

0.99+

Two partQUANTITY

0.99+

75%QUANTITY

0.99+

100 terabytesQUANTITY

0.99+

2029DATE

0.99+

HPEORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

10 minutesQUANTITY

0.99+

2021DATE

0.99+

SLA-1TITLE

0.99+

a monthQUANTITY

0.99+

SLA-2TITLE

0.99+

76%QUANTITY

0.99+

two weeksQUANTITY

0.99+

10 data setsQUANTITY

0.99+

MHPORGANIZATION

0.99+

10 IT guysQUANTITY

0.99+

PureORGANIZATION

0.99+

Sunil James, Sr Director, HPE [ZOOM]


 

(bright music) >> Welcome back to HPE Discover 2021. My name is Dave Vellante and you're watching theCUBE's virtual coverage of Discover. We're going to dig into the most pressing topic, not only for IT, but entire organizations. And that's cyber security. With me is Sunil James, senior director of security engineering at Hewlett Packard Enterprise. Sunil, welcome to theCUBE. Come on in. >> Dave, thank you for having me. I appreciate it. >> Hey, you talked about project Aurora today. Tell us about project Aurora, what is that? >> So I'm glad you asked. Project Aurora is a new framework that we're working on that attempts to provide the underpinnings for Zero Trust architectures inside of everything that we build at HPE. Zero Trust is a way of providing a mechanism for enterprises to allow for everything in their enterprise, whether it's a server, a human, or anything in between, to be verified and attested to before they're allowed to access or transact in certain ways. That's what we announced today. >> Well, so in response to a spate of damaging cyber attacks last month, President Biden issued an executive order designed to improve the United States' security posture. And in that order, he essentially issued a Zero Trust mandate. You know, it's interesting, Sunil. Zero Trust has gone from a buzzword to a critical part of a security strategy. So in thinking about a Zero Trust architecture, how do you think about that, and how does project Aurora fit in? >> Yeah, so Zero Trust architecture, as a concept, has been around for quite some time now. And over the last few years, we've seen many a company attempting to provide technologies that they purport to be Zero Trust. Zero Trust is a framework. It's not one technology, it's not one tool, it's not one product. It is an entire framework of thinking and applying cybersecurity principles to everything that we just talked about beforehand. Project Aurora, as I said beforehand, is designed to provide a way for ourselves and our customers to be able to measure, attest, and verify every single piece of technology that we sell to them. Whether it's a server or everything else in between. Now, we've got a long way to go before we're able to cover everything that HPE sells. But for us, these capabilities are the root of Zero Trust architectures. You need to be able to, at any given moment's notice, verify, measure, and attest, and this is what we're doing with project Aurora. >> So you founded a company called Scytale and sold that to HPE last year. And my understanding is you were really the driving force behind the secure production identity framework, but you said Zero Trust is really a framework. That's an open source project. Maybe you can explain what that is. I mean, people talk about the NIST Framework for cybersecurity. How does that relate? Why is this important and how does Aurora fit into it? >> Yeah, so that's a good question. The NIST Framework is a broader framework for cybersecurity that couples and covers many aspects of thinking about the security posture of an enterprise, whether it's network security, host based intrusion detection capabilities, incident response, things of that sort. SPIFFE, which you're referring to, Secure Production Identity Framework For Everyone, is an open source framework and technology base that we did work on when I was the CEO of Scytale, that was designed to provide a platform agnostic way to assign identity to anything that runs in a network. And so think about yourself or myself. We have identities in our back pocket, driver's license, passports, things of that sort. They provide a unique assertion of who we are, and what we're allowed to do. That does not exist in the world of software. And what SPIFFE does is it provides that mechanism so that you can actually use frameworks like project Aurora that can verify the underpinning infrastructure on top of which software workloads run to be able to verify those SPIFFE identities even better than before. >> Is the intent to productize this capability, you know, within this framework? How do you approach this from HPE's standpoint? >> So SPIFFE and SPIRE will and always will be, as far as I'm concerned, remain an open source project held by the Cloud Native Computing Foundation. It's for the world, all right. And we want that to be the case because we think that more of our Enterprise customers are not living in the world of one vendor or two vendors. They have multiple vendors. And so we need to give them the tools and the flexibility to be able to allow for open source capabilities like SPIFFE and SPIRE to provide a way for them to assign these identities and assign policies and control, regardless of the infrastructure choices they make today or tomorrow. HPE recognizes that this is a key differentiating capability for our customers. And our goal is to be able to look at our offerings that power the next generation of workloads. Kubernetes instances, containers, serverless, and anything that comes after that. And our responsibility is to say, "How can we actually take what we have and be able to provide those kinds of assertions, those underpinnings for Zero Trust that are going to be necessary to distribute those identities to those workloads, and to do so in a scalable, effective, and automated manner?" Which is one of the most important things that project Aurora does. >> So a lot of companies, Sunil, will set up a security division. But is the HPE strategy to essentially embed security across its entire portfolio? How should we think about HPE strategy in cyber? >> Yeah, so it's a great question. HPE has a long history in security and other domains, networking, and servers, and storage, and beyond. The way we think about what we're building with project Aurora, this is plumbing. This is plumbing that must be in everything we build. Customers don't buy one product from us and they think it's one company, and something else from us, and they think it's another company. They're buying HPE products. And our goal with project Aurora is to ensure that this plumbing is widely and uniformly distributed and made available. So whether you're buying an Aruba device, a Primera storage device, or a ProLiant server, project Aurora's capabilities are going to provide a consistent way to do the things that I've mentioned beforehand to allow for those Zero Trust architectures to become real. >> So, as I alluded to President Biden's executive order previously. I mean, you're a security practitioner, you're an expert in this area. It just seems as though, and I'd love to get your comments on this. I mean, the adversaries are well-funded, you know, they're either organized crime, they're nation states. They're extracting a lot of very valuable information, they're monetizing that. You've seen things like ransomware as a service now. So any knucklehead can be in the ransomware business. So it's just this endless escalation game. How do you see the industry approaching this? What needs to happen? So obviously I like what you're saying about the plumbing. You're not trying to attack this with a bunch of point tools, which is part of the problem. How do you see the industry coming together to solve this problem? >> Yeah. If you operate in the world of security, you have to operate from the standpoint of humility. And the reason why you have to operate from a standpoint of humility is because the attack landscape is constantly changing. The things, and tools, and investments, and techniques that you thought were going to thwart an attacker today, they're quickly outdated within a week, a month, a quarter, whatever it might be. And so you have to be able to consistently and continuously evolve and adapt towards what customers are facing on any given moment's notice. I think to be able to, as an industry, tackle these issues more and moreso, you need to be able to have all of us start to abide, not abide, but start to adopt these open-source patterns. We recognize that every company, HPE included, is here to serve customers and to make money for its shareholders as well. But in order for us to do that, we have to also recognize that they've got other technologies in their infrastructure as well. And so it's our belief, it's my belief, that allowing for us to support open standards with SPIFFE and SPIRE, and perhaps with some of the aspects of what we're doing with project Aurora, I think allows for other people to be able to kind of deliver the same underpinning capabilities, the plumbing, if you will, regardless of whether it's an HPE product or something else along those lines as well. We need more of that generally across our industry, and I think we're far from it. >> I mean, this sounds like a war. I mean, it's more than a battle, it's a war that actually is never going to end. And I don't think there is an end in sight. And you hear CESOs talk about the shortage of talent, they're getting inundated with point products and tools, and then that just creates more technical debt. It's been interesting to watch. Interesting maybe is not the right word. But the pivot to Zero Trust, endpoint security, cloud security, and the exposure that we've now seen as a result of the pandemic was sort of rushed. And then of course, we've seen, you know, the adversaries really take advantage of that. So, I mean what you're describing is this ongoing never-ending battle, isn't it? >> Yeah, yeah, no, it's going to be ongoing. And by the way, Zero Trust is not the end state, right? I mean, there was things that we called the final nail in the coffin five years ago, 10 years ago, and yet the attackers persevered. And that's because there's a lot of innovation out there. There's a lot of infrastructure moving to dynamic architectures like cloud and others that are going to be poorly configured, and are going to not have necessarily the best and brightest providing security around them. So we have to remain vigilant. We have to work as hard as we can to help customers deploy Zero Trust architectures. But we have to be thinking about what's next. We have to be watching, studying, and evolving to be able to prepare ourselves, to be able to go after whatever the next capabilities are. >> What I like about what you're saying is, you're right. You have to have humility. I don't want to say, I mean, it's hard because I do feel like a lot of times the vendor community says, "Okay, we have the answer," to your point. "Okay, we have a Zero Trust solution." Or, "We have a solution." And there is no silver bullet in this game. And I think what I'm hearing from you is, look we're providing infrastructure, plumbing, the substrate, but it's an open system. It's got to evolve. And the thing you didn't say, but I'd love your thoughts on this is we've got to collaborate with somebody you might think is your competitor. 'Cause they're the good guys. >> Yeah. Our customers don't care that we're competitors with anybody. They care that we're helping them solve their problems for their business. So our responsibility is to figure out what we need to do to work together to provide the basic capabilities that allow for our customers to remain in business, right? If cybersecurity issues plague any of our customers that doesn't affect just HPE, that affects all of the companies that are serving that customer. And so, I think we have a shared responsibility to be able to protect our customers. >> And you've been in cyber for much, if not most of your career, right? >> Correct. >> So I got to ask you, did you have a superhero when you were a kid? Did you have a sort of a, you know, save the world thing going? >> Did I have a, you know, I didn't have a save the world thing going, but I had, I had two parents that cared for the world in many, many ways. They were both in the world of healthcare. And so everyday I saw them taking care of other people. And I think that probably rubbed off in some of the decisions that I make too. >> Well it's awesome. You're doing great work, really appreciate you coming on theCUBE, and thank you so much for your insights. >> I appreciate that, thanks. >> And thank you for being with us for our ongoing coverage of HPE Discover 21. This is Dave Vellante. You're watching theCUBE. The leader in digital tech coverage. We'll be right back. (bright music)

Published Date : Jun 6 2021

SUMMARY :

Welcome back to HPE Discover 2021. Dave, thank you for having me. Hey, you talked about that attempts to provide the underpinnings Well, so in response to a spate and our customers to be able and sold that to HPE last year. to be able to verify And our goal is to be able But is the HPE strategy to essentially Aurora is to ensure and I'd love to get your comments on this. I think to be able to, as an industry, But the pivot to Zero that are going to be poorly configured, And the thing you didn't say, to be able to protect our customers. I didn't have a save the and thank you so much for your insights. And thank you for being with us

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

Sunil JamesPERSON

0.99+

DavePERSON

0.99+

two vendorsQUANTITY

0.99+

ScytaleORGANIZATION

0.99+

two parentsQUANTITY

0.99+

last yearDATE

0.99+

Cloud Native Computing FoundationORGANIZATION

0.99+

PresidentPERSON

0.99+

last monthDATE

0.99+

Zero TrustORGANIZATION

0.99+

tomorrowDATE

0.99+

HPEORGANIZATION

0.99+

Hewlett Packard EnterpriseORGANIZATION

0.99+

one vendorQUANTITY

0.99+

five years agoDATE

0.99+

bothQUANTITY

0.99+

10 years agoDATE

0.99+

Zero TrustORGANIZATION

0.98+

oneQUANTITY

0.98+

SunilORGANIZATION

0.98+

one companyQUANTITY

0.98+

SunilPERSON

0.98+

a monthQUANTITY

0.98+

one productQUANTITY

0.98+

todayDATE

0.98+

a weekQUANTITY

0.98+

SPIFFETITLE

0.97+

SPIRETITLE

0.96+

one toolQUANTITY

0.96+

a quarterQUANTITY

0.95+

pandemicEVENT

0.95+

BidenPERSON

0.94+

AuroraTITLE

0.93+

NIST FrameworkTITLE

0.93+

AuroraORGANIZATION

0.88+

theCUBEORGANIZATION

0.87+

projectORGANIZATION

0.87+

Zero TrustTITLE

0.87+

SPIREORGANIZATION

0.81+

UnitedORGANIZATION

0.8+

ArubaLOCATION

0.77+

Project AuroraTITLE

0.74+

SPIFFEORGANIZATION

0.73+

project AuroraORGANIZATION

0.73+

PrimeraORGANIZATION

0.69+

single pieceQUANTITY

0.69+

DiscoverTITLE

0.68+

Discover 21TITLE

0.68+

States'LOCATION

0.67+

FrameworkTITLE

0.65+

CESOsORGANIZATION

0.63+

projectTITLE

0.58+

Sandra Wheatley and Rob Rashotte, Fortinet


 

(upbeat music) >> Welcome to this CUBE Conversation, I'm Lisa Martin. I've got two guests from Fortinet with me next talking about an very interesting topic that's something that always piques my interest, cybersecurity, and some of the things going on with respect to that. Sandra Wheatley joins us the SVP of marketing, threat intelligence and influencer communications at Fortinet. Sandra, it's great to see you again. >> Thank you, Lisa. I'm delighted to be here today. >> Lisa: Good and Rob Rashotte is here as well, vice-president, global training and technical field enablement at Fortinet. Rob welcome to the program. >> Hi, great to meet you Lisa. Nice to be here. >> Likewise. So since I last saw Fortinet we've had such a challenging year as we all know, that's an understatement, but one of the things that happened so quickly was the distribution of the workforce. And there were already preexisting gaps in IT Visibility and teams being siloed, security teams being siloed as well exacerbated distinct cybersecurity skills gap. So Sandra I want to start with you. Talk to us about what's going on with the cybersecurity skills gap and how it's impacting organizations today. >> Thank you, Lisa. While the cybersecurity skills gap continues to be one of the biggest challenges facing security organizations today, as you know, the cybersecurity space is very dynamic. It's constantly changing and we saw this even through COVID with more people working from home or being educated from home. Cyber adversaries are using remote workers as a way into the enterprise network. And so security organizations today are facing a lot of complexity. They deal with billions of alerts that come in every day and a lot of these have to be managed manually and they just don't have the professionals to keep up with that. So it continues to be a big issue facing organizations. We have seen some progress about a year ago. It was estimated that we would need 4 million professionals come into the industry to close the gap. We are now at probably a little bit over 3 million. So there is progress being made but we still have a long way to go. >> Yeah, good progress there. But what I mean, one of the things that we saw so quickly was with the distribution center was suddenly, there were tons of trusted devices that were off the network perimeter where all these keep going, "Use your own device at home until we can get you something provisioned on the network." So huge challenge that was almost like a light switch for people in any industry. Rob, talk to me from your perspective the ongoing cybersecurity skills gap. What are some of the things that you were seeing through your lens? >> Yeah, well, I mean it has certainly changed our focus over the last year with the pandemic and the change in workforce and so on. And I think as a cybersecurity vendor, a lot of the times when we talk about training and the skills gap we often tend to think pretty quickly about engineers and technical training and like this has really opened up our eyes too. We need to really broaden our scope when we're talking about training and closing the skills gap, because it's a lot more than just engineers. So we've had to really focus more on really anyone sitting in front of a computer screen and ensure that programs are available for people that are working from home that need to understand, the fact that security is just as big an issue if you're working from home or working from the office. So it's really broadened our scope in terms of who we're delivering training to and within a number of our programs, actually, that has happened. When we're dealing with we have a lot of academic partners that we deliver training with them. And one thing that's happened there is we we've traditionally dealt with engineering schools within our academic partners but now we're starting to see a lot of business schools coming and talking to us about delivering training within MBA programs and so on. So that business leaders can start understand, the need to be addressing cybersecurity in the boardroom for example, not just within the it department. So it's I guess the one thing I would say is it's really broadened our scope in terms of who the audience is for cybersecurity and the skills gap is a, you know it impacts a lot of different areas in the organization. >> Yeah, you brought up a great point there that elevation of security to the board level is critical. As we saw like big spikes and things like Ransomware last year. Ransomware getting much more sophisticated kind of playing on people's concerns for buzzwords like COVID-19 for example, and I talked to a lot of organizations where security is at the board level but the talent gap is another challenge. Sandra talk to us about what Fortinet is doing from a partnership perspective to help shrink that gap. >> Well, it's interesting because if you were to do a survey of people about where the responsibility lies to train more professionals for the industry, you'll see a split about 40% of people feel like academia should be providing the training and the curriculum to bring more professionals into the industry. And then others feel like it's a mix between corporate private public partnerships. And that's something that Fortinet believes in. We are tackling this issue on multiple fronts. We recently launched our TAA initiative or our Training Advancement Agenda, and a lot of the pro programs that Rob manages are part of that agenda like our free NSE training, our security academies, but we're also working with a lot of global partners, corporate partners like Salesforce, and IBM. We're also working with the World Economic Forum on this initiative because we really believe it's a joint effort to really make a difference. And so, for example, with Salesforce we provide some of our curriculum and training for free on their training platform, the same with IBM. And we'll continue to scale these partnerships because with these partners, we can reach more people and accelerate the impact that we can have overall. >> Absolutely that ability to expand it especially as we saw such a change in the cyber threat landscape last year as you said, Sandra you've made great progress needing, you know, a deficit of 4 million folks down to 3 million, but also looking at the opportunity to try to find more folks leveraging partners and to rubs point elevating the conversation or expanding that scope. This isn't just a problem for IT and security folks. This is a challenge across the organization that the board needs to be focused on because we've seen in this rapidly changing last year organizations and enough peril in trying to pivot their businesses. And then you add on some of the cyber threats. Rob can you talk a little bit more about the TAA initiative? I know that about your Network Security Expert program NSE program, you guys also do FortiVet program. Tell us a little bit about some of those programs and maybe some of the things that you've done to broaden the scope during the last year. >> Yeah, it certainly can. I mean, there's a number of programs that make up the agenda and you know we've widened the scope in terms of the audiences that we're looking at. But also as Sandra mentioned, trying to expand our reach as ordinary, obviously we have a reach into our partners and our ecosystem, but the ecosystem of the IBM's and the world economic forums and so on go far beyond our reach. But one of the things that we were able to do as a company almost exactly a year ago, we made the conscious decision that the training curriculum that we've built, we wanted to make it available to as many people as we possibly could. So we we've made approximately 400 hours worth of cybersecurity training available to anyone that wants to sign up and take the training in self-paced format, where they want to take it, when they want to take it. So that was a big commitment on our part and that training continues to be free today and we'll keep it free until we start to see the skills gap closed but that that has resulted I guess it was about a month or two ago when we were tracking numbers that we've exceeded over a million registrations for that training, which really was validation to us that the demand for this training is massive. So that's helped us expand our reach but that training as well we're making it available for free, but we have all sorts of different types of partners who are taking that training and making it three free through their learning portals as well. So it's really expanded the reach in that way. You know, another area that we've really focused on is partnering with nonprofits who are representing underrepresented groups. So you mentioned the veterans program that's been a program we've had for quite a while now, but we've looked at that program and thought, well, you know, we can definitely replicate our efforts there and look at other groups as well and start to see how we can partner with different NGOs to really address the diversity and inclusion, within the cybersecurity industry. 'Cause, you know, I think one thing that's interesting here is because of the skill shortage, a lot of hiring managers have had to start to look at recruiting through non traditional streams. And that that can be, you know, looking at if we have policies that say, we must hire people with four year degrees. Well, maybe we want to take a look at that and see well is that really necessary for all the jobs that we're looking at? Maybe we could look at shorter programs even high school students but then also looking at underrepresented groups it is a great way for us to take a look at this skills gap in cybersecurity and align it with our diversity and inclusion initiatives, internally within our organizations and see how we can bring that to bear on problem and really start to have the same time, create a much more diverse workforce within cybersecurity while we're trying to close that skills gap. >> I love that what a great opportunity to expand upon that. I wanted to ask you just really quickly, Rob she said 400 hours of free cyber training available over a million registrations so far. You're right, that definitely shows the demand. I'm curious when we think of backgrounds we think are these, you know need to be IT folks. Is that curriculum broad enough so that somebody with a marketing degree or somebody that doesn't have a degree could kind of get in on level one and start learning their way up the security stack? >> Yeah, it is a very broad scope. When we look at the catalog, it is multiple levels. And in fact our network security expert program it's an eight level program. And the first couple of levels of that program are applicable to anyone that needs an awareness of cybersecurity and the issues. So, yeah, it's perfect. And `in fact the level one of that program is something that we've integrated into a new service offering which is our Cybersecurity Awareness Program that companies can implement internally to provide that base level of cybersecurity awareness to all of their employees. And then as you go up to level two, three, four and five, and so on, it gets more and more technical right up to the NSE level or we're talking about, you know, architects engineers are developing very large critical cyber security infrastructures. >> Lisa, you bring up a very important point that I'd like to make a comment on. There's this misconception that you need a degree in Computer Science or some other technical degree to be in cyber security. And that's absolutely not the case. In fact, half the people in cybersecurity don't have a degree in any Computer Science program, et cetera, but you know there's a lot of skillsets and backgrounds that really map well to cybersecurity. And it's a very broad industry. There was new roles coming all of the time. So I would encourage people to not let that be a barrier to getting into this industry. And in fact our Veteran's program has been extremely successful because people coming out of the defense forces have a lot of the skills that match very well to cyber security like attention to detail, situational awareness, the ability to work under pressure. So it's definitely a misconception that the industry needs to correct. >> I couldn't agree more, especially as the daughter of a Vietnam Combat Veteran and I love what you guys are doing with veterans but you're right. There's so many other skills that people have that are so transportable and transferable that, and it's such an exciting industry. I mean, we all have a million devices scattered around. I think with those new Apple tags that if I put one on my dog's collar, my dog's going to be a connected device. There's so many opportunities to learn but there's also more exposure. The more people that have different backgrounds I think just that with that thought diversity alone, organizations in any industry can benefit. Sandra talk to us about how partners are taking some of these programs and rolling them into their own to help kind of open that door wider as you say, to make sure that barrier isn't there and also get more folks aware of what they can learn. >> Yeah, the encouraging thing is I just see a lot more creativity around this issue. If you think about it, the lack of diversity in IT has been a challenge for everyone that the issue in cybersecurity is just a manifestation of that. And one of the reasons is that it's particularly cybersecurity. A lot of people don't understand how to get into the industry, or they have a lack of awareness about the different types of roles. And we see this in particular with women and young females as well as underserved minority groups. In fact, the veterans program is one way to bring more of that diversity into the industry. And if you think about it today, women make up about 24%. I think it's single digits for underrepresented groups. So we have a huge opportunity there. And I think somehow working with our partners we're doing a lot of different things. Not only are we providing our curriculum and our training and the technical support, but we're also done a lot of work around mapping roles and the steps you need to take to, to achieve those roles. So we've created that for different roles, and we've shared that with some of our training partners and they provide that information on their training platforms. We also regularly have done a lot of different podcasts and interviews with women and minorities have gone through the industry and been very successful talking about how they did that and how they got there. We're working with lots of nonprofits like Women in Cybersecurity speaking to people out there providing them the support. So it's a multi-phase approach. And I do think that private industry need to be doing things like creating entry level kinds of roles to bring more people in the industry and recruit differently. But the good news is there's a huge amount of awareness around this, and you definitely see companies doing a lot more, as well as our partners. >> Well if I could just touch on something there, well Sandra is talking about the different career roles and so on. The industry can get pretty complicated pretty quickly when we're talking about different roles. And there's a lot of buzzwords. And you know when people are looking at this and say, well, how do I even get into this industry? It sounds very technical complicated. And, you know, there are a number of different career patching tools that you can find out there around cyber security but when there's too many of those that even gets confusing. So the career paths that we've developed, we've done that in conjunction with NICE and there's an initiative called the NICE Framework which stands for National Initiative for Cyber Security Education. And so the pathways that we've developed map to that. So, you know, that's one thing I'd like to encourage other organizations to make sure that we're all following that framework so that as we're providing these career paths to people we're using the same terminology. We're using the same titles and career paths and so on. So it just makes it a little bit more understandable for people to pick a path that they want and then start their journey. >> I also think exposing students earlier in their education about cyber security is really important. In fact, we're just released a book called "Cyber Safe" and it's targeting elementary school children and their parents and making them more aware of cybersecurity, the risks, how they should behave online. It talks about cyber bullying and it also helps has guidance in there for parents. And this is a book that we're making freely available to underserved schools and it can easily be accessed online. We've had great reviews, but it's all part of our TAA efforts to educate and make people more aware about the opportunities on the industry overall. >> I love that, Sandra our SVP of marketing. Is there a URL that you can give our audience where they can find that free resource? >> Yes, you can find that I believe on our NSE training page. You can just go to fortinet.com NSE and or TAA and you will find information about how to get the book. >> Excellent so fortinet.com search TAA or NSE you'll find that information. I'm going to check that out myself 'cause maybe you know, for adult children of parents who also need some cybersecurity help I think I might check that out for myself. >> You can (indistinct) copy Lisa. >> Thank you, excellent. It's been great talking to you guys. This is such an interesting topic. I love the efforts that Fortinet is doing to close those gaps and also what you're doing to bridge that with the diversity and inclusion efforts brought out. That's a great effort, Sandra, Rob thank you for joining me today. >> Thank you, Lisa. >> Thank you, Lisa >> For Sandra Wheatley and Rob Rashotte. I'm Lisa Martin. You're watching this CUBE conversation with Fortinet. (gentle music)

Published Date : May 11 2021

SUMMARY :

Sandra, it's great to see you again. I'm delighted to be here today. and technical field Hi, great to meet you Lisa. but one of the things of the biggest challenges one of the things that we saw so quickly and the skills gap is a, you know and I talked to a lot of organizations and the curriculum to that the board needs to be and start to see how we can so that somebody with a marketing degree of cybersecurity and the issues. that the industry needs to correct. and I love what you guys and the steps you need to take to, So the career paths that we've developed, of cybersecurity, the risks, Is there a URL that you and you will find information I'm going to check that out myself It's been great talking to you guys. For Sandra Wheatley and Rob Rashotte.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

Rob RashottePERSON

0.99+

Sandra WheatleyPERSON

0.99+

IBMORGANIZATION

0.99+

SandraPERSON

0.99+

LisaPERSON

0.99+

RobPERSON

0.99+

FortinetORGANIZATION

0.99+

400 hoursQUANTITY

0.99+

SalesforceORGANIZATION

0.99+

Rob RashottePERSON

0.99+

last yearDATE

0.99+

NICEORGANIZATION

0.99+

four yearQUANTITY

0.99+

two guestsQUANTITY

0.99+

AppleORGANIZATION

0.99+

National Initiative for Cyber Security EducationORGANIZATION

0.99+

oneQUANTITY

0.99+

todayDATE

0.98+

COVID-19OTHER

0.98+

NSEORGANIZATION

0.98+

one wayQUANTITY

0.98+

approximately 400 hoursQUANTITY

0.98+

a year agoDATE

0.98+

4 million professionalsQUANTITY

0.98+

billions of alertsQUANTITY

0.97+

over 3 millionQUANTITY

0.97+

fiveQUANTITY

0.96+

about 24%QUANTITY

0.96+

about 40%QUANTITY

0.96+

pandemicEVENT

0.96+

over a million registrationsQUANTITY

0.96+

Cyber SafeTITLE

0.96+

about a monthDATE

0.94+

World Economic ForumORGANIZATION

0.93+

4 million folksQUANTITY

0.93+

over a million registrationsQUANTITY

0.93+

NICE FrameworkTITLE

0.92+

FortinetPERSON

0.91+

fourQUANTITY

0.9+

first coupleQUANTITY

0.9+

singleQUANTITY

0.88+

one thingQUANTITY

0.88+

two agoDATE

0.88+

a million devicesQUANTITY

0.88+

level oneQUANTITY

0.85+

A Day in the Life of Data with the HPE Ezmeral Data Fabric


 

>>Welcome everyone to a day in the life of data with HPE as well. Data fabric, the session is being recorded and will be available for replay at a later time. When you want to come back and view it again, feel free to add any questions that you have into the chat. And Chad and I joined stark. We'll, we'll be more than willing to answer your questions. And now let me turn it over to Jimmy Bates. >>Thanks. Uh, let me go ahead and share my screen here and we'll get started. >>Hey everyone. Uh, once again, my name is Jimmy Bates. I'm a director of solutions architecture here for HPS Merle in the Americas. Uh, today I'd like to walk you through a journey on how our everyday life is evolving, how everything about our world continues to grow more connected about, and about how here at HPE, how we support the data that represents that digital evolution for our customers, with the HPE as rural data fabric to start with, let's define that term data. The concept of that data can be simplified to a record of life's events. No matter if it's personal professional or mechanical in nature, data is just records that represent and describe what has happened, what is happening or what we think will happen. And it turns out the more complete record we have of these events, the easier it is to figure out what comes next. >>Um, I like to refer to that as the omnipotence protocol. Um, let's look at this from a personal perspective of two very different people. Um, let me introduce you to James. He's a native citizen of the digital world. He's, he's been, he's been a citizen of this, uh, an a career professional in the it world for years. He's always on always connected. He loves to get all the information he needs on a smartphone. He works constantly with analytics. He predicts what his customers need, what they want, where they are, uh, and how best to reach them. Um, he's fully embraced the use of data in his life. This is Sue SCA. She's, she's a bit of a, um, of an opposite to James. She's not yet immigrated to our digital world. She's been dealing with the changes that are prevalent in our times. And she started a new business that allows her customers, the option of, um, of expressing their personalities and the mask that they wear. She wants to make sure her customers can upload images, logos, and designs in order to deliver that customized mask, uh, to brighten their interactions with others while being safe as they go about their day. But she needs a crash course in digital and the digital journey. She's recently as, as most of us have as transitioned from an office culture to a work from home culture, and she wants to continue to grow that revenue venture on the side >>At the core of these personalities is a journey that is, that is representative common challenge that we're all facing today. Our world has been steadily shrinking as our ability to reach out to one another has steadily increased. We're all on that journey together to know more about what is happening to be connected to what our business is doing to be instantly responsive to our customer needs and to deliver that personalized service to every individual. And it as moral, we see this across every industry, the challenge of providing tailored experiences to potential customers in a connected world to provide constant information on deliveries that we requested or provide an easier commute to our destination to, to change the inventories, um, to the just-in-time arrival for our fabrications to identify quality issues in real time to alter the production of each product. So it's tailored to the request of the end user to deliver energy in, in smarter, more efficient ways, uh, without injury w while protecting the environment and to identify those, those, uh, medical emerging threats, and to deliver those personalized treatments safely. >>And at the core of all of these changes, all of these different industries is data. Um, if you look at the major technology trends, um, they've been evolving down this path for some time now, we're we're well into our cloud journey. The mobile platform world is, is now just part of our core strategies. IOT is feeding constant streams of data often over those mobile, uh, platforms. And the edge is increasingly just part of our core, all of this combined with the massive amounts of data that's becoming, becoming available through it is driving autonomous solutions with machine learning and AI. Uh, this is, this is just one aspect of this, this data journey that we're on, but for success, it's got, uh, sorry for success. It's got to be paired. Um, it's gotta be paired with action. >>Um, >>Well, when you look at the, uh, um, if we take a look at James and Cisco, right, we can start to see, um, with the investments in those actions, um, how their travel they're realizing >>Their goals, >>Services, efforts, you know, uh, focused, deliver new data-driven applications are done in new ways that are smaller in nature and kind of rapidly iterate, um, to respond to the digital needs of, of our new world, um, containerization to deploy and manage those apps anywhere in our connected world, they need to be secure we'll time streaming architecture, um, from, from the, from the beginning to allow for continual interactions with our changing customer demands and all of this, especially in our current environment, while running cost reduction initiatives. This is just the current world that, that our solutions must live in. Um, with that framework in mind, um, I'd like to take the remainder of our time and kind of walk through some of the use cases where, where we at HPE helped organizations through this journey with, with, with the ASML data fabrics, >>Let's >>Start with what's happening in the mobile world. In fact, the HPE as moral data fabric is being used by a number of companies to provide infinitely personalized experiences. In this case, it could be James could be sushi. It could be anyone that opens up their smartphone in the morning, uh, quickly checking what's transpiring in the world with a selection of curated, relative relevant articles, images, and videos provided by data-driven algorithm workloads, all that data, the logs, the recommendations, and the delivery of those recommendations are done through a variety of companies using HP as rural software, um, that provides a very personalized experience for our users. In addition, other companies monitor the service quality of those mobile devices to ensure optimize connectivity as they move throughout their day. The same is true for digital communication for that video communication, what we're doing right now, especially in these days where it's our primary method of connecting as we deal with limited physical engagements. Um, there's been a clear spike in the usage of these types of services. HPE, as Merle is helping a number of these companies deliver on real time telemetry analysis, predicting demand, latency, monitoring, user experience, and analyzing in real time, responding with autonomous adjustments to maintain pleasant experiences for all participants involved. >>Um, >>Another area, um, we're eight or HBS ML data fabric is playing a crucial role in the daily experience inside our automobiles. We invest a lot of ourselves in our cars. We expect tailored experiences that help us stay safe and connected as we move from one destination to another, in the areas of autonomous driving connected car, a number of major car companies in the world are using our data fabric to take autonomous driving to the next level where it should be effectively collecting all data from sensors and cameras, and then feeding that back into a global data fabric. So that engineers that develop cars can train next generation, future driving algorithms that make our driving experience safer and more autonomy going forward. >>Now let's take a look at a different mode of travel. Uh, the airline industry is being impaired. Varied is being impacted very differently today from, from the car companies, with our software, uh, we help airlines travel agencies, and even us as consumers deal with pricing, calculations and challenges, uh, with, um, air traffic services. We, we deal with, um, um, uh, delivering services around route predictions on time arrivals, weather patterns, and tagging and tracking luggage. We help people with flight connections and finding out what the figuring out what the best options are for your, for your travel. Uh, we collect mountains of data, secure it in a global data fabric, so it can provide, be provided back in an analyzed form with it. The stressed industry can contain some very interesting insights, provide competitive offerings and better services to us as travelers. >>This is also true for powering biometrics. At scale, we work with the biggest biometrics databases in the world, providing the back end for their enormous biometric authentication pursuit. Just to kind of give you a rough idea. A biometric authentication is done with a number of different data points from fingerprints. I re scans numerous facial features. All of these data points are captured for every individual and uploaded into the database, such that when the user is requesting services, their biometric metrics can be pooled and validated in seconds. From a scale perspective, they're onboarding 1 million people a day more than 200 million a year with a hundred percent business continuity and the options do multi-master and a global data fabric as needed ensuring that users will have no issues in securely accessing their pension payouts medical services or what other types of services. They may be guaranteed >>Pivoting >>To a very different industry. Even agriculture was being impacted in digital ways. Using HPE as well, data fabric, we help farmers become more digital. We help them predict weather patterns, optimize sea production. We even helped see producers create custom seed for very specific weather and ground conditions. We combine all of these things to help optimize production and ensure we can feed future generations. In some cases, all of these data sources collected at the edge can be provided back to insurance companies to help farmers issue claims when micro patterns affect farmers in negative ways, we all benefit from optimized farming and the HBS Modena fabric is there to assist in that journey. We provide the framework and the workload guidance to collect relevant data, analyze it and optimize food production. Our customers demonstrate the agricultural industry is most definitely my immigrating to our digital world. >>Now >>That we've got the food, we need to ship it along with everything else, all over the world, as well as offer can be found in action in many of the largest logistics companies in the world. I mean, just tracking things with greater efficiency can lead to astounding insights. What flights and ships did the package take? What Hans held it along its journey, what weather conditions did it encounter? What, what customs office did it go through and, and how much of it's requested and being delivered this along with hundreds of other telemetry points can be used to provide very accurate trade and economic predictions around what's going on with trade in the world. These data sets are being used very intensively to understand economy conditions and plan for future event consequences. We also help answer, uh, questions for shipping containers that are, that are more basic. Uh, like where is my container located at is my container still on the correct ship? Uh, surprisingly, uh, this helps cut down on those pesky little events like lost containers. >>Um, it's astounding the amount of data that's in DNA, and it's not just the pairs. It's, it's the never ending patterns found with other patterns that none of it can be fully understood unless the micro is maintained in context to the macro. You can't really understand these small patterns unless you maintain that overall understanding of the entire DNA structure to help the HVS mold data fabric can be found across every aspect of the medical field. Most recently was there providing the software framework to collect genomic sequencing, landing it in the data fabric, empowering connected availability for analysis to predict and find patterns of significance to shorten the effort it takes to identify those potential triggers and make things like vaccines become becoming available. In record time. >>Data is about people at HPE asthma. We keep people connected all around the world. We do this in a variety of ways. We we've already looked at several of the ways that that happens. We help you find data. You need, we help you get from point a to point B. We help make sure those birthday gifts show up on time. Some other interesting ways we connect people via recipes, through social platforms and online services. We help people connect to that new recipe that is unexpected, but may just be the kind of thing you need for dinner tonight at HPDs where we provide our customers with the power to deliver services that are tailored to the individual from edge to core, from containers to cloud. Many of the services you encounter everyday are delivered to you through an HV as oral global data fabric. You may not see it, but we're there in the morning in the morning when you get up and we're there in the evening. Um, when you wind down, um, at HPE as role, we make data globally available across everywhere that your business needs to go. Um, I'd like to thank everyone, uh, for the time that you've given us today. And I'd like to turn it back over and open up the floor for questions at this time, >>Jimmy, here's a question. What are the ways consumers can get started with HPS >>The fabric? Well, um, uh, there's several ways to get started, right? We, we, uh, first off we have software available that you can download that there's extensive documentation and use cases posted on our website. Um, uh, we have services that we offer, like, um, assessment services that can come in and help you assess the, the data challenges that you're having, whether you're, you're just dealing with a scale issue, a security issue, or trying to migrate to a more containerized approach. We have a services to help you come in, assess that aspect. Um, we have a getting started bundles, um, and we have, um, so there's all kinds of services that, that help you get started on your journey. So what >>Does a typical first deployment look like? >>Well, that's, that's a very, very interesting question. Um, a typical first deployment, it really kind of varies depending on where you're at in the material. Are you James? Are you, um, um, Cisco, right? It really depends on, on where you're at in your journey. Um, but a typical deployment, um, is, is, is involved. Uh, we, we like to come in, we we'd like to do workshops, really understand your specific challenges and problems so that we can determine what solutions are best for you. Um, that to take a look at when we kind of settle on that we, we, um, the first deployment, uh, is, um, there's typically, um, a deployment of, uh, a, uh, a service offering, um, w with a software to kind of get you started along the way we kind of bundle that aspect. Um, as you move forward, if you're more mature and you already have existing container solutions, you already have existing, large scale data aspects of it. Um, it's really about the specific use case of your current problem that you're dealing with. Um, every solution, um, is tailored towards the individual challenges and problems that, that each one of us are facing. >>I break, they mentioned as part of the asthma family. So how does data fabric pair with the other solutions within Israel? >>Well, so I like to say there's, um, there, there's, there's three main areas, um, from a software standpoint, um, for when you count some of our, um, offerings with the GreenLake solution, but there are, so there are really four main areas with ESMO. There's the data fabric offering, which is really focused on, on, on, on delivering that data at scale for AI ML workloads for big data workloads for containerized workloads. There is the ESMO container platform, which really solves a lot of, um, some of the same problems, but really focus more on a compute delivery, uh, and a hundred percent Kubernetes environment. We also have security offerings, um, which, which help you take in this containerized world, uh, that help you take the different aspects of, um, securing those applications. Um, so that when the application, the containerized applications move from one framework or one infrastructure from one to the other, it really helps those, the security go with those applications so that they can operate in a zero trust environment. And of course, all of this, uh, options of being available to you, where everything has a service, including the hardware through some of our GreenLake offerings. So those are kind of the areas that, uh, um, that pair with the HPE, um, data fabric, uh, when you look at the entire ESMO pro portfolio. >>Well, thanks, Jimmy really appreciate it. That's all the questions we have right now. So is there anything that you'd like to close with? >>Uh, you know, the, um, I I'm, I find it I'm very, uh, I'm honored to be here at HPE. Um, I, I really find it, it's amazing. Uh, as we work with our customers solving some really challenging problems that are core to their business, um, it's, it's always an interesting, um, interesting, um, day in the office because, uh, every problem is different because every problem is tailored to the specific challenges that our customers face. Um, while they're all will well, we will, what we went over today is a lot of the general areas and the general concepts that we're all on together in a journey, but the devil's always in the details. It's about understanding the specific challenges in the organization and, and as moral software is designed to help adapt, um, and, and empower your growth in your, in your company. So that you're focused on your business, in the complexity of delivering services across this connected world. That's what as will takes off your plate so that you don't have to worry about that. It just works, and you can focus on the things that impact your business more directly. >>Okay. Well, we really thank everyone for coming today and hope you learned, uh, an idea about how data fabric can begin to help your business with it. All of a sudden analytics, thank you for coming. Thanks.

Published Date : Mar 17 2021

SUMMARY :

Welcome everyone to a day in the life of data with HPE as well. Uh, let me go ahead and share my screen here and we'll get started. that digital evolution for our customers, with the HPE as rural data fabric to and designs in order to deliver that customized mask, uh, to brighten their interactions with others while protecting the environment and to identify those, those, uh, medical emerging threats, all of this combined with the massive amounts of data that's becoming, becoming available through it is This is just the current world that, that our solutions must live in. the service quality of those mobile devices to ensure optimize connectivity as they move a number of major car companies in the world are using our data fabric to take autonomous uh, we help airlines travel agencies, and even us as consumers deal with pricing, Just to kind of give you a rough idea. from optimized farming and the HBS Modena fabric is there to assist in that journey. and how much of it's requested and being delivered this along with hundreds of other telemetry points landing it in the data fabric, empowering connected availability for analysis to Many of the services you encounter everyday are delivered to you through What are the ways consumers can get started with HPS We have a services to help you uh, a service offering, um, w with a software to kind of get you started with the other solutions within Israel? uh, um, that pair with the HPE, um, data fabric, uh, when you look at the entire ESMO pro portfolio. That's all the questions we have right now. in the organization and, and as moral software is designed to help adapt, an idea about how data fabric can begin to help your business with it.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JamesPERSON

0.99+

ChadPERSON

0.99+

Jimmy BatesPERSON

0.99+

JimmyPERSON

0.99+

CiscoORGANIZATION

0.99+

HPORGANIZATION

0.99+

todayDATE

0.99+

HansPERSON

0.99+

HPS MerleORGANIZATION

0.99+

IsraelLOCATION

0.99+

hundredsQUANTITY

0.99+

HPEORGANIZATION

0.99+

AmericasLOCATION

0.99+

tonightDATE

0.99+

each productQUANTITY

0.98+

HPDsORGANIZATION

0.98+

three main areasQUANTITY

0.97+

ESMOTITLE

0.97+

four main areasQUANTITY

0.96+

more than 200 million a yearQUANTITY

0.96+

MerleORGANIZATION

0.96+

hundred percentQUANTITY

0.95+

one aspectQUANTITY

0.95+

GreenLakeORGANIZATION

0.94+

first deploymentQUANTITY

0.94+

one frameworkQUANTITY

0.93+

two very different peopleQUANTITY

0.92+

one infrastructureQUANTITY

0.92+

zero trustQUANTITY

0.88+

Sue SCAPERSON

0.88+

1 million people a dayQUANTITY

0.87+

firstQUANTITY

0.84+

ModenaCOMMERCIAL_ITEM

0.82+

HBSORGANIZATION

0.82+

each oneQUANTITY

0.82+

one destinationQUANTITY

0.77+

eightQUANTITY

0.73+

yearsQUANTITY

0.72+

A DayQUANTITY

0.67+

telemetry pointsQUANTITY

0.67+

KubernetesTITLE

0.61+

EzmeralORGANIZATION

0.58+

JamesORGANIZATION

0.56+

HPEOTHER

0.53+

Bratin Saha, Amazon | AWS re:Invent 2020


 

>>From around the globe. It's the cube with digital coverage of AWS reinvent 2020 sponsored by Intel and AWS. >>Welcome back to the cubes, ongoing coverage, AWS, AWS reinvent virtual. The cube has gone virtual too, and continues to bring our digital coverage of events across the globe. It's been a big week, big couple of weeks at reinvent and a big week for machine intelligence in learning and AI and new services for customers. And with me to discuss the trends in this space is broadened Sahab, who is the vice president and general manager of machine learning services at AWS Rodan. Great to see you. Thanks for coming on the cube. >>Thank you, Dave. Thank you for having me. >>You're very welcome. Let's get right into it. I mean, I remember when SageMaker was announced it was 2017. Uh, it was really a seminal moment in the whole machine learning space, but take us through the journey over the last few years. Uh, what can you tell us? >>So, you know, what, when we came out with SageMaker customers were telling us that machine learning is hard and it was within, you know, it's only a few large organizations that could truly deploy machine learning at scale. And so we released SageMaker in 2017 and we have seen really broad adoption of SageMaker across the entire spectrum of industries. And today, most of the machine learning in the cloud, the vast majority of it happens on AWS. In fact, AWS has more than two weeks of the machine learning than any other provider. And, you know, we saw this morning that more than 90% of the TensorFlow in the cloud and more than 92% of the pipe out in the cloud happens on AWS. So what has happened in that is customers saw that it was much easier to do machine learning once they were using tools like SageMaker. >>And so many customers started applying a handful of models and they started to see that they were getting real business value. You know, machine learning was no longer a niche machine learning was no longer a fictional thing. It was something that they were getting real business value. And then they started to proliferate across that use cases. And so these customers went from deploying like tens of models to deploying hundreds and thousands of models inside. We have one customer that is deploying more than a million models. And so that is what we have seen is really making machine learning broadly accessible to our customers through the use of SageMaker. >>Yeah. So you probably very quickly went through the experimentation phase and people said, wow, you got the aha moments. And, and, and so adoption went through the roof. What kind of patterns have you seen in terms of the way in which people are using data and maybe some of the problems and challenges that has created for organizations that they've asked you to erect help them rectify? Yes. >>And in fact, in a SageMaker is today one of the fastest growing services in AWS history. And what we have seen happen is as customer scaled out the machine learning deployments, they asked us to help them solve the issues that used to come when you deploy machine learning at scale. So one of the things that happens is when you're doing machine learning, you spend a lot of time preparing the data, cleaning the data, making sure the data is done correctly, so it can train your models. And customers wanted to be able to do the data prep in the same service in which they were doing machine learning. And hence we launched Sage, make a data and learn where with a few clicks, you can connect a variety of data stores, AWS data stores, or third party data stores, and do all of your data preparation. >>Now, once you've done your data preparation, customers wanted to be able to store that data. And that's why we came out with SageMaker feature store and then customers want to be able to take this entire end to end pipeline and be able to automate the whole thing. And that is why we came up with SageMaker pipelines. And then one of the things that customers have asked us to help them address is this issue of statistical bias and explainability. And so we released SageMaker clarify that actually helps customers look at statistical bias to the entire machine learning workflow before you do, when you're doing a data processing before you train your model. And even after you have deployed your model and it gives us insights into why your model is behaving in a particular way. And then we had machine learning in the cloud and many customers have started deploying machine learning at the edge, and they want to be able to deploy these models at the edge and wanted a solution that says, Hey, can I take all of these machine learning capabilities that I have in the cloud, specifically, the model management and the MLR SKP abilities and deploy them to the edge devices. >>And that is why we launched SageMaker edge manager. And then customers said, you know, we still need our basic functionality of training and so on to be faster. And so we released a number of enhancements to SageMaker distributed training in terms of new data, parallel models and new model parallelism models that give the fastest training time on SageMaker across both the frameworks. And, you know, that is one of the key things that we have at AWS is we give customers choice. We don't force them onto a single framework. >>Okay, great. And we, I think we hit them all except, uh, I don't know if you talked about SageMaker debugger, but we will. So I want to come back to and ask you a couple of questions about these features. So it's funny. Sometimes people make fun of your names, but I like them because they said, it says what it does because, because people tell me that I spend all my time wrangling data. So you have data Wrangler, it's, you know, it's all about transformation cleaning. And, and because you don't want to spend 80% of your time wrangling data, you want to spend 80 of your time, you know, driving insights and, and monetization. So, so how, how does one engage with, with data Wrangler and how do you see the possibilities there? >>So data angler is part of SageMaker studio. SageMaker studio was the world's first, fully integrated development run for machine learning. So you come to SageMaker studio, you have a tab there, which you SageMaker data angler, and then you have a visual UI. So that visual UI with just a single click, you can connect to AWS data stores like, you know, red shift or a Tina or third party data stores like snowflake and Databricks and Mongo DB, which will be coming. And then you have a set of built-in data processes for machine learning. So you get that data and you do some interactive processing. Once you're happy with the results of your data, you can just send it off as an automated data pipeline job. And, you know, it's really today the easiest and fastest way to do machine learning and really take out that 80% that you were talking about. >>Has it been so hard to automate the Sage, the pipelines to bring CIC D uh, to, uh, data pipelines? Why has that been such a challenge? And how did you resolve that? >>You know, what has happened is when you look at machine learning, machine learning deals with both code and data, okay. Unlike software, which really has to deal with only code. And so we had the CIC D tools for software, but someone needed to extend it to operating on both data and code. And at the same time, you know, you want to provide reproducibility and lineage and trackability, and really getting that whole end to end system to work across code and data across multiple capabilities was what made it hard. And, you know, that is where we brought in SageMaker pipelines to make this easy for our customers. >>Got it. Thank you. And then let me ask you about, uh, clarify. And this is a huge issue in, in machine intelligence, uh, you know, humans by the very nature of bias that they build models, the models of bias in them. Uh, and so you bringing transplant the other problem with, with AI, and I'm not sure that you're solving this problem, but please clarify if you are no pun intended, but it's that black box AI is a black box. I don't know how the answer, how we got to the answer. It seems like you're attacking that, bringing more transparency and really trying to deal with the biases. I wonder if you could talk about how you do that and how people can expect this to affect their operations. >>I'm glad you asked this question because you know, customers have also asked us about the SageMaker clarify is really intended to address the questions that you brought up. One is it gives you the tools to provide a lot of statistical analysis on the data set that you started with. So let's say you were creating a model for loan approvals, and you want to make sure that, you know, you have equal number of male applicants and equal number of female applicants and so on. So SageMaker clarify, lets you run these kinds of analysis to make sure that your data set is balanced to start with. Now, once that happens, you have trained the model. Once you've trained the model, you want to make sure that the training process did not introduce any unintended statistical bias. So then you can use, SageMaker clarify to again, say, well, is the model behaving in the way I expected it to behave based on the training data I had. >>So let's say your training data set, you know, 50% of all the male applicants got the loans approved after training, you can use, clarify to say, does this model actually predict that 50% of the male applicants will get approved? And if it's more than less, you know, you have a problem. And then after that, we get to the problem you mentioned, which is how do we unravel the black box nature of this? And you know, we took the first steps of it last year with autopilot where we actually gave notebooks. But SageMaker clarify really makes it much better because it tells you why our model is predicting the way it's predicting. It gives you the reasons and it tells you, you know, here is why the model predicts that, you know, you had approved a loan and here's why the model said that you may or may not get a loan. So it really makes it easier, gives visibility and transparency and helps to convert insights that you get from model predictions into actionable insights because you now know why the model is predicting what it's predicting. >>That brings out the confidence level. Okay. Thank you for that. Let me, let me ask you about distributed training on SageMaker help us understand what problem you're solving. You're injecting auto parallelism. Is that about, about scale? Help us understand that. >>Yeah. So one of the things that's happening is, you know, our customers are starting to train really large models like, you know, three years back, they will train models with like 20 million parameters. You know, last year they would train models with like couple of hundred million parameters. Now customers are actually training models with billions of parameters. And when you have such large models, that training can take days and sometimes weeks. And so what we have done E are two concepts. One is we introduced a way of taking a model and training it in parallel and multiple GPU's. And that's, you know what we call a data parallel implementation. We have our own custom libraries for this, which give you the fastest performance on AWS. And then the other thing that happens is customer stakes. Some of these models that are fairly large, you know, like billions of parameters and we showed one of them today called T five and these models are so big that they cannot fit in the memory of a single GPU. And so what happens is today customers have to train such a model. They spend weeks of effort trying to paralyze that Marlon, what we introduced in SageMaker today is a mechanism that automatically takes these large models and distributes it across multiple GPU's the auto parallelization that you were talking about, making it much easier and much faster for customers to really work with these big models. >>Well, the GPU is a very expensive resource. And prior to this, you would have the GPU waiting, waiting, waiting, load me up and you don't want to do that with it. Expensive resources. Yeah. >>And you know, one of the things I mentioned before is Sage make a debugger. So one of the things that we also came out with today is the SageMaker profiler, which is only part of the debugger that lets you look at your GPU utilization at your CPU utilization at, in network utilization and so on. And so now, you know, when your training job has started at which point has the GPU utilization gone down and you can go in and fix it. So this really lets you meet, utilize your resources much better and ultimately reducing your cost of training and making it more efficient. Awesome. >>Let's talk about edge manager because I, you know, Andy Jassy, his keynote was interesting. He his, where he's talking about hybrid and his vision is basically an Amazon's vision is we want to bring AWS to the edge. We see the data center as just another edge node. And so, so this is, to me, another example of, uh, of AWS is, you know, edge strategy, talk about how that works and, and, and, and in practice, uh, how does, how does it work? Am I doing inference at the edge and then bringing back data into the cloud? Uh, am I, am I doing things locally? >>Yes. So, you know what? See each man got edge manager does, is it helps you manage, deploy and manage and manage models at the edge. The inference is happening on the edge device. Now considers his case. So Lenovo has been working with us. And what Lenovo wants to do is to take these models and do predictive maintenance on laptops. So you want to get an it shop and you have a couple of hundred thousand laptops. You would want to know when something may go down. And so the deployed is predictive maintenance models on the laptop. They're doing inference locally on the laptop, but you want to see are the models getting degraded and you want to be able to see is the quality up. So what H manager does is number one, it takes your models, optimizes them so they can run on an edge device and we get up to 25 X benefit and then once you've deployed it, it helps you monitor the quality of the models by letting you upload data samples to SageMaker so that you can see if there is drift in your models, that if there's any other degradation, >>All right. And jumpstart is where I go to. It's kind of the portal that I go to, to access all these cool tools. Is that right? Yep. >>And you know, we have a lot of getting started material, lots of false party models, lots of open source models and solutions. >>I probably we're out of time, but I could go on forever and we did thanks so much for, for bringing this knowledge to the cube audience. Really appreciate your time. >>Thank you. Thank you, Dave, for having me. >>And you're very welcome and good luck with the, the announcements. And thank you for watching everybody. This is Dave Volante for the cube and our coverage of AWS reinvent 2020 continues right after this short break.

Published Date : Dec 10 2020

SUMMARY :

It's the cube with digital coverage of AWS And with me to discuss the trends in this Uh, what can you tell us? and it was within, you know, it's only a few large organizations that And so that is what we have seen is really making machine learning broadly accessible and challenges that has created for organizations that they've asked you to erect help them rectify? to come when you deploy machine learning at scale. And even after you have And then customers said, you know, we still need our basic functionality of training And we, I think we hit them all except, uh, I don't know if you talked about SageMaker debugger, And then you have a set of built-in data processes And at the same time, you know, you want to provide reproducibility and And then let me ask you about, uh, clarify. is really intended to address the questions that you brought up. And if it's more than less, you know, you have a problem. Thank you for that. And when you have such large models, And prior to this, you would have the GPU waiting, And so now, you know, when your training job has started at you know, edge strategy, talk about how that works and, and, They're doing inference locally on the laptop, but you want And jumpstart is where I go to. And you know, we have a lot of getting started material, lots of false party models, knowledge to the cube audience. Thank you. And thank you for watching everybody.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AWSORGANIZATION

0.99+

Andy JassyPERSON

0.99+

DavePERSON

0.99+

50%QUANTITY

0.99+

80%QUANTITY

0.99+

2017DATE

0.99+

AmazonORGANIZATION

0.99+

SahabPERSON

0.99+

more than two weeksQUANTITY

0.99+

80QUANTITY

0.99+

last yearDATE

0.99+

more than a million modelsQUANTITY

0.99+

oneQUANTITY

0.99+

Bratin SahaPERSON

0.99+

tens of modelsQUANTITY

0.99+

Dave VolantePERSON

0.99+

todayDATE

0.99+

more than 92%QUANTITY

0.99+

DatabricksORGANIZATION

0.99+

bothQUANTITY

0.99+

one customerQUANTITY

0.99+

two conceptsQUANTITY

0.99+

SageMakerORGANIZATION

0.99+

more than 90%QUANTITY

0.99+

LenovoORGANIZATION

0.98+

SageMakerTITLE

0.98+

firstQUANTITY

0.98+

OneQUANTITY

0.98+

TinaORGANIZATION

0.98+

three years backDATE

0.97+

SageORGANIZATION

0.96+

eachQUANTITY

0.96+

first stepsQUANTITY

0.96+

single frameworkQUANTITY

0.96+

both dataQUANTITY

0.95+

IntelORGANIZATION

0.95+

this morningDATE

0.94+

AWS RodanORGANIZATION

0.92+

20 million parametersQUANTITY

0.92+

snowflakeORGANIZATION

0.91+

single GPUQUANTITY

0.9+

hundreds and thousands of modelsQUANTITY

0.89+

billions of parametersQUANTITY

0.86+

Mongo DBORGANIZATION

0.8+

couple of hundred thousand laptopsQUANTITY

0.77+

Craig Wicks & Tod Golding, AWS | AWS re:Invent 2020 Partner Network Day


 

>>from around the globe. It's the Cube with digital coverage of AWS reinvent 2020. Special coverage sponsored by A. W s Global Partner Network. Welcome back to the cubes Coverage Cube. Virtual coverage of AWS reinvent 2020. We're not in person this year. We have to do the all the Cube interviews remote. But we've got two great guests from the Amazon Web Services Partner Network A W s a p N. Craig Wicks, senior manager of AWS Satisfactory. Todd Golden, Principal Cloud Architect, Global SAS Tech Lead Gentlemen, Thanks for joining the Cube. Appreciate it. >>Thanks, John. >>Um, first of all, I want to get in Craig with you and just take them in to explain what is the satisfactory. Because this is a unique and growing team within AWS. Um, we've been saying it for years, but the moves to the cloud houses has been obvious is mainstream. But your team, your role is doing some interesting things. Explain. What is the satisfactory? What do you guys do? >>Yeah, Thanks, John. Really delighted to be here today. Yeah, the satisfactory. Maybe for those that may be somewhat disappointing. There's no factory, no sort of easy button for SAS. There's no templates. There's no machinery. We wish we had it. But we're really a global team of subject matter. Experts in SAS that really help AWS partners transform their business right both business and technical to the Saas model and help them do that faster with greater confidence and all the best practices that our team has learned over the years. >>And Todd, your solution architect. So you're the partner. You have to help your customers get their, um, you know, being a solution architect really is like the mechanic of the business. You gotta lay out the engine of innovation and this is what clients are trying to strive for. Can you take him and explain how your role is involved in this? Obviously, SAS is not. It makes sense on paper, but making it happen is not trivial. What do you What do you what? Your role. >>Yeah, so I'm very much, in fact, connected to Craig. We're all part of the same organization, and we're sort of very much deeply involved with these organizations. We get very much, um, embedded with these these partners that we work with and really helped them through sort of the nuts and bolts of what it means to transform an application thio multi tenant sort of SAS models. That means helping them figure out how to map that two different AWS services. It means helping them figure out how to realize the sort of the business objective objectives of transforming to sass. But really, our goal is to sort of just get into the weeds with them, figure out their specific domain because there's no one size fits all. Versace figure out how that really connects toe, where they're at in their trajectory, in terms of where they're trying to get to end of the journey is a business and then find that alignment with a W S services. So there's sort of that trifecta of lining all those bits up and sort of formulating, Ah, technical strategy that really brings all those pieces together for them. >>Craig, I want to get your thoughts on the trends, and Todd, you can weigh in to want to get your reaction. Over the weekend, I was picking some folks on on the Internet, linked in and whatnot from eight years ago when that we did our first cube at reinvent with second year of reinvent, and nobody was there in the industry press, wasn't there were the first I think press to be there. Um and a lot of people have either moved on to big positions or companies have gone public. I bought me. Major things have happened in 2013 clouds certainly rose there. SAS became the business model. Everyone kind of knows that. But the dynamics today are different when you think about the on premises and you got the edge. A big part of the themes this week in the next couple weeks as we unfold here reinvent. This >>is >>different, but the same Can you share? What is the trend that people are riding on? What's the What's the wind of innovation? >>Yeah, and certainly I would say, First of all, just personally, I've been in SAS for some time. It was involved early on, in sort of, ah, model. We called the application service provider model, which was sort of a predecessor assassin, you know, the gray hairs out to remember that one. But, uh, you know, I think first of all, I would say SAS is everywhere and people wanted to be everywhere And so there's just We just see insatiable demand for sass from from customers out there, right? And I think the challenge problem we see is that organizations that we work with just can't transition fast enough, right? The rial technical challenges that air in front of them in terms of how they build an architect, Assaf solution and but most importantly, the business model that sort of underpins. That is a huge transformation for companies that they're going through. And that's one of the things that we just see. You know, Justin, my time in satisfactory native us. The range of organizations we worked with has just changed. So, you know, early on we're working with companies and infrastructure around security and storage and those areas, and the last few years it's just expanded to all sorts of industries, from public sector oil and gas. Um, sort of financial services. You know, everyone really wants to build this model, and that's really, you know, born around the customer demand they're seeing for South. >>That's interesting. You mention challenge. I wanna get your thoughts. You mentioned a SP application service provided you remember those days, you know, vividly, mainly a tech thing, but it's really a consumption model around delivery of software and services. And, you know, Web services came on in 2000. The rest is history. We've got Amazon Web services, but now, as you get more vertically expanded oil and gas and go mainstream. But what >>are some >>of the challenges? Because as people get smarter, it's not just about self service or buy as you go. It's a business model you mentioned. Is it a managed services itself? Services has been embedded into the application. Can you share some of the new things that are emerging on the business model side that people should pay attention to? What, some of those challenges? Yeah, I >>think one of the first things is just a fundamentally are operating service, right? So that changes the dynamics to everything, for in terms of how you engage with customers to how you deliver. You know, the kind of simple thing E I often tell people is you know who's answering the pager now. If someone goes, if something goes wrong, it's not your customer. That's you right, and you have to manage and sustain that service and and really continue Thio provide innovation and value to customers. Right? That's one of the challenges we see is is organizations are now on a treadmill in terms of innovation where customers expect something from South model and you really have to deliver on that. And then one of the final points I would say is it really transforms how you think about going to market right sales and marketing your fundamentally transformed. And, um, you know, traditional ways of really selling software and technology. Um, largely go away and go away and some good ways. And SAS, where you can really put customers in experience right and have them evaluate your technology in a manner where they can have a trial experience, right in a way, toe really introduce them to technology very slowly. And then, um, they grow over time, right? As they see value in that software, which is very aligned, how we think about, you know, a AWS our own technology. >>Okay, Todd, I gotta ask you out. So you want to drive that car? The SAS car, What's under the hood with the right tires? What's the conditions? And it's a technical issues here. If I'm a customer, I'm in a PM, partner. Okay, I'm in there. I got a traditional business pandemic hits or just my business models forcing me. What's your advice? What have I got to do? What's the playbook on the technical side? How doe I go to the next level? >>Well, uh, you know, we're obviously gonna ask a lot of questions and probably the answer to that, sadly, like most technical people will say to you is it depends which is never the answer anybody wants to hear. But so we're definitely gonna ask a lot of questions you about, like where you're at. What are the immediate sort of pressures in your business? This is where the technical team people on our team tended wearing a little bit of a business hat here where we want to know before we sort of guide you down any one particular technical path, like water. Sort of the key sort of dimensions of getting you to a SAS till every model, but but probably as a theme generally were saying to people is, Let's look at how we can get you there incrementally. Let's get you into a SAS model as fast as we possibly can. So we have a lot of different sort of patterns and strategies will use that air about sort of incremental adoption of SAS, which are how can I sort of lift my existing environment, move it into a SAS model, present a SAS offering to the business, Let me operate and run, get the metrics and analytics, get the sort of operational efficiency and the Dev ops goodness of sass, and then sort of move after that into the insides of that sass application. And think about now, how can I begin to move that two more modern constructs? How can I move that into containers? Potentially? Or how can I begin to adopt server list technologies? How can I apply? I am another constructs to achieve Tenet isolation. Eso We're really just trying to put them in a position where they can sort of incrementally modernize their applications while still realizing the benefits of getting to market on a saas model. >>So you're saying that the the playbook is come in low hanging fruit is used existing core building blocks, you see two s three dynamo whatever and then hit the higher level services as you get more experience Or is there a certain recipe that you see working for customers? >>So it's it's probably less about that. It's probably It's not about necessarily where you're out in the service continuum and which services you're using. Um, well, we're gonna move you to a set of services that are probably a good set of services that are that way to move your monolith in most effectively into a saas model as a beginning point that could land you in to that could land you in containers. The more important thing we're going to do here is we're going to surround the that sort of experience with all the other moving parts that you have tow have billing metrics. We're gonna We're gonna build in on boarding so that you could get frictionless on boarding. Those are all gonna be net new things you have to build. We're probably gonna change your identity model and connect that up with cognito or one of our partners solutions eso for us. It's it's sort of grabbing your existing environment. Can we move it over effectively, maybe modernize it a little bit along the way, but more importantly, build all those horizontal concepts in leveraging the right AWS services for you, uh, to bring that to life. >>That's actually smart, aleck. The way you described it that way, it's almost as if it's the core tenant of what Amazon stood for. You standing up fast and you get value, right? So what you're saying is, whatever it takes is a variety of tools to stand it up. I mean, this is interesting, Craig, and talk if you can comment on this because one of the things that we've been reporting on, I've done probably a dozen interviews specifically around companies that have moved to the cloud early, proactively kind of in this way, not in a major radical way. But, you know, operationally they have been transforming, you know, piece by piece. How Todd you laid it out and then pandemic it. And they've had successfully position themselves to take advantage of the forcing function of necessity of dealing with, you know, remote work and all these things that just clobbered him so and again. They were on the wave at the right time. Kind of because they had to because they did the right work. This >>is a >>factor. This is gonna tell sign. Can you guys share your reaction? What you've seen with satisfactory because this >>is the >>benefit of moving to the club. Being positioned needs pandemic today. Tomorrow, its edge. What's after that? Right space. I mean, there's a lot of things. This is kind of the playbook. What's your reaction to that? Correct. >>Yeah. I certainly see, you know, organizations that we work with that have really delivering the SAS model, being more agile, right. The ability to sort of flex resource is and change the way they sell and work with customers and find ways to, um, sort of delivered to them. Um, that don't require, um, some of the things that we're really maybe some of the things that are holding them back from traditional software in terms of how fast they deliver new features and services and, you know, changing to sort of market and world dynamics very quickly. Right is a big part of that. And, you know, one of the things we talked about in the SAS model is really not just getting to sass, but being to deliver in that model, right? And dr Innovations to customers very quickly. Um, s O that you really getting sort of securing, you know, sort of them is the loyal customers and sort of a lifetime customer. Hopefully, um, you know, that's a big part of status. >>Yeah. And there's two types of organizations that you guys have been successful with. The startup, obviously, you know, category creators or disruptors will come in, you know, come in with a nap. Born in the cloud, kick some ass you've seen that movie happens all the time still going on. And then you got the existing organizations that have to stay in that innovation wave and not get crushed by the by the change can you guys share how the factories working? The satisfactory from a mix of of clients is Atmore establishes its startups in between. Give us a taste of What's the makeup? >>Yeah, it's range just to give you a range of some of the companies worked with from kind of legacy technology companies or companies that have been around in some time, like BMC, you know, f five alfresco we've all worked with over the past few years, and they've launched products with our team on a W s. You know, to kind of start ups like Matile. Ian. You know, Cloud zero. Cokie City, which just launched a data management service announced here at Reinvent um, two very kind of specific industry players. I think this is a trend we've seen most recently where, you know, we work with organizations like NASDAQ. I based tea in the aerospace, you know, area Emerson in oil and gas. We've seen in a number of oil and gas companies really come to us based on sort of dynamics, their industry and the constraints the customers are in in terms of how they could deliver the value they provide, >>is there. Is there a key thing that's popping out of all these deals that kind of has a is a tale sign of pattern or, um, a specific thing That's obvious on then, when you look at the data, when you zoom out, >>Yeah, I think one thing I would just say people underestimate the transformation. They have to go through continually. And we still have organizations that come to us, and maybe they come to Todd or others, and they're really they're envisioning This is a technical transformation, right? And they sort of want to talk all about the application and and sort of the new architecture er they they want to move to. But we really see theon pertinent A line business and technology around sass is a model, and that's really fundamental to getting it right. And so, you know, often we see organizations that really have unrealistic launch dates, you know, which is pretty common in software and services these days, but particularly a staff model. We just see that, you know, they underestimate the work in front of them and kind of what they need to bring with that >>Todd real quick for it against the announcements which are cool. Um, technical things that pop out of these organizations is there, Uh, the cream kind of rises to the top. When you look at the value proposition, what do they focused on? Technically, >>um, you know, it's interesting because to me, ah, lot of the focus tends to be more on the things that would surprise you. Like a lot of people are wanna sort of think about how to design the ins Thea click ation on the business logic of their application and take advantage of this scale on the sizing of AWS and those things, they're still all true. But but really an assassin organization with a really successful SAS organizations will see ah, lot more shift to the agility and the operational efficiency, right? So really good organizations will say we're going to invest in all the metrics and all the land analytics, all the tooling that lets us really have our finger on the pulse of what our customers are doing. And then they'll derive all their tech and their business strategy based on this really data driven experience. And I see that as the trend and the thing we certainly advocate a ton inside of the satisfactory is don't under invest in that data because that data is really especially in a multi 10 environment where everybody's running in this sort of shared environment. That data is essential to understanding how to morph your business, how to innovate, understand how your cost profile is really evolving. And so I see the really strong organizations building lots of the sort of foundational bits here, even ahead sometimes of building features and functions into their own products. >>It's not only moving fast and deploying tech is moving fast on the business model innovation as well. You're basically saying, Don't overplay your hand and try toe lock in the business model logic because it's gonna change with the data that what you're saying. >>Yeah, they're playing for for the innovation. They're playing for the agility they're playing for new markets, new segments that may evolve. And so they're really trying to put themselves in the position of being able to pivot and move. And they're really taking pride in the fact that their technology lets them do that. >>You know, that's not that's a business model That's not for the faint of heart. You know, when you have a market that has a lot of competitiveness to it and certainly was seeing the sea change happening over this year in the past few years, with cloud completely changing the playing field, winners and losers air emerging. And that's I think, this key it's you know, as I said in The Godfather, you know, you need a wartime conciliatory for these kind of times, and this is kind of what we're seeing, and I think that's a great point. Todd. Good stuff there. Um Okay. So announcements. You guys had some things on stage. Talked about Craig. You guys launching some new stuff? New programs? >>Yeah, absolutely mhm. Yeah, John, I guess our model is really to learn from a range of partners and experiences we have and then, you know, build tools and approaches to help everyone go faster, right? Because we certainly can't work with thousands organizations. And one of things that our team has had the opportunity over the last few years is published ton of articles, Blog's white papers, you know, very specific approaches to building SAS solutions. If you search Todd Golding out there on YouTube or anything, you'll find a bunch of things. But we wanted to bring on the altogether. And so we've created Central directory called Satisfactory Insights. Hug. And there's a right now over 70 unique pieces of content that our team is produced and curated. Whether you're starting on your staff journey right, you need socks one on one and business planning to level 400 right? 10 10 in isolation from Todd Golding, right. That's all there and available to you on the satisfactory program page. >>What? Some of the interesting things that came out of that that data from the insights you can share. >>Yeah, a couple things that we have we published most recently I would point to are really interesting. We just recently published a five case study where we go deeper in terms of their transformation. To really understand what was, you know, behind the scenes and that, um, we also published a white paper called the SAS Journey Framework, where for the first time, our team really broke down the journey. And what are the steps required? And what are some of the key questions you need to ask Onda Final piece I'd point to for people that Todd talks to is, we have, ah, white paper on SAS tended isolation strategies where we really go deep on on that particular challenge and what's there and that's also published and available on our satisfactory inside sub. Could you >>just define what is that mean tenant isolation strategies? What does that >>go to Todd with that for sure? >>Let's get that on the record. What is the definition of SAS tenant isolation? >>Sure, sure. So, you know, I think I've been in the room and with a lot of people that reinvent and basically have been in Chuck talks and said, You know what's tended isolation to you, and a lot of people will say Oh, that's authentication. Essentially, somebody got into the system. So now I know my system is isolated, but and a multi tenant environment right where we're running all this. These resource is in this data all co mingled from all of these different tenants. Um, it would be a huge blow to the business if one tenant somehow inadvertently exposed the resource or exposed to the resource is of another tenant. And so, fundamentally 10 of isolation is all of these techniques and strategies and architectural patterns that you use to ensure that one tenant can inadvertently get access to the resource is of another tenant s. So it's a sort of a layer of protection and security that goes beyond just the authentication and authorization schemes that you'll typically see in a cess architectures. >>So that's basically like having your own room lock and key doorway not just getting in, but no one can access your your stuff. >>Yeah, so it's a whole set of measures you could imagine. Identity and access management and other policies sort of defining tenant boundaries and saying, as each tenant is trying to access a resource or trying toe, interact with the system in some way, you've put these extra walls up to ensure that you can't cross those boundaries. >>Todd, I want to get your thoughts on this. Well, architected sas lens piece. What is this all about? >>Well, um, a WS has had for a long time the sort of the well architected framework, which has been a really great set of sort of guiding principles and best practices around how to design an architect solutions on top of AWS. And certainly SAS providers have been using that all along the way to sort of ask foundational questions of their architecture. Er But there's always been this layer of additional sort of SAS considerations that have set on top of that are that air SAS specific architectural patterns. And so what we've done is we've used this mechanism called the well architected lens that lets us essentially take our SAS architectural principles and extend the well architected framework and introduce all these concepts into the SAS and to the architecture pillars that really ask the hard SAS architecture questions so security operations reliability all the sort of classic pillars that are part of the well architected framework now have a SAS specific context added to them. Thio to really go after those areas that are unique to sass providers. And this really gives developers, architects, consultants the ability to sit down and look at a SAS application and evaluate its alignment with these best practices. And so far we can really positive response. Thio the content. >>Great job, guys doing great work. Finally, there's something new that you guys are announcing today to make life easier. Preview building SAS on a bus. What's that? What's that about? >>Sure. Eso You know you can imagine. We've been working with thes SAS providers for a number of years now, and as we've worked with them, we've seen a number of different themes emerge on and and we've run into this pattern That's pretty common where we'll see these, uh, these customers that have a classic sort of installed software model. They're installing it on premises or in the cloud, but basically each customer's sort of has their own version of the product. They have one off versions. They have their potentially have customization that are different. And while this works for some time for these businesses, what they find is they sort of run into this operational efficiency and cost wall. Whereas they're trying to grow their businesses, they they just really can't. They can't sort of keep up based on the way that they're running their current systems, and this is sort of a natural draw to move them to sass. But the other pattern that we've seen here is that these organizations are sometimes not in a position where they have the luxury of sort of going away and just saying, Hey, I'll rewrite my system or modernize it and make all of these changes. There could be any number of factors competitive pressures, market realities, cost that just make that too much of, ah, difficult process for them to be able to just take the application and rewrite it. And so what we did is sort of try to acknowledge that and say, What could we do to give you, ah, more prescriptive solution of this, the sort of turn key, easy button, if you will to say, Take my existing monolithic application that I deliver in this classic way and plug it into an existing pre built framework. An environment that is essentially includes all these foundational bits of assassin Vyron mint. And let me just take my monolith, move it into that environment and begin toe offer a SAS product to to the universe. And so what we've done is we've printed something and were introduced. We've introduced this thing called a W s SAS boost So a W s ass boost. It's not on a W s service. It is an open source reference environment. So you essentially download it. You install it into your own A W s account. And then this installs all these building blocks of sass that we've talked about. And it gives you all this sort of prescriptive ability to say, How can I now take my existing monolithic environment lifted into this experience and begin toe offer that to the market as a sash products. So it has, you know, it has billing. It has metrics and analytics. All the things we've been kind of talked about here they're all baked into that from the ground up on. We've also offered this an open source model. So our hope here is that this is really just the starting point of this solution, which, which will solve one business case. But our hope is that essentially the open source community will lean in with us, help us figure out how to evolve and make this into something that addresses a broader set of needs. >>Well, I love the SAS boost. Firstly, I wanna take the energy drink business there. Right there. It sounds like an energy drink. Give me some of that sass boost by that at 7. 11. Craig, I wanna get the final word with you. You've been the SAS business for over 20 years. You've seen this movie before. There are a lot of people who know the SAS business, and some people are learning it. You guys are helping people get there. It's different, though. Now what's different today? Because it's it's It's not just your grandfather's sass. As the expression goes, it's different. It's new dynamics. What is, uh, the most important thing people should pay attention to Whether they have a SAS legacy kind of mindset or they're new to the game. Take us >>home. Yeah, I >>think certainly, you know, getting disaster is not the end of the journey. You know, we see really successful fast provider. Just continue to differentiate, right? And then one of the things that I think we've seen successful SAT providers do is really take advantage of AWS services to go faster. Right? And that's really key, I think in this model is to really find a way to accelerate your business and deliver value faster. Andi just sort of keep that differentiation innovation there. Um, but I would just say now that there's more information out there available than ever, you know, and not only from from our team, but from a host of people that really are our SAS experts and follow the space. And so lots of resources available. Everyone >>All right, gentlemen, Thanks for coming on. Great insight. Great segment on getting to sass, sass boost Just the landscape. You guys are helping customers get there, and that's really the top priority. It's necessity is the mother of all invention during this pandemic. More than ever, uh, keeping business model going and establishing new ones. So thanks for coming on. >>Thanks for having us, John. >>Okay, It's the cubes. Virtual coverage. We are a SAS business. Now we're virtual bringing you remote. Uh, SAS Cube and, uh, more coverage with reinvent next few weeks. Thanks for watching. Okay, yeah.

Published Date : Dec 3 2020

SUMMARY :

It's the Cube with digital Um, first of all, I want to get in Craig with you and just take them in to explain what is the satisfactory. Yeah, the satisfactory. get their, um, you know, being a solution architect really is like the mechanic of the business. But really, our goal is to sort of just get into the weeds with But the dynamics today are different when you think about the on premises and you got the edge. You know, everyone really wants to build this model, and that's really, you know, born around the customer demand they're seeing And, you know, Web services came on in 2000. Can you share some of the new things that are emerging on the business model side that people should pay attention So that changes the dynamics to everything, for in terms of how you engage with customers So you want to drive that car? Sort of the key sort of dimensions of getting you to a SAS till every model, We're gonna We're gonna build in on boarding so that you could get frictionless on boarding. necessity of dealing with, you know, remote work and all these things that just clobbered Can you guys share your reaction? This is kind of the playbook. of how fast they deliver new features and services and, you know, changing to sort of market get crushed by the by the change can you guys share how the Yeah, it's range just to give you a range of some of the companies worked with from kind of legacy technology companies when you look at the data, when you zoom out, And so, you know, often we see organizations that really have unrealistic launch dates, When you look at the value proposition, And I see that as the trend and the thing we certainly advocate a ton inside of the satisfactory It's not only moving fast and deploying tech is moving fast on the business model innovation as well. They're playing for the agility they're playing for And that's I think, this key it's you know, as I said in The Godfather, That's all there and available to you on the satisfactory Some of the interesting things that came out of that that data from the insights you And what are some of the key questions you need to ask Onda Final piece I'd point to for Let's get that on the record. exposed the resource or exposed to the resource is of another tenant. So that's basically like having your own room lock and key doorway ensure that you can't cross those boundaries. What is this all about? consultants the ability to sit down and look at a SAS application and evaluate Finally, there's something new that you guys are announcing today the sort of turn key, easy button, if you will to say, Take my existing monolithic application Whether they have a SAS legacy kind of mindset or they're new to the game. Yeah, I And that's really key, I think in this model is to really find a way to accelerate your business It's necessity is the mother of all Now we're virtual bringing you remote.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

Todd GoldingPERSON

0.99+

JustinPERSON

0.99+

AWSORGANIZATION

0.99+

NASDAQORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

ToddPERSON

0.99+

Todd GoldenPERSON

0.99+

2013DATE

0.99+

CraigPERSON

0.99+

TomorrowDATE

0.99+

2000DATE

0.99+

IanPERSON

0.99+

twoQUANTITY

0.99+

WSORGANIZATION

0.99+

AssafORGANIZATION

0.99+

BMCORGANIZATION

0.99+

N. Craig WicksPERSON

0.99+

A. W s Global Partner NetworkORGANIZATION

0.99+

SASORGANIZATION

0.99+

Amazon Web Services Partner NetworkORGANIZATION

0.99+

EmersonORGANIZATION

0.99+

firstQUANTITY

0.99+

AtmoreORGANIZATION

0.99+

todayDATE

0.99+

eight years agoDATE

0.99+

10QUANTITY

0.99+

7. 11DATE

0.99+

over 20 yearsQUANTITY

0.99+

first cubeQUANTITY

0.98+

first timeQUANTITY

0.98+

oneQUANTITY

0.98+

YouTubeORGANIZATION

0.98+

over 70 unique piecesQUANTITY

0.98+

two great guestsQUANTITY

0.98+

FirstlyQUANTITY

0.98+

Cokie CityORGANIZATION

0.98+

The GodfatherTITLE

0.98+

Cloud zeroORGANIZATION

0.98+

two typesQUANTITY

0.97+

each customerQUANTITY

0.97+

AWS SatisfactoryORGANIZATION

0.97+

second yearQUANTITY

0.96+

this weekDATE

0.96+

this yearDATE

0.96+

ChuckPERSON

0.96+

waveEVENT

0.96+

A W sORGANIZATION

0.95+

Tod GoldingPERSON

0.95+

pandemicEVENT

0.94+

SAS Journey FrameworkTITLE

0.94+

a dozen interviewsQUANTITY

0.93+

Deepak Singh, AWS | AWS re:Invent 2020.


 

>>from around the globe. It's the Cube with digital coverage of AWS reinvent 2020 sponsored by Intel and AWS. Yeah, welcome back to the Cubes. Live coverage of AWS reinvent 2020. It's virtual this year over three weeks. Next three weeks we're here on the ground, covering all the live action. Hundreds of videos Walter Wall coverage were virtual not in person this year. So we're bringing all the interviews remote. We have Deepak Singh, vice president of Compute Services. A range of things within Amazon's world. He's the container guy. He knows all what's going on with open source. Deepak, great to see you again. Sorry, we can't be in person, but that's the best we could do. Thanks for coming on. And big keynote news all year all over the keynote. Your DNA is everywhere in the keynote. Thanks for coming on. >>Yeah. Now, no thanks for having me again. It's always great to be on the Cube. Unfortunately, not sitting in the middle of the floral arrangement, which I kind of miss. I know, but it waas great morning for us. We had a number of announcements in the container space and sort of adjacent to that in the developer and operator experience space about making it easy for people to adopt things like containers and serverless. So we're pretty excited about. And his keynote today and the rest agreement. >>It's interesting, You know, I've been following Amazon. Now start a three invent. I've been using Amazon since easy to started telling that garment that story. But you look like the mainstream market right now. This is a wake up call for Cloud. Um, mainly because the pandemic has been forced upon everybody. I talked to Andy about that he brought up in the keynote, but you start to get into the meat on the bone here. When you're saying OK, what does it really mean? The containers, the server Lis, Uh, the machine learning all kind of tied together with computers getting faster. So you see an absolute focus of infrastructures of service, which has been the bread and butter for Amazon web services. But now that kinda you know, connective tissue between where the machine learning kicks in. This is where I see containers and lambda and serve Earless really kicking ass and and really fill in the hole there because that's really been the innovation story and containers air all through that and the eks anywhere was to me the big announcement because it shows Amazon's wow vision of taking Amazon to the edge to the data center. This is a big important announcement. Could you explain E. K s anywhere? Because I think this is at the heart of where customers are looking to go to its where the puck is going. You're skating to where the puck is. Explain the importance of eks anywhere. >>Yeah, I'll actually step back. And I talked about a couple of things here on I think some of the other announcements you heard today like the smaller outposts, uh, you know, the one you and do you outpost skills are also part of that story. So I mean, if you look at it, AWS started thinking about what will it take for us to be successful in customers data centers a few years ago? Because customers still have data centers, they're still running there On our first step towards that Waas AWS in many ways benefits a lot from the way we build hardware. How what we do with nitro all the way to see C two instance types that we have. What we have a GPS on our post waas. Can we bring some of the core fundamental properties that AWS has into a customer data center, which then allowed PCs any KS and other AWS services to be run on output? Because that's how we run today. But what we started hearing from customers waas That was not enough for two reasons. One, not all of them have big data centers. They may want to run things on, you know, in a much smaller location. I like to think about things like oil rates of point of sale places, for they may have existing hardware that they still plan to use and intend to use for a very long time with the foundational building blocks easy to EBS. Those get difficult when we go on to hardware. That is not a W s hardware because be very much depend on that. But it containers we know it's possible. So we started thinking about what will it take for us to bring the best of AWS toe help customers run containers in their own data center, so I'll start with kubernetes, so with que binaries. People very often pick Kubernetes because they start continue rising inside their own data centers. And the best solution for them is Cuban Aires. So they learn it very well. They understand it, their organizations are built around it. But then they come to AWS and run any chaos. And while communities is communities, if you're running upstream, something that runs on Prem will run on AWS. They end up in two places in sort of two situations. One, they want to work with AWS. They want to get our support. They want to get our expertise second, most of them once they start running. Eks realized that we have a really nice operational posture of a D. K s. It's very reliable. It scales. They want to bring that same operational posture on Prem. So with the ts anywhere what we decided to do Waas start with the bits underlying eks. The eks destroyed that we announced today it's an open source communities distribution with some additional pieces that that we had some of the items that we use that can be run anywhere. They're not dependent on AWS. You don't even have be connected to a W s to use eks destro, but we will Patrick. We will updated. It's an open source project on get help. So that's a starting point that's available today. No, Over the next several months, what will add is all of the operational to link that we have from chaos, we will make available on premises so that people can operate the Cuban and these clusters on Prem just the way they do on AWS. And then we also announced the U. K s dashboard today which gives you visibility into our communities clusters on AWS, and we'll extend that so that any communities clusters you're running will end up on the dashboard to get a single view into what's going on. And that's the vision for eks anywhere, which is if you're running communities. We have our operational approach to running it. We have a set of tools that we're gonna that we have built. We want everybody to have access to the same tools and then moving from wherever you are to aws becomes super easy cause using the same tooling. We did something similar with the C s as well the DCs anywhere. But we did it a little bit differently. Where in the CSU was centralized control plane and all we want for you is to bring a CPU and memory. The demo for that actually runs in a bunch of raspberry PiS. So as long as you can install the C s agent and connect to an AWS region, you're good to go. So same problem. Different, slightly different solutions. But then we are customers fall into both buckets. So that's that's the general idea is when we say anywhere it means anywhere and we'll meet you there >>and then data centers running the case in the data center and cloud all good stuff. The other thing that came out I want you to explain is the importance of what Andy was getting to around this notion of the monolith versus Micro Services at one slightly put up. And that's where he was talking about Lambda and Containers for smaller compute loads. What does it mean? What was he talking about there? Explain what he means by that >>that Z kind of subtle and quite honestly, it's not unique to London containers. That's the way the world was going, except that with containers and with several functions with panda. You got this new small building blocks that allow you to do it that much better. So you know you can break your application off. In the smaller and smaller pieces, you can have teams that own each of those individual pieces each other pieces. Each of these services can be built using architecture that you secret, some of them makes sense. Purely service, land and media gateway. Other things you may want to run on the C s and target. Ah, third component. You may have be depending on open source ecosystem of applications. And there you may want to run in communities. So what you're doing is taking up what used to be one giant down, breaking up into a number of constituent pieces, each of which is built somewhat independently or at least can be. The problem now is how do you build the infrastructure where the platform teams of visibility in tow, what all the services are they being run properly? And also, how do you scale this within an organization, you can't train an entire organ. Communities overnight takes time similar with similarly with server list eso. That's kind of what I was talking about. That's where the world is going. And then to address that specific problem we announced AWS proton, uh, AWS program is essentially a service that allows you to bring all of these best practices together, allows the centralized team, for example, to decide what are the architectures they want to support. What are the tools that they want to support infrastructure escort, continuous delivery, observe ability. You know all the buzzwords, but that's where the world's going and then give them a single framework where they can deploy these and then the developers can come into self service. It's like I want to build a service using Lambda. I don't even learn how toe put it all together. I'm just gonna put my coat and pointed at this stock that might centralized team has built for me. All I need to do is put a couple of parameters, um, and I'm off to the races and not scale it to end, and it gives you the ability to manage also, So >>it's really kind of the building blocks pushing that out to the customer. I gotta ask you real quick on the proton. That's a fully managed service created best. Could you explain what that means for the developer customer? What's the bottom line? What's the benefit to >>them? So the biggest benefit of developers if they don't need to become an expert at every single technology out there, they can focus on writing application court, not have to learn how to crawl into structure and how pipelines are built and what are the best practices they could choose to do. So the developers, you know, modern and companies Sometimes developers wear two hats and the building off, the sort of underlying scaffolding and the and the build applications for application development. Now all you have to do is in writing an application code and then just go into a proton and say, This is architecture, that I'm going to choose your self, service it and then you're off to the races. If there's any underlying component that's changing, or any updates are coming on, put on it automatically take care off updates for you or give you a signal that says, Hey, the stock has to be updated first time to redeploy accord so you can do all of that in a very automated fashion. That's why everything is done. Infrastructures Gold. It's like a key, uh, infrastructure and told us, and continuous delivery of sort of key foundational principles off put on. And what they basically do is doing something that every company that we talked oh wants to do. But only a handful have the teams and the skill set to do that. It takes a lot of work and it takes ah lot of retraining. And now most companies don't need to do that. Or at least not in that here. So I think this is where the automation and manageability that brings makes life a lot easier. >>Yeah, a lot of drugs. No docker containers. They're very familiar with it. They want to use that. Whatever. Workflow. Quickly explain again to me so I can understand fully the benefit of the lamb container dynamic. Because what was the use case there? What's the problem that you solve? And what does it mean for the developer? What specifically is going on there? What's the What's the benefit? Why would I care? >>Yeah, eso I'll actually talked about one of the services that my team runs called it of your stature. AWS batch has a front time that's completely serverless. It's Lambda and FBI did play its back in the PCs running on the city right? That's the better the back end services run on their customers. Jobs in the running. Our customers are just like that. You know, we have many customers out there that are building services that are either completely service, but they fit that pattern. They are triggered by events. They're taking an event from something and then triggering a bunch of services or their triggering an action which is doing some data processing. And then they have these long running services, which almost universally in our running on containment. How do you bring all of this together into a single framework, as opposed to some people being experts on Lambda and some people being experts and containers? That's not how the real world works. So trying to put all of this because these teams do work together into a single framework was our goal, because that's what we see our customers doing, and I think they'll they'll do it. More related to that is the fact that Lambda now supports Dr Images containing images as a packaging format because a lot of companies have invested in tooling, toe build container images and our land. I can benefit from that as well. While customers get all the, you know, magic, The Lambda brings you >>a couple of years ago on this on the Cube. I shared this tweet out earlier in the week. Andy, we pressed and even services launches like, would you launch build Amazon on Lamb? Day says we probably would. And then he announced to me And he also I think you mentioned the keynote that half of Amazon's new APS are built on lambda. >>Yeah, that's good. This >>is a new generation of developers. >>Oh, absolutely. I mean, you should talk to the Lambda today also, but even like even in the container side, almost half of the new container customers that we have on AWS in 2020 have chosen target, which is serverless containers. They're not picking E c s or E. T. S and running at least two. They're running it on target the vast majority of those two PCs, but we see that trend on the container side as well, and actually it's accelerating. More and more and more new customers will pick target, then running containers on the city. >>Deepak, great to chat with you. I know you gotta go. Thanks for coming on our program. Breaking down the keynote analysis. You've got a great, um, focus area is only going to get hotter and grow faster and a lot more controversy and goodness coming at the same time. So congratulations. >>Thank you. And always good to be here. >>Thanks for coming on. This is the Cube Virtual. We are the Cube. Virtual. I'm John for your host. Thanks for watching.

Published Date : Dec 2 2020

SUMMARY :

Deepak, great to see you again. in the container space and sort of adjacent to that in the developer and operator experience I talked to Andy about that he brought up in the keynote, but you start to get into the meat on So that's that's the general idea is when we say anywhere it means anywhere and we'll meet you there to explain is the importance of what Andy was getting to around this notion of the monolith versus In the smaller and smaller pieces, you can have teams it's really kind of the building blocks pushing that out to the customer. So the biggest benefit of developers if they don't need to become an expert at every single technology out there, What's the problem that you solve? It's Lambda and FBI did play its back in the PCs running on the city right? And then he announced to me And he also I think you mentioned the keynote that half Yeah, that's good. almost half of the new container customers that we have on AWS in 2020 have I know you gotta go. And always good to be here. This is the Cube Virtual.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AndyPERSON

0.99+

AWSORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

Deepak SinghPERSON

0.99+

2020DATE

0.99+

DeepakPERSON

0.99+

Walter WallPERSON

0.99+

todayDATE

0.99+

first stepQUANTITY

0.99+

JohnPERSON

0.99+

two situationsQUANTITY

0.99+

oneQUANTITY

0.99+

two PCsQUANTITY

0.99+

LambdaTITLE

0.99+

two reasonsQUANTITY

0.99+

OneQUANTITY

0.99+

EachQUANTITY

0.99+

two placesQUANTITY

0.99+

LondonLOCATION

0.98+

FBIORGANIZATION

0.98+

Hundreds of videosQUANTITY

0.98+

this yearDATE

0.98+

IntelORGANIZATION

0.97+

first timeQUANTITY

0.97+

third componentQUANTITY

0.97+

U. KLOCATION

0.97+

single frameworkQUANTITY

0.96+

eachQUANTITY

0.96+

both bucketsQUANTITY

0.96+

Cuban AiresLOCATION

0.96+

CubeCOMMERCIAL_ITEM

0.95+

Cube VirtualCOMMERCIAL_ITEM

0.95+

pandemicEVENT

0.94+

singleQUANTITY

0.93+

PatrickPERSON

0.93+

over three weeksQUANTITY

0.93+

few years agoDATE

0.92+

awsORGANIZATION

0.9+

secondQUANTITY

0.9+

Compute ServicesORGANIZATION

0.9+

LambdaORGANIZATION

0.88+

couple of years agoDATE

0.87+

KubernetesTITLE

0.87+

Next three weeksDATE

0.86+

two hatsQUANTITY

0.82+

single technologyQUANTITY

0.82+

EBSORGANIZATION

0.81+

PremORGANIZATION

0.8+

monthsDATE

0.77+

The LambdaTITLE

0.76+

threeQUANTITY

0.74+

C sTITLE

0.71+

least twoQUANTITY

0.69+

Tom Sweet, Dell Technologies | Dell Technologies World 2020


 

>>from around the globe. It's the Cube with digital coverage of Dell Technologies. World Digital Experience Brought to You by Dell Technologies. Hello, everyone, and welcome Back to the cubes. Continuing coverage of Del Tech World 2020. This is David Dante With Me is Tom Sweet. He's the EVP and chief financial officer of Dell Technologies. Tom is great to see you. Thanks for coming on The Virtual Cube. >>Dave is always good to see you. And thanks for having me. It's always good to have a conversation with you. >>I actually don't think I've spent a lot of time talking to folks from jail, but I don't think you and I have talked since the pandemic hit. So you know, what's the macro picture? You know, you and I was usually start with the big picture. And, of course, the impact of the pandemic and kind of the big waves that you're seeing out. There may be some of the changes that you're navigating >>Well, you know, it's it's been uninterested near David's. You and I both know, right, and so we way clearly did a number of tactical actions as we worked our way through the pandemic in the early days to make sure our team members could work and we're safe and then pivoted to making sure we could, you know, help our customers and get them up in productive from a work from home perspective, you know? And so it's and then we've evolved into Then, you know, how do you think your way through? Um, you know, what's the what's the work? How do you work your way through? What do you look like on the other end? And so we've been spending a lot of time thinking about investments. Where do we put Capital Toe work to position the organization for success? Post Cobain, whenever that might be, by the way, and and so that's been the focus in, you know, really spending a lot of time on investment areas. The whole macro dynamic has been interesting is, you know, way went through this huge trough in Q two in terms of GDP and global GDP. You know, we're working our way out of that at a macro level. It's very interesting as you go across the globe and look at the various countries and regions and how they're recovering at very different paces. You know, the business has been uninterested in business in terms of what we do, and our PC business has been quite strong. And we've seen a big shift with the work from home and learn from home dynamics with strong demand from government and education. Three infrastructure business R I s G business has been a bit softer, just a zoo Companies have pivoted, but all in all, I think we're working our way through it. I e think the actions we took to preserve liquidity and protect the P and L early in the pandemic have paid off for us. And, uh, we're now focused on how do we position Post Post when we get through this whole cova dynamic? >>You know, way both seen a couple of pretty severe downturns. I think about the dot com downturn and then the financial crisis. I'm actually kind of surprised and impressed the way that that not just our industry, but all industries have worked through this. I guess in hindsight, that shouldn't be surprising given the pace of technology. But I remember those two that I just mentioned. People were flat footed. I remember Ed Zander joking when he was a son. Anybody wanna buy a server? And it was just there was business wasn't being transacted. And that's different this time around, Uh, industries have have responded and you know, technology, of course, is is at the heart of that. But were you surprised at all by the by the pace of I don't want to say recovery, but resiliency, I guess >>a little bit to be honest day. I mean I mean, it does highlight the fact that at the heart of what most companies are you know are doing these days is technology and how they evolve their business model, how how they interact with their customers. And so clearly, if you you think all the way back with our industry date back to the early two thousands and we had a with the bump with the dot com bust and people shut down, I t spending, you know. And now I don't think you can really do that if you think about where you need to be from a business model perspective. So I think there's been a maturation and a recognition that technology plays a key role. But But it has been surprising about how fast it's pivoted. To be honest with you in the sense of, you know, I think of the very distinct cycles is would come through the Coba dynamic. Big PC demand early innings. You know, we saw some recovering the I S G spend in Q two in our quarter second quarter a little bit better than Q one. You know, as companies readjusted spin eso, it's The organizations across in our customer base have have adjusted quite well. Clearly, there is vertical implications. If you're in the airline industry or some of the hospitality, you're you're being a bit more cautious, right? But all in all, it's been a It's been an interesting journey for all of us. >>Yeah, I mean, at the height of the pandemic, you saw, you know, some people taking actions. Obviously, they were freezing I t projects. They were starting to do layoffs or freezing new hires. That's moderated based on the data that we've seen. I just published the other day that we're starting to see some, you know, slow thawing of that tight grip on I t. What are you seeing? Both externally and maybe as the CFO. What are you doing internally? Well, >>if you talk to my CEO should probably give you a different answer day that I'm about to give you because you know, I'm a extraordinarily balanced guy in my point of view, right? But, you know, look, I think externally we're seeing targeted investments happening by customers that are moving projects forward. I think there's a bit of caution, and I do think this whole evolution off. How do customers want to consume? I t is evolving, you know. Is it a cat expand? Is it a Is it a financing structure? Is it a as a service and consumption model type? You know, So those three economic models around I t. Or changing and evolving. But I think overall, what we've seen is some level off, you know, cautious, you know, cautiousness. But yet, you know, targeted and investment with our customers and in an internally, Quite frankly, we're continuing to invest. We have capabilities that we need to evolve. You know, we're working. We're very focused on transformational projects that enable our customers to do business with us easier. On the other hand, we're being very tight around. What do I need to do from, You know, some of those old run the business types spend and how doe I streamline that while still supporting the business properly. So it's a bit of a balance right now. >>Yeah, and you obviously have the advantage of large portfolio parts of your portfolio exposed. Like you said, some of the on Prem stuff. But then you've got the certainly the laptop in the work from home shift. A couple of questions there. One is, first of all, you know, Della was largely a larger work from home culture than the average. The average Let's say the average is on a 15 to 20% of employees work from home. You're probably higher than that. And and But now we're seeing that people are expecting at least double that long term are gonna work from home. So you were, you know, somewhat, maybe more prepared than than most. But then again, you have that tailwind on one side of your business. Your supply chain did very well, unlike some of your competitors that we saw early in the pandemic, you know? So it seems like you've managed that pretty well. Maybe your thoughts. >>Yeah. Okay. We do have a culture that provided flexibility. We've been on this journey for roughly 10 years about having our people have some flexibility where they work. And so we had roughly 20 25,000 people working remotely, or some are in some hybrid fashion before the pandemic. You know, obviously, right now, 90% of our workforce is is remote. We think, you know, post pandemic, you know that it's gonna look like something like, you know, you know, 45 50% of the organization is probably gonna be in some sort of hybrid or remote setting. You know, that's the feedback our team members are giving us. And, uh and so you know, we have been fortunate to be able to have the culture that pivoted quite frank quite quickly, I should say, as we worked our way through this from a supply chain perspective Look our supply chain has done. Team has done a terrific job on sort of navigating the barriers and the challenges put up by a covert 19 crisis. But I'll go further back that if you and I talked about this before, think about what's happened with our supply chain and global supply chains over the last couple of years and whether it's the US China dynamic and how do you work your way through that? You know, and how do you ensure continuity of supply for our customers? And so that that teams done a great job? You know, we have long term relationships with many of our key suppliers, which has been helpful. And, you know, as you know, we have one of the largest, if not the largest, technology by in the industry. So it has helped us in terms of making sure we have capability and availability for custom. >>Let's talk a little bit about some of the strategy and the value levers that you guys talk about. You've always hit on industry consolidation, integration delivering. You've seen the 13 D with the movie you're gonna make with VM Ware. How have things changed? There has a pandemic changed your thinking at all, And how are you doing in terms of those turning those knobs? >>You know, first, it has not changed our thinking in the sense of some of those keep long term value creation activities we've been focused on and platforms we've been focused on around Hey, you know, we know that in the where we where we sell where we compete, that the industry is not a, you know, a rapidly growing industry. And so you grow organically by consolidation and share gain, and that's what we've been focused on. You couple that with the innovation engine we have with Dell Technologies. And, uh, including our, you know, way need to including that VM ware. You know, we've got a new, extraordinary patent portfolio and we've got these what we think are unique solutions and capability. So we're pushing hard on the innovation engine, and then you couple that with the capital work we've been doing around, how do you delivering the balance sheet? Getting the company reposition back towards investment grade. And we've made really good progress on that. You know will pay down $5.5 billion of debt this year, which will again position us closer to those investment grade like metrics. And so those those platforms are pillars, if you will, of our strategy, haven't changed. But in addition to that, you know, we are looking at where do you grow and how do you continue to grow at a pace, perhaps at GDP GDP plus, which is sort of where we think you know, is the long term framework we've got to be thinking about. So that's where you get into these adjacency is like, How do you How do you further driving a multi cloud hybrid cloud? How do you think about the opportunity with Telco, with five G roll out that's happening across the globe and the investment that's going to go into that the whole edge computing the edge cloud is of interest to us. And so there's a number of these emerging areas that we think are pretty interesting, and their adjacent and fit nicely into what we do is a, you know is, quite frankly, that essential infrastructure company. So that's the focus we've been driving about. How do we set up both continue on our core mission of consolidation, innovation and delivering as well as how do you set up some of these growth vectors as we move forward? >>Well, in one of the other levers you filed the 13 d, I don't know what you can share with us. Some of it gets confused. How much is fact sometimes and how much is speculation. But, I mean, I've said that it appears that one of the things that you're looking at is creating an equilibrium in terms of the balance sheets of both companies. Uh, keep getting them both that investment grade. What can you tell us about what you're thinking there? >>Yeah, I look, you know, obviously we did file a 13 D in mid July, which essentially said we were contemplating whether you know, a potential spin of our 81% ownership interest out to the Dell Technology shareholders. And so we're continuing to work with the VM Ware team on, you know, what does that look like with a couple of fundamental principles, which is Hey, you know, we have both benefited from this better together story. And so how do we keep that differentiation in some type of a long term operating agreement or operating framework? But at the same point in time, you know, you know, do the potentially look at it spend that unlocks value for both sets of shareholders of both companies, right? VM ware gets additional flexibility from a from a strategic perspective, they don't have the Dell balance sheet. Dell Technologies balance sheets sitting on top of them from the Dell Technologies perspective. You know, we presumably as part of this would be some type of a dividend stream. But by being were out to its share. What shareholders? We get the opportunity to accelerate our delivering story and get back closer to investment grade or right at investment grade, depending upon how this all works out. So we think there's a number of really interesting value levers here, right at the same point in time, wanting to protect what's been really good about the relationship in the way we've gone to market, the way we've innovated. And so that's the balance were walking right now. And you know there's work to do is we work with being where to see. If this makes sense, can we get it done? But But we're early innings and and we may end up not doing anything honestly, But I mean, that's that's sort of the thinking that we're working through right now. >>Well, it's an interesting thought exercise, if nothing else. And so e I look at it when when you combine del in the M. C when you did the acquisition. Now you became VM Ware's most important partner. Just even if it's in terms of revenue because you've got a massive distribution channel. So there's there's that inherent value in that relationship, independent of anything else. The flip side of that is VM Ware has been, you know, awesome acquire of companies. Uh, you know, inorganic r and D, if you will. And some pretty cool R and D A Z Well, so it's gonna be really interesting toe watch how that plays out. I think we wait and see. That's a comment, you know, >>we're working through it and we'll see where we end up. But, you know, you've highlighted a couple of great points. I mean, our, you know, our go to market reach, you know, it is extraordinary. And VM Ware has benefited from that. We've benefited from the VM Ware relationship with some of their technologies is we've integrated those into our combined solution. So it's been a it's been a win win, and that's the balance of how do you keep that, Aziz. Well, as you know, quite frankly, provide some value back to your shareholders. >>Well, we've seen that not just the the uplift of the market. But clearly the speculation has caused some unlocking of value and may bring some others from the sidelines. But I wanted to ask you about I've been talking about this automation mandate. I think there was one. Certainly. There was one before the pandemic, and now it's even accentuated. Um, can you talk a little bit about how you're applying automation, thio your business and maybe what you're seeing with customers? How that could affect, you know, the long term productivity of your business? Maybe new ways to work. What can you tell us there? >>Yeah, Look, I mean, we we have a pretty significant automation agenda within Dell Technologies, both from an internal perspective as well as the automation and a I am and machine learning capabilities were embedding into our solutions to help our customers Dr their automation agendas. Internally, what we've been focused on is how do I simplify? How do I take complexity out? You know, how doe I providing a richer mawr interactive experience with our customers? How doe I lean into service needs service capabilities, all those areas that are ripe for automation and my finance organization alone Right now, I think I have over 125 automation projects going right now is we? We look at how we simplify from a customer. Perspective is I go out and talk to customers. They're also doing much the same thing that we're doing, which is how did they take complexity out of their process? How do they streamline? How are they? How do they drive? Responsiveness and customer, uh, you know, customer experience at a much higher level. And so it's all you know. It's all war walking down this pathway of process simplification, automation, which includes technology, investment, obviously which is, you know, helpful from our perspective. And so there's a agenda out there is Aziz. We talked with customers in terms of in a commonality as we talked with customers. And then the other point I'd give you Dave, is that just as you think about, you know, as I talked to my peers out in the industry, I mean, many of us are driving automation agendas. Have a lot of that, you know, with focused on taking touch out, enrichment of job and capabilities, enrichment of, you know, we gotta build skill sets to drive that. So there is a big theme across the industry in this area, and I think it's gonna do nothing but accelerate. Quite frankly, Aziz, we work our way forward. >>Yeah, I've talked to a bunch of customers in this topic, and it seems to be sort of three paths. Actually, one path is there's. There's a lot of low hanging fruit and easy wins. And but the problem with that is a lot of times it's just paving the cow path with automation. You know, the other is you got to do the hard work of really digging into the process and the third that I've seen, which is kind of interesting to which is kind of what you're alluding to is your free up. You know, some of the mundane tasks, and you let the people who really understand the process rethink that process. And then you go into a deeper automation agenda, and that seems toe that will turn millions into billions. >>That's the value. Add their game. I mean, it's that third framework that you laid out, which is you have to do the work around process. But then again, how doe I then you know over time is I is. I have the experts help us on the automation capabilities. Once we've identified, what are the appropriate processes or functions to be automated? How do you then pivot resource tomb or higher value add activity across the organization and that Z when you when you do that, you unlock, I think, a terrific value creation opportunity, which we're very focused on. >>And I know there's always a big concern about jobs with automation. But the reality is, if you look at the data from the U. S. And Europe of the last couple of decades, the productivity trend is clear. It's it's gone down. And if you think about the big problems that we face in the world, whether it's climate change, your national debt or health care, you know you know hunger, you just can't throw people at that problem. You gotta have a combinations of people in machines. And so well, there may be, you know, a short term impact. I'm kind of an optimist. I know you are a swell >>No, it Zuno. Obviously, this is a tough time for a lot of businesses and customers. As we work our way through the pandemic and and including, you know, and and some have adjusted their workforce, you know, and part of its from the economic reality. But part of it is also a skill set. Dynamic is a reshaping workforce. And but I do think automation plays a key role. And how do you enable skill sets to evolve and get again re allocated Thio other value creation activity. So there is, you know, unfortunately, are probably gonna be some short term disruptions in certain areas. But on the other hand, if you think about the long term gain and the productivity gains that we all need to drive, you know you can't do it without automation and thinking your way through streamlining and taking complexity out of the organization. >>So my last question has come back the productivity We're talking about work from home. Do you feel like you've had a bump in productivity? As a result? Maybe there was some short term disruption. But you know, what's your what's your data or your gut say, in terms of the impact on your organization and then maybe on your customers as well in terms of the program. So >>I think it's been fairly similar between us and our customers. I waas concerned when we went to a work from home back in March that we were gonna lose productivity and, you know, and I thought it was gonna be a productivity drain, you know, a czar. Team members were juggling work and their family dynamics and situation is in. Obviously in the middle of that are in the early innings of this covert crisis. What we have seen, in fact, is actually, we've seen productivity improved pre Koba to where we are today. And I think a lot of that has to do with the fact that we're giving our team members one flexibility on how they do their job. But we're giving them time back there, and they're not commuting. There's less meetings that are consuming time, you know, and the responsiveness in the capabilities of the order such that we're moving through decisions and projects. I think, at a faster pace, quite frankly. And so it's been an interesting and, I think to me a bit of a surprising result from what we've seen as I talked to customers and I'm the executive sponsor on a number of extraordinary, very large multinational customers. It's pretty much the same response. You know, the similar experience, right, that they've seen similar results that we have. So now what you don't want this to be is that you're doing it on the backs of the team members working 15 or 16 hours a day. You've got to find the right balance. But the fact that we're giving them flexibility to jump out during the middle of Daito tend to some family members or help with, you know, their Children's learning. Then they're back in maybe a little bit later during the day. I mean, I do think that we've been able to a culture that's pretty interesting that is paying dividends for us right now. >>Yeah, it's ironic that this hit at the beginning of of 2020 it's clear that it's gonna be a different decade than it was last decade, which I guess every decade is Tom Tom Sweet. It was great to have you on the Cube. Thanks so much. Always a pleasure speaking with you. >>Always, always great to see you. Thanks for having me. >>You're welcome. And thank you for watching everybody says Dave Volonte, you're watching our coverage, the cubes coverage of del Tech World 2020. But right back after this short break

Published Date : Oct 21 2020

SUMMARY :

It's the Cube with digital coverage of Dell It's always good to have a conversation with you. I actually don't think I've spent a lot of time talking to folks from jail, but I don't think you and I have talked since the pandemic and and so that's been the focus in, you know, really spending a lot of time on investment responded and you know, technology, of course, is is at the heart of that. And now I don't think you can really do that if you think about where you need to be from Yeah, I mean, at the height of the pandemic, you saw, you know, some people taking actions. level off, you know, cautious, you know, cautiousness. One is, first of all, you know, Della was largely a larger And, you know, as you know, we have one of the largest, if not the largest, technology by Let's talk a little bit about some of the strategy and the value levers that you guys talk about. that the industry is not a, you know, a rapidly growing industry. Well, in one of the other levers you filed the 13 d, I don't know what you can share with us. But at the same point in time, you know, you know, do the potentially look at it spend that That's a comment, you know, I mean, our, you know, our go to market reach, How that could affect, you know, the long term productivity of your business? Have a lot of that, you know, with focused on taking touch out, You know, some of the mundane tasks, and you let the people who really understand the process rethink across the organization and that Z when you when you do that, And if you think about the big problems that we face in the world, But on the other hand, if you think about the long term gain and the productivity gains that But you know, what's your what's your data or your gut that are consuming time, you know, and the responsiveness It was great to have you on the Cube. Always, always great to see you. And thank you for watching everybody says Dave Volonte, you're watching our coverage, the cubes coverage of del Tech

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Susan WojcickiPERSON

0.99+

Dave VellantePERSON

0.99+

Lisa MartinPERSON

0.99+

JimPERSON

0.99+

JasonPERSON

0.99+

Tara HernandezPERSON

0.99+

David FloyerPERSON

0.99+

DavePERSON

0.99+

Lena SmartPERSON

0.99+

John TroyerPERSON

0.99+

Mark PorterPERSON

0.99+

MellanoxORGANIZATION

0.99+

Kevin DeierlingPERSON

0.99+

Marty LansPERSON

0.99+

TaraPERSON

0.99+

JohnPERSON

0.99+

AWSORGANIZATION

0.99+

Jim JacksonPERSON

0.99+

Jason NewtonPERSON

0.99+

IBMORGANIZATION

0.99+

Daniel HernandezPERSON

0.99+

Dave WinokurPERSON

0.99+

DanielPERSON

0.99+

LenaPERSON

0.99+

Meg WhitmanPERSON

0.99+

TelcoORGANIZATION

0.99+

Julie SweetPERSON

0.99+

MartyPERSON

0.99+

Yaron HavivPERSON

0.99+

AmazonORGANIZATION

0.99+

Western DigitalORGANIZATION

0.99+

Kayla NelsonPERSON

0.99+

Mike PiechPERSON

0.99+

JeffPERSON

0.99+

Dave VolantePERSON

0.99+

John WallsPERSON

0.99+

Keith TownsendPERSON

0.99+

fiveQUANTITY

0.99+

IrelandLOCATION

0.99+

AntonioPERSON

0.99+

Daniel LauryPERSON

0.99+

Jeff FrickPERSON

0.99+

MicrosoftORGANIZATION

0.99+

sixQUANTITY

0.99+

Todd KerryPERSON

0.99+

John FurrierPERSON

0.99+

$20QUANTITY

0.99+

MikePERSON

0.99+

January 30thDATE

0.99+

MegPERSON

0.99+

Mark LittlePERSON

0.99+

Luke CerneyPERSON

0.99+

PeterPERSON

0.99+

Jeff BasilPERSON

0.99+

Stu MinimanPERSON

0.99+

DanPERSON

0.99+

10QUANTITY

0.99+

AllanPERSON

0.99+

40 gigQUANTITY

0.99+

Mik Kersten, Tasktop | BizOps Manifesto Unveiled


 

>>from around the globe. It's the Cube with digital coverage of biz ops Manifesto unveiled. Brought to you by Biz Ops Coalition. Hey, Welcome back, everybody. Jeffrey here with the Cube. We're coming to you from our Palo Alto studios. And welcome back to this event. Is the biz Opps Manifesto unveiling? So the biz Opps manifesto and the biz Opps coalition have been around for a little while, But today's the big day. That's kind of the big public unveiling are excited to have some of the foundational people that put their put their name on the dotted line, if you will, to support this initiative to talk about why that initiative is so important. And so the next guest, we're excited to have his doctor, Mick Kirsten. He is the founder and CEO of Task Top. Make great to see you coming in from Vancouver, Canada, I think. Right. >>Yes. Great to be here, Jeff. Thank you. Absolutely. >>I hope your air is a little better out there. I know you had some of the worst air of all of us a couple a couple of weeks back, so hopefully things air, uh, getting a little better. And we get those fires under control? >>Yeah, Things have cleared up now, so yeah, it's good. It's good to be close to the U. S. And it's gonna have the Arabic clean as well. >>Absolutely. So let's let's jump into it. So you you've just been an innovation guy forever Starting way back in the day and Xerox Park. I was so excited to do an event at Xerox Park for the first time last year. I mean that that to me represents along with Bell Labs and and some other, you know, kind of foundational innovation and technology centers. That's got to be one of the greatest one. So I just wonder if you could share some perspective of getting your start there at Xerox Parc. You know, some of the lessons you learn and what you've been ableto kind of carry forward from those days. >>Yeah, I was fortunate. Joined Xerox Park in the computer science lab there at a very early point in my career, and to be working on open source programming languages. So back then, and the computer science lab where some of the inventions around programming around software development names such as Object of programming and ah, lot of what we had around really modern programming levels construct. Those were the teams that had the fortune of working with and really our goal waas. And of course, there's a Z. You know, this, uh, there's just this DNA of innovation and excitement and innovation in the water. And really, it was the model that was all about changing the way that we work was looking at for how we could make it 10 times easier to write. Code like this is back in 99 we were looking at new ways of expressing especially business concerns, especially ways of enabling people who are who want to innovate for their business, to express those concerns in code and make that 10 times easier than what that would take. So we created a new open source programming language, and we saw some benefits, but not quite quite what we expected. I then went and actually joined Charles Stephanie that former chief actor Microsoft, who is responsible for I actually got a Microsoft word as a out of Xerox Parc and into Microsoft and into the hands of Bill Gates and the company I was behind the whole office suite and his vision and the one I was trying to execute with working for him was to, you know, make Power point like a programming language, make everything completely visual. And I realized none of this was really working, that there was something else fundamentally wrong that programming languages or new ways of building software like Let's try to do with Charles around intentional programming. That was not enough. >>That was not enough. So you know, the agile movement got started about 20 years ago, and we've seen the rise of Dev ops and really this kind of embracing of of, of sprints And, you know, getting away from M. R. D s and P. R. D s and these massive definitions of what we're gonna build and long billed cycles to this iterative process. And that's been going on for a little while. So what was still wrong? What was still missing? Why the Biz Ops Coalition? Why the biz ops manifesto? >>Yeah, so I basically think we nailed some of the things that the programming language levels of teams can have. Effective languages deployed softened the club easily now right and at the kind of process and collaboration and planning level agile two decades decades ago was formed. We were adopting all the all the teams I was involved with on. It's really become a solved problem. So agile tools, agile teams actually of planning are now very mature and the whole challenges when organizations try to scale that. And so what I realized is that the way that Agile was scaling across teams and really scaling from the Technology Party organization to the business was just completely flawed. The agile teams had one set of doing things. One set of metrics, one set of tools and the way that the business was working was planning was investing in technology was just completely disconnected and using a a whole different set of measures. It's pretty interesting because I think it's >>pretty clear from the software development teams in terms of what they're trying to deliver, because they've got a feature set right and they've got bugs and it's easy. It's easy to see what they deliver, but it sounds like what you're really honing in on is is disconnect on the business side in terms of, you know, is it the right investment you know. Are we getting the right business? R o I on this investment? Was that the right feature? Should we be building another feature or shall we building a completely different products? That so it sounds like it's really a core piece of this is to get the right measurement tools, the right measurement data sets so that you can make the right decisions in terms of what you're investing, you know, limited resource is you can't Nobody has unlimited resources and ultimately have to decide what to do, which means you're also deciding what not to dio. It sounds like that's a really big piece of this of this whole effort. >>Yeah, Jeff, that's exactly it. Which is the way that the adult measures their own way of working is very different from the way that you measure business outcomes. The business outcomes are in terms of how happy your customers are. Are you innovating fast enough to keep up with the pace of, ah, rapidly changing economy, rapidly changing market and those are those are all around the customer. And so what? I learned on this long journey of supporting many organizations transformations and having them trying to apply those principles vigilant develops that those are not enough. Those measures technical practices, those measures, technical excellence of bringing code to the market. They don't actually measure business outcomes. And so I realized that really was much more around having these entwined flow metrics that are customer centric and business centric and market centric where we needed to go. So I want to shift gears >>a little bit and talk about your book because you're also a best selling author project a product, and and you you brought up this concept in your book called The Flow Framework. And it's really interesting to me because I know, you know, flow on one hand is kind of a workflow in the process flow, and you know that's how things get done and and embrace the flow. On the other hand, you know, everyone now in a little higher level, existential way is trying to get into the flow right into the workflow and, you know not be interrupted and get into a state where you're kind of your highest productivity, you know, kind of your highest comfort. Which floor you talking about in your book, or is it a little bit of both. >>That's a great question, is it's not what I gotta ask very often, cause me, it's It's absolutely both. So the thing that we want to get that we've learned how toe and, uh, master individual flow, that there's this beautiful book by me Holly teachings mentality. There's a beautiful Ted talk about him as well, about how we can take control of our own flow. So my question with the book with project surprise, How can we bring that to entire teams and really entire organizations? How come we have everyone contributing to a customer outcome? And this is really what if you go to the bazaar manifesto? It says, I focus on Out comes on using data to drive, whether we're delivering those outcomes rather than a focus on proxy metrics such as How quickly did we implement this feature? And now it's really how much value did the customs of the future and how quickly did we learn? And how quickly did you use that data to drive to that next outcome? Really, that with companies like Netflix on, like Amazon, have mastered, how do we get that every large organization, every idea, organization and make everyone be a softer innovator. So it's to bring that on the concept of flow to these entering value streams. And the fascinating thing is, we've actually seen the data. We've been able to study a lot of value streams. We see when flow increases, when organizations deliver value to a customer faster developers actually become more happy. So things like that implying that promotes course rise. And we've got empirical data for this. So that beautiful thing to me is that we've actually been able thio, combine these two things and and see the results in the data that you increased flow to the customer, your development or more happy. I >>love it. I love it, right, because we're all more. We're all happier when we're in the flow and we're all more productive winner in the flow. So I that is a great melding of two concepts. But let's jump into the into the manifesto itself a little bit. And you know, I love that you know, that took this approach really of having kind of four key values, and he gets 12 key principles and I just want to read a couple these values because when you read them, it sounds pretty brain dead, right? Of course. Right. Of course, you should focus on business outcomes. Of course, you should have trust and collaboration. Of course, you should have data based decision making processes and not just intuition or, you know, whoever is the loudest person in the room on toe, learn and respond and pivot. But >>what's the >>value of actually just putting them on a piece of paper? Because again, this is not this. These are all good positive things, right? When when somebody reads these to you or tells you these or sticks it on the wall? Of course. But unfortunately, of course, isn't always enough. >>No, I think what's happened is some of these core principles originally from the agile manifested two decades ago. The whole Dev ops movement of the last decade off flow feedback and continue learning has been key. But a lot of organizations, especially the ones undergoing transformations, have actually gone a very different way, right? The way that they measure value in technology innovation is through costs For many organizations, the way that they actually are looking at at their moving to cloud is actually is a reduction in costs, whereas the right way of looking at moving the cloud is how much more quickly can we get to the value to the customer? How quickly can we learn from that? And how could quickly can we drive the next business outcome? So, really, the key thing is to move away from those old ways of doing things that funding projects and call centers to actually funding and investing in outcomes and measuring outcomes through these flow metrics, which in the end are your fast feedback for how quickly you're innovating for your customer. So these things do seem, you know, very obvious when you look at them. But the key thing is what you need to stop doing. To focus on these, you need to actually have accurate real time data off how much value your phone to the customer every week, every month, every quarter. And if you don't have that, your decisions are not given on data. If you don't know what your bottle like, it's. And this is something that in the decades of manufacturing car manufacturers, other manufacturers master. They always know where the bottom back in their production processes you ask, uh, random. See, I all want a global 500 company where the bottleneck is, and you won't get it there. Answer. Because there's not that level of understanding. So have to actually follow these principles. You need to know exactly where you follow like is because that's what's making your developers miserable and frustrated on having them context, which on thrash So it. The approach here is important, and we have to stop doing these other things right. >>There's so much. They're a pack. I love it, you know, especially the cloud conversation, because so many people look at it wrong as a cost saving device as opposed to an innovation driver, and they get stuck, they get stuck in the literal. And, you know, I think the same thing always about Moore's law, right? You know, there's a lot of interesting riel tech around Moore's law and the increasing power of microprocessors. But the real power, I think in Moore's laws, is the attitudinal change in terms of working in a world where you know that you've got all this power and what will you build and design? E think it's funny to your your comment on the flow in the bottleneck, right? Because because we know manufacturing assumes you fix one bottleneck. You move to your next one, right, You always move to your next point of failure. So if you're not fixing those things, you know you're not. You're not increasing that speed down the line unless you can identify where that bottleneck is, or no matter how Maney improvements you make to the rest of the process, it's still going to get hung up on that one spot. >>That's exactly, and you also make it sound so simple. But again, if you don't have the data driven visibility of where the bottleneck is. And but these bottlenecks are just as you said, if it's just lack, um, all right, so we need to understand is the bottleneck, because our security use air taking too long and stopping us from getting like the customer. If it's that automate that process and then you move on to the next bottleneck, which might actually be that deploy yourself through the clouds is taking too long. But if you don't take that approach of going flow first rather than again the sort of way cost production first you have taken approach of customer centric city, and you only focus on optimizing cost. Your costs will increase and your flow will slow down. And this is just one, these fascinating things. Whereas if you focus on getting back to the customer and reducing your cycles on getting value your flow time from six months to two weeks or 21 week or two event as we see with tech giants, you actually could both lower your costs and get much more value. Of course, get that learning going. So I think I've I've seen all these cloud deployments and modernizations happen that delivered almost no value because there was such a big ball next up front in the process. And actually the hosting and the AP testing was not even possible with all of those inefficiencies. So that's why going flow first rather than costs. First, there are projects versus Sochi. >>I love that and and and and it begs, repeating to that right within a subscription economy. You know you're on the hook to deliver value every single month because they're paying you every single month. So if you're not on top of how you delivering value, you're going to get sideways because it's not like, you know, they pay a big down payment and a small maintenance fee every month. But once you're in a subscription relationship, you know you have to constantly be delivering value and upgrading that value because you're constantly taking money from the customers. It's it's such a different kind of relationship, that kind of the classic, you know, Big Bang with the maintenance agreement on the back end really important. >>Yeah, and I think in terms of industry ship, that's it. That's what catalyzed this industry shift is in this SAS that subscription economy. If you're not delivering more and more value to your customers, someone else's and they're winning the business, not you. So one way we know is that divide their customers with great user experiences. Well, that really is based on how many features you delivered or how much. How about how many quality improvements or scaler performance improvements you delivered? So the problem is, and this is what the business manifesto was was the forefront of touch on is, if you can't measure how much value delivered to a customer, what are you measuring? You just back again measuring costs, and that's not a measure of value. So we have to shift quickly away from measuring costs to measuring value to survive in in the subscription economy. Mick, >>we could go for days and days and days. I want to shift gears a little bit into data and and a data driven, um, decision making a data driven organization. Because right day has been talked about for a long time. The huge big data mean with with Hadoop over over several years and data warehouses and data lakes and data, oceans and data swamps and you go on and on, it's not that easy to do right. And at the same time, the proliferation of data is growing exponentially were just around the corner from from I, O. T and five G. So now the accumulation of data at machine scale again this is gonna overwhelm, and one of the really interesting principles that I wanted to call out and get your take right is today's organizations generate mawr data than humans can process. So informed decisions must be augmented by machine learning and artificial intelligence. I wonder if you can again, you've got some great historical perspective reflect on how hard it is to get the right data to get the data in the right context and then to deliver to the decision makers and then trust the decision makers to actually make the data and move that down. You know, it's kind of this democratization process into more and more people and more and more frontline jobs, making more and more of these little decisions every day. >>Yeah, and Jeff, I think the front part of what you said are where the promises of big data have completely fallen on their face into these swamps. As you mentioned, because if you don't have the data and the right format, you can connect, collected that the right way, you're not. Model it that way the right way. You can't use human or machine learning on it effectively. And there have been the number of data, warehouses and a typical enterprise organization, and the sheer investment is tremendous. But the amount of intelligence being extracted from those is a very big problem. So the key thing that I've known this is that if you can model your value streams so you actually understand how you're innovating, how you're measuring the delivery value and how long that takes. What is your time to value through these metrics? Like for the time you can actually use both. You know the intelligence that you've got around the table and push that balance as it the assay, far as you can to the organization. But you can actually start using that those models to understand, find patterns and detect bottlenecks that might be surprising, Right? Well, you can detect interesting bottle next one you shift to work from home. We detected all sorts of interesting bottlenecks in our own organization that we're not intuitive to me that had to do with more senior people being overloaded and creating bottlenecks where they didn't exist. Whereas we thought we were actually organization. That was very good at working from home because of our open source route. So the data is highly complex. Software Valley streams are extremely complicated, and the only way to really get the proper analysts and data is to model it properly and then to leverage these machine learning and AI techniques that we have. But that front, part of what you said, is where organizations are just extremely immature in what I've seen, where they've got data from all the tools, but not modeled in the right way. >>Well, all right, so before I let you go, you know? So you get a business leader he buys in. He reads the manifesto. He signs on the dotted line. He says, Mick, how do I get started? I want to be more aligned with With the development teams, you know, I'm in a very competitive space. We need to be putting out new software features and engage with our customers. I want to be more data driven. How do I get started? Well, you know, what's the biggest inhibitor for most people to get started and get some early winds, which we know is always the key to success in any kind of a new initiative, >>right? So I think you can reach out to us through the website. Uh, on the is a manifesto, but the key thing is just it's exactly what you said, Jeff. It's to get started and get the key wins. So take a probably value stream. That's mission critical. It could be your new mobile Web experiences, or or part of your cloud modernization platform where your analysts pipeline. But take that and actually apply these principles to it and measure the entire inflow of value. Make sure you have a volumetric that everyone is on the same page on, right. The people on the development teams that people in leadership all the way up to the CEO and one of the where I encourage you to start is actually that enter and flow time, right? That is the number one metric. That is how you measure whether you're getting the benefit of your cloud modernization. That is the one metric that even Cockcroft when people I respect tremendously put in his cloud for CEOs Metric 11 way to measure innovation. So basically, take these principles, deployed them on one product value stream measure into and flow time on. Then you'll actually you well on your path to transforming and to applying the concepts of agile and develops all the way to the business to the way in your operating model. >>Well, Mick, really great tips, really fun to catch up. I look forward to a time when we can actually sit across the table and and get into this, because I just I just love the perspective. And, you know, you're very fortunate to have that foundational, that foundational base coming from Xerox parc. And it's, you know, it's a very magical place with a magical history. So the to incorporate that and to continue to spread that wealth, you know, good for you through the book and through your company. So thanks for sharing your insight with us today. >>Thanks so much for having me, Jeff. Absolutely. >>Alright. And go to the biz ops manifesto dot org's Read it. Check it out. If you want to sign it, sign it. They'd love to have you do it. Stay with us for continuing coverage of the unveiling of the business manifesto on the Cube. I'm Jeffrey. Thanks for watching. See you next time.

Published Date : Oct 16 2020

SUMMARY :

Make great to see you coming in from Vancouver, Canada, I think. Absolutely. I know you had some of the worst air of all of us a couple a couple of weeks back, It's good to be close to the U. S. And it's gonna have the Arabic You know, some of the lessons you learn and what you've been ableto kind of carry forward you know, make Power point like a programming language, make everything completely visual. So you know, the agile movement got started about 20 years ago, and the whole challenges when organizations try to scale that. on is is disconnect on the business side in terms of, you know, is it the right investment you know. very different from the way that you measure business outcomes. And it's really interesting to me because I know, you know, flow on one hand is kind of a workflow the results in the data that you increased flow to the customer, your development or more happy. And you know, I love that you know, that took this approach really of having kind of four key When when somebody reads these to you or tells you these or sticks But the key thing is what you need to stop doing. You're not increasing that speed down the line unless you can identify where that bottleneck is, flow first rather than again the sort of way cost production first you have taken you know you have to constantly be delivering value and upgrading that value because you're constantly taking money and this is what the business manifesto was was the forefront of touch on is, if you can't measure how and data lakes and data, oceans and data swamps and you go on and on, it's not that easy to do So the key thing that I've known this is that if you can model your value streams so you more aligned with With the development teams, you know, I'm in a very competitive space. but the key thing is just it's exactly what you said, Jeff. continue to spread that wealth, you know, good for you through the book and through your company. Thanks so much for having me, Jeff. They'd love to have you do it.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

Mick KirstenPERSON

0.99+

JeffreyPERSON

0.99+

Mik KerstenPERSON

0.99+

MicrosoftORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

MickPERSON

0.99+

12 key principlesQUANTITY

0.99+

10 timesQUANTITY

0.99+

NetflixORGANIZATION

0.99+

Bell LabsORGANIZATION

0.99+

CharlesPERSON

0.99+

twoQUANTITY

0.99+

Palo AltoLOCATION

0.99+

six monthsQUANTITY

0.99+

Task TopORGANIZATION

0.99+

two decades agoDATE

0.99+

Xerox ParkORGANIZATION

0.99+

U. S.LOCATION

0.99+

last yearDATE

0.99+

FirstQUANTITY

0.99+

Bill GatesPERSON

0.99+

CockcroftPERSON

0.99+

HollyPERSON

0.99+

agileTITLE

0.99+

two weeksQUANTITY

0.99+

21 weekQUANTITY

0.99+

one setQUANTITY

0.99+

one metricQUANTITY

0.99+

Biz Ops CoalitionORGANIZATION

0.99+

two conceptsQUANTITY

0.99+

two thingsQUANTITY

0.99+

Xerox ParcORGANIZATION

0.98+

Charles StephaniePERSON

0.98+

bothQUANTITY

0.98+

two decades decades agoDATE

0.98+

Vancouver, CanadaLOCATION

0.98+

oneQUANTITY

0.98+

todayDATE

0.98+

The Flow FrameworkTITLE

0.97+

TedPERSON

0.96+

One setQUANTITY

0.96+

CubeORGANIZATION

0.96+

500 companyQUANTITY

0.96+

M. R. DPERSON

0.95+

Xerox ParkLOCATION

0.95+

firstQUANTITY

0.93+

one spotQUANTITY

0.92+

P. R. DPERSON

0.92+

one bottleneckQUANTITY

0.92+

SochiORGANIZATION

0.91+

AgileTITLE

0.91+

about 20 years agoDATE

0.9+

last decadeDATE

0.9+

decadesQUANTITY

0.88+

single monthQUANTITY

0.88+

MoorePERSON

0.87+

XeroxORGANIZATION

0.87+

first timeQUANTITY

0.87+

ArabicOTHER

0.86+

four key valuesQUANTITY

0.83+

Opps ManifestoEVENT

0.82+

Big BangEVENT

0.8+

everyQUANTITY

0.76+

TasktopORGANIZATION

0.72+

couple of weeksDATE

0.7+

coupleQUANTITY

0.69+

Monica Kumar & Bala Kuchibhotla, Nutanix | Introducing a New Era in Database Management


 

>> Narrator: From around the globe. It's theCUBE with digital coverage of A New Era In Database Management. Brought to you by Nutanix. >> Hi, I'm Stu Miniman. And welcome to this special presentation with Nutanix. We're talking about A New Era In Database Management. To help us dig into it, first of all, I have the Senior Vice President and General Manager of Nutanix Era Databases and Business Critical Applications, that is Bala Kuchibhotla. And one of our other CUBE alongs, Monica Kumar. Who's an SVP also with Nutanix. Bala, Monica, thank you so much for joining us. >> Thank you, thank you so... >> Great to be here. All right, so first of all, Bala a new Era. We, have a little bit of a punj. You've got me with some punjs there. Of course we know that the database for Nutanix solution is Era. So, we always like to bring out the news first. Why don't you tell us, what does this mean? What is Nutanix announcing today? >> Awesome. Thank you, Stu. Yeah, so today's a very big day for us. I'm super excited to inform all of us and our audience that we are announcing the Eratory dot two GA bits for customers to enjoy it. Some customers can download and start playing with it. So what's new with Nutanix Eratory dot two? As you knows 1.0 is a single cluster solution meaning the customers have to have a Nutanix cluster and then have around the same cluster to enjoy the databases. But with Eratory dot two, it becomes multi-cluster solution. It's not just a multi-cluster solution, but customers can enjoy database across clusters, That means that they can have their Always On Availability Groups SQL servers, their Postgres servers across Nutanix clusters. That means that they can spread across Azure Availability Zones. Now, the most interesting point of this is, it's not just across clusters, customers can place these clusters in the cloud. That is AWS. You can have Nutanix cluster in the AWS cluster and then the primary production clusters maybe on the Nutanix and primary enterprise cloud kind of stuff, that's number one. Number two, we have extended our data management capabilities, data management platform capabilities, and what we call them as global time mission. Global time mission with a data access management. Like racing river, that you need to harness the racing river by constructing a dam and then harness it for multipurpose either irrigation projects or hydroelectric project kind of stuff. You need to kind of do the similar things for your data in company, enterprise company. You need to make sure that the right persons get the right amount of data, so that you don't kind of give all production data to everyone in the company. At the same time, they also need the accessible, with one click they can get the database, the data they want. So that's the data access management. Imagine a QA person only gets the sanitized snapshots or sanitize database backups for them to create the copies. And then we are extending our database engine portfolios too to introduce SAP HANA to the thing. As you know, that we support Oracle today, Postgres, MalSQL, Mariadb SQL server. I'm excited to inform that we are introducing SAP HANA. Our customers can do one click sandbox creation into an environment for SAP HANA predown intense platform. And lastly, I'm super excited to inform that we are becoming a Postgres vendor. We are willing to give 24 by seven, 365 day support but Postgres database engine, that's kind of a provision through Nutanix setup platform. So this way the customers can enjoy the engine, platform, service all together in one single shot with a single 180 company that they can call and get the support they want. I'm super duper excited that this is going to make the customers a truly multicloud multi cluster data management platform. Thank you. >> Yeah. And I'll just add to that too. It's fantastic that we are now offering this new capability. I just want to kind of remind our audience that Nutanix for many years has been providing the foundation the infrastructure software, where you can run all these multiple workloads including databases today. And what we're doing with Era is fantastic because now they are giving our customers the ability to take that database that they run on top of Nutanix to provide that as a service now. So now are talking to a whole different organization here. It's database administrations, it's administrators, it's teams that run databases, it teams that care about data and providing access to data and organizations. >> Well, first of all, congratulations, I've taught for a couple of years to the teams at Nutanix especially some of the people working on PostgreSQL really exciting stuff and you've both seen really the unlocking of database. It used to be ,we talked about, I have one database it's kind of the one that everything runs on. Now, customers they have more databases. You talked about that flexibility is then, where we run it. We'd love to hear, maybe Monica we start with you. You talk about the customers, what does this really mean for them? Because one of our most mission critical applications we talk about, we're not just throwing our databases or what. I don't wake up in the morning and say, Oh let me move it to this cloud and put it in this data center. This needs to be reliable. I need to have access to the data. I need to be able to work with it. So, what does this really mean? And what does it unlock for your customers? >> Yes absolutely, I love to talk about this topic. I mean, if you think about databases, they are means to an end. And in this case, the end is being able to mine insights from the data and then make meaningful decisions based on that. So when we talk to customers, it's really clear that data has not become one of the most valuable assets that an organization owns. Well, of course, in addition to the employees that are part of the organization and our customers. Data is one of the most important assets. But most organizations, the challenges they face is a lot of data gets collected. And in fact, we've heard numbers thrown around for many years like, almost 80% of world's data has been created in the last like three or four years. And data is doubling every two years in terms of volume. Well guess what? Data gets collected. It sits there and organizations are struggling to get access to it with the right performance, the right security and regulation compliance, the reliability, availability, by persona, developers need certain access, analysts needs different access line of businesses need different access. So what we see is organizations are struggling in getting access to data at the right time by the right person on the team and when they need it. And I think that's where database as a service is critical. It's not just about having the database software which is of course important but how you know not make that service available to your stakeholders, to developers to lines of business within the SLAs that they demand. So is it instantly? How quickly can you make it available? How quickly can you use have access to data and do something meaningful with it? And mind the insights for smarter business? And then the one thing I'd like to add is that's where IT and business really come together. That's the glue. If you think about it today, what is the blue between an IT Organization and a business organization? It's the data. And that's where they're really coming together to say how can we together deliver the right service? So you, the business owner can deliver the right outcome for our business. >> That's very true. Maybe I'll just add a couple of comments there. What we're trying to do is we are trying to bring the cloud experience, the RDS-like experience to the enterprise cloud and then hybrid cloud. So the customers will now have a choice of cloud. They don't need to be locked in a particular cloud, at the same time enjoy the true cloud utility experience. We help customers create clouds, database clouds either by themselves if that's big enough to manage the cloud themselves or they can partner with a GSIs like Wipro, WorkHCL and then create a completely managed database service kind of stuff. So, this brings this cloud neutrality, portability for customers and give them the choice and their terms, Stu. >> Well Bala, absolutely we've seen a huge growth in managed services as you've said, maybe bring us inside a little bit. What is free up customers? What we've said for so long that back when HCI first started, it was some of the storage administrators might bristle because you were taking things away from them. It was like, no, we're going to free you up to do other things that as Monica said, deliver more business value not mapping LUNs and doing that. How about from the DBA standpoint? What are some of those repetitive, undifferentiated heavy lifting that we're going to take away from them so that they can focus on the business value. >> Yep. Thank you Stu. So think about this. We all do copy paste operations in laptops. Something of that sort happens in data center at a much larger scale. Meaning that the same kind of copy paste operation happens to databases and petabytes and terabytes of scale. Hundreds of petabytes. It has become the most dreaded complex, long running error prone operation. Why should it be that way? Why should the DBS spend all this mundane tasks and then get busy for every cloning operation? It's a two day job for me, every backup job. It's like a hobby job for provisioning takes like three days. We can take this undifferentiated heavy lifting by this and then let the DBS focus on designing the cloud for them. Looking for the database tuning, design data modeling, ML aspects of the data kind of stuff. So we are freeing up the database Ops people, in a way that they can design the database cloud, and make sure that they are energy focused on high valid things and more towards the business center kind of stuff. >> Yeah. And you know automation is really important. You were talking about is automating mundane grunt work. Like IT spends 80% of its time in maintaining systems. So then where is the time for innovation. So if we can automate stuff that's repetitive, stuff that the machine can do, the software can do, why not? And I think that's what our database as a service often does. And I would add this, the big thing our database as a service does really is provide IT organizations and DV organizations a way to manage heterogeneous databases too. It's not like, here's my environment for Postgres. Here's my environment for my SQL. Here's my environment for Oracle. Here's my environment for SQL server. Now with a single offering, a single tool you can manage your heterogeneous environment across different clouds. On premises cloud, or in a public cloud environment. So I think that's the beauty we are talking about with Nutanix's Era. Is a truly, truly gives organizations that single environment to manage heterogeneous databases, apply the same automation and the ease of management across all these different environments. >> Yeah. I'll just add one comment to that. A true managed PaaS obviously customers in like a single shop go to public cloud, just click through and then they get the database and point. And then if someone is managing the database for them. But if you look at the enterprise data centers, they need to bring that enterprise GalNets and structure to these databases. It's not like anyone can do anything to any or these databases. So we are kind of getting the best of both, the needed enterprise GalNets by these enterprise people at the same time bringing the convenience for the application teams and developers they want to consume these databases like utility. So bringing the cloud experience, bringing the enterprise GalNets. At same time, I'm super confident we can cut down the cost. So that is what Nutanix Era is all about across all the clouds, including the enterprise cloud. >> Well, Bala being simpler and being less expensive are one of the original promises of the cloud that don't necessarily always come out there. So, that's super important. One of the other things, you talk about these hybrid environments. It's not just studied, in the public cloud want to understand these environments, if I'm in the public cloud, can I still leverage some of the services that are in the public cloud? So, if I want to run some analytics, if I want to use some of the phenomenal services that are coming out every day. Is that something that can be done in this environment? >> Yeah, beautiful. Thank you Stu. So we are seeing customers who two categories. There is a public cloud customer, completely born in public cloud cloud, native services. They realize that for every database that maintaining five or seven different copies and the management of these copies is prohibited just because every copy is a faulty copy in the public cloud. Meaning you take a backup snapshot and restore it. Your meter like New York taxi, it starts with running for your EBS   and that you are looking at it kind of stuff. So they can leverage Nutanix clusters and then have a highly efficient cloning capability so that they can cut down some of these costs for these secondary environments that I talk about. What we call is copy data management, that's one kind of use case. The other kind of customers that we are seeing who's cloud is a phenomenon. There's no way that people have to move to cloud. That's the something at a C level mandate that happens. These customers are enjoying their database experience on our enterprise cloud. But when they try to go to these big hyperscalers, they are seeing the disconnect that they're not able to enjoy some of the things that they are seeing on the enterprise cloud with us. So this transition, they are talking to us. Can you get this kind of functionality with Nutanix platform onto some of these big hyperscalers? So there are kind of customers moving both sides, some customers that are public cloud they're time to enjoy our facilities other than copy data management and Nutanix. Customers that are on-prem but they have a mandate to good public cloud ,with our hybrid cloud strategy. They get to enjoy the same kind of convenience that they are seeing it on enterprise and bringing the same kind of governance that they used to do it. so that maybe see customers. Yeah. >> Yeah. Monica, I want to go back to something you talked about customers dealing with that heterogeneous environment that they have reminds me of a lot of the themes that we talked about at nutanix.next because customers have they have multiple clouds they're using, requires different skillsets, different tooling. It's that simplicity layer that Nutanix has been working to deliver since day one. What are you from your customers? How are they doing with this? And especially in the database world. What are some of those challenges that they're really facing that we're looking to help solve with the solution today. >> Yeah. I mean, if you think about it, what customers at least in our experience, what they want or what they're looking for is this modern cloud platform that can really work across multiple cloud environments. Cause people don't want to change running, let's say an Oracle database you're on-prem on a certain stack and then using a whole different stack to run Oracle database in the cloud. What they want is the same exact foundation. So be so they can be, for sure have the right performance. Availability, reliability, the applications don't have to be rewritten on top of Oracle database. They want to preserve all of that, but they want the flexibility to be able to run that cloud platform wherever they choose to. So that's one. So that's choosing the right and modernizing and choosing the right cloud platform is definitely very important to our customers, but you nailed it on the head Stu. It's been about how do you manage it? How do you operate it on a daily basis? And that's where our customers are struggling with multiple types of tools out there, custom tool for every single environment. And that's what they don't want. They want to be able to manage, simply across multiple environments using the same tools and skillsets. And again, and I'm going to beat the same drum, but that's when Nutanix shines. That's a design principle is. It's the exact same technology foundation that you provide to customers to run any applications. In this case it happens to be databases. Exact same foundation you can use to run databases on-prem in the cloud. And then on top of that using Era boom! Simple management, simple operations, simple provisioning simple copy data management, simple patching, all of that becomes easy using just a single framework to manage and operate. And I will tell you this, when we talk to customers, what is it that DBS and database teams are struggling with? They're struggling with SLS and performance on scalability, that's one, number two they're struggling with keeping it up and running and fulfilling the demands of the stakeholders because they cannot keep up with how many databases they need to keep provisioning and patching and updating. So at Nutanix now we are actually solving both those problems with the platform. We are solving the problem of a very specific SLA that we can deliver in any cloud. And with Era, you're solving the issue of that operational complexity. We're making it really easy. So again, IT stakeholders DBS can fulfill the demands of the business stakeholders and really help them monetize the data. >> Yeah. I'll just add on with one concrete examples too. Like we have a big financial customer, they want to run Postgres. They are looking at the public cloud. Can we do a manage services kind of stuff, but you look at this, that the cost difference between a Postgres and your company infrastructure versus managed services almost like $3X to $4X dollars. Now, with Nutanix platform and Era, we were able to show that they can do at much reduced cost, manage their best service experience including their DBA cost are including the cloud administration cost. Like we added the infrastructure picture. We added the people who are going to manage the cloud, internal cloud and then intern experience being, plus plus of what they can see to public cloud. That's what makes the big difference. And this is what data sovereignty, data control, compliance and infrastructure governance, all these things coupled with cloud experiences, what customers really see the value of Era and the enterprise cloud and with an extension to the public cloud, with our hybrid cloud strategy. if they want to move this workload to public cloud they can do it. So, today with AWS clusters and tomorrow with our Azure clusters. So that gives them that kind of insurance not getting locked in by a big hyperscaler, but at same time enjoy the cloud experience. That's what big customers are looking for. >> Alright Bala, all the things you laid out here, what's the availability of Era rotically dot two? >> Era rotically dot two is actually available today. The customers can enjoy download the bits. We already have bunches of beta customers who are trying it out with the recall big telco companies are financial companies, and even big companies that manage big pensions kind of stuff. Let's talk about that kind of stuff. People are looking to us. In fact, there are customers who are looking for, when is this available for Azure cluster so that we can move some of our workloads to and manage the databases in Azure classes. So it is available and I'm looking forward to great feedback from our customers. And I'm hoping that it will solve some of their major critical problems. And in the process they get the best of Nutanix. >> Monica, last question I have for you. This doesn't seem like it's necessarily the same traditional infrastructure go to market for a solution like this. If I think back to, people think of HCI it was like, Oh! well, it was kind of a new box. We know Nutanix is a software company. More of what you do today is subscription based. So, maybe if you could talk a little bit to just how Nutanix goes to market with a solution like this. >> Yeah. And you know what, maybe people don't realize it but I'm hoping a lot of people do that. Nutanix is not just an infrastructure company anymore. In the last many years we've developed a full cloud platform in not only do we offer the infrastructure services with hyperconverged infrastructure which is now really the foundation. It's the hybrid cloud infrastructure. As you know, Stu, we talked to you a month ago and we talked about the evolution of XCI to really becoming the hybrid cloud infrastructure. But in addition to that, we also offer other data center services on storage DR Networking. We also offer DevOps services with application provisioning automation, application orchestration and then of course, database services that we talking about today and we offer desktop services. So Nutanix has really evolved in the last few years to a complete cloud platform really focusing on the application and workloads that run on top of the infrastructure stack. So not just the infrastructure layer but how can we be the best platform to run your databases? Your end is the computing workloads, your analytics applications your enterprise applications, cloud native applications. So that's what this is. And databases is one of our most successful workloads that's that runs a Nutanix very well because of the way the infrastructure software is architected. Because it's really great to scale high performance because again our superior architecture. And now with Era, it's a tool, it's all in one. Now it's also about really simplifying the management of databases and delivering them speedily and with agility to drive innovation in the organizations. >> Yep. Thank you Monica. Thank you. I I'll just add a couple of lines of comments into that. DTM for databases as erotically dots two, is going to be a challenge. And historically we are seen as an infrastructure company but the beauty of databases is so and to send to the infrastructure, the storage. So the language slightly becomes easy. And in fact, this holistic way of looking at solving the problem at the solution level rather than infrastructure helps us to go to a different kind of buyer, different kinds of decision maker, and we are learning. And I can tell you confidently the kind of progress that we have seen for in one enough year, the kind of customers that we are winning. And we are proving that we can bring a big difference to them. Though there is a challenge of DTM speaking the language of database, but the sheer nature of cloud platform the way they are a hundred hyperscale work. That's the kind of language that we take. You can run your solution. And here is how you can cut down your database backup time from hours to less than minute. Here's how you can cut down your patching from 16 hours to less than one hour. It is how you can cut down your provisioning time from multiple weeks to let them like matter of minutes. That holistic way of approaching it coupled with the power of the platform, really making the big difference for us. And I usually tell every time I meet, can you give us an opportunity to cut down your database cost, the PC vote, total cost of operations by close to 50%? That gets them excited that lets then move lean in and say, how do you plan to do it? And then we go about how do we do it? And we do a deep dive and PC people and all of it. So I'm excited. I think this is going to be a big play for Nutanix. We're going to make big difference. >> Absolutely well, Bala, congratulations to the team. Monica, both of you thank you so much for joining, really excited for all the announcements. >> Thank you so much. >> Thank you >> Stay with us. We're going to dig in a little bit more with one more interview for this product launch of the New Era and Database Management from Nutanix. I'm Stu Minimam as always, thank you for watching theCUBE. (cool music)

Published Date : Oct 6 2020

SUMMARY :

Narrator: From around the globe. I have the Senior Vice that the database for the customers have to our customers the ability I have one database it's kind of the one of the most valuable assets So the customers will now How about from the DBA standpoint? Meaning that the same kind of stuff that the machine can do, So bringing the cloud experience, of the services that are and the management of these of a lot of the themes that we talked about at nutanix.next demands of the stakeholders of Era and the enterprise And in the process they the same traditional of the way the infrastructure the kind of customers that we are winning. really excited for all the announcements. the New Era and Database

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MonicaPERSON

0.99+

NutanixORGANIZATION

0.99+

Monica KumarPERSON

0.99+

fiveQUANTITY

0.99+

$3XQUANTITY

0.99+

AWSORGANIZATION

0.99+

DBSORGANIZATION

0.99+

two dayQUANTITY

0.99+

$4XQUANTITY

0.99+

Stu MinimanPERSON

0.99+

PostgresORGANIZATION

0.99+

oneQUANTITY

0.99+

80%QUANTITY

0.99+

threeQUANTITY

0.99+

24QUANTITY

0.99+

16 hoursQUANTITY

0.99+

New YorkLOCATION

0.99+

three daysQUANTITY

0.99+

Bala KuchibhotlaPERSON

0.99+

less than one hourQUANTITY

0.99+

BalaPERSON

0.99+

bothQUANTITY

0.99+

four yearsQUANTITY

0.99+

OracleORGANIZATION

0.99+

tomorrowDATE

0.99+

SAP HANATITLE

0.99+

365 dayQUANTITY

0.99+

Stu MinimamPERSON

0.99+

StuPERSON

0.99+

Hundreds of petabytesQUANTITY

0.99+

both sidesQUANTITY

0.98+

AzureTITLE

0.98+

a month agoDATE

0.98+

todayDATE

0.98+

SQLTITLE

0.98+

two categoriesQUANTITY

0.98+

OneQUANTITY

0.98+

SAP HANATITLE

0.98+

HCIORGANIZATION

0.98+

single clusterQUANTITY

0.97+

seven different copiesQUANTITY

0.96+

single shopQUANTITY

0.96+

almost 80%QUANTITY

0.96+

nutanix.nextORGANIZATION

0.96+

sevenQUANTITY

0.96+

single frameworkQUANTITY

0.95+

one kindQUANTITY

0.94+

Eratory dot twoTITLE

0.94+

every two yearsQUANTITY

0.93+

Manoj Nair. Metallic and Ranga Rajagopalan, Commvault | CUBE Conversation, October 2020


 

(royalty free music) >> Woman's voice: From the Cube Studios in Palo Alto, in Boston, connecting with thought leaders all around the world, this is a cube conversation. >> Hi, I'm Stu Miniman coming to you from our Boston area studio and this is a special cube conversation. I have a special announcement from our friends at Commvault. So welcome back to the program. We have two of our cube alumni. First, we have Manoj Nair, he's actually the general manager of Metallic, which is a Commvault venture. First time Manoj on the program in your role with, with Commvault, welcome back. And also welcoming back Ranga Rajagopalan who's the vice president of products at Commvault. Ranga, caught up with you recently at the FutureReady event that we had over the summer. Thanks so much for joining us again. >> Sure. >> Alright. So Manoj, let's start. Metallic obviously was, you know, the standout you know, thing that everybody talked about last year at Commvault GO. Really helping to, you know, put Commvault clearly into the SaaS marketplace out there. Talking about how, you know, all the wonderful features for managing my data in a cloud environment. So there is an expansion to the portfolio that we're announcing today. Why don't you share the news? >> Yeah, absolutely Stu, you know, it's great to be back here with all of you and Metallic has come a long way from the launch. Just less than a year ago, we announced the creation of Metallic multiple different offerings whether it's protecting SaaS workloads like O365, remote endpoints and a hybrid cloud workloads. You know, the context that we're getting from our customers, especially in the last six months, increased cloud adoption and, you know, remote working collaboration suites being adopted. All of that has been a great accelerator for adoption of SaaS data protection, which is really what the Metallic is offering. We have gone to global countries and expanded to our Commvault customer base who was, you know, using both Commvault software and Metallic now. One of the key things that we're not, you know, today's announcement is focused on a Metallic cloud storage service that as a new service available for Commvault customers are looking to get a, you know, fully managed secure cloud-based SaaS target for protecting all of the data as an air gap copy and this is, you know, is more relevant than ever. >> So Manoj, using the cloud for data protection, for backup isn't new? Ranga, help us understand. I heard in there air gap, I heard, you know, leveraging the cloud. Absolutely, we've seen a huge tailwind for cloud adoption but there's that gap for making sure customers, you know, protect their data, secure their data. Do they have the skillset to be able to leverage that, so help help us drill in and understand what's different about this new service >> You're right Stu. Cloud is absolutely not new but what is really unique about today's announcement with metallic cloud storage service is that we are bringing cloud even closer to our Commvault customers. So thinking from a data management perspective, our customers want to more easily and securely get the benefits of cloud storage. What we are doing today is integrating Metallic cloud storage service as a cloud storage target into our Commvault software as well as our HyperScale X plans. And that lets our customers to seamlessly use cloud storage for their data protection, backup and archival use cases without needing to understand a lot about the cloud, without needing to get through any of the complexities. Think of it as the easy button that is now introduced into the Commvault software and HyperScale X. >> All right, so, if I heard you right, this is a managed service that Commvault is offering. Did I get that right? >> That's fast. >> Yeah >> So, you know, it's a managed service. It's public cloud storage. It's, as Ranga said, the easy button to be able to create your air gap copies in the cloud. And, you know, with everything that we keep hearing about ransomware, and we believe this is one of the, the, the most important steps in ransomware readiness, a lot of our customers are already doing it by bringing their own cloud storage on all the clouds we protect, but it's still not easy. And this is a skills gap, you know, the procurement process and all of that, you know, the management of the credentials, the setting up of the networking, all of that is encapsulated. So now, it's just, you know, it's like a built-in feature, just, you know plug it in and now you've got an on-ramp to the cloud. Make sure you have your air gap copy. >> Yeah, maybe it would help if you'd, if you'd talk about the easy button, give us a little compare contrast 'cause, right, I could go, I could spin up instance of the cloud, but, you know, who has access? What are the security settings? There's a whole litany of things that I need to make sure I've got the right identity management. It's kind of easy, but not necessarily simple to, to be able to do that. So from what you're describing I don't even need to really think, you know, yes, it's in the cloud, I'm leveraging all the wonderful things of the cloud, but I don't have to have that, that ramp up of skillset if I don't already have that in house as... Ranga, sounds like I'm understanding that. >> Yeah >> You know. >> Yeah, you're perfectly understanding and that's all there is to it. And let me expand on the PC part there, right? For us, simplicity is into end-customer experience. So I'm going to break this down from a customer life cycle perspective. Think of a Commvault customer who's backing up pretty much all the workloads in the data center. The first question they have is, you know, "For security reasons "for easy, or because I'm in a transformation project "I need to make, I need to start using cloud storage." So the first complexity they would face is understanding which cloud provider to use, what kind of cloud profile to use? or who their cloud or chasing model, which is very different from how they normally procure their hardware and software. So that's really the first dimension of simplicity that this Metallic cloud storage offer. Our customers can procure their cloud storage along with any other Commvault software and hardware just like they would do any other Commvault software. So that's the first level of simplicity. The second one is "How do I bring "that into my data management life cycle." And again, as I mentioned before, MCSS is fully integrated into Commvault software. So through the simplicity of command center, which is the one UI that brings all our products together, customers can just click to the cloud storage target and start backing up, moving copies, archiving, doing all the data management use cases, the second dimension of simplicity. And the third one really is the predictability. You know, cloud is beautiful, It brings a lot of flexibility, but it also brings in a lot of new terms. What are the egress charges? What does ingress mean? What does egress mean? What happens when I have the V store? What happens when I have the Ricola? So all of that complexity is taken away. We handle all of that in the backend. From the customer's perspective, just like they use CAP, just like they use the Desk, now, they can use cloud. We handled all the egress and all those kind of stuff in the backend. From the customer's perspective, they get a simple, predictable price point. So from the time of choosing, procuring it, using it and continuously getting the best benefits out of it, the easy button extends across that entire dimension. And the beauty in all of this is customers getting all the benefits of cloud without having to really understand much about cloud. So that's really the benefit we bring to the table with MCSS. >> Yeah. Manoj, Commvault has a long history of being able to live on, you know, various infrastructures that customers have. Are you able to share who the, I'm assuming there's a cloud partner for part of this, so who is the, the underlying IS? >> Yeah, so still, you know, end of June doing, we announced the next phase of our strategic partnership with Microsoft. So this is a, you know, one of the first big, new things that is coming out of the giant partnership between Commvault and Microsoft around Metallic and Microsoft Azure. There's a lot of things that, you know, we're jointly doing that are unique that make all of the simplicity Ranga, you know, just mentioned, come to life and, you know, that's, you know, power of the end as I call it. It's Commvault and Metallic and Microsoft, you know, coming together to make this really easy for our customers to start getting the value out of leveraging cloud for the data protection. Yeah. >> Well, Manoj, it seems natural extension of what you've already talked about for what Metallic can protect. Of course, you've got the, you know, the business suite from Microsoft, can you help frame it for us, you know, where this new, the MCSS fits in the Metallic portfolio today? >> Yeah absolutely. So if you look at, you know, what... I'll give you a customer journey and what's been happening. If you are not a Commvault customer today and you're looking at "What's my best 0365 data protection option," if you go to microsoft.com, you'll actually find Metallic in there as the recommended offer. And they, they might start the journey there or you're an existing Commvault customer and you start rapidly adopting teams and O365, you know, post COVID. The, the, you know, Metallic is the default option. So it doesn't matter how you enter in, you're now getting a full, you know, SaaS actual backup as a service, no storage costs, no egress costs. And so our Commvault customers have been asking, "We love that part of it, why not make that available "for all of the other data that is being protected "by Commvault, either appliance or software on-prem?" and, you know, in a very simple way, it's, you know, the best things are driven by customers. And in this case, our customers came to us and said, "We love the simple button "not just what's included in the Metallic service, "we would like that that to be available, even for, "you know, the existing software you're protecting on-prem "for the air gap copy use case is kind of the biggest one." And you know, all of the things that Ranga said in terms of simplicity now comes to bear. And it's something that we were including inside the Metallic SaaS offerings. Now, it's available for software and appliance customers. >> Yeah. I definitely, I've heard of the industry now. Microsoft seems a little bit more amenable to, you know, not charging for egress, with some of their partners, when they put together these solutions. Ranga, Manoj has mentioned air gap a couple of times, can you help us frame, you know, what that means today? You know, I even think back, you know, ape that most people are familiar with. Even, I think about, you know, Google, you know, use ape for many years even in the public cloud to give that air gap. Of course, we've talked to your customers lots about how to protect against ransomware. So how does, how does this fit in the new solution? >> You know, unfortunately, Stu today. It's, it's important reality for us to discuss the ransomware readiness. Number of attacks are going up depending on, you know, which your source you are listening to. So security is a very important concern in top of our customers' minds. Now, MCSS is cloud storage, so it is off site storage. So it comes with all the natural layered security that it's built into cloud storage. Additionally, Commvault brings a complete ransomware protection, protection and recovery framework, which becomes inherently available with the MCSS. And let me explain that in a few very simple quotes. Now, the entire journey from on-prem to the cloud storage is completely encrypted. So that's, you know, a very important part of the order on security mechanism, but here is where it really becomes cool Commvault software is managing the cloud credentials, the cloud keys. So the entire access to MCSS as a cloud storage target is managed to Commvault. So there isn't an independent cloud admin accessing that storage, which opens it up for any kind of an intentional or unintentional access. Anything can happen when you allow that access. So Commvault completely manages that access the keys are owned by the customer, but managed by a Commvault. So it's a really air gap security, layered security mechanism that you get in combination with the entire framework of air gap isolation, anomaly protection, the authentication, everything that is built into the Commvault framework. So when you, when you bring in the simplicity that we talked about earlier, you can apply that to the security angle as well here. Instead of making the customer manage yet another piece in the jigsaw, we are managing it for them. So from their perspective, it is a seamless extension to their data management strategy while it also adds an extra layer of security and a readiness to recover from ransomware attacks. >> While it's being launched today, we already have customers that have, you know, we have accelerated into adoption of MCSS and it's coming exactly for the scenarios Ranga just said. You know, they, they have a requirement for a cloud copy. If you have seen that on the Metallic SaaS side that some of the customers might be in pilot mode. And because they were in pilot mode, they were quickly able to recover from attacks that happened. Unfortunately, those, those things are reality. And we have had customers who after the attack go and say "I want to make sure it's much easier to recover from that." And so we already have our first customers who are starting to adopt the service even as we launch it today. >> Well. I'm so glad you brought up the customer examples. Manoj, give us a little bit just the high level view, you talked about the growth and adoption of Metallic overall, and you just talked about kind of the, the single management. You got any SaaS for us, you know, how much data do you have in the cloud now and, you know, what's the growth looking like? And talk a little bit about, you know, what we can expect going forward from this portfolio. >> Yeah, I, you know, I don't know how many people disclose this or not, but we have disclosed it in the past, we have over an exabyte of data today in the cloud that, you know, our customers are, you know, either using a Metallic or bringing their own cloud with Commvault and writing to the cloud. So, you know, that's probably, you know, best in class out there. What we are also seeing is the acceleration of that, you know, so we look at it's, you know, it's exponential growth over a hundred percent, you know, we're, we're seeing that, that rise in leverage yet it's something that when you look at the overall industry percentages, it depends on whose stats you use, it's probably only 5%, maybe 10% that are leveraging the cloud for anything, whether it's, you know, in this case, it's data, cloud data as a secondary target. So there's a lot of untapped potential. And the things that Ranga said I think really are the ones our customers are telling us as we tested this out. And those are the biggest reasons. Right cost, you know, I'm concerned about it. I've heard that it's unpredictable. It goes up, people start spinning up other things that they shouldn't be. And so I want predictable costs, you know, security and the whole model around it, the, the governance of the keys, and finally skills, everyone's busy, no one's trying to not be, you know, upping their cloud skills yet it's not something that is very, you know, very easy for most people to, you know, become an expert. And if you're not an expert while you're protecting your data, that's not, you know, that's not something you want to do, so you kind of hold back. And I think this is really the biggest thing that customers are looking at, like our cloud expertise packaged in an offering solving all those things? >> And Stu, we discussed this at FutureReady of how the Commvault portfolio continues to come closer and closer together in order to deliver that increased value to our customers. In July, when we were having a similar conversation, we saw how Hedvig came in as the scale load storage in our HyperScale X integrated data protection plans. And we can see that we have Metallic Cloud Storage Service coming in as a cloud extension to our software, as well as HyperScale X. So it's kind of bringing the best of both worlds, customers who want to continue to stay on for them, protect their on-prem workloads with on-prem footprint. You have HyperScale X as a very nice scale, which integrated our plans. And as the capacity needs increase, as the security needs increase, you have MCSS now as a managed storage extension, bringing together those pieces of the portfolio. Now, the thing that is now available already as of September 15 is our ability to manage Metallic as part of command center. So while you want that SaaS flexibility and you're using Metallic to protect the SaaS workloads let's also realize that there are a bunch of other workloads that you might be protecting using Commvault software all through HyperScale. We can now bring all of them together into the simplicity of command center. So it, again, takes away another point of complexity for the customer. Just one UI, go ahead, do protect the workloads the way you want. With the form factor you want. SaaS software, or our plans, and we bring it all together into a single management framework for you. So you're going to continue seeing the portfolio coming closer together because our prime concern is to provide flexibility of choice to customers. Flexibility of choice in so many different ways, you know, you can use software, our plans or SaaS. You can bring your own on-prem storage, cloud storage, or if you want to hit the simple button, use Metallic clouds for it. So, so you're going to see that happen as we move forward. >> Well. Manoj, Ranga, thank you so much for the updates. Congratulations on the launch. Love little tagline leading it. We're we're making the cloud just a little bit closer to us. >> It is, >> It is a lot closer. >> Thank you. Thank you Stu for your time. >> Thank you. >> I'm Stu Miniman. Thank you so much for watching theCUBE. (royalty free music)

Published Date : Oct 6 2020

SUMMARY :

all around the world, Hi, I'm Stu Miniman coming to you you know, the standout and this is, you know, is sure customers, you know, Think of it as the easy button that is now introduced All right, so, if I heard you right, So now, it's just, you know, to really think, you know, We handle all of that in the backend. to live on, you know, So this is a, you know, one you know, the business suite And you know, all of the Even, I think about, you know, Google, So that's, you know, a very you know, we have And talk a little bit about, you know, in the cloud that, you know, protect the workloads the way you want. you so much for the updates. Thank you Stu for your time. Thank you so much for watching theCUBE.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
RangaPERSON

0.99+

MicrosoftORGANIZATION

0.99+

twoQUANTITY

0.99+

MetallicORGANIZATION

0.99+

September 15DATE

0.99+

Ranga RajagopalanPERSON

0.99+

Stu MinimanPERSON

0.99+

GoogleORGANIZATION

0.99+

ManojPERSON

0.99+

CommvaultORGANIZATION

0.99+

October 2020DATE

0.99+

BostonLOCATION

0.99+

JulyDATE

0.99+

10%QUANTITY

0.99+

third oneQUANTITY

0.99+

Palo AltoLOCATION

0.99+

Manoj NairPERSON

0.99+

second oneQUANTITY

0.99+

FirstQUANTITY

0.99+

last yearDATE

0.99+

second dimensionQUANTITY

0.99+

todayDATE

0.99+

HyperScale XTITLE

0.99+

MCSSTITLE

0.99+

StuPERSON

0.99+

first customersQUANTITY

0.99+

first levelQUANTITY

0.98+

HyperScale X.TITLE

0.98+

RicolaORGANIZATION

0.98+

end of JuneDATE

0.98+

bothQUANTITY

0.98+

first questionQUANTITY

0.98+

both worldsQUANTITY

0.98+

HyperScaleTITLE

0.98+

FutureReadyORGANIZATION

0.97+

first dimensionQUANTITY

0.97+

5%QUANTITY

0.97+

FutureReadyEVENT

0.97+

OneQUANTITY

0.96+

oneQUANTITY

0.95+

singleQUANTITY

0.95+

John F Thompson V1 FOR REVIEW


 

>> Narrator: From around the globe. It's theCUBE covering space in cybersecurity symposium 2020 hosted by Cal Poly. >> Hello, everyone. Welcome to the space and cybersecurity symposium, 2020 hosted by Cal Poly where the intersection of space and security are coming together. I'm John Furrier, your host with theCUBE here in California. I want to welcome our featured guest, Lieutenant General, John F. Thompson with the United States Space Force approach to cybersecurity. That's the topic of this session. And of course he's the commander of the space and missile system center in Los Angeles Air Force Base. Also heading up Space Force. General, thank you for coming on. I really appreciate to you kicking this off. Welcome to the symposium. >> Hey, so thank you very much, John, for that very kind introduction. Also very much thank you to Cal Poly for this opportunity to speak to this audience today. Also a special shout out to one of the organizers, Dustin Debrun, for all of his work, helping get us to this point. Ladies and gentlemen as a John mentioned, I'm JT Thompson. I lead the 6,000 men and women of the United States Space Force's Space and Missile System Center, which is headquartered here at Los Angeles Air Force Base and El Segundo. If you're not quite sure where that's at, it's about a mile and a half from LAX. This is our main operating location, but we do have a number of other operating locations around the country. We're about 500 people at Kirtland Air Force Base in Albuquerque, New Mexico, and an about another 500 people on the front range of the Rockies between Colorado Springs and Denver plus a smattering of other much smaller operating locations nationwide. We're responsible for acquiring, developing and sustaining the United States Space Force's, critical space assets. That includes the satellites in the space layer and also on the ground layer our ground segments to operate those satellites. And we also are in charge of procuring launch services for the US Space Force and a number of our critical mission partners across the Department of Defense and the intelligence community. Just as a couple of examples of some of the things we do, if you're unfamiliar with our work we developed and currently sustain the 31 satellite GPS constellation that satellite constellation, while originally intended to help with global navigation, those GPS signals have provided trillions of dollars in unanticipated value to the global economy over the past three decades. GPS is everywhere. I think everybody realizes that. Agriculture, banking, the stock market, the airline industry, separate and distinct navigation systems. It's really pervasive across both capabilities for our Department of Defense and capabilities for our economy and individuals, billions of individuals across our country and the planet. Some of the other work we do for instance, in the communications sector, secure communications satellites that we designed and build that link America's sons and daughters serving in the military around the world and really enable real time support and comms for our deployed forces. And those of our allies. We also acquire infrared missile warning satellites that monitor the planet for missile launches that provide advanced warning to the US Homeland and to our allies in case some of those missile launches are nefarious. On a note, that's probably a lot closer to home, maybe a lot closer to home than many of us want to think about here in the state of California. In 2018, SMC jumped through a bunch of red tape and bureaucracy to partner with the US Forest Service during two of the largest wildfires in the state's history, the Camp and Woolsey fires in Northern California. As those fires spread out of control, we created processes on the fly to share data from our missile warning satellites. Those are satellites that are systems that are purpose built to see heat sources from thousands of miles above the planet. And we collaborated with the US Forest Service so that firefighters on the ground could track those fires more in real time and better forecast fires and where they were spreading, thereby saving lives and property by identifying hotspots and flareups for firefighters. That data that we were able to working with our contractors pass to the US Forest Service and authorities here in California, was passed in less than an hour as it was collected to get it into the hands of the emergency responders, the first responders as quickly as possible and doing that in an hour greatly surpassed what was available from some of the other assets in the airborne and ground-based fire spotters. It was really instrumental in fighting those fires and stopping their spread. We've continued that involvement in recent years, using multiple systems to support firefighters across the Western US this fall, as they battled numerous wildfires that unfortunately continue. Working together with the US Forest Service and with other partners we'd like to think that we've made a difference here, but there's still a lot more work to go. And I think that we should always be asking ourselves what else can space data be used for and how can we more rapidly get that space data to stakeholders so that they can use it for purposes of good, if you will. How else can we protect our nation? How else can we protect our friends and allies? I think a major component of the discussion that we will have throughout this conference is that the space landscape has changed rapidly and continues to change rapidly. Just over the past few years, John and I were talking before we went live here and 80 nations now have space programs. Nearly 80 space faring nations on the planet. If you just look at one mission area that the Department of Defense is interested in, and that's small launch, there are currently over 100 different small launch companies within the US industrial base vying for commercial DoD and civil payload capabilities, mostly to lower earth orbit. It's truly a remarkable time. If you factor in those things like artificial intelligence and machine learning, where we're revolutionizing really, the ways that we generate process and use data. It's really remarkable. In 2016, so if you think about this four years ago, NASA estimated that there were 28 terabytes of information transiting their space network each day. And that was four years ago. Obviously we've got a lot of desire to work with a lot of the people in the audience in this conference, we need to work with big thinkers, like many of you to answer questions on how best we apply data analytics to extract value and meaning from that data. We need new generations of thinkers to help apply cutting edge theories of data mining, cyber behaviorism, and Internet of Things 2.0, it's just truly a remarkable time to be in the space business and the cyber aspects of the space business are truly, truly daunting and important to all of us. Integrating cyber security into our space systems, both commercial and government is a mandate. it's no longer just a nice to have as the US Space Force and Department of the Air Force leadership has said many times over the past couple of years, space is becoming congested and contested. And that contested aspect means that we've got to focus on cyber security in the same way that the banking industry and cyber commerce focus on cybersecurity day in and day out. The value of the data and services provided is really directly tied to the integrity and availability of that data and services from the space layer, from the ground control segments associated with it. And this value is not just military, it's also economic and it's not just American, it's also a value for the entire world, particularly our allies, as we all depend upon space and space systems. Your neighbors and friends here in California that are employed at the space and missile system center work with network defenders. We work with our commercial contractors and our systems developers, our international allies and partners to try and build as secure and resilient systems as we can from the ground up that keep the global comments of space free and open for exploration and for commerce as John and I were talking earlier, before we came online, there's an aspect of cybersecurity for space systems, especially for some of our legacy systems, that's more, how do we bolt this on? Cause we fielded those space systems a number of years ago, and the challenges of cybersecurity in the space domain have grown. So we have a part that we have to worry about, bolting it on, but then we have to worry about building it in as we field new systems and build in a flexibility that realizes that the cyber threat or the cybersecurity landscape will evolve over time. It's not just going to be stagnant. There will always be new vulnerabilities and new threat vectors that we all have to look at. Look, as Secretary Barrett, who is our secretary of the air force likes to say most Americans use space before they have their first cup of coffee in the morning. The American way of life really depends on space. And as part of the United States Space Force, we work with defense leaders, our Congress joint, and international military teammates and industry to ensure American leadership in space. I really thank you for this opportunity to address the audience today, John, and thanks so much to Cal Poly for letting me be one of the speakers at this event. I've really looked forward to this for several months. And so with that, I look forward to your questions as we kind of move along here. >> General, thank you very much for those awesome introductory statement. For the folks watching on the stream, Brigadier General Carthan's going to be in the chat, answering any questions, feel free to chat away. He's the vice commander of Space and Missile System Center, he'll be available. A couple of comments from your keynote before I get to my questions. Cause it just jumped into my head. You mentioned the benefits of say space with the fires in California. We're living that here. That's really realtime. That's a benefit. You also mentioned the ability for more people launching payloads into space. I'm only imagined Moore's law smaller, faster, cheaper applies to rockets too. So I'm imagining you have the benefits of space and you have now more potential objects flying out sanctioned and maybe unsanctioned. So is it going to be more rules around that? This is an interesting question cause it's exciting Space Force, but for all the good there is potentially bad out there. >> Yeah. So John, I think the basics of your question is as space becomes more congested and contested, is there a need for more international norms of how satellites fly in space? What kind of basic features satellites have to perhaps de orbit themselves? What kind of basic protections should all satellites be afforded as part of a peaceful global commons of space? I think those are all fantastic questions. And I know that US and many allied policy makers are looking very, very hard at those kinds of questions in terms of what are the norms of behavior and how we field, and field as the military term. But how we populate using civil or commercial terms that space layer at different altitudes, lower earth orbit, mid earth orbit, geosynchronous earth orbit, different kinds of orbits, what the kind of mission areas we accomplished from space. That's all things that need to be definitely taken into account as the place gets a little bit, not a little bit as the place gets increasingly more popular day in and day out. >> I'm super excited for Space Force. I know that a new generation of young folks are really interested in it's an emerging, changing great space. The focus here at this conference is space and cybersecurity, the intersection. I'd like to get your thoughts on the approach that a space force is taking to cybersecurity and how it impacts our national goals here in the United States. >> Yeah. So that's a great question John, let me talk about it in two basic ways. At number one is an and I know some people in the audience, this might make them a little bit uncomfortable, but I have to talk about the threat. And then relative to that threat, I really have to talk about the importance of cyber and specifically cyber security, as it relates to that threat. The threats that we face really represented a new era of warfare and that new era of warfare involves both space and cyber. We've seen a lot of action in recent months from certain countries, notably China and Russia that have threatened what I referred to earlier as the peaceful global commons of space. For example, it threw many unclassified sources and media sources. Everybody should understand that the Russians have been testing on orbit anti-satellite capabilities. It's been very clear if you were following just the week before last, the Department of Defense released its 2020 military and security developments involving the People's Republic of China. And it was very clear that China is developing ASATs, electronic jammers, directed energy weapons, and most relevant to today's discussion, offensive cyber capabilities. There are kinetic threats that are very, very easy to see, but a cyber attack against a critical command and control site or against a particular spacecraft could be just as devastating to the system and our war fighters in the case of GPS and important to note that that GPS system also impacts many civilians who are dependent on those systems from a first response perspective and emergency services, a cyber attack against a ground control site could cause operators to lose control of a spacecraft or an attacker could feed spoofed data to assist them to mislead operators so that they sent emergency services personnel to the wrong address. Attacks on spacecraft on orbit, whether directly via a network intrusion or enabled through malware introduced during the system's production while we're building the satellite can cripple or corrupt the data. Denial-of-service type attacks on our global networks obviously would disrupt our data flow and interfere with ongoing operations and satellite control. If GPS went down, I hesitate to say it this way, cause we might elicit some screams from the audience. But if GPS went down a Starbucks, wouldn't be able to handle your mobile order, Uber drivers wouldn't be able to find you. And Domino's certainly wouldn't be able to get there in 30 minutes or less. So with a little bit of tongue in cheek there from a military operations perspective, it's dead serious. We have become accustomed in the commercial world to threats like ransomware and malware. And those things have unfortunately become commonplace in commercial terrestrial networks and computer systems. However, what we're seeing is that our adversaries with the increased competition in space these same techniques are being retooled, if you will, to use against our national security space systems day in and day out. As I said, during my opening remarks on the importance of cyber, the value of these systems is directly tied to their integrity. If commanders in the field, firefighters in California or baristas in Starbucks, can't trust the data they're receiving, then that really harms their decision making capabilities. One of the big trends we've recently seen is the move towards proliferated LEO constellations, obviously Space X's Starlink on the commercial side and on the military side, the work that DARPA and my organization SMC are doing on Blackjack and Casino, as well as some space transport layer constellation work that the space development agency is designing are all really, really important types of mesh network systems that will revolutionaries how we plan and field war fighting systems and commercial communications and internet providing systems. But they're also heavily reliant on cybersecurity. We've got to make sure that they are secured to avoid an accident or international damage. Loss of control of these constellations really could be catastrophic from both a mission perspective or from a satellites tumbling out of low earth orbit perspective. Another trend is introductions in artificial intelligence and machine learning, onboard spacecraft are at the edge. Our satellites are really not so much hardware systems with a little software anymore in the commercial sector and in the defense sector, they're basically flying boxes full of software. And we need to ensure that data that we're getting out of those flying boxes full of software are helping us base our decisions on accurate data and algorithms, governing the right actions and that those systems are impervious to the extent possible to nefarious modifications. So in summation, cybersecurity is a vital element of everything in our national security space goals. And I would argue for our national goals, writ large, including economic and information dimensions, the Space Force leadership at all levels from some of the brand new second lieutenants that general Raymond swore in to the space force this morning, ceremonially from the air force associations, airspace and cyberspace conference to the various highest levels, General Raymond, General DT Thompson, myself, and a number of other senior leaders in this enterprise. We've got to make sure that we're all working together to keep cyber security at the forefront of our space systems cause they absolutely depend on it. >> You mentioned hardware, software threats, opportunities, challenges. I want to ask you because you got me thinking of the minute they're around infrastructure. We've heard critical infrastructure, grids here on earth. You're talking about critical infrastructure, a redefinition of what critical infrastructure is, an extension of what we have. So I'd love to get your thoughts about Space Force's view of that critical infrastructure vis-a-vis the threat vectors, because the term threat vectors has been kicked around in the cyberspace. Oh you have threat vectors. They're always increasing the surface area. If the surface area is from space, it's an unlimited service area. So you got different vectors. So you've got new critical infrastructure developing real time, really fast. And you got an expanded threat vector landscape. Putting that in perspective for the folks that aren't really inside the ropes on these critical issues. How would you explain this and how would you talk about those two things? >> So I tell you, just like, I'm sure people in the security side or the cybersecurity side of the business in the banking industry feel, they feel like it's all possible threat vectors represent a dramatic and protect potentially existential threat to all of the dollars that they have in the banking system, to the financial sector. On the Department of Defense side, we've got to have sort of the same mindset. That threat vector from, to, and through space against critical space systems, ground segments, the launch enterprise, or transportation to orbit and the various different domains within space itself. Like I mentioned before, LEO, MEO and GEO based satellites with different orbits, all of the different mission areas that are accomplished from space that I mentioned earlier, some that I did mention like a weather tactical or wide band communications, various new features of space control. All of those are things that we have to worry about from a cyber security threat perspective. And it's a daunting challenge right now. >> Yeah, that's awesome. And one of the things we've been falling on the hardware side on the ground is the supply chain. We've seen, malware being, really put in a really obscure hardware. Who manufactures it? Is it being outsourced? Obviously government has restrictions, but with the private sector, you mentioned China and the US kind of working together across these peaceful areas. But you got to look at the supply chain. How does the supply chain in the security aspect impact the mission of the US space Force? >> Yeah. Yeah. So how about another, just in terms of an example, another kind of California based historical example. The very first US Satellite, Explorer 1, was built by the jet propulsion laboratory folks, not far from here in El Segundo, up in Pasadena, that satellite, when it was first built in the late 50s weighing a little bit, over 30 pounds. And I'm sure that each and every part was custom made and definitely made by US companies. Fast forward to today. The global supply chain is so tightly coupled, and frankly many industries are so specialized, almost specialized regionally around the planet. We focus every day to guarantee the integrity of every component that we put in our space systems is absolutely critical to the operations of those satellites and we're dependent upon them, but it becomes more difficult and more difficult to understand the heritage, if you will, of some of the parts that are used, the thousands of parts that are used in some of our satellites that are literally school bus sized. The space industry, especially national security space sector is relatively small compared to other commercial industries. And we're moving towards using more and more parts from non US companies. Cybersecurity and cyber awareness have to be baked in from the beginning if we're going to be using parts that maybe we don't necessarily understand 100% like an Explorer one, the lineage of that particular part. The environmental difficulties in space are well known. The radiation environment, the temperature extremes, the vacuum, those require specialized component. And the US military is not the only customer in that space. In fact, we're definitely not the dominant customer in space anymore. All those factors require us along with our other government partners and many different commercial space organizations to keep a very close eye on our supply chains, from a quality perspective, a security perspective and availability. There's open source reporting on supply training intrusions from many different breaches of commercial retailers to the infectious spread of compromised patches, if you will. And our adversaries are aware of these techniques. As I mentioned earlier, with other forms of attack, considering our supply chains and development networks really becomes fair game for our adversaries. So we have to take that threat seriously. Between the government and industry sectors here in the US. We're also working with our industry partners to enact stronger defenses and assess our own vulnerabilities. Last fall, we completed an extensive review of all of our major contracts here at Space and Missile System Center to determine the levels of cyber security requirements we've implemented across our portfolio. And it sounds really kind of businessy geeky, if you will. Hey, we looked at our contracts to make sure that we had the right clauses in our contracts to address cybersecurity as dynamically as we possibly could. And so we found ourselves having to add new language to our contracts, to require system developers, to implement some more advanced protective measures in this evolving cyber security environment. So that data handling and supply chain protections from contract inception to launch and operations were taken into account. Cyber security really is a key performance parameter for us now. Performance of the system, It's as important as cost, it's as important as schedule, because if we deliver the perfect system on time and on cost, it can perform that missile warning or that communications mission perfectly, but it's not cyber secure. If it's doesn't have cyber protections built into it, or the ability to implement mitigations against cyber threats, then we've essentially fielded a shoe box in space that doesn't do the CA the war fighter or the nation any good. Supply chain risk management is a major challenge for us. We're doing a lot to coordinate with our industry partners. We're all facing it head on to try and build secure and trusted components that keep our confidence as leaders, firefighters, and baristas as the case may be. But it is a challenge. And we're trying to rise to that challenge. >> This is so exciting this new area, because it really touches everything. Talk about geeking out on the tech, the hardware, the systems but also you put your kind of MBA hat on you go, what's the ROI of extra development and how things get built. Because the always the exciting thing for space geeks is like, if you're building cool stuff, it's exciting, but you still have to build. And cybersecurity has proven that security has to be baked in from the beginning and be thought as a system architecture. So you're still building things, which means you got to acquire things, you got to acquire parts, you got acquire build software and sustain it. How is security impacting the acquisition and the sustainment of these systems for space? >> Yeah. From initial development, through planning for the acquisition, design, development, our production fielding and sustainment, it impacts all aspects of the life cycle, John. We simply, especially from the concept of baking in cybersecurity, we can't wait until something is built and then try and figure out how to make it cyber secure. So we've moved way further towards working side by side with our system developers to strengthen cybersecurity from the very beginning of a systems development, cyber security, and the resilience associated with it really have to be treated as a key system attribute. As I mentioned earlier, equivalent with data rates or other metrics of performance. We like to talk in the space world about mission assurance and mission assurance has always sort of taken us as we technically geek out. Mission assurance has always taken us to the will this system work in space. Can it work in a vacuum? Can it work in as it transfers through the Van Allen radiation belt or through the Southern hemisphere's electromagnetic anomaly? Will it work out in space? And now from a resiliency perspective, yeah, it has to work in space. It's got to be functional in space, but it's also got to be resistant to these cybersecurity threats. It's not just, I think a General D.T Thompson quoted this term. It's not just widget assurance anymore. It's mission assurance. How does that satellite operator that ground control segment operate while under attack? So let me break your question a little bit, just for purposes of discussion into really two parts, cybersecurity, for systems that are new and cybersecurity for systems that are in sustainment are kind of old and legacy. Obviously there's cyber vulnerabilities that threatened both, and we really have to employ different strategies for defensive of each one. For new systems. We're desperately trying to implement across the Department of Defense and particularly in the space world, a kind of a dev sec ops methodology and practice to delivering software faster and with greater security for our space systems. Here at SMC, we have a program called enterprise ground services, which is a toolkit, basically a collection of tools for common command and control of different satellite systems, EGS as we call it has an integrated suite for defensive cyber capabilities. Network operators can use these tools to gain unprecedented insight to data flows and to monitor space network traffic for anomalies or other potential indicators of a bad behavior, malicious behavior, if you will, it's rudimentary at this point, but because we're using DevSecOps and that incremental development approach, as we scale it, it just becomes more and more capable. Every product increment that we feel. Here at LA Air Force Base, we have the United Space Force's West Coast Software Factory, which we've dubbed the Kobayashi Maru. They're using those agile DevOps software development practices to deliver a space awareness software to the combined space operations center. Affectionately called the CSpock that CSpock is just on the road from Cal Poly there in San Luis Obispo at Vandenberg Air Force Base. They've so securely linked the sea Spock with other space operation centers around the planet, our allies, Australia, Canada, and the UK. We're partnering with all of them to enable secure and enhanced combined space operations. So lots of new stuff going on as we bake in new development capabilities for our space systems. But as I mentioned earlier, we've got large constellations of satellites on orbit right now. Some of them are well in excess of a decade or more or old on orbit. And so the design aspects of those satellites are several decades old. But we still have to worry about them cause they're critical to our space capabilities. We've been working with an air force material command organization called CROWS, which stands for the Cyber Resiliency Office for Weapon Systems to assess all of those legacy platforms from a cyber security perspective and develop defensive strategies and potential hardware and software upgrades to those systems to better enable them to live through this increasingly cybersecurity concerned era that we currently live in. Our industry partners have been critical to both of those different avenues. Both new systems and legacy systems. We're working closely with them to defend and upgrade national assets and develop the capabilities to do similar with new national assets coming online. The vulnerabilities of our space systems really kind of threatened the way we've done business in the past, both militarily and in the case of GPS economically. The impacts of that cybersecurity risk are clear in our acquisition and sustainment processes, but I've got to tell you, as the threat vectors change, as the vulnerabilities change, we've got to be nimble enough, agile enough, to be able to bounce back and forth. We can't just say, many people in the audience are probably familiar with the RMF or the Risk Management Framework approach to reviewing the cyber security of a system. We can't have program managers and engineers just accomplish an RMF on a system. And then, hey, high five, we're all good. It's a journey, not a destination, that's cybersecurity. And it's a constant battle rhythm through our weapon systems lifecycle, not just a single event. >> I want to get to this commercial business needs and your needs on the next question. But before I go there, you mentioned agile. And I see that clearly because when you have accelerated innovation cycles, you've got to be faster. And we saw this in the computer industry, mainframes, mini computers, and then we started getting beyond maybe when the internet hit and PCs came out, you saw the big enterprises, the banks and government start to work with startups. And it used to be a joke in the entrepreneurial circles is that, there's no way if you are a startup you're ever going to get a contract with a big business enterprise. Now that used to be for public sector and certainly for you guys. So as you see startups out there and there's acquisition involved, I'm sure would love to have a contract with Space Force. There's an ROI calculation where if it's in space and you have a sustainment view and it's software, you might have a new kind of business model that could be attractive to startups. Could you share your thoughts on the folks who want to be a supplier to you, whether they're a startup or an existing business that wants to be agile, but they might not be that big company. >> John, that's a fantastic question. We're desperately trying to reach out to those new space advocates, to those startups, to those what we sometimes refer to, within the Department of Defense, those non traditional defense contractors. A couple of things just for thinking purposes on some of the things that we're trying to highlight. Three years ago, we created here at Space and Missile System Center, the Space Enterprise Consortium to provide a platform, a contractual vehicle, really to enable us to rapidly prototype, development of space systems and to collaborate between the US Space Force, traditional defense contractors, non traditional vendors like startups, and even some academic institutions. SPEC, as we call it, Space Enterprise Consortium uses a specialized contracting tool to get contracts awarded quickly. Many in the audience may be familiar with other transaction agreements. And that's what SPEC is based on. And so far in just three years, SPEC has awarded 75 different prototyping contracts worth over $800 million with a 36% reduction in time to award. And because it's a consortium based competition for these kinds of prototyping efforts, the barrier to entry for small and nontraditional, for startups, even for academic institutions to be able to compete for these kinds of prototyping has really lowered. These types of partnerships that we've been working through on spec have really helped us work with smaller companies who might not have the background or expertise in dealing with the government or in working with cyber security for their systems, both our developmental systems and the systems that they're designing and trying to build. We want to provide ways for companies large and small to partner together in support kind of mutually beneficial relationships between all. Recently at the Annual Air Force Association conference that I mentioned earlier, I moderated a panel with several space industry leaders, all from big traditional defense contractors, by the way. And they all stressed the importance of building bridges and partnerships between major contractors in the defense industry and new entrance. And that helps us capture the benefits of speed and agility that come with small companies and startups, as well as the expertise and specialized skill sets of some of those larger contractors that we rely on day in and day out. Advanced cyber security protections and utilization of secure facilities are just a couple of things that I think we could be prioritizing more so in those collaborations. As I mentioned earlier, the SPEC has been very successful in awarding a number of different prototyping contracts and large dollar values. And it's just going to get better. There's over 400 members of the space enterprise consortium, 80% of them are non traditional kinds of vendors. And we just love working with them. Another thing that many people in the audience may be familiar with in terms of our outreach to innovators, if you will, and innovators that include cyber security experts is our space pitch day events. So we held our first event last November in San Francisco, where we awarded over a two day period about $46 million to 30 different companies that had potentially game changing ideas. These were phase two small business innovative research efforts that we awarded with cash on the spot. We're planning on holding our second space pitch day in the spring of 2021. We're planning on doing it right here in Los Angeles, COVID-19 environment permitting. And we think that these are fantastic venues for identifying and working with high-speed startups, and small businesses who are interested in really, truly partnering with the US Air Force. It's, as I said before, it's a really exciting time to be a part of this business. And working with the innovation economy is something that the Department of Defense really needs to do in that the innovation that we used to think was ours. That 80% of the industrial base innovation that came from the Department of Defense, the script has been flipped there. And so now more than 70%, particularly in space innovation comes from the commercial sector, not from the defense business itself. And so that's a tsunami of investment and a tsunami of a capability. And I need to figure out how to get my surfboard out and ride it, you know what I mean? >> Yeah, It's one of those things where the script has been flipped, but it's exciting because it's impacting everything. When you're talking about systems architecture? You're talking about software, you're talking about a business model. You're talking about dev sec opsx from a technical perspective, but now you have a business model innovation. All the theaters are exploding in innovation, technical, business, personnel. This brings up the workforce challenge. You've got the cyber needs for the US Space Force, It's probably great ROI model for new kinds of software development that could be priced into contracts. That's a entrepreneurial innovation, you've got the business model theater, you've got the personnel. How does the industry adopt and change? You guys are clearly driving this. How does the industry adjust to you? >> Yeah. So I think a great way to answer that question is to just talk about the kind of people that we're trying to prioritize in the US Space Force from an acquisition perspective, and in this particular case from a cybersecurity perspective. As I mentioned earlier, it's the most exciting time to be in space programs, really since the days of Apollo. Just to put it in terms that maybe have an impact with the audience. From 1957 until today, approximately 9,000 satellites have been launched from the various space varying countries around the planet. Less than 2000 of those 9,000 are still up on orbit and operational. And yet in the new space regime players like Space X have plans to launch, 12,000 satellites for some of their constellations alone. It really is a remarkable time in terms of innovation and fielding of space capabilities and all of those space capabilities, whether they're commercial, civil, or defense are going to require appropriate cybersecurity protections. It's just a really exciting time to be working in stuff like this. And so folks like the folks in this audience who have a passion about space and a passion about cybersecurity are just the kind of people that we want to work with. Cause we need to make sure our systems are secure and resilient. We need folks that have technical and computing expertise, engineering skills to be able to design cyber secure systems that can detect and mitigate attacks. But we also, as you alluded to, we need people that have that business and business acumen, human networking background, so that we can launch the startups and work with the non traditional businesses. Help to bring them on board help, to secure both their data and our data and make sure our processes and systems are free as much as possible from attack. For preparation, for audience members who are young and maybe thinking about getting into this trade space, you got to be smart on digital networking. You got to understand basic internet protocols, concepts, programming languages, database design. Learn what you can for penetration or vulnerability testing and a risk assessment. I will tell you this, and I don't think he will, I know he will not mind me telling you this, but you got to be a lifelong learner and so two years ago, I'm at home evening and I get a phone call on my cell phone and it's my boss, the commander of Air Force Space command, General, J. Raymond, who is now currently the Chief of Space Operations. And he is on temporary duty, flying overseas. He lands where he's going and first thing he does when he lands is he calls me and he goes JT, while I was traveling, I noticed that there were eBooks available on the commercial airliner I was traveling on and there was an ebook on something called scrumming and agile DevSecOps. And I read it, have you read it? And I said, no, sir. But if you tell me what the title of the book is, I will read it. And so I got to go to my staff meeting, the very next week, the next time we had a staff meeting and tell everybody in the staff meeting, hey, if the four star and the three star can read the book about scrumming, then I'm pretty sure all of you around this table and all our lieutenants and our captains our GS13s, All of our government employees can get smart on the scrumming development process. And interestingly as another side, I had a telephone call with him last year during the holidays, where he was trying to take some leave. And I said, sir, what are you up to today? Are you making eggnog for the event tonight or whatever. And the Chief of Space Operations told me no, I'm trying to teach myself Python. I'm at lesson two, and it's not going so well, but I'm going to figure this out. And so that kind of thing, if the chief of staff or the Chief of Space Operations can prioritize scrumming and Python language and innovation in his daily schedule, then we're definitely looking for other people who can do that. And we'll just say, lower levels of rank throughout our entire space force enterprise. Look, we don't need people that can code a satellite from scratch, but we need to know, we need to have people that have a basic grasp of the programming basics and cybersecurity requirements. And that can turn those things into meaningful actions, obviously in the space domain, things like basic physics and orbital mechanics are also important spaces, not an intuitive domain. So under understanding how things survive on orbit is really critical to making the right design and operational decisions. And I know there's probably a lot, because of this conference. I know there's probably a whole lot of high speed cybersecurity experts out in the audience. And I need those people in the US Space Force. The country is counting on it, but I wouldn't discount having people that are just cyber aware or cyber savvy. I have contracting officers and logisticians and program managers, and they don't have to be high end cybersecurity experts, but they have to be aware enough about it to be able to implement cyber security protections into our space systems. So the skill set is really, really broad. Our adversaries are pouring billions of dollars into designing and fielding offensive and destructive space, cybersecurity weapons. They repeatedly shown really a blatant disregard of safety and international norms for good behavior on orbit. And the cyber security aspects of our space systems is really a key battleground going forward so that we can maintain that. As I mentioned before, peaceful global comments of space, we really need all hands on deck. If you're interested in helping in uniform, if you're interested in helping, not in uniform, but as a government employee, a commercial or civil employee to help us make cyber security more important or more able to be developed for our space systems. And we'd really love to work with you or have you on the team to build that safe and secure future for our space systems. >> Lieutenant General John Thompson, great insight. Thank you for sharing all that awesome stories too, and motivation for the young next generation. The United States Space Force approach to cybersecurity. Really amazing talk, thank you for your time. Final parting question is, as you look out and you have your magic wand, what's your view for the next few years in terms of things that we could accomplish? It's a super exciting time. What do you hope for? >> So first of all, John, thanks to you and thanks to Cal Poly for the invitation and thanks to everybody for their interest in cybersecurity, especially as it relates to space systems, that's here at the conference. There's a quote, and I'll read it here from Bernard Schriever, who was the founder, if you will, a legend in a DoD space, the founder of the Western development division, which was a predecessor organization to Space and Missile System Center, General Schriever, I think captures the essence of how we see the next couple of years. "The world has an ample supply of people "who can always come up with a dozen good reasons "why new ideas will not work and should not be tried, "but the people who produce progress are breed apart. "They have the imagination, "the courage and the persistence to find solutions." And so I think if you're hoping that the next few years of space innovation and cybersecurity innovation are going to be upon a pony ride at the County fair, then perhaps you should look for another line of work, because I think the next few years in space and cybersecurity innovation are going to be more like a rodeo and a very dynamic rodeo as it goes. It is an awesome privilege to be part of this ecosystem. It's really an honor for me to be able to play some small role in the space ecosystem and trying to improve it while I'm trying to improve the chances of the United States of America in a space war fighting environment. And so I thank all of you for participating today and for this little bit of time that you've allowed me to share with you. Thank you. >> Sir, thank you for your leadership and thank you for the time for this awesome event, Space and Cyber Cybersecurity Symposium 2020, I'm John Furrier on behalf of Cal Poly, thanks for watching. (mellow music)

Published Date : Sep 16 2020

SUMMARY :

Narrator: From around the globe. And of course he's the and Department of the Air Force leadership but for all the good there and field as the military term. and cybersecurity, the intersection. in the case of GPS and important to note of the minute they're and the various different of the US space Force? or the ability to implement mitigations and the sustainment of and in the case of GPS economically. on the folks who want the barrier to entry How does the industry adjust to you? and they don't have to be high and motivation for the hoping that the next few years for the time for this awesome event,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dustin DebrunPERSON

0.99+

Bernard SchrieverPERSON

0.99+

JohnPERSON

0.99+

CaliforniaLOCATION

0.99+

JT ThompsonPERSON

0.99+

Cal PolyORGANIZATION

0.99+

Department of DefenseORGANIZATION

0.99+

PasadenaLOCATION

0.99+

Space ForceORGANIZATION

0.99+

SMCORGANIZATION

0.99+

El SegundoLOCATION

0.99+

2016DATE

0.99+

US Forest ServiceORGANIZATION

0.99+

NASAORGANIZATION

0.99+

John FurrierPERSON

0.99+

Space Enterprise ConsortiumORGANIZATION

0.99+

Department of DefenseORGANIZATION

0.99+

United Space ForceORGANIZATION

0.99+

Los AngelesLOCATION

0.99+

US Forest ServiceORGANIZATION

0.99+

San Luis ObispoLOCATION

0.99+

United States Space ForceORGANIZATION

0.99+

USLOCATION

0.99+

John F. ThompsonPERSON

0.99+

DenverLOCATION

0.99+

US Space ForceORGANIZATION

0.99+

LAXLOCATION

0.99+

United States Space ForceORGANIZATION

0.99+

28 terabytesQUANTITY

0.99+

Space and Missile System CenterORGANIZATION

0.99+

United States Space ForceORGANIZATION

0.99+

36%QUANTITY

0.99+

80%QUANTITY

0.99+

tonightDATE

0.99+

DARPAORGANIZATION

0.99+

Department of DefenseORGANIZATION

0.99+

2018DATE

0.99+

Cal PolyORGANIZATION

0.99+

twoQUANTITY

0.99+

US Air ForceORGANIZATION

0.99+

last yearDATE

0.99+

San FranciscoLOCATION

0.99+

thousands of milesQUANTITY

0.99+

Space Enterprise ConsortiumORGANIZATION

0.99+

United StatesLOCATION

0.99+

less than an hourQUANTITY

0.99+

UberORGANIZATION

0.99+

three starQUANTITY

0.99+

John F ThompsonPERSON

0.99+

CROWSORGANIZATION

0.99+

Northern CaliforniaLOCATION

0.99+

El SegundoLOCATION

0.99+

West Coast Software FactoryORGANIZATION

0.99+

more than 70%QUANTITY

0.99+

two partsQUANTITY

0.99+

J. RaymondPERSON

0.99+

GEOORGANIZATION

0.99+

over 30 poundsQUANTITY

0.99+

three yearsQUANTITY

0.99+

each dayQUANTITY

0.99+

Colorado SpringsLOCATION

0.99+

billions of dollarsQUANTITY

0.99+

over $800 millionQUANTITY

0.99+

BothQUANTITY

0.99+

PythonTITLE

0.99+

two thingsQUANTITY

0.99+

SPECORGANIZATION

0.99+

AlbuquerqueLOCATION

0.99+

Space XORGANIZATION

0.99+

MEOORGANIZATION

0.99+

trillions of dollarsQUANTITY

0.99+

100%QUANTITY

0.99+