Douglas Lieberman, Dell Technologies & Jason Inskeep, AT&T | MWC Barcelona 2023
(upbeat music) >> Hey everyone, Lisa Martin here with you on theCUBE Live from Mobile World Congress '23 in Barcelona. We're having a great day at the show. We hope you are too. I've got two guests here with me next. We're going to be talking about telco's 5G, all that exciting stuff. Please welcome Jason Inskeep, the AVP 5G, and Private 5G Center of Excellence at AT&T Business. And Doug Lieberman is here as well. Senior Director, Global Solutions Co-Creation Services at Dell Technologies. Guys, it's great to have you on the show, live from the show floor, talk to me about what's going on, how are you? >> Hey, thanks for having us on. It's a great show, I'm happy to be back here this year and really looking forward to the conversations that are going on and really continuing these partnerships that Dell has with companies like AT&T to truly drive the realities and the benefits of 5G. >> Absolutely, Doug, talk to me a little bit. You have an interesting title, Director of Global Solutions Co-Creation Services at Dell. Tell me a little bit about your role, what you're responsible for, and then Jason we'll have you do the same. >> Yeah, thanks for bringing that up. So, I have a very interesting role and a very exciting role at Dell because we have a unique organization that I run globally whose job it is, is to work with telcos to co-create services for enterprise and jointly go to market with those. So that basically take the combined power of AT&T and Dell and bring that to enterprise customers and other telcos so that enterprises can realize the value of, and truly leverage and harness the capabilities of 5G for private mobility and Mac and IOT and connected devices. >> Jason, let's bring you into the conversation now. You have an interesting title as well. You're with the 5G Center of Excellence at AT&T. Talk a little bit about your role and that COE. >> Yeah, thanks for having me again as well. The role with my team at AT&T is we're on the cutting edge. We're sitting in between our customers and our product houses that are working with folks at Dell, really helping putting our products together in the space of 5G. A lot of open opportunities here, a lot of things changing really fast. So my teams are off as well as putting this stuff in customers production sites it's also taking and capturing that information, working with my internal partners, both on the technology side, on the product side, and partners like Dell who are coming in helping us enabling those products and services that we can take and scale out through the different opportunities that we're seeing in this space. >> Let's double click on that partner angle, Jason, will stay with you. The 5G revolution, it's here, we are all excited about it. There's so much potential that will come from that. Let's talk about the AT&T/Dell partnership. How are you guys working together to deliver 5G globally? Jason, we'll start with you and then Doug will go to you. >> Yeah, at the core of it, when we started looking at 5G and seeing the changes that were happening, one of the biggest changes is it became software defined. So, the way we could deploy the hardware with the software becomes a whole new conversation. And what we saw coming out of that is it's not going to be a single winner and loser to really execute the way it's necessary for the experiences of tomorrow. It has to be an ecosystem that comes together. Dell creates a great opportunity for us from the hardware perspective to move those services around, to scale those services ultimately to all kinds of site types up to cities right down to small offices. And those different form factors that they bring with the software and the network pieces that we're adding on top of it help to streamline the flows and processes and really gets to that next generation that we see happening, which is this converged architecture. This meeting of network and application, creating a whole new skillset along with products. So we're at the very top we've got Dell/AT&T, at a partner level, it gets at a granular level too. The users and the developers underneath are starting to change as well, so very interesting dichotomy happening right now. >> Right, Doug, what's through Dell's lens? Tell us a little bit about the partnership and how you're working together to deliver 5G and really unlock its potential globally. >> Yeah, thank you, I'd love to bonus off of what Jason was saying, for Dell, what we look at is through the lens of an enterprise. An enterprise needs to execute their business function, their outcome, their mission that they need to operate. And so therefore they have workloads that they need to run. And 5G is an enabler for that technology, and there's lots of other enablers but the key piece is how can they get their business work done better, faster, cheaper, more efficiently, more securely? And the combination of AT&T and Dell truly is a combination that brings in a partnership that brings together a full breadth of those capabilities, with understanding what those enterprise workloads are and how they work and how an enterprise would leverage these capabilities. And then bonus on top of that and merge together with that the capabilities of AT&T. And when you look at 5G, there's a lot of people that talk about 5G being the enterprise G. And a lot of that is because of things that Jason mentioned. As we move to a disaggregated stack where you have software-defined aspects of it, and the ability in the underlying definition of what 5G in the specifications to allow much more customization. It means that enterprises now cannot just take connectivity as it is and use it however it comes but actually work with a telco and work with Dell to customize that connectivity in a way that better meets their requirements. Whether that be with slicing or private mobility or roaming between private and the public network and things like profiles and being able to have different views of how different users and devices connect to that network are all key in truly harnessing the power of that connectivity to have always on, always connected, always integrated systems from the edge, the core, to the cloud. >> Always on, always connected. That's what we all expect these days. Wherever we are in the world, whatever we're trying to do. But to be able to take advantage of all that 5G offers for all of us, telcos have to create infrastructures that can support it, let's double click guys on the infrastructure that Dell and AT&T have put in place to enable this. Jason, I want to get your perspective first and then Doug will go to you. >> Yeah, I mean, it's foundational, the things that we're trying to do and build out here and there's a lot of complexity in it now that we didn't have before because of the flexibility in it. It's one of those things like the good news in software is you can do whatever you want. The bad news in software is you can do whatever you want. Once you have that foundation there though in terms of infrastructure, which for us is really air to glass. Fiber through the spectrum on top. But underneath of that, we have the servers, we have that infrastructure where those fibers come together where that air meets the radios and so forth. And we've got to have that great foundation. So working with Dell and getting those spaces built together preps the area as needed so that there's additional place now for compute and scale at that new converged meet-me point. And that's going to be the opportunity that we're trying to think about really to get that foundation in a way that maximizes capacity and maximizes control for the customers and enterprises in particular. And more importantly, maximizes the time horizon. Because if you're putting in a foundation like this, you're not looking at two to three years. You're trying to skate beyond, skate where the puck is going, look at five, 10 years out, set that foundation. And that's what we're trying to look at with Dell. What can our network do already? Where can we push it? In return, they're going to build their solutions to help maximize that potential. >> From an infrastructure perspective, Doug, I want to understand really where Dell is really shining there but also what are some of the differentiators that Dell brings to this foundational infrastructure that to your point, is built for scale? >> Yeah, so it really all comes down to as we start to see this transition that's been happening for years, but it's accelerating because of always-connected devices and everything connected and the great proliferation of data at the edge. As we move assets from the data center and out to the edge we introduce new challenges that have to be overcome. You have things like security, automation, infrastructure cost, maintenance, day-one operations, day-two operations, all of these things are new complexities which enterprises want to enable their workloads, enable the outcomes that they want to generate. But they need to make sure that they're not taking a step backwards when it comes to things like regulations. In Europe, you've got GDPR, and in the US you've got different security regulations. No one wants to be the next front page headline about their company being attacked and having a ransomware attack. And so as we spread out these assets, what Dell is here to do is to work with AT&T and enable enterprises to effectively build their virtual enterprise around the world where those assets, whether they're at the edge or the core or in the cloud, are all managed with the same profiles and the same security features and the same automation that they have in a core data center. So my ability to deploy an edge cloud so that I can leverage AT&T's network and have end-user devices do things like gaming or connect to video services or get directed retail advertising to you are not basically introducing new vectors for security vulnerabilities into that network. And so Dell has worked really hard and is a leader in the industry in providing automation and lower cost of ownership and security for those solutions. So it's not just about putting a server out there but it's about putting an infrastructure and a cloud that is connected by AT&T's backbone and to a central core of automation management and orchestration capabilities so that I can leverage those assets securely and efficiently. >> That security element that you bring up, Doug, is so incredibly critical. We talk about it at every event, we talk about it every day. We've seen such dramatic changes in the threat landscape in the last couple of years with covid and things like that. So that security element isn't trivial, it's essential for every type of enterprise regardless of where they are. I want to talk a little bit now about best practices. And Doug, go back to you, looking at what AT&T is achieving, the 5G COE, what you're doing with Dell. From your lens and your experiences, what are some of the best practices for telcos deploying secured network and connectivity at the edge? >> Yeah, well, I think the first one is that automation and that orchestration, right? The answer is that you cannot have snowflakes at every single ag point. You need to make sure that those infrastructures are consistent and compliant with the integrations and with the policies that have been set across the network. The second thing is that you want to make sure that the connectivity is monitored and metered and managed so that we know whether, for example that endpoint is there and it's not there, if it goes offline. And ensuring the end-user experience is consistent throughout. And so what we are seeing is that it's really important that we provide an implementation where the enterprise can get a consistent and a predictable outcome for what they're trying to accomplish. What they don't want to do, what enterprises hate and is really bad for them is when they provide an inconsistent or inappropriate results to their users, to their customer base. So if your website goes offline or you're a gaming platform, if people can't get to your game you're going to lose customers, you're going to lose business you're going to have people lose faith in your network. And so our partnership with AT&T and with other telcos is about ensuring that we have all those aspects covered, day zero, day one, and day two, as well as the security aspects. And that back haul is an essential piece of that because as we get more and more devices and more and more edge devices set up, there's more sprawl. And so the complexity goes up substantially, but what really wins is when you can take that complexity and use it to your advantage and be able to manage and deploy those systems as though they were all within your virtual enterprise. >> Using complexity to your advantage. That's an interesting one, Doug, that you're bringing up. Jason, I want to know, what does that mean for you and how is AT&T leveraging complexity to its advantage for its customers all over the globe? >> You know, first thing is if you're thinking about, we're a network company we're not just a 5G company, so we're wireline, we're wireless, we're global in terms of the amount of fiber we have in the ground, the amount of in the US, domestic sailor deployments, our investments in FirstNet, is our first responder network here in the US. So we have a big portfolio inclusive of IOT. That is a global brand as well. That, if you look at it through the outside lens, that's super complex, all over the planet. So when we're talking to our customers now in this new world, which is very much, "Hey, you can do these things on your own." We go back and the bigger, obviously have the products, and the network and the tech but now that customers can take advantage of it and take things that Dell have rolled out, they need that new new age expertise. You also got the Dell expertise of building these platforms from maybe a software level, from an orchestration level, those kind of things. And at the edge that's creating a new type of person and a new type of workflow, a new type of way to respond and work. So that combination of those two is going to be that new skillset. It's in small pockets now, it's growing in how that looks because it's a little combination of both the app developer and the network developer, that's coming together. Our footprint and in terms of what we provide in there is not just 5G, it's 5G, it's fiber, it's all of those pieces together. And that's what's going to super enable that experience that Doug talked about when you're thinking about gaming or transportation, it's not just the network performance, it's the roundtrip, so we're really trying to focus on that and educate our customers in that way with the expertise that we bring over years and years of building these things. >> And if I could just jump in there. I'd like to just emphasize something Jason just said. When we look at workloads at the edge, very rarely are those workloads uniquely just an edge workload, there are components. The example I like to use is video surveillance. If you are a big box store and you have video surveillance inside your store, there is a set of workloads and outcomes you need for immediate response at that edge. You want to know if there's a safety hazard, if there is a theft or those things. Those things need to be processed real time in the store before the thief leaves the store. But then there's a set of connectivity as well where you want to process that data up in the cloud to get long-term analytics and data off of that information. What's my average store density on a Thursday afternoon in November when it's 20 degrees out. Because that would drive how many employees I have, how much inventory I carry, et cetera. And that combination is a factor that drives all the different aspects of AT&T's network. We need the connectivity in the store for the practicability and the spectrum for the cameras that talk to a central server. We need the high-speed backup and throughput in order to provide cyber recovery as well as point-of-sales services so that they can do credit card transactions flawlessly, which is using a lot of wireline services for AT&T. And together with their cloud and their other capabilities, an enterprise needs all those different aspects to work, both the edge, the core and the cloud coming together to form an outcome from one piece of input. So that one piece of input, that video stream is used in multiple different ways and because of that, that network that AT&T brings can support the end-to-end outcome and use cases for that implementation, as an example. >> That end-to-end roundtrip that you guys talked about is essential for every type of enterprise. A lot of great work that Dell and AT&T are doing together to really enable enterprises to really capitalize on all that the new technology that 5G has the potential to deliver. So I got to wrap things up, Jason, with you. From a business-customer perspective, what's next for AT&T? What can those business customers expect? >> Just continued to scaling because you're looking at a space that's evolving rapidly. It's evolving rapidly, there's a lot of opportunity. You look at the private wireless space in particular, it's nascent, but growing rapidly with the customers having their ability to do this on their own. So for us, and really where we're starting to think now is we're seeing the things move from POC, starting to move to production, customers are starting to think about what's next. For us, we're trying to skate ahead of that knowing how we built our own networks, knowing how we engaged in our own partnerships like with Dell and trying to bring that expertise back to the customer, because it isn't cookie cutter anymore. There's a lot of flexibility and each input creates a different output. So it's up to us to at least help them balance that. Define what I like to affectionately call, "Find their Goldilocks." What is that just right for them? >> Great point, Jason, it is no longer a cookie cutter. Cookie cutter isn't going to cut it. Jason, Doug, thank you so much for joining me on theCUBE today from Mobile World Congress in Barcelona. We appreciate thank you all of your insights. Sounds like some great work that AT&T and Dell are doing together. Enterprises have a lot to look forward to. Thank you again for your time. >> Thank you very much, >> Thank you. >> Looking forward to seeing you at the show. >> I'm Lisa Martin from theCUBE at Mobile World Congress '23 in Barcelona. Thanks for watching. (upbeat music)
SUMMARY :
Guys, it's great to have you on the show, and the benefits of 5G. and then Jason we'll have you do the same. and bring that to enterprise into the conversation now. and our product houses that on that partner angle, that is it's not going to be and how you're working that they need to operate. advantage of all that 5G offers and scale at that new and out to the edge we introduce and connectivity at the edge? and managed so that we know whether, Doug, that you're bringing up. and the network and the tech that drives all the different that the new technology that 5G What is that just right for them? Enterprises have a lot to look forward to. Looking forward to at Mobile World Congress '23 in Barcelona.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Jason | PERSON | 0.99+ |
Jason Inskeep | PERSON | 0.99+ |
Doug | PERSON | 0.99+ |
Doug Lieberman | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Europe | LOCATION | 0.99+ |
AT&T | ORGANIZATION | 0.99+ |
US | LOCATION | 0.99+ |
20 degrees | QUANTITY | 0.99+ |
Douglas Lieberman | PERSON | 0.99+ |
AT&T. | ORGANIZATION | 0.99+ |
two guests | QUANTITY | 0.99+ |
Thursday afternoon | DATE | 0.99+ |
three years | QUANTITY | 0.99+ |
AT&T/Dell | ORGANIZATION | 0.99+ |
Dell/AT&T | ORGANIZATION | 0.99+ |
Barcelona | LOCATION | 0.99+ |
FirstNet | ORGANIZATION | 0.99+ |
today | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
Dell Technologies | ORGANIZATION | 0.98+ |
second thing | QUANTITY | 0.98+ |
5G | ORGANIZATION | 0.98+ |
telco | ORGANIZATION | 0.98+ |
Mobile World Congress | EVENT | 0.98+ |
one piece | QUANTITY | 0.98+ |
first one | QUANTITY | 0.98+ |
this year | DATE | 0.97+ |
UNLIST TILL 4/2 - Keep Data Private
>> Paige: Hello everybody and thank you for joining us today for the Virtual Vertica BDC 2020. Today's breakout session is entitled Keep Data Private Prepare and Analyze Without Unencrypting With Voltage SecureData for Vertica. I'm Paige Roberts, Open Source Relations Manager at Vertica, and I'll be your host for this session. Joining me is Rich Gaston, Global Solutions Architect, Security, Risk, and Government at Voltage. And before we begin, I encourage you to submit your questions or comments during the virtual session, you don't have to wait till the end. Just type your question as it occurs to you, or comment, in the question box below the slide and then click Submit. There'll be a Q&A session at the end of the presentation where we'll try to answer as many of your questions as we're able to get to during the time. Any questions that we don't address we'll do our best to answer offline. Now, if you want, you can visit the Vertica Forum to post your questions there after the session. Now, that's going to take the place of the Developer Lounge, and our engineering team is planning to join the Forum, to keep the conversation going. So as a reminder, you can also maximize your screen by clicking the double arrow button, in the lower-right corner of the slides. That'll allow you to see the slides better. And before you ask, yes, this virtual session is being recorded and it will be available to view on-demand this week. We'll send you a notification as soon as it's ready. All right, let's get started. Over to you, Rich. >> Rich: Hey, thank you very much, Paige, and appreciate the opportunity to discuss this topic with the audience. My name is Rich Gaston and I'm a Global Solutions Architect, within the Micro Focus team, and I work on global Data privacy and protection efforts, for many different organizations, looking to take that journey toward breach defense and regulatory compliance, from platforms ranging from mobile to mainframe, everything in between, cloud, you name it, we're there in terms of our solution sets. Vertica is one of our major partners in this space, and I'm very excited to talk with you today about our solutions on the Vertica platform. First, let's talk a little bit about what you're not going to learn today, and that is, on screen you'll see, just part of the mathematics that goes into, the format-preserving encryption algorithm. We are the originators and authors and patent holders on that algorithm. Came out of research from Stanford University, back in the '90s, and we are very proud, to take that out into the market through the NIST standard process, and license that to others. So we are the originators and maintainers, of both standards and athureader in the industry. We try to make this easy and you don't have to learn any of this tough math. Behind this there are also many other layers of technology. They are part of the security, the platform, such as stateless key management. That's a really complex area, and we make it very simple for you. We have very mature and powerful products in that space, that really make your job quite easy, when you want to implement our technology within Vertica. So today, our goal is to make Data protection easy for you, to be able to understand the basics of Voltage Secure Data, you're going to be learning how the Vertica UDx, can help you get started quickly, and we're going to see some examples of how Vertica plus Voltage Secure Data, are going to be working together, in our customer cases out in the field. First, let's take you through a quick introduction to Voltage Secure Data. The business drivers and what's this all about. First of all, we started off with Breach Defense. We see that despite continued investments, in personal perimeter and platform security, Data breaches continue to occur. Voltage Secure Data plus Vertica, provides defense in depth for sensitive Data, and that's a key concept that we're going to be referring to. in the security field defense in depth, is a standard approach to be able to provide, more layers of protection around sensitive assets, such as your Data, and that's exactly what Secure Data is designed to do. Now that we've come through many of these breach examples, and big ticket items, getting the news around breaches and their impact, the business regulators have stepped up, and regulatory compliance, is now a hot topic in Data privacy. Regulations such as GDPR came online in 2018 for the EU. CCPA came online just this year, a couple months ago for California, and is the de-facto standard for the United States now, as organizations are trying to look at, the best practices for providing, regulatory compliance around Data privacy and protection. These gives massive new rights to consumers, but also obligations to organizations, to protect that personal Data. Secure Data Plus Vertica provides, fine grained authorization around sensitive Data, And we're going to show you exactly how that works, within the Vertica platform. At the bottom, you'll see some of the snippets there, of the news articles that just keep racking up, and our goal is to keep you off the news, to keep your company safe, so that you can have the assurance, that even if there is an unintentional, or intentional breach of Data out of the corporation, if it is protected by voltage Secure Data, it will be of no value to those hackers, and then you have no impact, in terms of risk to the organization. What do we mean by defense in depth? Let's take a look first at the encryption types, and the benefits that they provide, and we see our customers implementing, all kinds of different protection mechanisms, within the organization. You could be looking at disk level protection, file system protection, protection on the files themselves. You could protect the entire Database, you could protect our transmissions, as they go from the client to the server via TLS, or other protected tunnels. And then we look at Field-level Encryption, and that's what we're talking about today. That's all the above protections, at the perimeter level at the platform level. Plus, we're giving you granular access control, to your sensitive Data. Our main message is, keep the Data protected for at the earliest possible point, and only access it, when you have a valid business need to do so. That's a really critical aspect as we see Vertica customers, loading terabytes, petabytes of Data, into clusters of Vertica console, Vertica Database being able to give access to that Data, out to a wide variety of end users. We started off with organizations having, four people in an office doing Data science, or analytics, or Data warehousing, or whatever it's called within an organization, and that's now ballooned out, to a new customer coming in and telling us, we're going to have 1000 people accessing it, plus service accounts accessing Vertica, we need to be able to provide fine level access control, and be able to understand what are folks doing with that sensitive Data? And how can we Secure it, the best practices possible. In very simple state, voltage protect Data at rest and in motion. The encryption of Data facilitates compliance, and it reduces your risk of breach. So if you take a look at what we mean by feel level, we could take a name, that name might not just be in US ASCII. Here we have a sort of Latin one extended, example of Harold Potter, and we could take a look at the example protected Data. Notice that we're taking a character set approach, to protecting it, meaning, I've got an alphanumeric option here for the format, that I'm applying to that name. That gives me a mix of alpha and numeric, and plus, I've got some of that Latin one extended alphabet in there as well, and that's really controllable by the end customer. They can have this be just US ASCII, they can have it be numbers for numbers, you can have a wide variety, of different protection mechanisms, including ignoring some characters in the alphabet, in case you want to maintain formatting. We've got all the bells and whistles, that you would ever want, to put on top of format preserving encryption, and we continue to add more to that platform, as we go forward. Taking a look at tax ID, there's an example of numbers for numbers, pretty basic, but it gives us the sort of idea, that we can very quickly and easily keep the Data protected, while maintaining the format. No schema changes are going to be required, when you want to protect that Data. If you look at credit card number, really popular example, and the same concept can be applied to tax ID, often the last four digits will be used in a tax ID, to verify someone's identity. That could be on an automated telephone system, it could be a customer service representative, just trying to validate the security of the customer, and we can keep that Data in the clear for that purpose, while protecting the entire string from breach. Dates are another critical area of concern, for a lot of medical use cases. But we're seeing Date of Birth, being included in a lot of Data privacy conversations, and we can protect dates with dates, they're going to be a valid date, and we have some really nifty tools, to maintain offsets between dates. So again, we've got the real depth of capability, within our encryption, that's not just saying, here's a one size fits all approach, GPS location, customer ID, IP address, all of those kinds of Data strings, can be protected by voltage Secure Data within Vertica. Let's take a look at the UDx basics. So what are we doing, when we add Voltage to Vertica? Vertica stays as is in the center. In fact, if you get the Vertical distribution, you're getting the Secure Data UDx onboard, you just need to enable it, and have Secure Data virtual appliance, that's the box there on the middle right. That's what we come in and add to the mix, as we start to be able to add those capabilities to Vertica. On the left hand side, you'll see that your users, your service accounts, your analytics, are still typically doing Select, Update, Insert, Delete, type of functionality within Vertica. And they're going to come into Vertica's access control layer, they're going to also access those services via SQL, and we simply extend SQL for Vertica. So when you add the UDx, you get additional syntax that we can provide, and we're going to show you examples of that. You can also integrate that with concepts, like Views within Vertica. So that we can say, let's give a view of Data, that gives the Data in the clear, using the UDx to decrypt that Data, and let's give everybody else, access to the raw Data which is protected. Third parties could be brought in, folks like contractors or folks that aren't vetted, as closely as a security team might do, for internal sensitive Data access, could be given access to the Vertical cluster, without risk of them breaching and going into some area, they're not supposed to take a look at. Vertica has excellent control for access, down even to the column level, which is phenomenal, and really provides you with world class security, around the Vertical solution itself. Secure Data adds another layer of protection, like we're mentioning, so that we can have Data protected in use, Data protected at rest, and then we can have the ability, to share that protected Data throughout the organization. And that's really where Secure Data shines, is the ability to protect that Data on mainframe, on mobile, and open systems, in the cloud, everywhere you want to have that Data move to and from Vertica, then you can have Secure Data, integrated with those endpoints as well. That's an additional solution on top, the Secure Data Plus Vertica solution, that is bundled together today for a sales purpose. But we can also have that conversation with you, about those wider Secure Data use cases, we'd be happy to talk to you about that. Security to the virtual appliance, is a lightweight appliance, sits on something like eight cores, 16 gigs of RAM, 100 gig of disk or 200 gig of disk, really a lightweight appliance, you can have one or many. Most customers have four in production, just for redundancy, they don't need them for scale. But we have some customers with 16 or more in production, because they're running such high volumes of transaction load. They're running a lot of web service transactions, and they're running Vertica as well. So we're going to have those virtual appliances, as co-located around the globe, hooked up to all kinds of systems, like Syslog, LDAP, load balancers, we've got a lot of capability within the appliance, to fit into your enterprise IP landscape. So let me get you directly into the neat, of what does the UDx do. If you're technical and you know SQL, this is probably going to be pretty straightforward to you, you'll see the copy command, used widely in Vertica to get Data into Vertica. So let's try to protect that Data when we're ingesting it. Let's grab it from maybe a CSV file, and put it straight into Vertica, but protected on the way and that's what the UDx does. We have Voltage Secure protectors, an added syntax, like I mentioned, to the Vertica SQL. And that allows us to say, we're going to protect the customer first name, using the parameters of hyper alphanumeric. That's our internal lingo of a format, within Secure Data, this part of our API, the API is require very few inputs. The format is the one, that you as a developer will be supplying, and you'll have different ones for maybe SSN, you'll have different formats for street address, but you can reuse a lot of your formats, across a lot of your PII, PHI Data types. Protecting after ingest is also common. So I've got some Data, that's already been put into a staging area, perhaps I've got a landing zone, a sandbox of some sort, now I want to be able to move that, into a different zone in Vertica, different area of the schema, and I want to have that Data protected. We can do that with the update command, and simply again, you'll notice Voltage Secure protect, nothing too wild there, basically the same syntax. We're going to query unprotected Data. How do we search once I've encrypted all my Data? Well, actually, there's a pretty nifty trick to do so. If you want to be able to query unprotected Data, and we have the search string, like a phone number there in this example, simply call Voltage Secure protect on that, now you'll have the cipher text, and you'll be able to search the stored cipher text. Again, we're just format preserving encrypting the Data, and it's just a string, and we can always compare those strings, using standard syntax and SQL. Using views to decrypt Data, again a powerful concept, in terms of how to make this work, within the Vertica Landscape, when you have a lot of different groups of users. Views are very powerful, to be able to point a BI tool, for instance, business intelligence tools, Cognos, Tableau, etc, might be accessing Data from Vertica with simple queries. Well, let's point them to a view that does the hard work, and uses the Vertical nodes, and its horsepower of CPU and RAM, to actually run that Udx, and do the decryption of the Data in use, temporarily in memory, and then throw that away, so that it can't be breached. That's a nice way to keep your users active and working and going forward, with their Data access and Data analytics, while also keeping the Data Secure in the process. And then we might want to export some Data, and push it out to someone in a clear text manner. We've got a third party, needs to take the tax ID along with some Data, to do some processing, all we need to do is call Voltage Secure Access, again, very similar to the protect call, and you're writing the parameter again, and boom, we have decrypted the Data and used again, the Vertical resources of RAM and CPU and horsepower, to do the work. All we're doing with Voltage Secure Data Appliance, is a real simple little key fetch, across a protected tunnel, that's a tiny atomic transaction, gets done very quick, and you're good to go. This is it in terms of the UDx, you have a couple of calls, and one parameter to pass, everything else is config driven, and really, you're up and running very quickly. We can even do demos and samples of this Vertical Udx, using hosted appliances, that we put up for pre sales purposes. So folks want to get up and get a demo going. We could take that Udx, configure it to point to our, appliance sitting on the internet, and within a couple of minutes, we're up and running with some simple use cases. Of course, for on-prem deployment, or deployment in the cloud, you'll want your own appliance in your own crypto district, you have your own security, but it just shows, that we can easily connect to any appliance, and get this working in a matter of minutes. Let's take a look deeper at the voltage plus Vertica solution, and we'll describe some of the use cases and path to success. First of all your steps to, implementing Data-centric security and Vertica. Want to note there on the left hand side, identify sensitive Data. How do we do this? I have one customer, where they look at me and say, Rich, we know exactly what our sensitive Data is, we develop the schema, it's our own App, we have a customer table, we don't need any help in this. We've got other customers that say, Rich, we have a very complex Database environment, with multiple Databases, multiple schemas, thousands of tables, hundreds of thousands of columns, it's really, really complex help, and we don't know what people have been doing exactly, with some of that Data, We've got various teams that share this resource. There, we do have additional tools, I wanted to give a shout out to another microfocus product, which is called Structured Data Manager. It's a great tool that helps you identify sensitive Data, with some really amazing technology under the hood, that can go into a Vertica repository, scan those tables, take a sample of rows or a full table scan, and give you back some really good reports on, we think this is sensitive, let's go confirm it, and move forward with Data protection. So if you need help on that, we've got the tools to do it. Once you identify that sensitive Data, you're going to want to understand, your Data flows and your use cases. Take a look at what analytics you're doing today. What analytics do you want to do, on sensitive Data in the future? Let's start designing our analytics, to work with sensitive Data, and there's some tips and tricks that we can provide, to help you mitigate, any kind of concerns around performance, or any kind of concerns around rewriting your SQL. As you've noted, you can just simply insert our SQL additions, into your code and you're off and running. You want to install and configure the Udx, and secure Data software plants. Well, the UDx is pretty darn simple. The documentation on Vertica is publicly available, you could see how that works, and what you need to configure it, one file here, and you're ready to go. So that's pretty straightforward to process, either grant some access to the Udx, and that's really up to the customer, because there are many different ways, to handle access control in Vertica, we're going to be flexible to fit within your model, of access control and adding the UDx to your mix. Each customer is a little different there, so you might want to talk with us a little bit about, the best practices for your use cases. But in general, that's going to be up and running in just a minute. The security software plants, hardened Linux appliance today, sits on-prem or in the cloud. And you can deploy that. I've seen it done in 15 minutes, but that's what the real tech you had, access to being able to generate a search, and do all this so that, your being able to set the firewall and all the DNS entries, the basically blocking and tackling of a software appliance, you get that done, corporations can take care of that, in just a couple of weeks, they get it all done, because they have wait waiting on other teams, but the software plants are really fast to get stood up, and they're very simple to administer, with our web based GUI. Then finally, you're going to implement your UDx use cases. Once the software appliance is up and running, we can set authentication methods, we could set up the format that you're going to use in Vertica, and then those two start talking together. And it should be going in dev and test in about half a day, and then you're running toward production, in just a matter of days, in most cases. We've got other customers that say, Hey, this is going to be a bigger migration project for us. We might want to split this up into chunks. Let's do the real sensitive and scary Data, like tax ID first, as our sort of toe in the water approach, and then we'll come back and protect other Data elements. That's one way to slice and dice, and implement your solution in a planned manner. Another way is schema based. Let's take a look at this section of the schema, and implement protection on these Data elements. Now let's take a look at the different schema, and we'll repeat the process, so you can iteratively move forward with your deployment. So what's the added value? When you add full Vertica plus voltage? I want to highlight this distinction because, Vertica contains world class security controls, around their Database. I'm an old time DBA from a different product, competing against Vertica in the past, and I'm really aware of the granular access controls, that are provided within various platforms. Vertica would rank at the very top of the list, in terms of being able to give me very tight control, and a lot of different AWS methods, being able to protect the Data, in a lot of different use cases. So Vertica can handle a lot of your Data protection needs, right out of the box. Voltage Secure Data, as we keep mentioning, adds that defense in-Depth, and it's going to enable those, enterprise wide use cases as well. So first off, I mentioned this, the standard of FF1, that is format preserving encryption, we're the authors of it, we continue to maintain that, and we want to emphasize that customers, really ought to be very, very careful, in terms of choosing a NIST standard, when implementing any kind of encryption, within the organization. So 8 ES was one of the first, and Hallmark, benchmark encryption algorithms, and in 2016, we were added to that mix, as FF1 with CS online. If you search NIST, and Voltage Security, you'll see us right there as the author of the standard, and all the processes that went along with that approval. We have centralized policy for key management, authentication, audit and compliance. We can now see that Vertica selected or fetch the key, to be able to protect some Data at this date and time. We can track that and be able to give you audit, and compliance reporting against that Data. You can move protected Data into and out of Vertica. So if we ingest via Kafka, and just via NiFi and Kafka, ingest on stream sets. There are a variety of different ingestion methods, and streaming methods, that can get Data into Vertica. We can integrate secure Data with all of those components. We're very well suited to integrate, with any Hadoop technology or any big Data technology, as we have API's in a variety of languages, bitness and platforms. So we've got that all out of the box, ready to go for you, if you need it. When you're moving Data out of Vertica, you might move it into an open systems platform, you might move it to the cloud, we can also operate and do the decryption there, you're going to get the same plaintext back, and if you protect Data over in the cloud, and move it into Vertica, you're going to be able to decrypt it in Vertica. That's our cross platform promise. We've been delivering on that for many, many years, and we now have many, many endpoints that do that, in production for the world's largest organization. We're going to preserve your Data format, and referential integrity. So if I protect my social security number today, I can protect another batch of Data tomorrow, and that same ciphertext will be generated, when I put that into Vertica, I can have absolute referential integrity on that Data, to be able to allow for analytics to occur, without even decrypting Data in many cases. And we have decrypt access for authorized users only, with the ability to add LDAP authentication authorization, for UDx users. So you can really have a number of different approaches, and flavors of how you implement voltage within Vertica, but what you're getting is the additional ability, to have that confidence, that we've got the Data protected at rest, even if I have a DBA that's not vetted or someone new, or I don't know where this person is from a third party, and being provided access as a DBA level privilege. They could select star from all day long, and they're going to get ciphertext, they're going to have nothing of any value, and if they want to use the UDF to decrypt it, they're going to be tracked and traced, as to their utilization of that. So it allows us to have that control, and additional layer of security on your sensitive Data. This may be required by regulatory agencies, and it's seeming that we're seeing compliance audits, get more and more strict every year. GDPR was kind of funny, because they said in 2016, hey, this is coming, they said in 2018, it's here, and now they're saying in 2020, hey, we're serious about this, and the fines are mounting. And let's give you some examples to kind of, help you understand, that these regulations are real, the fines are real, and your reputational damage can be significant, if you were to be in breach, of a regulatory compliance requirements. We're finding so many different use cases now, popping up around regional protection of Data. I need to protect this Data so that it cannot go offshore. I need to protect this Data, so that people from another region cannot see it. That's all the kind of capability that we have, within secure Data that we can add to Vertica. We have that broad platform support, and I mentioned NiFi and Kafka, those would be on the left hand side, as we start to ingest Data from applications into Vertica. We can have landing zone approaches, where we provide some automated scripting at an OS level, to be able to protect ETL batch transactions coming in. We could protect within the Vertica UDx, as I mentioned, with the copy command, directly using Vertica. Everything inside that dot dash line, is the Vertical Plus Voltage Secure Data combo, that's sold together as a single package. Additionally, we'd love to talk with you, about the stuff that's outside the dash box, because we have dozens and dozens of endpoints, that could protect and access Data, on many different platforms. And this is where you really start to leverage, some of the extensive power of secure Data, to go across platform to handle your web based apps, to handle apps in the cloud, and to handle all of this at scale, with hundreds of thousands of transactions per second, of format preserving encryption. That may not sound like much, but when you take a look at the algorithm, what we're doing on the mathematics side, when you look at everything that goes into that transaction, to me, that's an amazing accomplishment, that we're trying to reach those kinds of levels of scale, and with Vertica, it scales horizontally. So the more nodes you add, the more power you get, the more throughput you're going to get, from voltage secure Data. I want to highlight the next steps, on how we can continue to move forward. Our secure Data team is available to you, to talk about the landscape, your use cases, your Data. We really love the concept that, we've got so many different organizations out there, using secure Data in so many different and unique ways. We have vehicle manufacturers, who are protecting not just the VIN, not just their customer Data, but in fact they're protecting sensor Data from the vehicles, which is sent over the network, down to the home base every 15 minutes, for every vehicle that's on the road, and every vehicle of this customer of ours, since 2017, has included that capability. So now we're talking about, an additional millions and millions of units coming online, as those cars are sold and distributed, and used by customers. That sensor Data is critical to the customer, and they cannot let that be ex-filled in the clear. So they protect that Data with secure Data, and we have a great track record of being able to meet, a variety of different unique requirements, whether it's IoT, whether it's web based Apps, E-commerce, healthcare, all kinds of different industries, we would love to help move the conversations forward, and we do find that it's really a three party discussion, the customer, secure Data experts in some cases, and the Vertica team. We have great enablement within Vertica team, to be able to explain and present, our secure Data solution to you. But we also have that other ability to add other experts in, to keep that conversation going into a broader perspective, of how can I protect my Data across all my platforms, not just in Vertica. I want to give a shout out to our friends at Vertica Academy. They're building out a great demo and training facilities, to be able to help you learn more about these UDx's, and how they're implemented. The Academy, is a terrific reference and resource for your teams, to be able to learn more, about the solution in a self guided way, and then we'd love to have your feedback on that. How can we help you more? What are the topics you'd like to learn more about? How can we look to the future, in protecting unstructured Data? How can we look to the future, of being able to protect Data at scale? What are the requirements that we need to be meeting? Help us through the learning processes, and through feedback to the team, get better, and then we'll help you deliver more solutions, out to those endpoints and protect that Data, so that we're not having Data breach, we're not having regulatory compliance concerns. And then lastly, learn more about the Udx. I mentioned, that all of our content there, is online and available to the public. So vertica.com/secureData , you're going to be able to walk through the basics of the UDX. You're going to see how simple it is to set up, what the UDx syntax looks like, how to grant access to it, and then you'll start to be able to figure out, hey, how can I start to put this, into a PLC in my own environment? Like I mentioned before, we have publicly available hosted appliance, for demo purposes, that we can make available to you, if you want to PLC this. Reach out to us. Let's get a conversation going, and we'll get you the address and get you some instructions, we can have a quick enablement session. We really want to make this accessible to you, and help demystify the concept of encryption, because when you see it as a developer, and you start to get your hands on it and put it to use, you can very quickly see, huh, I could use this in a variety of different cases, and I could use this to protect my Data, without impacting my analytics. Those are some of the really big concerns that folks have, and once we start to get through that learning process, and playing around with it in a PLC way, that we can start to really put it to practice into production, to say, with confidence, we're going to move forward toward Data encryption, and have a very good result, at the end of the day. This is one of the things I find with customers, that's really interesting. Their biggest stress, is not around the timeframe or the resource, it's really around, this is my Data, I have been working on collecting this Data, and making it available in a very high quality way, for many years. This is my job and I'm responsible for this Data, and now you're telling me, you're going to encrypt that Data? It makes me nervous, and that's common, everybody feels that. So we want to have that conversation, and that sort of trial and error process to say, hey, let's get your feet wet with it, and see how you like it in a sandbox environment. Let's now take that into analytics, and take a look at how we can make this, go for a quick 1.0 release, and let's then take a look at, future expansions to that, where we start adding Kafka on the ingest side. We start sending Data off, into other machine learning and analytics platforms, that we might want to utilize outside of Vertica, for certain purposes, in certain industries. Let's take a look at those use cases together, and through that journey, we can really chart a path toward the future, where we can really help you protect that Data, at rest, in use, and keep you safe, from both the hackers and the regulators, and that I think at the end of the day, is really what it's all about, in terms of protecting our Data within Vertica. We're going to have a little couple minutes for Q&A, and we would encourage you to have any questions here, and we'd love to follow up with you more, about any questions you might have, about Vertica Plus Voltage Secure Data. They you very much for your time today.
SUMMARY :
and our engineering team is planning to join the Forum, and our goal is to keep you off the news,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Vertica | ORGANIZATION | 0.99+ |
100 gig | QUANTITY | 0.99+ |
16 | QUANTITY | 0.99+ |
16 gigs | QUANTITY | 0.99+ |
200 gig | QUANTITY | 0.99+ |
Paige Roberts | PERSON | 0.99+ |
2016 | DATE | 0.99+ |
Paige | PERSON | 0.99+ |
Rich Gaston | PERSON | 0.99+ |
dozens | QUANTITY | 0.99+ |
2018 | DATE | 0.99+ |
Vertica Academy | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
SQL | TITLE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
1000 people | QUANTITY | 0.99+ |
Hallmark | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
Harold Potter | PERSON | 0.99+ |
Rich | PERSON | 0.99+ |
millions | QUANTITY | 0.99+ |
Stanford University | ORGANIZATION | 0.99+ |
15 minutes | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
Each customer | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
California | LOCATION | 0.99+ |
Kafka | TITLE | 0.99+ |
Vertica | TITLE | 0.99+ |
Latin | OTHER | 0.99+ |
tomorrow | DATE | 0.99+ |
2017 | DATE | 0.99+ |
eight cores | QUANTITY | 0.99+ |
two | QUANTITY | 0.98+ |
GDPR | TITLE | 0.98+ |
first | QUANTITY | 0.98+ |
one customer | QUANTITY | 0.98+ |
Tableau | TITLE | 0.98+ |
United States | LOCATION | 0.97+ |
this week | DATE | 0.97+ |
Vertica | LOCATION | 0.97+ |
4/2 | DATE | 0.97+ |
Linux | TITLE | 0.97+ |
one file | QUANTITY | 0.96+ |
vertica.com/secureData | OTHER | 0.96+ |
four | QUANTITY | 0.95+ |
about half a day | QUANTITY | 0.95+ |
Cognos | TITLE | 0.95+ |
four people | QUANTITY | 0.94+ |
Udx | ORGANIZATION | 0.94+ |
one way | QUANTITY | 0.94+ |
Rob Gruener, Telstra & Raj Patnam, ScienceLogic | ScienceLogic Symposium 2019
>> from Washington, D. C. It's the queue covering science logic. Symposium twenty nineteen. Brought to you by Science Logic >> Hi, I'm student men and this is the Cubes coverage of Science Logic. Symposium twenty nineteen here at the Ritz Carlton in Washington, D. C. First of all, want Welcome back to the program. Roger Putnam, Who's the vice president of Global Solutions? That science logic Thanks for coming back and what with programme A first time Rob Gruner listed is this loosened architect from Telstra. But >> Rob, I actually had >> a chance to talk to some of your co ords there, they said. Arav robs a wizard. He's an engineer that does everything. So you know, solutions. Architect. Of course, we know that they're out there. They do a lot of different things and asleep, leased. Your peers say you're somebody that does quite a lot of different >> things. Did Jack of All trades master of none unfortunate >> way? It's all right, don't you know it is in vogue now to be, you know, a generalist. It's, you know, we've gone from specialties to well, oh no, it's it's platforms and everything's going to be everything, so I have plenty of background with Telstra, but maybe talk a little bit about you know, your role in the organization and what what kind of things you're involved in. Since you know some of those trades that you >> are jack of all, >> probably our spies have come into Telstra's an acquisition. So, you know, working for small company, you tend to do everything on. For some reason, I've been allowed to continue to do that on developing expertise around science logic. And that means I've been involved across a lot of areas of the business as we've been adopting science logic more widely, and it's been quite interesting. Process means eye contact, that expertise and then see how it's applied across the organization. So it's been quite interesting, >> awesome. One of things that's been interested in me and in talking to service Friday is talking to the enterprise customers is two. You know how many tools they had, how many they replaced with science logic, but also what things it's integrating with and working with. It was a big focus on the keynote this morning is, you know, integrations with Sam and you know all these various pieces, so maybe give us a little bit of kind of the scope. You know how long's tells me you've been using science logic, How broads the deployment and you know what? What? What does it do in? What does it tie into >> a tte? The mammoth is more enterprise focused. So on. That's the area. Tell Stur I come from so it's really around delivering services to her customers. Quite recently, we've seen then looking in deploying science logic across their carriage spokes and managing services there. That's quite a large deployment. You know, we're quite happy with that in terms of what is going to be doing for the business on the integrations, their endless. So Telstra, like a lot of large organizations, has a lot of different systems to talk to. A lot of different service dis, depending on the operational areas. So in service now is one of those. But it's a hollow of other stuff on, so that's a very challenging process. And sounds objects being pretty good at, you know, spreading itself around. Those >> give us a little insight as to you know, how fast things are changing. You know, hear Kafka and Streams and, you know, constantly moving I've been looking at the, you know, communities and container stuff that's happening, which is which is fast moving. So >> are definitely say it. And Telstra's trying as hard as akin to move as quickly as the market can allowed. So definitely it's virtual izing. ITT's automating II ops is a big component of what we're doing. It is extremely important for the business. >> Okay, so Alps is something you're doing have to We're not as mature as we'd like to video. I'm not sure if you saw the keynote this morning, but they put out a maturity models So would love for you to, you know, where are you when you look at that? They kind of had the three criterias there is. There's kind of the the machine learning, there's the automation and I'm trying to remember the third piece that was there, but you know where where are you today? You know, how'd you get there? And you know what? What's what's a little bit of the road map going forward? >> I think it might be probably our ambitions to be in that the upper end of the spectrum and into remediation, But that's an ambition and I think we've got a while to go with that. So, uh, more than that, I can't coming off >> its interests. So they have that The keynote tomorrow they're going. Jean Kim speaking on the deaf ops. And, you know, I'm a big fan of the Phoenix project and they talked about, you know, the jack of all trades that does it all. He could sometimes be the bottleneck in the system. Absolutely. Because you can't be up. I need something fixed. Well, we'LL go to Rob Rob all fix it. That's great. That fire floating mode. I know I've done that in my career, and it's one of those things. Oh, jeez, you're never going to move at this job because you're replaceable. It's like that's a dangerous place to be. >> It is s >> o. You know, we talk a little bit about, you know, you said, you know, science logic. You know that they position themselves as this is going to help you move that, you know, machine speed and keep up with that. Give us a little bit the reality of what you're seeing. How what does that impact your job? Your organization? >> Look, I think sounds logic has done a wonderful job within the organization. It's it's the legacy infrastructure within any organization, particularly tells her scale. That's really holding you back on. There's a lot of Well, I think people level with Intel Street. Move as quickly as we can, but we have such a large number of legacy systems to deal with. You know, we're looking at one deployment of Sands object. We were looking at IDing systems to kill, So it's a big task >> the wonderful technical death that we've all inherited. So So you know, Roger, you know, this something we hear from all customers. It'd be lovely if I had the mythical, you know, unicorn that, you know, start from the ground up and you know, he can start afresh. But we always have to have that mix and give it a little bit about what you're seeing. You know, about the Telstra in a little bit broader, You know, >> I think what tell us she has done really well with taking advantage of our technology was they didn't come in with this attitude of would rip out everything that we have and just have a magic easy bun. Software doesn't work that way. I think we've all learned the lessons of tough deployments when you try to stay out of fix everything. So they came in with a really gradual, phased approach of Get a couple pieces done where they had gaps. You start to fill those gaps. What's happening during the last few years as we've seen the shift greater change and they've taken advantage of the platforms, nationalities a hole as they go through their digitization efforts. And so as they digitize, they taking this step by step by step approach to you know what you were saying earlier with Rob does. He doesn't answer the question of being the one man band, but they did was they build it all process wise, using software to drive the automation. So once it's done one time, you're not stuck on the person anymore. And so I think when we look at our most successful customers like Telstra, it's because they've had this gradual, phased approach where they're using software rather than single person bottlenecks. And rather than having these tiger teams to try to solve problems and moving towards a better process to take advantage of the world, we're in today. So how >> do you measure success? You know, what are some of the business outcomes or, you know, k p I's that you understand how you're moving from kind of where you were to where you want to be. >> Uh, that's a difficult one to answer because particularly sounds, logic was used in so many different context. So for a certain part of the business, we might say, Are we monitoring the full stack? I were giving customers real value invisibility through the whole dynamic of the business. And then, in another context, we using sound subject. We were just saying, We just need to deploy its scale. We need two one board as quickly as possible. We need to keep the cost down to a minimum. We need to keep events that's allow as possible. Okay, so it's more about the efficiency argument, so it's really depends and way we're trying to use it and how we're deploying it. So >> how do you have visibility across how everybody is doing and getting trained on the latest things and keeping up to date and sharing best practices? How do you manage that internally, and how do you how do you do you network with your peers on some of that? >> Well, we've tried Teo really within. Tell us we have a concept of centre of excellence. So it's really about, you know, being recognizes the business experts in particular area and allowing the business to understand. That's that. That's where the expertise sits on a certain we've done a very good job with that and then allowing and communicating that after the business as well. So it's a very tough asked. It's a big business. We have thirty thousand people so often one person doesn't know about another person, another floor on the buildings, you know, to try and spread it across the biz, since we have fifty officers worldwide. So it's a process, you >> know? I mean, Roger just want one of things that here is, you know, science logic. It's not a widget, and it's, you know, can fit in a lot of different environments and a lot of different uses. You know, I heard of, you know, strong emphasis in into training had your CEO on where in his wizard tat for for for the that the learning knowledge that was gonna happen. So you know you talk a little bit about how science logic is looking to address this, especially for some you know, large customers like Telstra. >> You know, I think there's a general skills gap in is a whole beyond our technology beyond what's taking place in the world today. And you know, I've been in the business for quite a while, and we've long focused on training the operator on how to utilize the technology to solve their specific problems. And while that those aspects really powerful, some of the things we've done recently to go a step further is when we hear similar questions. We started record all of those so our customers could watch videos of how to solve problems instead of just going onto some form and let me type some question and hope somebody responds to in the future. You have read it for that. So we've got a look at a better mechanism and video based training handheld handling the customers we can build out these use cases drives the platform value, and what Telstra does it's really unique is they use the platform less so from a perspective of can I manage X y Z technology. But what can I build on top of it? How can I break the platform to some extend? And Rob is a mad scientist for us here. I mean, could jump into this more. But they've broken the platform to solve those business needs by addressing them individually. And what we've done is we've taken his best practices, and we rolled them back out to the rest of our customers. So with Robin, tell Hsia and a couple of other really great customers were driving a better community and sense of community so less question, answer form, less traditional support, more video, more community, more share ability. And that's where you're going to get additional quality. Coming out from the products are being delivered. Makes sense to you, Robert. Absolutely. >> Yeah, Rob. I mean, I love any commentary on that. You know, the network effect of software especially would talk about Sasser as a service type things, you know, that's what sales force really came out. It was like a weight one customer. Ask for something and wake everybody. You can take advantage of that or something similar. So are you seeing that kind of dynamics today with science logic and with others >> well, perfectly within the Telstra business. Absolutely so by building a capital into one area, you can share it across. And we found that we've been able to then sell the system internally, your internal stakeholders, so they appreciate the value of it and we can build on that. And then our customers, whilst we don't necessarily lady with the product they can. They see what's going on, and they basically then take it on as a service as well. So it's very, very interesting process. >> So one thing we haven't talked about yet, but you talk about data, you know, what's the role of data in your environment is something that you know key to the platform from science logic. How you leveraging it? How's that changing in your environment? One of the opportunities there. >> It's interesting questions. So as the telco, we collect a lot of data on DA. Obviously we have federal agencies who make that a requirement as well. So we have an existing data like initiative on that's very full of moment, and science logic is where we're looking at how we can add to that the value, valuable information and provides, but like everyone else, is a lot of data to collect, and it's an interesting process to try and make sense out of it and react accordingly. I mean, as a business, we were responding to millions and millions events of a day. So it's, you know, it's a difficult thing. >> Yeah, one of things. When we look at things like you know, anything that requires training like machine learning or the like, There's the balance between I want to learn from everybody. But you know, you're in a competitive marketplace. I don't want my competitors necessarily to get things. So you know the software products usually Well, I can isolate, and it doesn't have specific information. But how do you look at that dynamic of making sure that you gain from what the industry is doing, but that, you know, you could still stay competitive in ahead of your competition? >> Uh, >> no. I don't have a necessary can answer that. I suppose my head's tied into really what I could do with a platform and how I can then bring new technologies into the company's. So that's really are spies remind spaces on, Really, it's what I'm focused on. So you know what we do with the daughter probably is. He's not necessarily big concerns. How >> about that? There was quite a lot of announcements this week. The number of integrations as well as you know, update to the product. Anything specifically that you've been waiting for or that has caught your eye, >> the service now integration. I think it is far more advanced than has been in the past. On we have aspect of the business used thinks over quite heavily. So the fact that that's now matured and much more robust and you know which sort of offering that'LL have a lot of impact on the business. So I definitely mean the machine learning is another great thing on the question of then how that develops over time. So we'LL see how that goes. You >> know, Roger loves you know what? When I've been digging into some is the feedback you've been getting from customers and what's been leading toe, you know, some of the enhancement. So I would love, love your take on what you're saying. >> You know, I think one of the things that tell Sharpe pushed us towards a few years back was we're going to build. We already have a data like we don't need you to function. Is there Data Lake? So its multiple different Veda lakes And this concept of how do I move later From one day to lake to a different data Lake lakes within lakes ponds. Whatever the terminology is today the data ocean, our family perfect. And I'm getting to that data ocean from our lake. We have to go get streaming data. So now I'm going to extremes against really geographic here. But, you know, Rob really pushed us to make sure we could go right to Kaka buses and pushed data out. So what do you do with the data? And so tell Strip has been a, you know, an early adopter of a lot of our technology. And by being an early adopter, they've pushed us in a number of directions. So I think when you see a lot of the functionality that we've released this week and we've announced, it's been because of our customer base because of our partners like Telstra, that need to drive the business for further and forward, especially the industry like Telco World, where everything is mobile everything's moving so fast and aggressively. They're really like a good sounding board for where we need to go and how do we get there and and that drive And that partnership is What I think I'm most excited about working with tell sure is they demand from us to be excellent, and that gets great product coming out. And we see the results this week with all of our customers excitingly looking at stream treating capability that Rob was pushing us for well in advance of anyone else. >> Yeah, Robin, I want to give you the final word. You know, I can't help but notice you actually co branded shirts you've got tell star on your arm wither with science logic there. So, obviously, more than just a vendor relationship there, maybe close us out with you know how important science logic is. Two to your business >> job, Critical part of the business. I mean, particularly where we're looking at the commodity aspect of many services, you know, we can't survive unless we can provide quality, invaluable information where customers and really sounds. Logic has been the key platform for that. So in some respects, we're resting, you know, an aspect of the business entirely and Scientology's hands and we're hoping they'LL deliver >> well, Robin Raj, Thank you so much for joining us. Just sharing all the progress that you've made in. You know where things were going? Thanks so much, thanks to all right. And I'm student men. This is the Cube at Science Logic Symposium twenty nineteen. Thanks for watching.
SUMMARY :
Brought to you by Science Logic Who's the vice president of Global Solutions? So you know, solutions. with Telstra, but maybe talk a little bit about you know, your role in the organization and you know, working for small company, you tend to do everything on. How broads the deployment and you know what? And sounds objects being pretty good at, you know, spreading itself around. give us a little insight as to you know, how fast things are changing. It is extremely important for the business. you know, where are you when you look at that? I think it might be probably our ambitions to be in that the upper end of the spectrum And, you know, I'm a big fan of the Phoenix project and they talked about, You know that they position themselves as this is going to help you move that, you know, machine speed and keep That's really holding you back on. you know, unicorn that, you know, start from the ground up and you know, he can start afresh. And so as they digitize, they taking this step by step by step approach to you know what You know, what are some of the business outcomes or, you know, k p I's that you understand So for a certain part of the business, we might say, So it's really about, you know, being recognizes the business experts in particular area and allowing You know, I heard of, you know, strong emphasis in into training had your CEO on where in his wizard tat for And you know, I've been in the business for quite a while, and we've long focused on training So are you seeing that kind of dynamics today with science logic and with others you can share it across. So one thing we haven't talked about yet, but you talk about data, you know, what's the role of data in your environment So it's, you know, it's a difficult thing. but that, you know, you could still stay competitive in ahead of your competition? So you know what we do with the daughter probably is. The number of integrations as well as you know, So the fact that that's now matured and much more robust and you know and what's been leading toe, you know, some of the enhancement. So I think when you see a lot of the functionality that we've released this week and we've announced, more than just a vendor relationship there, maybe close us out with you know how important science we're resting, you know, an aspect of the business entirely and Scientology's hands and we're hoping they'LL deliver well, Robin Raj, Thank you so much for joining us.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Robert | PERSON | 0.99+ |
Robin | PERSON | 0.99+ |
Roger Putnam | PERSON | 0.99+ |
Roger | PERSON | 0.99+ |
Rob Gruener | PERSON | 0.99+ |
Rob Gruner | PERSON | 0.99+ |
Telstra | ORGANIZATION | 0.99+ |
Rob | PERSON | 0.99+ |
Sam | PERSON | 0.99+ |
Telco World | ORGANIZATION | 0.99+ |
Robin Raj | PERSON | 0.99+ |
Raj Patnam | PERSON | 0.99+ |
Jean Kim | PERSON | 0.99+ |
millions | QUANTITY | 0.99+ |
Washington, D. C. | LOCATION | 0.99+ |
fifty officers | QUANTITY | 0.99+ |
thirty thousand people | QUANTITY | 0.99+ |
third piece | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
one day | QUANTITY | 0.99+ |
this week | DATE | 0.98+ |
telco | ORGANIZATION | 0.98+ |
one person | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
ITT | ORGANIZATION | 0.98+ |
Two | QUANTITY | 0.98+ |
Jack | PERSON | 0.98+ |
one time | QUANTITY | 0.97+ |
Friday | DATE | 0.97+ |
Telstra | PERSON | 0.96+ |
ScienceLogic | ORGANIZATION | 0.96+ |
one | QUANTITY | 0.96+ |
Science Logic Symposium | EVENT | 0.94+ |
Global Solutions | ORGANIZATION | 0.94+ |
one area | QUANTITY | 0.92+ |
this morning | DATE | 0.92+ |
Strip | ORGANIZATION | 0.91+ |
Scientology | ORGANIZATION | 0.91+ |
Veda | LOCATION | 0.89+ |
three criterias | QUANTITY | 0.89+ |
First | QUANTITY | 0.89+ |
Kafka | TITLE | 0.89+ |
one board | QUANTITY | 0.88+ |
Hsia | PERSON | 0.88+ |
one customer | QUANTITY | 0.88+ |
Stur | PERSON | 0.86+ |
Rob Rob | PERSON | 0.85+ |
first time | QUANTITY | 0.85+ |
single person | QUANTITY | 0.84+ |
a day | QUANTITY | 0.84+ |
ScienceLogic Symposium 2019 | EVENT | 0.81+ |
few years back | DATE | 0.81+ |
Kaka | LOCATION | 0.77+ |
Intel Street | ORGANIZATION | 0.73+ |
one man | QUANTITY | 0.72+ |
one deployment | QUANTITY | 0.71+ |
couple pieces | QUANTITY | 0.7+ |
twenty nineteen | QUANTITY | 0.7+ |
Ritz Carlton | ORGANIZATION | 0.68+ |
Arav | PERSON | 0.67+ |
Cubes | PERSON | 0.67+ |
last few years | DATE | 0.65+ |
twenty | QUANTITY | 0.63+ |
Alps | ORGANIZATION | 0.61+ |